首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   482篇
  免费   75篇
  国内免费   57篇
电工技术   10篇
综合类   43篇
化学工业   2篇
金属工艺   2篇
机械仪表   3篇
建筑科学   1篇
矿业工程   3篇
水利工程   1篇
石油天然气   2篇
武器工业   3篇
无线电   196篇
一般工业技术   11篇
冶金工业   2篇
自动化技术   335篇
  2025年   2篇
  2024年   10篇
  2023年   8篇
  2022年   14篇
  2021年   14篇
  2020年   20篇
  2019年   17篇
  2018年   19篇
  2017年   26篇
  2016年   26篇
  2015年   42篇
  2014年   45篇
  2013年   41篇
  2012年   39篇
  2011年   41篇
  2010年   29篇
  2009年   32篇
  2008年   34篇
  2007年   34篇
  2006年   28篇
  2005年   19篇
  2004年   23篇
  2003年   15篇
  2002年   19篇
  2001年   5篇
  2000年   3篇
  1999年   1篇
  1998年   1篇
  1997年   4篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
排序方式: 共有614条查询结果,搜索用时 0 毫秒
21.
The novel distributed mobility management trend is a promising direction to cope with the increasing mobile data traffic and flatten network architectures. Most of the novel mobility approaches distribute the mobility anchors through the access level, as opposed to the centralized mobility anchoring model. Other recent approaches argue that mobility anchors closer to the content servers may be the solution to optimize the mobility performance. However, none of the mobility anchoring models is ideal for all scenarios, since it depends on the user, the session and the network. Hence, we propose an IP mobility approach driven by the context of the user, sessions and the network, where the mobility anchors for IP address allocation and for routing/forwarding are distributed through the network nodes, while the mobility context is managed by the mobile devices. Although each session is properly anchored in the establishment phase, the routing/forwarding is adapted over time, according to the user, the session and the network context: the proposed approach is able to signal different mobility anchors to optimize the routing path to new and ongoing sessions of the user. The outcome of the evaluation shows that the proposed approach overall reduces the data cost, the data delay, the tunneled packets and the tunnel length, when compared with other anchoring models.  相似文献   
22.
Water resources management models are widely used to evaluate planning or operational scenarios to support water resource management decision-making. However, the approaches to modelling used in the past have led to problems, such as modellers having difficulty establishing the credibility of their model with stakeholders, and stakeholders having difficulty understanding and trusting model results. A best practice approach to the implementation and application of water resources management models based on a quality assurance procedure is an appropriate means of overcoming these difficulties, and there are a number of guidelines and papers available promoting this approach. However, guidance in these on the use of models to analyse water resource planning scenarios is limited or not provided. This paper therefore provides guidance on the implementation and application of water resources management models with an emphasis on scenario analysis. This guidance is principally intended for practising modellers, and also for peer reviewers and stakeholders such as managers, decision makers, and community-based groups. Adoption strategies and recommendations for future directions are also discussed.  相似文献   
23.
Recently, opportunistic routing has received much attention as a new design direction. It can exploit the wireless broadcast and more highly reliable opportunistic forwarding, so as to substantially increase the throughput of network. Due to dynamic topology, distributed collaboration, limited bandwidth and computing ability, the absence of enough physical protection in Ad hoc networks, opportunistic routing is vulnerable to attacks by malicious nodes. In order to alleviate the malicious behaviors, we incorporate the concept of trust to Ad hoc networks, build a simple trust model to evaluate neighbors’ forwarding behavior and apply this model to opportunistic routing for Ad hoc networks. A new trusted opportunistic forwarding model is proposed by choosing the trusted and highest priority candidate forwarder, then a trusted minimum cost routing algorithm (MCOR) is formally formulated, the correctness and effectiveness of this algorithm from theoretical analysis are also approved. Finally, MCOR algorithm is verified by simulation using nsclick software and compared its performance with the classic protocols: ExOR, TAODV and Watchdog-DSR. The simulation results show that MCOR scheme can detect and mitigate node misbehaviors. Furthermore, MCOR scheme outperforms the other protocols in terms of: throughput, delay, Expected ETX, security-gains and cost of routing.  相似文献   
24.
在已有的对单条微博信息价值的研究中,一般都是从构成微博信息价值的多维因素出发,分析每个因素的权重然后综合进行评定,这样就带来了计算复杂的问题。但是,由于中文语义的复杂性,这种先验的分析方法,难免会有“一概而论”的嫌疑。由于转发行为的本质就是对微博信息价值的认同,而转发人占收到此信息总人数的比率则反映了该信息的普遍影响程度,因此从这两个因素出发研究微博信息价值非常值得思考。为此,文中从粉丝行为和影响覆盖率两个角度出发,引入了“单条微博影响力饱和度”概念,对单条微博信息价值进行了研究,在研究思路上进行了积极拓展。  相似文献   
25.
