首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   519篇
  免费   101篇
  国内免费   83篇
电工技术   6篇
综合类   21篇
金属工艺   1篇
机械仪表   1篇
建筑科学   1篇
矿业工程   2篇
水利工程   1篇
武器工业   7篇
无线电   230篇
一般工业技术   8篇
原子能技术   1篇
自动化技术   424篇
  2024年   1篇
  2023年   4篇
  2022年   3篇
  2021年   3篇
  2020年   4篇
  2019年   7篇
  2018年   6篇
  2017年   11篇
  2016年   14篇
  2015年   13篇
  2014年   20篇
  2013年   40篇
  2012年   31篇
  2011年   63篇
  2010年   68篇
  2009年   75篇
  2008年   71篇
  2007年   81篇
  2006年   72篇
  2005年   51篇
  2004年   32篇
  2003年   14篇
  2002年   11篇
  2001年   4篇
  2000年   2篇
  1997年   2篇
排序方式: 共有703条查询结果,搜索用时 295 毫秒
11.
针对移动自组织网络路由的可靠运行和安全保障问题,提出一种基于Dempster-Shafer证据理论的节点信任评估模型。利用历史交互信息计算直接信任度,通过邻居节点的推荐度量值获取间接信任度。对直接和间接信任度进行权重修正后根据Dempster组合规则合成,得到节点全局信任度。利用该模型对优化链络状态路由协议的多点中继技术进行优化,设计改进的路由协议TOLSR。仿真结果表明,TOLSR协议能发现和抑制网络的自私节点和恶意节点,有效提高移动自组织网络的可靠性,证明了该信任度评估模型的有效性和合理性。  相似文献   
12.
 The mobile nature of the nodes in a wireless mobile ad-hoc network (MANET) and the error prone link connectivity between nodes pose many challenges. These include frequent route changes, high packet loss, etc. Such problems increase the end-toend delay and decrease the throughput. This paper proposes two adaptive priority packet scheduling algorithms for MANET based on Mamdani and Sugeno fuzzy inference system. The fuzzy systems consist of three input variables: data rate, signal-to-noise ratio (SNR) and queue size. The fuzzy decision system has been optimised to improve its efficiency. Both fuzzy systems were verified using the Matlab fuzzy toolbox and the performance of both algorithms were evaluated using the riverbed modeler (formally known as OPNET modeler). The results were compared to an existing fuzzy scheduler under various network loads, for constant-bit-rate (CBR) and variable-bit-rate (VBR) traffic. The measuring metrics which form the basis for performance evaluation are end-to-end delay, throughput and packet delivery ratio. The proposed Mamdani and Sugeno scheduler perform better than the existing scheduler for CBR traffic. The end-to-end delay for Mamdani and Sugeno scheduler was reduced by an average of 52% and 54%, respectively. The performance of the throughput and packet delivery ratio for CBR traffic are very similar to the existing scheduler because of the characteristic of the traffic. The network was also at full capacity. The proposed schedulers also showed a better performance for VBR traffic. The end-to-end delay was reduced by an average of 38% and 52%, respectively. Both the throughput and packet delivery ratio (PDR) increased by an average of 53% and 47%, respectively. The Mamdani scheduler is more computationally complex than the Sugeno scheduler, even though they both showed similar network performance. Thus, the Sugeno scheduler is more suitable for real-time applications.  相似文献   
13.
ABSTRACT

A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.  相似文献   
14.
There is a lack of appropriate guidelines for realistic user traces, mobility models, routing protocols, considerations of real-life challenges, etc. for general-purpose mobile ad hoc networks (MANET). In this paper, four laptops are used in an open field environment in four scenarios to evaluate the performances of Internet control message protocol (ICMP) based ping and transmission control protocol (TCP) based streaming video applications using optimised link state routing (OLSR) implementation in an IEEE 802.11g wireless network. Corresponding simulations are developed in Network Simulator ns-2 by setting simulation parameters according to the real experiments. Difficulties faced to regenerate real-life scenarios have been discussed and the gaps between reality and simulation are identified. A setup guideline to produce realistic simulation results has been established.  相似文献   
15.
