首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7730篇
  免费   980篇
  国内免费   87篇
化学   67篇
晶体学   4篇
力学   51篇
综合类   47篇
数学   727篇
物理学   450篇
无线电   7451篇
  2024年   19篇
  2023年   98篇
  2022年   114篇
  2021年   143篇
  2020年   237篇
  2019年   146篇
  2018年   143篇
  2017年   236篇
  2016年   314篇
  2015年   448篇
  2014年   720篇
  2013年   606篇
  2012年   736篇
  2011年   685篇
  2010年   471篇
  2009年   443篇
  2008年   493篇
  2007年   547篇
  2006年   446篇
  2005年   367篇
  2004年   294篇
  2003年   278篇
  2002年   246篇
  2001年   170篇
  2000年   92篇
  1999年   63篇
  1998年   41篇
  1997年   36篇
  1996年   38篇
  1995年   20篇
  1994年   13篇
  1993年   8篇
  1992年   9篇
  1991年   5篇
  1990年   7篇
  1989年   5篇
  1988年   5篇
  1987年   4篇
  1986年   9篇
  1985年   13篇
  1984年   4篇
  1983年   3篇
  1982年   4篇
  1981年   8篇
  1979年   5篇
  1978年   1篇
  1977年   1篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
排序方式: 共有8797条查询结果,搜索用时 122 毫秒
81.
针对低功耗有损网络(Low Power and Lossy Network, LLN)中移动节点作为中继节点时,存在无线链路易断开、数据传输成功率较低和控制开销较高的问题,提出了一种快速低开销的移动节点分布式寻路RPL路由协议(Mobile Node Distributed Pathfinding RPL Routing Protocol, MNA-RPL)。首先,提出一种邻居表自适应更新机制,依据邻居表快速切换父节点;其次,提出一种父子节点双断开机制,能够有效减少数据包丢失;最后,提出一种基于速度动态管理的Trickle计时器,根据自身速度动态调整DIO广播周期。理论分析和仿真结果表明,与主流路由协议相比,该协议在数据传输和控制开销等方面的性能均有一定的提升。  相似文献   
82.
The technological innovations and wide use of Wireless Sensor Network (WSN) applications need to handle diverse data. These huge data possess network security issues as intrusions that cannot be neglected or ignored. An effective strategy to counteract security issues in WSN can be achieved through the Intrusion Detection System (IDS). IDS ensures network integrity, availability, and confidentiality by detecting different attacks. Regardless of efforts by various researchers, the domain is still open to obtain an IDS with improved detection accuracy with minimum false alarms to detect intrusions. Machine learning models are deployed as IDS, but their potential solutions need to be improved in terms of detection accuracy. The neural network performance depends on feature selection, and hence, it is essential to bring an efficient feature selection model for better performance. An optimized deep learning model has been presented to detect different types of attacks in WSN. Instead of the conventional parameter selection procedure for Convolutional Neural Network (CNN) architecture, a nature-inspired whale optimization algorithm is included to optimize the CNN parameters such as kernel size, feature map count, padding, and pooling type. These optimized features greatly improved the intrusion detection accuracy compared to Deep Neural network (DNN), Random Forest (RF), and Decision Tree (DT) models.  相似文献   
83.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
84.
The use of rechargeable sensors is a promising solution for wireless sensor networks. On this type of network, mobile charging vehicles (MC) are used for charging sensors using wireless energy transfer (WET) technology. In on-demand charging, a sensor transmits a charging request to the service station, and the MC visits the sensor to transfer energy. The key disadvantages of utilizing MC-based WET are its high energy expenditure rate due to mobility, long service time, and slow charging rate. Because of these reasons, sensors deplete their energy and become dead before the MC reaches the requesting nodes to recharge. We have adapted a genetic algorithm-based partial charging scheme to serve the charging requests. Our objective is to improve the survival ratio of the network. Using comprehensive simulations, we analyze the performance of our proposed method and compare it to two other existing approaches. The simulation results demonstrate that our proposed algorithm improves the survival ratio by up to 20 % by developing a dynamic energy threshold function for transmitting charging requests from the sensors and a partial charging schedule using a genetic algorithm.  相似文献   
85.
