全文获取类型
收费全文 | 3051篇 |
免费 | 429篇 |
国内免费 | 34篇 |
专业分类
化学 | 6篇 |
晶体学 | 1篇 |
力学 | 3篇 |
综合类 | 25篇 |
数学 | 466篇 |
物理学 | 124篇 |
无线电 | 2889篇 |
出版年
2024年 | 12篇 |
2023年 | 45篇 |
2022年 | 51篇 |
2021年 | 52篇 |
2020年 | 69篇 |
2019年 | 65篇 |
2018年 | 56篇 |
2017年 | 85篇 |
2016年 | 115篇 |
2015年 | 138篇 |
2014年 | 197篇 |
2013年 | 240篇 |
2012年 | 194篇 |
2011年 | 222篇 |
2010年 | 175篇 |
2009年 | 206篇 |
2008年 | 179篇 |
2007年 | 257篇 |
2006年 | 214篇 |
2005年 | 161篇 |
2004年 | 172篇 |
2003年 | 152篇 |
2002年 | 114篇 |
2001年 | 111篇 |
2000年 | 60篇 |
1999年 | 31篇 |
1998年 | 26篇 |
1997年 | 26篇 |
1996年 | 20篇 |
1995年 | 23篇 |
1994年 | 8篇 |
1993年 | 8篇 |
1992年 | 9篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 10篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有3514条查询结果,搜索用时 15 毫秒
121.
Georgios Kioumourtzis Christos Bouras Apostolos Gkamas 《International Journal of Network Management》2012,22(3):216-234
Mobile ad hoc networks (MANETs) are of much interest to both the research community and the military because of the potential to establish a communication network in any situation that involves emergencies. Examples are search‐and‐rescue operations, military deployment in hostile environments, and several types of police operations. One critical open issue is how to route messages considering the characteristics of these networks. The nodes act as routers in an environment without a fixed infrastructure, the nodes are mobile, the wireless medium has its own limitations compared to wired networks, and existing routing protocols cannot be employed, at least without modifications. Over the last few years, a number of routing protocols have been proposed and enhanced to address the issue of routing in MANETs. It is not clear how those different protocols perform under different environments. One protocol may be the best in one network configuration but the worst in another. This article provides an analysis and performance evaluation of those protocols that may be suitable for military communications. The evaluation is conducted in two phases. In the first phase, we compare the protocols based on qualitative metrics to locate those that may fit our evaluation criteria. In the second phase, we evaluate the selected protocols from the first phase based on quantitative metrics in a mobility scenario that reflects tactical military movements. The results disclose that there is no routing protocol in the current stage without modifications that can provide efficient routing to any size of network, regardless of the number of nodes and the network load and mobility. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
122.
研究并设计了一款基于阿基米德螺旋天线的宽频带(覆盖GPS,BeiDou 和GLONASS 卫星导航系统的所有工作频点,即1.1 -1.7 GHz)高稳定相位中心导航天线。以带有反射腔的阿基米德螺旋天线为基础,结合三维扼流环抑制多径效应的性能,通过加载扼流环,并经有限元电磁仿真软件的参数优化设计,很大程度上改善了整个频带内天线在特定俯仰角范围内的相位稳定度。所设计的宽频带高稳定相位中心导航天线的指标达到:在GPS,BeiDou 和GLONASS 卫星导航系统的所有工作频点上,输入端口驻波比小于1.5;在俯仰角为-60°-60°的范围内,方向图轴比小于2 dB,相位稳定度在-2.7°-2.7°;同时由于扼流环的加载,天线的抗多径性能也得到了改善。研究表明,加载了三维扼流环的阿基米德螺旋天线综合性能优异,适合作为宽频带高稳定相位中心导航天线。 相似文献
123.
Tirthankar?GhoshEmail author Niki?Pissinou Kami?Sam?Makki 《Mobile Networks and Applications》2005,10(6):985-995
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical
security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity.
This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper
we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from
the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best
of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts
that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes
in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive
simulation has been carried out to evaluate the design of our protocol.
Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00
and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557.
Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His
area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor
of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University.
Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the
University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University.
She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU.
Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at
Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded
by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network
Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems.
Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer
Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in
Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer
Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland
University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland
in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications,
and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical
program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number
of achievement awards. 相似文献
124.
当前,基于社区的机会网络研究在模型上还有待完善,在社区间的路由算法没有考虑消息的传输效率,只采用简单的分发等待路由算法,使得路由效率较低。为此,对社区模型进行了改进,加入节点回归因素,并在此模型下提出了新的路由算法NBR。在社区内采用混合路由算法,并加入了正反馈思想重新计算节点活跃度。在社区间采用查询路由表和判断节点回归相结合的方法,利用节点回归的特性提高转发效率。仿真结果表明,在改进后的社区模型下,NBR算法使得社区间和社区内的消息传输成功率得到了提升,有效的降低了网络资源的消耗。 相似文献
125.
Ying‐Dar Lin Te‐Lung Liu Shun‐Hsien Wang Yuan‐Cheng Lai 《International Journal of Communication Systems》2019,32(14)
With the growth of network traffic volume, link congestion cannot be avoided efficiently with conventional routing protocols. By utilizing the single shortest‐path routing algorithm from link state advertisement information, standard routing protocols lack of global awareness and are difficult to be modified in a traditional network environment. Recently, software‐defined network (SDN) provided innovative architecture for researchers to program their own network protocols. With SDN, we can divert heavy traffic to multiple paths in order to resolve link congestion. Furthermore, certain network traffics come in periodic fashion such as peak hours at working days so that we can leverage forecasting for resource management to improve its performance. In this paper, we propose a proactive multipath routing with a predictive mechanism (PMRP) to achieve high‐performance congestion resolution. PMRP has two main concepts: (a) a proactive mechanism where PMRP deploys M/M/1 queue and traffic statistics to simulate weighted delay for possible combinations of multipaths placement of all subnet pairs, and leverage genetic algorithm for accelerating selection of optimized solution, and (b) a predictive mechanism whereby PMRP uses exponential smoothing for demand traffic volumes and variance predictions. Experimental results show a 49% reduction in average delay as compared with single shortest routing, and a 16% reduction in average delay compared with utilization & topology‐aware multipath routing (UTAMP). With the predictive mechanism, PMRP can decrease an additional 20% average delay. Furthermore, PMRP reduces 93% of flow table usage on average as compared with UTAMP. 相似文献
126.
127.
路由方案是Ad hoc网络中一个热点研究领域。其中,按需路由算法由于其有效性在带宽受限的Ad hoc网络中得到比较大的发展。然而大部分的按需路由算法,建立并只使用单条路由,当前使用的路径的链路断开时,路由算法必须执行一个路由修复过程。提出了不相关多路由源端路由算法(DMSR),建立并利用多条最大不相关路由。算法中,中间节点等待一段时间以得到多个路由请求包(RREQ),然后在这个RREQ中,选择相关性最小的多路径,并将这些信息写入一个RREQ中,并将它广播出去。从仿真结果可以看出本文的算法提高了数据包的正确传输率和业务均衡性。 相似文献
128.
LDPC码在浅海水声通信中的应用研究 总被引:1,自引:0,他引:1
LDPC码具有编码增益高、译码速度快、可并行译码等特点,是当前编码界的一个研究热点。针对复杂多变、强多途和大起伏干扰的浅海水声信道,建立了LDPC码在浅海水声信道中仿真的模型,仿真研究了浅海水声信道下采用和一积译码算法的LDPC码性能。仿真结果表明,LDPC码在3径多途信道下性能优越;当译码迭代3—5次,码长1000bit左右时基本上能满足水声通信对误码率为10^-4的基本要求。 相似文献
129.
130.
针对DS-UWB在室内高速短距离通信上的诸多优势,文章介绍了基于采用一组正交脉冲UWB信号的三进制互补集。文章首先建立了多用户通信传输的系统模型,分析了三进制互补集及其递归构造方法,进而提出了一种利用Rake接收的三进制互补集多用户通信性能评估结构。由于三进制互补集有良好的非周期自相关和互相关函数,因此减轻了多用户和多径干扰。仿真结果表明,在SV/IEEE802.15.3a信道模型下三进制互补集相对于其它随机序列而言具有更好的性能。 相似文献