首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   312篇
  免费   9篇
  国内免费   1篇
工业技术   322篇
  2023年   3篇
  2022年   7篇
  2021年   14篇
  2020年   14篇
  2019年   10篇
  2018年   16篇
  2017年   16篇
  2016年   9篇
  2015年   8篇
  2014年   7篇
  2013年   23篇
  2012年   18篇
  2011年   18篇
  2010年   17篇
  2009年   16篇
  2008年   11篇
  2007年   11篇
  2006年   6篇
  2005年   1篇
  2004年   5篇
  2003年   3篇
  2002年   6篇
  2001年   1篇
  2000年   2篇
  1999年   4篇
  1998年   6篇
  1997年   12篇
  1996年   6篇
  1995年   5篇
  1994年   2篇
  1993年   3篇
  1992年   4篇
  1991年   3篇
  1990年   4篇
  1989年   1篇
  1988年   3篇
  1987年   2篇
  1986年   3篇
  1985年   2篇
  1984年   1篇
  1983年   3篇
  1982年   1篇
  1980年   1篇
  1979年   2篇
  1978年   4篇
  1977年   2篇
  1976年   1篇
  1974年   1篇
  1972年   2篇
  1965年   2篇
排序方式: 共有322条查询结果,搜索用时 0 毫秒
321.
Mobile ad hoc networks (MANETs) are subjected to attack detection for transmitting and creating new messages or existing message modifications. The attacker on another node evaluates the forging activity in the message directly or indirectly. Every node sends short packets in a MANET environment with its identifier, location on the map, and time through beacons. The attackers on the network broadcast the warning message using faked coordinates, providing the appearance of a network collision. Similarly, MANET degrades the channel utilization performance. Performance highly affects network performance through security algorithms. This paper developed a trust management technique called Enhanced Beacon Trust Management with Hybrid Optimization (EBTM-Hyopt) for efficient cluster head selection and malicious node detection. It tries to build trust among connected nodes and may improve security by requiring every participating node to develop and distribute genuine, accurate, and trustworthy material across the network. Specifically, optimized cluster head election is done periodically to reduce and balance the energy consumption to improve the lifetime network. The cluster head election optimization is based on hybridizing Particle Swarm Optimization (PSO) and Gravitational Search Optimization Algorithm (GSOA) concepts to enable and ensure reliable routing. Simulation results show that the proposed EBTM-HYOPT outperforms the state-of-the-art trust model in terms of 297.99 kbps of throughput, 46.34% of PDR, 13% of energy consumption, 165.6 kbps of packet loss, 67.49% of end-to-end delay, and 16.34% of packet length.  相似文献   
322.
Fog computing or a fog network is a decentralized network placed in between data source and the cloud to minimize the network latency issues and thus support in-time service delivery, of Internet of Things (IoT) applications. However, placing computational tasks of IoT applications in fog infrastructure is a challenging task. State of the art focuses on quality of service and quality of experience (QoE) based application placement. In this article, we design hierarchical fuzzy based QoE-aware application placement strategy for mapping IoT applications with compatible instances in the fog network. The proposed method considers user application expectation parameters and metrics of available fog instances, and assigns the priority of applications using hierarchical fuzzy logic. The method later uses Hungarian maximization assignment algorithm to map applications with compatible instances. The simulation results of the proposed policy show better performance over the existing baseline algorithms in terms of resource gain (RG), processing time reduction ratio (PTRR), and similarly network relaxation ratio. When considering 10 applications in the fog network, our proposed method simulation results show 70.00%, 22.44%, 37.83% improvement in RG, and 28.46%, 37.5%, 23.07% improvement in PTRR, when compared with QoE-aware, randomized, FIFO algorithms, respectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号