In the area of wireless communication technologies, 6LoWPAN leverages the extensive capabilities of IPv6, even within the constraints imposed by resource-limited devices, particularly within wireless sensor networks (WSNs). The integration of 6LoWPAN into modern solutions for implementing the IPv6-based Internet of Things (IoT) is becoming increasingly important. In this paper, a sensor monitoring and notification system specifically designed for deployment over 6LoWPAN has been proposed. Multipurpose capability, scalability, and ease of deployability are the main features of the proposed system. Its architecture reflects the highest degree of flexibility and allows for a variety of use cases encountered in practical scenarios. In addition, a web interface has been developed as part of the comprehensive system architecture. This interface enables efficient management of the entire system and facilitates connection for new users and seamless integration of additional sensors. By encapsulating complex functions in a user-friendly interface, the system promotes accessibility, convenience, and an enhanced user experience. The proposed system overcomes the limitations of current approaches, thereby creating new opportunities. The flexibility of the proposed system allows it to be applied to various use cases.  相似文献   
86.
针对双无人机无源雷达对宽带辐射源目标的直接无源定位(DPD)初始值敏感,提出一种基于小生境拓扑结构改进矢量粒子群算法(NTVIPSO)的直接无源定位算法。本文算法将直接法和间接法结合起来,依靠间接法中尺度差参数构造约束条件,利用小生境矢量粒子群求解得到精确的位置。仿真结果表明本文粒子群算法优于矢量粒子群算法和邻域拓扑结构粒子群算法。提出的存在扰动情况下尺度差约束条件下的直接无源定算法精确度低于直接法,但优于间接法;计算复杂度低于直接法,大于间接法。  相似文献   
87.
Activating Wireless Power Transfer (WPT) in Radio-Frequency (RF) to provide on-demand energy supply to widely deployed Internet of Everything devices is a key to the next-generation energy self-sustainable 6G network. However, Simultaneous Wireless Information and Power Transfer (SWIPT) in the same RF bands is challenging. The majority of previous studies compared SWIPT performance to Gaussian signaling with an infinite alphabet, which is impossible to implement in any realistic communication system. In contrast, we study the SWIPT system in a well-known Nakagami-m wireless fading channel using practical modulation techniques with finite alphabet. The attainable rate-energy-reliability tradeoff and the corresponding rationale are revealed for fixed modulation schemes. Furthermore, an adaptive modulation-based transceiver is provided for further expanding the attainable rate-energy-reliability region based on various SWIPT performances of different modulation schemes. The modulation switching thresholds and transmit power allocation at the SWIPT transmitter and the power splitting ratios at the SWIPT receiver are jointly optimized to maximize the attainable spectrum efficiency of wireless information transfer while satisfying the WPT requirement and the instantaneous and average BER constraints. Numerical results demonstrate the SWIPT performance of various fixed modulation schemes in different fading conditions. The advantage of the adaptive modulation-based SWIPT transceiver is validated.  相似文献   
88.
随着移动互联网的发展,智能手机的快速普及,无线网络迅速融入当代人的主流生活,逐渐成为人们工作、学习与生活的基本需求。为了提高用户满意度,进一步提高网络覆盖面积,实现园区室外无线覆盖,文章提出了一种园区室外无线覆盖解决方案,有效解决了用户室外无线上网的需求。  相似文献   
89.
设计了学生信息管理系统来解决学校学生信息管理方面不完善问题,此系统分为基本信息管理、疫苗信息管理和位置管理三个模块,通过收集学生的基本信息,疫苗详细信息和学生位置变化信息,提高学校收集管理学生信息的时间效率以及减少统计错误等问题。  相似文献   
90.
In many wireless sensor network (WSN) applications, the location of a sensor node is crucial for determining where the event or situation of interest occurred. Therefore, localization is one of the critical challenges in WSNs. Mobile anchor node assisted localization (MANAL) is one of the promising solutions for the localization of statically deployed sensors. The main problem in MANAL localization is that the path planning of the mobile anchor (MA) node should be done so that the localization error in the network will be minimal and that all unknown nodes in the network are covered. This paper proposes a new path planning approach called nested hexagons curves (NHexCurves) for MANAL. NHexCurves guarantees that it will receive messages from at least three non-collinear anchors to locate all unknown nodes in the network. The proposed model has compared six different path planning schemes in the literature using weighted centroid localization (WCL). In these comparisons, first of all, localization errors of the models are compared using some statistical concepts. Second, the variation of the localization error according to parameters such as resolution (R) and the standard deviation of noise (σ) is observed. Then, with similar approaches, the standard deviation of errors, localization ratio, scalability performances, and finally, path lengths of the models are examined. The simulation results show that the NHexCurves static path planning model proposed in this study stands out compared to other models with high localization error and localization ratio performance, especially at low resolutions, due to its path design. At the same time, the lowest error values according to σ are obtained with the proposed model among all models considered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号