首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   741篇
  免费   88篇
化学   31篇
力学   20篇
综合类   2篇
数学   50篇
物理学   26篇
无线电   700篇
  2024年   3篇
  2023年   19篇
  2022年   24篇
  2021年   42篇
  2020年   31篇
  2019年   35篇
  2018年   31篇
  2017年   38篇
  2016年   46篇
  2015年   48篇
  2014年   72篇
  2013年   52篇
  2012年   47篇
  2011年   50篇
  2010年   27篇
  2009年   26篇
  2008年   16篇
  2007年   25篇
  2006年   21篇
  2005年   23篇
  2004年   17篇
  2003年   23篇
  2002年   24篇
  2001年   18篇
  2000年   22篇
  1999年   7篇
  1998年   4篇
  1997年   7篇
  1996年   9篇
  1995年   3篇
  1994年   3篇
  1993年   2篇
  1991年   1篇
  1987年   2篇
  1985年   2篇
  1984年   4篇
  1983年   1篇
  1982年   3篇
  1981年   1篇
排序方式: 共有829条查询结果,搜索用时 427 毫秒
1.
Information‐Centric Networking (ICN) has been accepted to overcome some weaknesses of the current Internet architecture, showing that “what is being exchanged” is more important than “who are exchanging information.” Given the inadequate considerations on Quality of Service (QoS) and energy saving in ICN routing, we propose in this paper a routing algorithm to enhance the two aspects. At first, on one hand, Cauchy distribution is used as a fuzzy model to evaluate users' QoS requirements, such as bandwidth, delay, and error rate; on the other hand, we formulate energy saving problem to evaluate the green quality of routing algorithm. Then, we design a link selection approach by considering QoS and energy saving, which belongs to a multi‐objective decision problem resolved by intelligent drops algorithm. Finally, we implement the proposed algorithm and compare it with the famous adaptive forwarding mechanism in terms of some significant metrics, and the experimental results reveal that the proposed algorithm is more efficient.  相似文献   
2.
The piecewise linear method (PLM) based on time operator splitting is used to solve the unsteady compressible Euler equations describing the two-dimensional flow around and through a straight wall inlet placed stationary in a rapidly rotating supersonic flow. The PLM scheme is formulated as a Lagrangian step followed by an Eulerian remap. The inhomogeneous terms in the Euler equations written in cylindrical coordinates are first removed by Sod's method and the resulting set of equations is further reduced to two sets of one-dimensional Lagrangian equations, using time operator splitting. The numerically generated flow fields are presented for different values of the back pressure imposed at the downstream exit of the inlet nozzle. An oblique shock wave is formed in front of the almost whole portion of the inlet entrance, the incoming streamlines being deflected towards the higher pressure side after passing through the oblique shock wave and then bending down to the lower pressure side. A reverse flow appears inside the inlet nozzle owing to the recovery pressure of the incoming streams being lower than the back pressure of the inlet nozzle.  相似文献   
3.
We propose in this paper a self-organized monitoring architecture for mobile ad-hoc networks based on a selective scheme where subsets of nodes are managed. These nodes are determined based on their network behavior in order to favor subsets of well-connected nodes. The key idea is to relax the requirements of the management plane, and to use these manageable subsets to monitor the performance of the overall network. We therefore propose a new performance metric to be monitored, in order to estimate the capability of ad-hoc nodes to communicate end-to-end in the network. Extensive simulations show how different parameters affect this metric.  相似文献   
4.
Wireless ad hoc networks are temporary formed, infrastructureless networks. Due to the unstable channel conditions and network connectivity, their characteristics impose serious challenges in front of network designers. The layering approach to network design does not fit the ad hoc environment well. Therefore, various cross-layering approaches, where protocol layers actively interact, exchange inherent layer information and fine tune their parameters according to the network status are becoming increasingly popular. This paper presents an in-depth analysis of the latest cross-layering approaches for wireless ad hoc networks supported by several examples. A special emphasis is put on the link and network layer related cross-layer designs. Several link adaptation and efficient service discovery schemes are elaborated through analytical and simulation studies. Their performance shows the potentials of the cross-layering for boosting system characteristics in wireless ad hoc networks. Liljana Gavrilovska currently holds a position of full professor at Faculty of Electrical Engineering, University “St. Cyril and Metodij” – Skopje, Macedonia. She is chief of Telecommunications Laboratory and teaches undergraduate courses in telecommunication networks, data transmission and switching and traffic theory, and graduate courses in wireless, mobile and personal networks, teletraffic engineering and planning, and broadband multiservices networks. In 2000 she joined the Center for PersonKommunikation, Aalborg University, Denmark, as a visiting professor and during 2001--2002 she held a position of associate research professor at the same university. Currently she holds a part-time position of associated research professor with Center for Teleinfrastructur (CTIF). Prof. Gavrilovska was involved in several EU (ACTS ASAP, IST PACWOMAN, MAGNET, TEMPUS) and national/international projects. She published numerous conference and journal papers and participated in several workshops. At the moment she is working on the book “Ad Hoc Networking Towards Seamless Communications” together with prof. R. Prasad. Her research interests include wireless and personal area networks, ad hoc networking, networking protocols, traffic analysis, QoS, and optimization techniques. She is a senior member of IEEE and serves as a Chair of Macedonian Communication Chapter.  相似文献   
5.
