全文获取类型
收费全文 | 713篇 |
免费 | 94篇 |
国内免费 | 81篇 |
专业分类
电工技术 | 17篇 |
综合类 | 67篇 |
化学工业 | 39篇 |
金属工艺 | 2篇 |
机械仪表 | 13篇 |
建筑科学 | 5篇 |
矿业工程 | 4篇 |
能源动力 | 1篇 |
轻工业 | 10篇 |
水利工程 | 2篇 |
石油天然气 | 6篇 |
武器工业 | 1篇 |
无线电 | 162篇 |
一般工业技术 | 18篇 |
冶金工业 | 156篇 |
原子能技术 | 1篇 |
自动化技术 | 384篇 |
出版年
2024年 | 4篇 |
2023年 | 17篇 |
2022年 | 22篇 |
2021年 | 26篇 |
2020年 | 31篇 |
2019年 | 20篇 |
2018年 | 19篇 |
2017年 | 21篇 |
2016年 | 28篇 |
2015年 | 27篇 |
2014年 | 39篇 |
2013年 | 40篇 |
2012年 | 52篇 |
2011年 | 50篇 |
2010年 | 46篇 |
2009年 | 49篇 |
2008年 | 58篇 |
2007年 | 37篇 |
2006年 | 32篇 |
2005年 | 50篇 |
2004年 | 46篇 |
2003年 | 42篇 |
2002年 | 37篇 |
2001年 | 26篇 |
2000年 | 13篇 |
1999年 | 11篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 4篇 |
1983年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1968年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
1961年 | 2篇 |
1960年 | 1篇 |
1955年 | 2篇 |
排序方式: 共有888条查询结果,搜索用时 15 毫秒
21.
提出了一种根据无线传感网络流量自动调节节点睡眠-活动时间比例的MAC协议-ATMAC,在无线传感器网络TMAC协议的基础上,以低能耗、低延迟为目标,主要采用自适应、多级别的占空比及自适应竞争窗口,数据优先级队列使节点在流量较小时能更多地处于睡眠状态以节省能量,而在流量较大时,传输所涉及的节点可相对长时间地进入活动状态,且大流量和小流量节点所采取的占空比可以不同,从而节省低流量节点用于空闲侦听的能耗,降低数据传输的延迟,增大网络的吞吐量。仿真结果显示新协议在能量消耗、数据延迟等方面要超过TMAC。 相似文献
22.
3D NoC在同构多核系统中相比2D NoC具有更为优越的性能.本文在研究3D Mesh结构的基础上,对拓扑结构中的平均延时和理想吞吐量进行了理论上的评估,并提出了一种基于3D Mesh的新的静态路由算法,最后运用NS2网络仿真软件对其进行仿真和比较.实验结果显示,新的路由算法可以有效地提高吞吐量,并在大规模数据传输时... 相似文献
23.
24.
Longy O. Anyanwu Jared Keengwe Gladys A. Arome 《通讯和计算机》2009,6(12):38-46
Each lnternet communication leaves trails that can be followed back to the user. Notably, anonymous communication schemes are purposed to hide users' identity as to personal, source, destination location and content information. Notably, no network capability is in existence to completely negate anonymity leakage in network latency[~l, thus, the minimization of anonymity leakage in network latency becomes critically salient. The purpose of this paper is to investigate network latency anonymity leaks, and propose practical techniques for their reduction. In this direction, the author investigate the following technical question: What implementation techniques can be configured to truly reduce anonymity leaks using deployable systems and exploiting the popular Tor security strategies. 相似文献
25.
移动IPv6协议的切换时延性能比较分析 总被引:1,自引:1,他引:0
吴昕怡 《计算机与数字工程》2009,37(10):143-146
移动IPv6中的切换时延对于特定网络情景中的性能起着很大的作用,它会导致数据包的丢失和严重的端对端性能下降,文章对移动IPv6中的各种协议的切换时延作了性能分析比较,介绍了移动IPv6的基本知识及快速切换的重要性,阐述了层次化移动IPv6和快速移动IPv6的工作原理,采用网络仿真工具NS-2对三种移动IPv6协议的切换性能进行了比较和仿真,实验结果表明快速移动MIPv6具有良好的性能。 相似文献
26.
Yawar Abbas Bangash Waseem Iqbal Saddaf Rubab Abdul Waheed Khan Waqas Aman 《International Journal of Communication Systems》2023,36(17):e5601
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
27.
随着区块链技术的不断发展,区块的传输延迟成为区块链系统可扩展性的性能瓶颈。远程直接内存访问(RDMA)技术能够支持高带宽和低时延的数据传输,为低延迟区块传输提供了新的思路。因此,结合RDMA原语的特性,设计了用于区块信息共享的区块目录结构,并在此基础上设计并实现了区块传输的基本工作过程。实验结果表明,相较于基于TCP的方案,在1 MB大小的区块上基于RDMA的区块传输机制将节点间的区块传输延迟降低了44%,全网络的区块传输延迟降低了24.4%,在10 000节点规模的区块链上,区块链发生临时分叉的数量降低了22.6%。可见,基于RDMA的区块传输机制充分发挥了高速网络的性能优势,降低了区块传输延迟及临时分叉的数量,提高了现有区块链系统的可扩展性。 相似文献
28.
Shahad Alyousif Mohammed Dauwed Rafal Nader Mohammed Hasan Ali Mustafa Musa Jabar Ahmed Alkhayyat 《计算机、材料和连续体(英文)》2023,75(1):531-546
The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile devices. The computation latency can also be decreased by offloading computing duties to edge servers with a specific level of computing power. Device-to-device (D2D) collaboration can assist in processing small-scale activities that are time-sensitive in order to further reduce task delays. The task offloading performance is drastically reduced due to the variation of different performance capabilities of edge nodes. Therefore, this paper addressed this problem and proposed a new method for D2D communication. In this method, the time delay is reduced by enabling the edge nodes to exchange data samples. Simulation results show that the proposed algorithm has better performance than traditional algorithm. 相似文献
29.
Replication technique can improve access performance and data availability of data grid systems. So far,most related work on data replication in data grid systems focuses on read-only dataset.Though write operations have been widely used in practice,its optimization problem has not been suciently studied.In this paper,we show that write requests from users can be processed by a nearest site,regardless of the location of latest written replicas.The policy of write nearby instead of write to the latest replic... 相似文献
30.