首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   519篇
  免费   101篇
  国内免费   83篇
电工技术   6篇
综合类   21篇
金属工艺   1篇
机械仪表   1篇
建筑科学   1篇
矿业工程   2篇
水利工程   1篇
武器工业   7篇
无线电   230篇
一般工业技术   8篇
原子能技术   1篇
自动化技术   424篇
  2024年   1篇
  2023年   4篇
  2022年   3篇
  2021年   3篇
  2020年   4篇
  2019年   7篇
  2018年   6篇
  2017年   11篇
  2016年   14篇
  2015年   13篇
  2014年   20篇
  2013年   40篇
  2012年   31篇
  2011年   63篇
  2010年   68篇
  2009年   75篇
  2008年   71篇
  2007年   81篇
  2006年   72篇
  2005年   51篇
  2004年   32篇
  2003年   14篇
  2002年   11篇
  2001年   4篇
  2000年   2篇
  1997年   2篇
排序方式: 共有703条查询结果,搜索用时 15 毫秒
701.
A set of mobile devices that employs wireless transmission for communication is termed Mobile Ad hoc Networks (MANETs). Offering better communication services among the users in a centralized organization is the primary objective of the MANET. Due to the features of MANET, this can directly End-to-End Delay (EED) the Quality of Service (QoS). Hence, the implementation of resource management becomes an essential issue in MANETs. This paper focuses on the efficient Resource Allocation (RA) for many types of Traffic Flows (TF) in MANET. In Mobile Ad hoc Networks environments, the main objective of Resource Allocation (RA) is to process consistently available resources among terminals required to address the service requirements of the users. These three categories improve performance metrics by varying transmission rates and simulation time. For solving that problem, the proposed work is divided into Queue Management (QM), Admission Control (AC) and RA. For effective QM, this paper develops a QM model for elastic (EL) and inelastic (IEL) Traffic Flows. This research paper presents an AC mechanism for multiple TF for effective AC. This work presents a Resource Allocation Using Tokens (RAUT) for various priority TF for effective RA. Here, nodes have three cycles which are: Non-Critical Section (NCS), Entry Section (ES) and Critical Section (CS). When a node requires any resources, it sends Resource Request Message (RRM) to the ES. Elastic and inelastic TF priority is determined using Fuzzy Logic (FL). The token holder selects the node from the inelastic queue with high priority for allocating the resources. Using Network Simulator-2 (NS-2), simulations demonstrate that the proposed design increases Packet Delivery Ratio (PDR), decrease Packet Loss Ratio (PLR), minimise the Fairness and reduce the EED.  相似文献   
702.
Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management technique called Enhanced Beacon Trust Management with Hybrid Optimization (EBTM-Hyopt) for efficient cluster head selection and malicious node detection. It tries to build trust among connected nodes and may improve security by requiring every participating node to develop and distribute genuine, accurate, and trustworthy material across the network. Specifically, optimized cluster head election is done periodically to reduce and balance the energy consumption to improve the lifetime network. The cluster head election optimization is based on hybridizing Particle Swarm Optimization (PSO) and Gravitational Search Optimization Algorithm (GSOA) concepts to enable and ensure reliable routing. Simulation results show that the proposed EBTM-HYOPT outperforms the state-of-the-art trust model in terms of 297.99 kbps of throughput, 46.34% of PDR, 13% of energy consumption, 165.6 kbps of packet loss, 67.49% of end-to-end delay, and 16.34% of packet length.  相似文献   
703.
Terrorist attacks have contributed significantly to using wireless technologies to identify concrete destruction survivors. A dynamic ad hoc mobile network (MANET) consists of wireless linked nodes, which route hop-by-hop without the support of a fixed infrastructure acquires information from trapped survivors. The energy efficiency that extends the lifespan of the network is an essential prerequisite of MANET. Researchers have suggested many strategies to accomplish this purpose and a cluster of these techniques in MANETs are used to provide an energy-efficient approach. In this paper we are proposing a red deer multi-objective constraint applied for an energy efficient QoS routing (RD-MOCER) algorithm to the number of clusters in an ad hoc network and the energy dispensing in nodes to provide an energy effective solution and to minimise network traffic. Intracluster and intercluster traffic is handled by the cluster heads in the proposed approach. The algorithm suggested takes account of mobile nodes' node degrees, transmitting capacity and battery power usage. This approach gives a variety of options at a time, the key benefit of which is that the ideal Pareto front results in these solutions. We correlate the findings with two other well-known methods of clustering; MOPSO and MOEAQ-based clustering with different results. We conduct detailed simulations to demonstrate that the solution proposed is an effective and stronger solution to clustering in ad hoc cell networks than the other two techniques.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号