全文获取类型
收费全文 | 312篇 |
免费 | 9篇 |
国内免费 | 1篇 |
学科分类
工业技术 | 322篇 |
出版年
2023年 | 3篇 |
2022年 | 7篇 |
2021年 | 14篇 |
2020年 | 14篇 |
2019年 | 10篇 |
2018年 | 16篇 |
2017年 | 16篇 |
2016年 | 9篇 |
2015年 | 8篇 |
2014年 | 7篇 |
2013年 | 23篇 |
2012年 | 18篇 |
2011年 | 18篇 |
2010年 | 17篇 |
2009年 | 16篇 |
2008年 | 11篇 |
2007年 | 11篇 |
2006年 | 6篇 |
2005年 | 1篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 6篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 6篇 |
1997年 | 12篇 |
1996年 | 6篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1972年 | 2篇 |
1965年 | 2篇 |
排序方式: 共有322条查询结果,搜索用时 0 毫秒
321.
M. V. Narayana Vadla Pradeep Kumar Ashok Kumar Nanda Hanumantha Rao Jalla Subba Reddy Chavva 《计算机、材料和连续体(英文)》2023,75(1):587-607
Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management technique called Enhanced Beacon Trust Management with Hybrid Optimization (EBTM-Hyopt) for efficient cluster head selection and malicious node detection. It tries to build trust among connected nodes and may improve security by requiring every participating node to develop and distribute genuine, accurate, and trustworthy material across the network. Specifically, optimized cluster head election is done periodically to reduce and balance the energy consumption to improve the lifetime network. The cluster head election optimization is based on hybridizing Particle Swarm Optimization (PSO) and Gravitational Search Optimization Algorithm (GSOA) concepts to enable and ensure reliable routing. Simulation results show that the proposed EBTM-HYOPT outperforms the state-of-the-art trust model in terms of 297.99 kbps of throughput, 46.34% of PDR, 13% of energy consumption, 165.6 kbps of packet loss, 67.49% of end-to-end delay, and 16.34% of packet length. 相似文献
322.
Sreenivasu Mirampalli Satish Narayana Srirama Rajeev Wankar Raghavendra Rao Chillarige 《Software》2023,53(2):263-282
Fog computing or a fog network is a decentralized network placed in between data source and the cloud to minimize the network latency issues and thus support in-time service delivery, of Internet of Things (IoT) applications. However, placing computational tasks of IoT applications in fog infrastructure is a challenging task. State of the art focuses on quality of service and quality of experience (QoE) based application placement. In this article, we design hierarchical fuzzy based QoE-aware application placement strategy for mapping IoT applications with compatible instances in the fog network. The proposed method considers user application expectation parameters and metrics of available fog instances, and assigns the priority of applications using hierarchical fuzzy logic. The method later uses Hungarian maximization assignment algorithm to map applications with compatible instances. The simulation results of the proposed policy show better performance over the existing baseline algorithms in terms of resource gain (RG), processing time reduction ratio (PTRR), and similarly network relaxation ratio. When considering 10 applications in the fog network, our proposed method simulation results show 70.00%, 22.44%, 37.83% improvement in RG, and 28.46%, 37.5%, 23.07% improvement in PTRR, when compared with QoE-aware, randomized, FIFO algorithms, respectively. 相似文献