To provide responsive information services in a ubiquitous computing environment, service software and system development are indispensable. A component-based ubiquitous information system with a JAIN (Java APIs for Integrated Networks) platform to achieve seamless transmissions and reach-everywhere communications was designed in our research. In this development, numerous ubiquitous service modules were identified: location management, roaming, mobile IP and WAP networking. These component-based network modules were constructed using a component composition language with component specification and interface definition, running on top of a distributed service architecture using a JAIN platform to distribute the ubiquitous information services to mobile users. Two applications, Wireless-Application-Protocol (WAP) Mail and Video-on-Demand (VoD) services, show that the JAIN-like platform with the developed networking components effectively fills the gap for application developers between mobile appliances and various kinds of ubiquitous information services.  相似文献   
6.
王新蕾  周敏  张涛 《电讯技术》2023,63(11):1830-1838
时间敏感网络(Time-sensitive Networking,TSN)是一种新型确定性网络,具有低时延、低抖动等特点,能够满足现代网络传输控制的要求。流量调度是TSN标准中关键技术之一,用于确保流量传输的服务质量。首先对时间敏感网络的发展背景、重要机制、应用场景进行阐述,着重研究5种时间敏感网络流量调度机制,包括基于时间的整形机制、基于信用值的整形机制、循环队列转发机制、帧抢占机制以及异步流量整形机制;然后,分析了流量调度算法的研究现状,归纳和总结了时间触发(Time-triggered,TT)流和事件触发(Event-triggered,ET)流的调度算法,分析了目前流量调度算法存在的问题;最后,指出了TSN流量调度算法的发展方向和趋势。  相似文献   
7.
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy.  相似文献   
8.
卢东祥 《电子科技》2023,36(3):81-86
为了进一步提高城市道路交通网络的通行效率,粒子群优化和神经网络等多种智能优化算法受到越来越多的关注。近年来,深度学习技术的普及与应用大幅提升了城市交通网络的节点识别效率,而交通网络的节点调度又扩展了深度学习技术的应用。文中详细分析了交通节点调度所面临的关键问题,归纳并总结了相关网络节点分配的研究现状。在此基础上,深入研讨了城市交通网络节点调度与深度学习的应用前景,并对交通网络节点分配优化策略的未来研究方向进行了展望。  相似文献   
9.
针对物联传感网络由于数据类型不一致造成散粒噪声.提出一种物联传感网络散粒噪声过滤的自适应线性权值算法.提取物联传感网络散粒噪声特征参数,对上述参数进行线性变换,获取噪声关联特征参数自适应线性权值,完成物联传感网络散粒噪声过滤.实验表明,该算法能够有效过滤物联传感网络中的散粒噪声,取得了令人满意的结果.  相似文献   
10.
This study aimed to investigate the effects of brand anthropomorphism on consumer-brand relationships in a social media marketing context. We hypothesized that anthropomorphism on a brand’s Facebook fan page can strengthen the relationships between brands and consumers by yielding both social presence and a positive inference regarding the brand’s quality as a relationship partner. Our longitudinal experiment confirmed the effects of brand anthropomorphism on consumer-brand relationships on social media and the mediating role of social presence. The results suggest that when the anthropomorphized brand had relationships with consumers, a favorable attitude was shown toward the brand. Further, the participants perceived the anthropomorphized brand as a trustworthy relationship partner, giving more “Likes” for the posts from the anthropomorphized brand than those from the non-anthropomorphized brand. Further, the results confirmed that these favorable relationships were maintained even after the participants became aware of a brand transgression.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号