首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3051篇
  免费   429篇
  国内免费   34篇
化学   6篇
晶体学   1篇
力学   3篇
综合类   25篇
数学   466篇
物理学   124篇
无线电   2889篇
  2024年   12篇
  2023年   45篇
  2022年   51篇
  2021年   52篇
  2020年   69篇
  2019年   65篇
  2018年   56篇
  2017年   85篇
  2016年   115篇
  2015年   138篇
  2014年   197篇
  2013年   240篇
  2012年   194篇
  2011年   222篇
  2010年   175篇
  2009年   206篇
  2008年   179篇
  2007年   257篇
  2006年   214篇
  2005年   161篇
  2004年   172篇
  2003年   152篇
  2002年   114篇
  2001年   111篇
  2000年   60篇
  1999年   31篇
  1998年   26篇
  1997年   26篇
  1996年   20篇
  1995年   23篇
  1994年   8篇
  1993年   8篇
  1992年   9篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1985年   10篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1970年   1篇
排序方式: 共有3514条查询结果,搜索用时 15 毫秒
121.
Mobile ad hoc networks (MANETs) are of much interest to both the research community and the military because of the potential to establish a communication network in any situation that involves emergencies. Examples are search‐and‐rescue operations, military deployment in hostile environments, and several types of police operations. One critical open issue is how to route messages considering the characteristics of these networks. The nodes act as routers in an environment without a fixed infrastructure, the nodes are mobile, the wireless medium has its own limitations compared to wired networks, and existing routing protocols cannot be employed, at least without modifications. Over the last few years, a number of routing protocols have been proposed and enhanced to address the issue of routing in MANETs. It is not clear how those different protocols perform under different environments. One protocol may be the best in one network configuration but the worst in another. This article provides an analysis and performance evaluation of those protocols that may be suitable for military communications. The evaluation is conducted in two phases. In the first phase, we compare the protocols based on qualitative metrics to locate those that may fit our evaluation criteria. In the second phase, we evaluate the selected protocols from the first phase based on quantitative metrics in a mobility scenario that reflects tactical military movements. The results disclose that there is no routing protocol in the current stage without modifications that can provide efficient routing to any size of network, regardless of the number of nodes and the network load and mobility. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
122.
研究并设计了一款基于阿基米德螺旋天线的宽频带(覆盖GPS,BeiDou 和GLONASS 卫星导航系统的所有工作频点,即1.1 -1.7 GHz)高稳定相位中心导航天线。以带有反射腔的阿基米德螺旋天线为基础,结合三维扼流环抑制多径效应的性能,通过加载扼流环,并经有限元电磁仿真软件的参数优化设计,很大程度上改善了整个频带内天线在特定俯仰角范围内的相位稳定度。所设计的宽频带高稳定相位中心导航天线的指标达到:在GPS,BeiDou 和GLONASS 卫星导航系统的所有工作频点上,输入端口驻波比小于1.5;在俯仰角为-60°-60°的范围内,方向图轴比小于2 dB,相位稳定度在-2.7°-2.7°;同时由于扼流环的加载,天线的抗多径性能也得到了改善。研究表明,加载了三维扼流环的阿基米德螺旋天线综合性能优异,适合作为宽频带高稳定相位中心导航天线。  相似文献   
123.
Designing a trusted and secure routing solution in an untrustworthy scenario is always a challenging problem. Lack of physical security and low trust levels among nodes in an ad hoc network demands a secure end-to-end route free of any malicious entity. This is particularly challenging when malicious nodes collude with one another to disrupt the network operation. In this paper we have designed a secure routing solution to find an end-to-end route free of malicious nodes with collaborative effort from the neighbors. We have also extended the solution to secure the network against colluding malicious nodes, which, to the best of our knowledge, is the first such solution proposed. We have also proposed a framework for computing and distributing trusts that can be used with out trusted routing protocol. Our proposed framework is unique and different from the other schemes in that it tries to analyze the psychology of the attacker and quantifies the behavior in the computational model. Extensive simulation has been carried out to evaluate the design of our protocol. Partially funded by Department of Defense Award No. H98230-04-C-0460, Department of Transportation Project No. FL-26-7102-00 and National Science Foundation Grant Nos. ANI-0123950 and CCR-0196557. Tirthankar Ghosh is a PhD candidate in the Telecommunications and Information Technology Institute at Florida International University. His area of research is routing security and trust computation in wireless ad hoc and sensor networks. He received his Bachelor of Electrical Engineering from Jadavpur University, India and Masters in Computer Engineering from Florida International University. Dr. Niki Pissinou received her Ph.D. in Computer Science from the University of Southern California, her M.S. in Computer Science from the University of California at Riverside, and her B.S.I.S.E. in Industrial and Systems Engineering from The Ohio State University. She is currently a tenured professor and the director of the Telecommunication & Information Technology Institute at FIU. Previously Dr. Pissinou was a tenured faculty at the Center for Advanced Computer Studies at the University of Louisiana at Lafayette where she was also the director of the Telecommunication & Information & Technology Laboratory partially funded by NASA, and the co-director of the NOMAD: A Wireless and Nomadic Laboratory partially funded by NSF, and the Advanced Network Laboratory. Dr. Pissinou is active in the fields computer networks, information technology and distributed systems. Dr. Kami (Sam) Makki has earned his Ph.D. in Computer Science from the University of Queensland in Brisbane Australia, his Masters degree in Computer Science and Engineering from the University of New South Wales in Sydney Australia, and his Bachelor and Masters Degrees in Civil Engineering from the University of Tehran Iran. Before joining the department of Electrical Engineering and Computer Science at the University of Toledo he has held a number of academic positions and research appointments at the Queensland University of Technology in Brisbane, Royal Melbourne Institution of Technology in Melbourne and at The University of Queensland in Brisbane Australia. He is an active researcher in the fields of distributed systems, databases, mobile and wireless communications, and has more than 30 publications in peerreviewed journals and international proceedings. He has served as a chair and technical program committee member and reviewer for a number of IEEE and ACM sponsored technical conferences and has received a number of achievement awards.  相似文献   
124.
