全文获取类型
收费全文 | 482篇 |
免费 | 75篇 |
国内免费 | 57篇 |
专业分类
电工技术 | 10篇 |
综合类 | 43篇 |
化学工业 | 2篇 |
金属工艺 | 2篇 |
机械仪表 | 3篇 |
建筑科学 | 1篇 |
矿业工程 | 3篇 |
水利工程 | 1篇 |
石油天然气 | 2篇 |
武器工业 | 3篇 |
无线电 | 196篇 |
一般工业技术 | 11篇 |
冶金工业 | 2篇 |
自动化技术 | 335篇 |
出版年
2025年 | 2篇 |
2024年 | 10篇 |
2023年 | 8篇 |
2022年 | 14篇 |
2021年 | 14篇 |
2020年 | 20篇 |
2019年 | 17篇 |
2018年 | 19篇 |
2017年 | 26篇 |
2016年 | 26篇 |
2015年 | 42篇 |
2014年 | 45篇 |
2013年 | 41篇 |
2012年 | 39篇 |
2011年 | 41篇 |
2010年 | 29篇 |
2009年 | 32篇 |
2008年 | 34篇 |
2007年 | 34篇 |
2006年 | 28篇 |
2005年 | 19篇 |
2004年 | 23篇 |
2003年 | 15篇 |
2002年 | 19篇 |
2001年 | 5篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有614条查询结果,搜索用时 0 毫秒
21.
The novel distributed mobility management trend is a promising direction to cope with the increasing mobile data traffic and flatten network architectures. Most of the novel mobility approaches distribute the mobility anchors through the access level, as opposed to the centralized mobility anchoring model. Other recent approaches argue that mobility anchors closer to the content servers may be the solution to optimize the mobility performance. However, none of the mobility anchoring models is ideal for all scenarios, since it depends on the user, the session and the network. Hence, we propose an IP mobility approach driven by the context of the user, sessions and the network, where the mobility anchors for IP address allocation and for routing/forwarding are distributed through the network nodes, while the mobility context is managed by the mobile devices. Although each session is properly anchored in the establishment phase, the routing/forwarding is adapted over time, according to the user, the session and the network context: the proposed approach is able to signal different mobility anchors to optimize the routing path to new and ongoing sessions of the user. The outcome of the evaluation shows that the proposed approach overall reduces the data cost, the data delay, the tunneled packets and the tunnel length, when compared with other anchoring models. 相似文献
22.
Water resources management models are widely used to evaluate planning or operational scenarios to support water resource management decision-making. However, the approaches to modelling used in the past have led to problems, such as modellers having difficulty establishing the credibility of their model with stakeholders, and stakeholders having difficulty understanding and trusting model results. A best practice approach to the implementation and application of water resources management models based on a quality assurance procedure is an appropriate means of overcoming these difficulties, and there are a number of guidelines and papers available promoting this approach. However, guidance in these on the use of models to analyse water resource planning scenarios is limited or not provided. This paper therefore provides guidance on the implementation and application of water resources management models with an emphasis on scenario analysis. This guidance is principally intended for practising modellers, and also for peer reviewers and stakeholders such as managers, decision makers, and community-based groups. Adoption strategies and recommendations for future directions are also discussed. 相似文献
23.
Wang BoAuthor Vitae Huang ChuanheAuthor VitaeLi LayuanAuthor Vitae Yang WenzhongAuthor Vitae 《Journal of Systems and Software》2011,84(12):2107-2122
Recently, opportunistic routing has received much attention as a new design direction. It can exploit the wireless broadcast and more highly reliable opportunistic forwarding, so as to substantially increase the throughput of network. Due to dynamic topology, distributed collaboration, limited bandwidth and computing ability, the absence of enough physical protection in Ad hoc networks, opportunistic routing is vulnerable to attacks by malicious nodes. In order to alleviate the malicious behaviors, we incorporate the concept of trust to Ad hoc networks, build a simple trust model to evaluate neighbors’ forwarding behavior and apply this model to opportunistic routing for Ad hoc networks. A new trusted opportunistic forwarding model is proposed by choosing the trusted and highest priority candidate forwarder, then a trusted minimum cost routing algorithm (MCOR) is formally formulated, the correctness and effectiveness of this algorithm from theoretical analysis are also approved. Finally, MCOR algorithm is verified by simulation using nsclick software and compared its performance with the classic protocols: ExOR, TAODV and Watchdog-DSR. The simulation results show that MCOR scheme can detect and mitigate node misbehaviors. Furthermore, MCOR scheme outperforms the other protocols in terms of: throughput, delay, Expected ETX, security-gains and cost of routing. 相似文献
24.
