全文获取类型
收费全文 | 519篇 |
免费 | 101篇 |
国内免费 | 83篇 |
专业分类
电工技术 | 6篇 |
综合类 | 21篇 |
金属工艺 | 1篇 |
机械仪表 | 1篇 |
建筑科学 | 1篇 |
矿业工程 | 2篇 |
水利工程 | 1篇 |
武器工业 | 7篇 |
无线电 | 230篇 |
一般工业技术 | 8篇 |
原子能技术 | 1篇 |
自动化技术 | 424篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 6篇 |
2017年 | 11篇 |
2016年 | 14篇 |
2015年 | 13篇 |
2014年 | 20篇 |
2013年 | 40篇 |
2012年 | 31篇 |
2011年 | 63篇 |
2010年 | 68篇 |
2009年 | 75篇 |
2008年 | 71篇 |
2007年 | 81篇 |
2006年 | 72篇 |
2005年 | 51篇 |
2004年 | 32篇 |
2003年 | 14篇 |
2002年 | 11篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1997年 | 2篇 |
排序方式: 共有703条查询结果,搜索用时 15 毫秒
701.
A set of mobile devices that employs wireless transmission for communication is termed Mobile Ad hoc Networks (MANETs). Offering better communication services among the users in a centralized organization is the primary objective of the MANET. Due to the features of MANET, this can directly End-to-End Delay (EED) the Quality of Service (QoS). Hence, the implementation of resource management becomes an essential issue in MANETs. This paper focuses on the efficient Resource Allocation (RA) for many types of Traffic Flows (TF) in MANET. In Mobile Ad hoc Networks environments, the main objective of Resource Allocation (RA) is to process consistently available resources among terminals required to address the service requirements of the users. These three categories improve performance metrics by varying transmission rates and simulation time. For solving that problem, the proposed work is divided into Queue Management (QM), Admission Control (AC) and RA. For effective QM, this paper develops a QM model for elastic (EL) and inelastic (IEL) Traffic Flows. This research paper presents an AC mechanism for multiple TF for effective AC. This work presents a Resource Allocation Using Tokens (RAUT) for various priority TF for effective RA. Here, nodes have three cycles which are: Non-Critical Section (NCS), Entry Section (ES) and Critical Section (CS). When a node requires any resources, it sends Resource Request Message (RRM) to the ES. Elastic and inelastic TF priority is determined using Fuzzy Logic (FL). The token holder selects the node from the inelastic queue with high priority for allocating the resources. Using Network Simulator-2 (NS-2), simulations demonstrate that the proposed design increases Packet Delivery Ratio (PDR), decrease Packet Loss Ratio (PLR), minimise the Fairness and reduce the EED. 相似文献
702.
M. V. Narayana Vadla Pradeep Kumar Ashok Kumar Nanda Hanumantha Rao Jalla Subba Reddy Chavva 《计算机、材料和连续体(英文)》2023,75(1):587-607
Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management technique called Enhanced Beacon Trust Management with Hybrid Optimization (EBTM-Hyopt) for efficient cluster head selection and malicious node detection. It tries to build trust among connected nodes and may improve security by requiring every participating node to develop and distribute genuine, accurate, and trustworthy material across the network. Specifically, optimized cluster head election is done periodically to reduce and balance the energy consumption to improve the lifetime network. The cluster head election optimization is based on hybridizing Particle Swarm Optimization (PSO) and Gravitational Search Optimization Algorithm (GSOA) concepts to enable and ensure reliable routing. Simulation results show that the proposed EBTM-HYOPT outperforms the state-of-the-art trust model in terms of 297.99 kbps of throughput, 46.34% of PDR, 13% of energy consumption, 165.6 kbps of packet loss, 67.49% of end-to-end delay, and 16.34% of packet length. 相似文献
703.
Terrorist attacks have contributed significantly to using wireless technologies to identify concrete destruction survivors. A dynamic ad hoc mobile network (MANET) consists of wireless linked nodes, which route hop-by-hop without the support of a fixed infrastructure acquires information from trapped survivors. The energy efficiency that extends the lifespan of the network is an essential prerequisite of MANET. Researchers have suggested many strategies to accomplish this purpose and a cluster of these techniques in MANETs are used to provide an energy-efficient approach. In this paper we are proposing a red deer multi-objective constraint applied for an energy efficient QoS routing (RD-MOCER) algorithm to the number of clusters in an ad hoc network and the energy dispensing in nodes to provide an energy effective solution and to minimise network traffic. Intracluster and intercluster traffic is handled by the cluster heads in the proposed approach. The algorithm suggested takes account of mobile nodes' node degrees, transmitting capacity and battery power usage. This approach gives a variety of options at a time, the key benefit of which is that the ideal Pareto front results in these solutions. We correlate the findings with two other well-known methods of clustering; MOPSO and MOEAQ-based clustering with different results. We conduct detailed simulations to demonstrate that the solution proposed is an effective and stronger solution to clustering in ad hoc cell networks than the other two techniques. 相似文献