MANET环境下的服务发现系统需要面对节点可能频繁移动位置、节点新加入或离开网络,以及服务提供者可能主动撤销服务,因此应在上述情况下以合理的代价发现可用的服务.为了提高系统的自适应性,服务发现系统SCN4M-DL采用了无目录服务器结构.与底层地理路由协议耦合,设计和实现了基于圆环的服务注册和发现机制.SCN4M-DL能获得较高的发现请求的成功率,有效控制存储开销和网络负载.实验结果表明,SCN4M-DL对于MANET特性以及服务状态的改变具有良好的自适应性.  相似文献   
16.
无线自组网是由一组无线移动主机组成的无基础设施的临时网络,在与其相关的网络协议的研究中常涉及到修改及扩展问题。文章分析了经典按需路由协议AODV的路由发现和建立过程,通过NS2仿真软件的内核扩展及重编译,在控制台输出相关的扩展内容,包括RREQ和RREP包的传送、正反向路由表的建立和节点路由表的更新等信息。结果表明,在NS2仿真软件下对无线自组网路由协议的研究和调试分析是一种科学有效的方法。最后对AODV协议本身提出了几种改进的思路和方法。  相似文献   
17.
王立  吴蒙  常莉 《微机发展》2010,(3):32-35
在移动Ad hoc网络(MANET)中,节点的远距离通信需要中间节点的协作,中间节点通过转发数据包将信息传递给目的节点。但是,自私节点为了节省资源(如电池电量,带宽)将不属于自己的数据包丢弃。如果没有合理的机制处理自私节点,正常的节点将会过载,从而使整个网络的性能退化。提出在Adhoc网络中针对自私节点促使其转发数据包的一种分布式协作方案。方案采用信誉和货币机制相结合的策略达到减少自私节点、改善网络环境的目的。理论分析和仿真结果表明,该方案比传统的方法更快更准确地检测到自私节点,提高合作节点,减少自私节点的吞吐量。  相似文献   
18.
移动Ad Hoc网络作为一种新型的无线移动通信网络,在军事和民用上都有广泛的应用。由于其动态拓扑、无线通信的特点,易于遭受各种安全威胁。入侵检测是解决移动Ad Hoc网络安全问题的最重要技术之一。本文在分析了当前入侵检测系统体系结构的基础上,给出了一种基于移动代理的移动Ad Hoc网络入侵检测系统模型。该系统联合采用误用检测和异常检测方法,具有较高的检测效率和较低的误报率。  相似文献   
19.
Multicast routing in mobile ad hoc networks (MANETs) poses several challenges due to inherent characteristics of the network such as node mobility, reliability, scarce resources, etc. This paper proposes an Agent Based Multicast Routing Scheme (ABMRS) in MANETs, which uses a set of static and mobile agents. Five types of agents are used in the scheme: Route manager static agent, Network initiation mobile agent, Network management static agent, Multicast initiation mobile agent and Multicast management static agent. The scheme operates in the following steps: (1) to identify reliable nodes; (2) to connect reliable nodes through intermediate nodes; (3) to construct a backbone for multicasting using reliable nodes and intermediate nodes; (4) to join multicast group members to the backbone; (5) to perform backbone and group members management in case of mobility. The scheme has been simulated in various network scenarios to test operation effectiveness in terms of performance parameters such as packet delivery ratio, control overheads and group reliability. Also, a comparison of proposed scheme with MAODV (Multicast Ad hoc on-demand Distance Vector) protocol is presented. ABMRS performs better than MAODV as observed from the simulation. ABMRS offers flexible and adaptable multicast services and also supports component based software development.  相似文献   
20.
在移动自组网(MANET)与Internet互联的网络结构中,由于移动节点的能量是影响网络性能的重要因素,因此必须考虑节点的负载及能量问题.本文针对这些问题提出一种基于负载均衡和不对称多径传输的路由机制LBAMR(Load-Balanced and Asymmetrical Multipath Routing),并用NS2软件对其进行了仿真.仿真结果表明,该路由机制能够有效地均衡网络负载并保护网络中的低能量节点,尽可能地延长网络寿命.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号