The design and development of multi-hop wireless sensor networks are guided by the specific requirements of their corresponding sensing applications. These requirements can be associated with certain well-defined qualitative and/or quantitative performance metrics, which are application-dependent. The main function of this type of network is to monitor a field of interest using the sensing capability of the sensors, collect the corresponding sensed data, and forward it to a data gathering point, also known as sink. Thus, the longevity of wireless sensor networks requires that the load of data forwarding be balanced among all the sensor nodes so they deplete their battery power (or energy) slowly and uniformly. However, some sensing applications are time-critical in nature. Hence, they should satisfy strict delay constraints so the sink can receive the sensed data originated from the sensors within a specified time bound. Thus, to account for all of these various sensing applications, appropriate data forwarding protocols should be designed to achieve some or all of the following three major goals, namely minimum energy consumption, uniform battery power depletion, and minimum delay. To this end, it is necessary to jointly consider these three goals by formulating a multi-objective optimization problem and solving it. In this paper, we propose a data forwarding protocol that trades off these three goals via slicing the communication range of the sensors into concentric circular bands. In particular, we discuss an approach, called weighted scale-uniform-unit sum, which is used by the source sensors to solve this multi-objective optimization problem. Our proposed data forwarding protocol, called Trade-off Energy with Delay (TED), makes use of our solution to this multi-objective optimization problem in order to find a “best” trade-off of minimum energy consumption, uniform battery power depletion, and minimum delay. Then, we present and discuss several numerical results to show the effectiveness of TED. Moreover, we show how to relax several widely used assumptions in order to enhance the practicality of our TED protocol, and extend it to real-world network scenarios. Finally, we evaluate the performance of TED through extensive simulations. We find that TED is near optimal with respect to the energy × delay metric. This simulation study is an essential step to gain more insight into TED before implementing it using a sensor test-bed.  相似文献   
26.
针对当前智能家居环境中家庭网关所存在的安全隐患问题,文中提出一种智能家庭网关的设计方案以及一种基于该网关的数据转发方法,当所在家庭网关故障时,根据家居设备节点可接入网关的信号强度、节点的数据处理能力、优先级等信息来选择汇聚节点.监控中心根据候选网关的安全等级、带宽情况、当前负载等信息来选择转发网关.仿真实验证明,当网关...  相似文献   
27.
支持CE的T—MPLS关键技术及应用   总被引:1,自引:0,他引:1  
传送多协议标记交换(T—MPLS)作为一种面向连接的分组传送技术,是支持电信级以太网(CE)的主要承载技术。从T—MPLS技术特性入手,文章介绍了T—MPLS标准化的最新进展及其面临的挑战,给出T—MPLS作为CE承载技术的组网模型,在此基础上,讨论了与T—MPLS有关的数据转发平面,控制平面,网络生存性,操作、维护和管理(OAM)等关键技术,分析了基于T—MPLS的CE技术的应用情况。  相似文献   
28.
5GLAN功能已经成为5G网络在工业互联网应用中最重要的增强能力之一。参考传统交换机的常用组网拓扑,分析了5GLAN的组网和转发需求,研究了支持5GLAN功能的UPF转发模型,设计了UPF软件架构,并基于开源软件完成了Ethernet类型5G LAN的基本转发功能验证,为5G LAN技术研究和应用提供参考。  相似文献   
29.
Radio LANs are emerging in the computing world. They are supported by distinct configurations: on the one hand radio LANs with base stations and a wired backbone, on the other hand radio LANs implementing Intra-forwarding. Adding a new node in a radio LAN with Intra-forwarding, increases the reliability, while this reliability decreases with ad hoc or hub configurations. This advantage of Intra-forwarding is quantified. Intra-forwarding, as defined in the HIPERLAN standard, is based on a hop-by-hop policy and link check procedures. It is shown how point-to-point packets and broadcast packets are forwarded. The three basic components of Intra-forwarding needed to build and update the Intra-forwarding database are described. The originality of this approach is the use of multipoint relays which enable better scalability. The correctness of the Intra-forwarding protocol is proved and its cost is evaluated.  相似文献   
30.
针对MPLS技术在运营商应用中存在问题的分析,结合SDN思想和概念,将网络抽象为“网络转发”、“业务控制”和“运营支撑”三个平面,提出端到端无缝MPLS组网的解决方案。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号