全文获取类型
收费全文 | 519篇 |
免费 | 101篇 |
国内免费 | 83篇 |
专业分类
电工技术 | 6篇 |
综合类 | 21篇 |
金属工艺 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 1篇 |
矿业工程 | 2篇 |
水利工程 | 1篇 |
武器工业 | 7篇 |
无线电 | 230篇 |
一般工业技术 | 8篇 |
原子能技术 | 1篇 |
自动化技术 | 424篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 6篇 |
2017年 | 11篇 |
2016年 | 14篇 |
2015年 | 13篇 |
2014年 | 20篇 |
2013年 | 40篇 |
2012年 | 31篇 |
2011年 | 63篇 |
2010年 | 68篇 |
2009年 | 75篇 |
2008年 | 71篇 |
2007年 | 81篇 |
2006年 | 72篇 |
2005年 | 51篇 |
2004年 | 32篇 |
2003年 | 14篇 |
2002年 | 11篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1997年 | 2篇 |
排序方式: 共有703条查询结果,搜索用时 295 毫秒
11.
针对移动自组织网络路由的可靠运行和安全保障问题,提出一种基于Dempster-Shafer证据理论的节点信任评估模型。利用历史交互信息计算直接信任度,通过邻居节点的推荐度量值获取间接信任度。对直接和间接信任度进行权重修正后根据Dempster组合规则合成,得到节点全局信任度。利用该模型对优化链络状态路由协议的多点中继技术进行优化,设计改进的路由协议TOLSR。仿真结果表明,TOLSR协议能发现和抑制网络的自私节点和恶意节点,有效提高移动自组织网络的可靠性,证明了该信任度评估模型的有效性和合理性。 相似文献
12.
The mobile nature of the nodes in a wireless mobile ad-hoc network (MANET) and the error prone link connectivity between nodes pose many challenges. These include frequent route changes, high packet loss, etc. Such problems increase the end-toend delay and decrease the throughput. This paper proposes two adaptive priority packet scheduling algorithms for MANET based on Mamdani and Sugeno fuzzy inference system. The fuzzy systems consist of three input variables: data rate, signal-to-noise ratio (SNR) and queue size. The fuzzy decision system has been optimised to improve its efficiency. Both fuzzy systems were verified using the Matlab fuzzy toolbox and the performance of both algorithms were evaluated using the riverbed modeler (formally known as OPNET modeler). The results were compared to an existing fuzzy scheduler under various network loads, for constant-bit-rate (CBR) and variable-bit-rate (VBR) traffic. The measuring metrics which form the basis for performance evaluation are end-to-end delay, throughput and packet delivery ratio. The proposed Mamdani and Sugeno scheduler perform better than the existing scheduler for CBR traffic. The end-to-end delay for Mamdani and Sugeno scheduler was reduced by an average of 52% and 54%, respectively. The performance of the throughput and packet delivery ratio for CBR traffic are very similar to the existing scheduler because of the characteristic of the traffic. The network was also at full capacity. The proposed schedulers also showed a better performance for VBR traffic. The end-to-end delay was reduced by an average of 38% and 52%, respectively. Both the throughput and packet delivery ratio (PDR) increased by an average of 53% and 47%, respectively. The Mamdani scheduler is more computationally complex than the Sugeno scheduler, even though they both showed similar network performance. Thus, the Sugeno scheduler is more suitable for real-time applications. 相似文献
13.
《Information Security Journal: A Global Perspective》2013,22(5):248-256
ABSTRACT A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2. 相似文献
14.
Development and Verification of Simulation Model Based on Real MANET Experiments for Transport Layer Protocols (UDP and TCP) 总被引:5,自引:5,他引:0
Joarder Mohammad Mustafa Kamal Mohammad Shahidul Hasan Alison L. Griffiths Hongnian Yu 《国际自动化与计算杂志》2013,10(1):53-63
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established. 相似文献
15.
16.
无线自组网是由一组无线移动主机组成的无基础设施的临时网络,在与其相关的网络协议的研究中常涉及到修改及扩展问题。文章分析了经典按需路由协议AODV的路由发现和建立过程,通过NS2仿真软件的内核扩展及重编译,在控制台输出相关的扩展内容,包括RREQ和RREP包的传送、正反向路由表的建立和节点路由表的更新等信息。结果表明,在NS2仿真软件下对无线自组网路由协议的研究和调试分析是一种科学有效的方法。最后对AODV协议本身提出了几种改进的思路和方法。 相似文献
17.
在移动Ad hoc网络(MANET)中,节点的远距离通信需要中间节点的协作,中间节点通过转发数据包将信息传递给目的节点。但是,自私节点为了节省资源(如电池电量,带宽)将不属于自己的数据包丢弃。如果没有合理的机制处理自私节点,正常的节点将会过载,从而使整个网络的性能退化。提出在Adhoc网络中针对自私节点促使其转发数据包的一种分布式协作方案。方案采用信誉和货币机制相结合的策略达到减少自私节点、改善网络环境的目的。理论分析和仿真结果表明,该方案比传统的方法更快更准确地检测到自私节点,提高合作节点,减少自私节点的吞吐量。 相似文献
18.
移动Ad Hoc网络作为一种新型的无线移动通信网络,在军事和民用上都有广泛的应用。由于其动态拓扑、无线通信的特点,易于遭受各种安全威胁。入侵检测是解决移动Ad Hoc网络安全问题的最重要技术之一。本文在分析了当前入侵检测系统体系结构的基础上,给出了一种基于移动代理的移动Ad Hoc网络入侵检测系统模型。该系统联合采用误用检测和异常检测方法,具有较高的检测效率和较低的误报率。 相似文献
19.
Multicast routing in mobile ad hoc networks (MANETs) poses several challenges due to inherent characteristics of the network such as node mobility, reliability, scarce resources, etc. This paper proposes an Agent Based Multicast Routing Scheme (ABMRS) in MANETs, which uses a set of static and mobile agents. Five types of agents are used in the scheme: Route manager static agent, Network initiation mobile agent, Network management static agent, Multicast initiation mobile agent and Multicast management static agent. The scheme operates in the following steps: (1) to identify reliable nodes; (2) to connect reliable nodes through intermediate nodes; (3) to construct a backbone for multicasting using reliable nodes and intermediate nodes; (4) to join multicast group members to the backbone; (5) to perform backbone and group members management in case of mobility. The scheme has been simulated in various network scenarios to test operation effectiveness in terms of performance parameters such as packet delivery ratio, control overheads and group reliability. Also, a comparison of proposed scheme with MAODV (Multicast Ad hoc on-demand Distance Vector) protocol is presented. ABMRS performs better than MAODV as observed from the simulation. ABMRS offers flexible and adaptable multicast services and also supports component based software development. 相似文献
20.
在移动自组网(MANET)与Internet互联的网络结构中,由于移动节点的能量是影响网络性能的重要因素,因此必须考虑节点的负载及能量问题.本文针对这些问题提出一种基于负载均衡和不对称多径传输的路由机制LBAMR(Load-Balanced and Asymmetrical Multipath Routing),并用NS2软件对其进行了仿真.仿真结果表明,该路由机制能够有效地均衡网络负载并保护网络中的低能量节点,尽可能地延长网络寿命. 相似文献