在已有的对单条微博信息价值的研究中,一般都是从构成微博信息价值的多维因素出发,分析每个因素的权重然后综合进行评定,这样就带来了计算复杂的问题。但是,由于中文语义的复杂性,这种先验的分析方法,难免会有“一概而论”的嫌疑。由于转发行为的本质就是对微博信息价值的认同,而转发人占收到此信息总人数的比率则反映了该信息的普遍影响程度,因此从这两个因素出发研究微博信息价值非常值得思考。为此,文中从粉丝行为和影响覆盖率两个角度出发,引入了“单条微博影响力饱和度”概念,对单条微博信息价值进行了研究,在研究思路上进行了积极拓展。 相似文献
25.
Habib M. Ammari 《Computer Networks》2013,57(9):1913-1935
The design and development of multi-hop wireless sensor networks are guided by the specific requirements of their corresponding sensing applications. These requirements can be associated with certain well-defined qualitative and/or quantitative performance metrics, which are application-dependent. The main function of this type of network is to monitor a field of interest using the sensing capability of the sensors, collect the corresponding sensed data, and forward it to a data gathering point, also known as sink. Thus, the longevity of wireless sensor networks requires that the load of data forwarding be balanced among all the sensor nodes so they deplete their battery power (or energy) slowly and uniformly. However, some sensing applications are time-critical in nature. Hence, they should satisfy strict delay constraints so the sink can receive the sensed data originated from the sensors within a specified time bound. Thus, to account for all of these various sensing applications, appropriate data forwarding protocols should be designed to achieve some or all of the following three major goals, namely minimum energy consumption, uniform battery power depletion, and minimum delay. To this end, it is necessary to jointly consider these three goals by formulating a multi-objective optimization problem and solving it. In this paper, we propose a data forwarding protocol that trades off these three goals via slicing the communication range of the sensors into concentric circular bands. In particular, we discuss an approach, called weighted scale-uniform-unit sum, which is used by the source sensors to solve this multi-objective optimization problem. Our proposed data forwarding protocol, called Trade-off Energy with Delay (TED), makes use of our solution to this multi-objective optimization problem in order to find a “best” trade-off of minimum energy consumption, uniform battery power depletion, and minimum delay. Then, we present and discuss several numerical results to show the effectiveness of TED. Moreover, we show how to relax several widely used assumptions in order to enhance the practicality of our TED protocol, and extend it to real-world network scenarios. Finally, we evaluate the performance of TED through extensive simulations. We find that TED is near optimal with respect to the energy × delay metric. This simulation study is an essential step to gain more insight into TED before implementing it using a sensor test-bed. 相似文献
26.
27.
28.
29.
Jacquet Philippe Minet Pascale Mühlethaler Paul Rivierre Nicolas 《Wireless Personal Communications》1997,4(1):51-63
Radio LANs are emerging in the computing world. They are supported by distinct configurations: on the one hand radio LANs with base stations and a wired backbone, on the other hand radio LANs implementing Intra-forwarding. Adding a new node in a radio LAN with Intra-forwarding, increases the reliability, while this reliability decreases with ad hoc or hub configurations. This advantage of Intra-forwarding is quantified. Intra-forwarding, as defined in the HIPERLAN standard, is based on a hop-by-hop policy and link check procedures. It is shown how point-to-point packets and broadcast packets are forwarded. The three basic components of Intra-forwarding needed to build and update the Intra-forwarding database are described. The originality of this approach is the use of multipoint relays which enable better scalability. The correctness of the Intra-forwarding protocol is proved and its cost is evaluated. 相似文献
30.
针对MPLS技术在运营商应用中存在问题的分析,结合SDN思想和概念,将网络抽象为“网络转发”、“业务控制”和“运营支撑”三个平面,提出端到端无缝MPLS组网的解决方案。 相似文献