马恒  杜庆伟 《电子科技》2013,26(5):117-121
当前,基于社区的机会网络研究在模型上还有待完善,在社区间的路由算法没有考虑消息的传输效率,只采用简单的分发等待路由算法,使得路由效率较低。为此,对社区模型进行了改进,加入节点回归因素,并在此模型下提出了新的路由算法NBR。在社区内采用混合路由算法,并加入了正反馈思想重新计算节点活跃度。在社区间采用查询路由表和判断节点回归相结合的方法,利用节点回归的特性提高转发效率。仿真结果表明,在改进后的社区模型下,NBR算法使得社区间和社区内的消息传输成功率得到了提升,有效的降低了网络资源的消耗。  相似文献   
125.
With the growth of network traffic volume, link congestion cannot be avoided efficiently with conventional routing protocols. By utilizing the single shortest‐path routing algorithm from link state advertisement information, standard routing protocols lack of global awareness and are difficult to be modified in a traditional network environment. Recently, software‐defined network (SDN) provided innovative architecture for researchers to program their own network protocols. With SDN, we can divert heavy traffic to multiple paths in order to resolve link congestion. Furthermore, certain network traffics come in periodic fashion such as peak hours at working days so that we can leverage forecasting for resource management to improve its performance. In this paper, we propose a proactive multipath routing with a predictive mechanism (PMRP) to achieve high‐performance congestion resolution. PMRP has two main concepts: (a) a proactive mechanism where PMRP deploys M/M/1 queue and traffic statistics to simulate weighted delay for possible combinations of multipaths placement of all subnet pairs, and leverage genetic algorithm for accelerating selection of optimized solution, and (b) a predictive mechanism whereby PMRP uses exponential smoothing for demand traffic volumes and variance predictions. Experimental results show a 49% reduction in average delay as compared with single shortest routing, and a 16% reduction in average delay compared with utilization & topology‐aware multipath routing (UTAMP). With the predictive mechanism, PMRP can decrease an additional 20% average delay. Furthermore, PMRP reduces 93% of flow table usage on average as compared with UTAMP.  相似文献   
126.
在分析了最小跳数路由算法局限性的基础上对该算法进行了改进,充分考虑了无线传感器网络的跳数、能量、负载均衡等问题。改进后的算法使得传感器的某些节点不会因为频繁使用而迅速死亡,数据包可以沿着最优的路径向网关节点发送。仿真结果显示,改进后的算法可以有效地提高无线传感器网络的可靠性和稳定性,延长了网络的通信时间。  相似文献   
127.
路由方案是Ad hoc网络中一个热点研究领域。其中,按需路由算法由于其有效性在带宽受限的Ad hoc网络中得到比较大的发展。然而大部分的按需路由算法,建立并只使用单条路由,当前使用的路径的链路断开时,路由算法必须执行一个路由修复过程。提出了不相关多路由源端路由算法(DMSR),建立并利用多条最大不相关路由。算法中,中间节点等待一段时间以得到多个路由请求包(RREQ),然后在这个RREQ中,选择相关性最小的多路径,并将这些信息写入一个RREQ中,并将它广播出去。从仿真结果可以看出本文的算法提高了数据包的正确传输率和业务均衡性。  相似文献   
128.
LDPC码在浅海水声通信中的应用研究   总被引:1,自引:0,他引:1  
LDPC码具有编码增益高、译码速度快、可并行译码等特点,是当前编码界的一个研究热点。针对复杂多变、强多途和大起伏干扰的浅海水声信道,建立了LDPC码在浅海水声信道中仿真的模型,仿真研究了浅海水声信道下采用和一积译码算法的LDPC码性能。仿真结果表明,LDPC码在3径多途信道下性能优越;当译码迭代3—5次,码长1000bit左右时基本上能满足水声通信对误码率为10^-4的基本要求。  相似文献   
129.
介绍了基于负载均衡的动态负载感知路由协议(DLLMR)的工作过程,DLLMR协议对DSR协议进行了3个方面的改进:①避免了负载较重的路径上继续增加业务量;②均匀地分配网络中的业务流;③减小了由于重新发起路由发现过程带来的开销和时延。最后介绍了以负载、时延为尺度的路径优劣判定准则。  相似文献   
130.
王石记  张乃通 《通信学报》2005,26(10):128-132
针对DS-UWB在室内高速短距离通信上的诸多优势,文章介绍了基于采用一组正交脉冲UWB信号的三进制互补集。文章首先建立了多用户通信传输的系统模型,分析了三进制互补集及其递归构造方法,进而提出了一种利用Rake接收的三进制互补集多用户通信性能评估结构。由于三进制互补集有良好的非周期自相关和互相关函数,因此减轻了多用户和多径干扰。仿真结果表明,在SV/IEEE802.15.3a信道模型下三进制互补集相对于其它随机序列而言具有更好的性能。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号