全文获取类型
收费全文 | 127篇 |
免费 | 3篇 |
学科分类
工业技术 | 130篇 |
出版年
2022年 | 1篇 |
2020年 | 3篇 |
2019年 | 2篇 |
2017年 | 1篇 |
2016年 | 3篇 |
2014年 | 2篇 |
2013年 | 9篇 |
2012年 | 2篇 |
2011年 | 6篇 |
2010年 | 5篇 |
2009年 | 9篇 |
2008年 | 4篇 |
2007年 | 4篇 |
2006年 | 2篇 |
2005年 | 6篇 |
2004年 | 11篇 |
2003年 | 2篇 |
2002年 | 11篇 |
2001年 | 9篇 |
2000年 | 4篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 1篇 |
排序方式: 共有130条查询结果,搜索用时 15 毫秒
1.
Hudaverdi Turker Akyildiz Ozge 《Bulletin of Engineering Geology and the Environment》2019,78(1):177-187
Bulletin of Engineering Geology and the Environment - A novel classification approach was proposed for prediction of flyrock throw distance based on the site measurements performed in a sandstone... 相似文献
2.
N. Akkari J. M. Jornet P. Wang E. Fadel L. Elrefaei M. G. A. Malik S. Almasri I. F. Akyildiz 《Wireless Networks》2016,22(4):1221-1233
Nanonetworks consist of nano-sized communicating devices which are able to perform simple tasks at the nanoscale. The limited capabilities of individual nanomachines and the Terahertz (THz) band channel behavior lead to error-prone wireless links. In this paper, a cross-layer analysis of error-control strategies for nanonetworks in the THz band is presented. A mathematical framework is developed and used to analyze the tradeoffs between Bit Error Rate, Packet Error Rate, energy consumption and latency, for five different error-control strategies, namely, Automatic Repeat reQuest (ARQ), Forward Error Correction (FEC), two types of Error Prevention Codes (EPC) and a hybrid EPC. The cross-layer effects between the physical and the link layers as well as the impact of the nanomachine capabilities in both layers are taken into account. At the physical layer, nanomachines are considered to communicate by following a time-spread on-off keying modulation based on the transmission of femtosecond-long pulses. At the link layer, nanomachines are considered to access the channel in an uncoordinated fashion, by leveraging the possibility to interleave pulse-based transmissions from different nodes. Throughout the analysis, accurate path loss, noise and multi-user interference models, validated by means of electromagnetic simulation, are utilized. In addition, the energy consumption and latency introduced by a hardware implementation of each error control technique, as well as, the additional constraints imposed by the use of energy-harvesting mechanisms to power the nanomachines, are taken into account. The results show that, despite their simplicity, EPCs outperform traditional ARQ and FEC schemes, in terms of error correcting capabilities, which results in further energy savings and reduced latency. 相似文献
3.
4.
Zhi Sun Pu Wang Mehmet C. Vuran Mznah A. Al-Rodhaan Abdullah M. Al-Dhelaan Ian F. Akyildiz 《Ad hoc Networks》2011,9(3):468-477
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed. 相似文献
5.
This article presents a survey on medium access control protocols for multimedia traffic in wireless networks. A basic overview of MAC protocol concepts is presented, and a framework is developed on which to base qualitative comparisons. The MAC protocols covered include third-generation TDMA and CDMA schemes intended for use in a single-hop wireless system. The operation of each protocol is explained, and its advantages and disadvantages ore presented. Finally, a qualitative comparative outline of the discussed protocols is provided, based on multimedia traffic requirements 相似文献
6.
Oncu Akyildiz Ersin Emre Oren Tarik Omer Ogurtani 《Journal of Materials Science》2011,46(18):6054-6064
A systematic study based on the self-consistent dynamical simulations is presented for the grain boundary thermal grooving
problem by strictly following the irreversible thermodynamic theory of surfaces and interfaces with singularities [T. O. Ogurtani,
J. Chem. Phys. 124, 144706 (2006)]. This approach furnishes us to have auto-control on the otherwise free-motion of the grain
boundary triple junction without presuming any equilibrium dihedral (wetting) angles at the edges. The effects of physicochemical
properties and the anisotropic surface diffusivity on the transient grooving behavior, which takes place at the early stage
of the scenario, were considered. We analyzed the experimental thermal grooving data reported for tungsten in the literature,
and compared them with the carried simulation results. This investigation showed that the observed changes in the dihedral
angles are strictly connected to the transient behavior of the simulated global system, and manifest themselves at the early
stage of the thermal grooving phenomenon. 相似文献
7.
I. F. Akyildiz 《Computing》1987,39(3):219-232
The classical mean value analysis approach is extended to single class closed queueing networks containing Erlang service time distributions and FCFS scheduling disciplines. A new formula for the mean residence time of jobs is derived. Each iteration provides self-checks for validity, and is repeated whenever invalid results are detected. On the average, the solutions obtained vary by less than five percent from their respective simulation results. 相似文献
8.
Summary Open, closed and mixed queueing networks with reversible routing, multiple job classes and rejection blocking are investigated. In rejection blocking networks blocking event occurs when upon completion of its service of a particular station's server, a job attempts to proceed to its next station. If, at that moment, its destination station is full, the job is rejected. The job goes back to the server of the source station and immediately receives a new service. This is repeated until the next station releases a job and a place becomes available. In the model jobs may change their class membership and general service time distributions depending on the job class are allowed. Two station types are considered: Either the scheduling discipline is symmetric, in which case the service time distributions are allowed to be general and dependent on the job class or the service time distributions at a station are all identical exponential distributions, in which case more general scheduling disciplines are allowed. An exact product form solution for equilibrium state probabilities is presented. Using the exact product form solution of the equilibrium state distribution, algorithms for computation of performance measures, such as mean number of jobs and throughputs, are derived. The complexity of the algorithms is discussed. 相似文献
9.
The communication requirements for space missions necessitate to address the problems due to deep space communication networks. In this letter, the effects of slow start algorithm, propagation delay and the link errors on the throughput performance of transport layer protocols are investigated in deep space communication networks. The objective of this letter is to demonstrate through experimental results that existing TCP protocols are far from satisfying the deep space communication requirements and point out the urgent need for new TCP solutions. 相似文献
10.
There is increasing interest in deploying ATM technology in local or campus networks. ATM is an ideal technology to overcome many of the limitations of today's LAN technologies. This article focuses on the application of ATM in the LAN environment to interconnect high-end host computers, and on the interworking of ATM-based LANs with legacy LANs. The authors introduce ATM LAN requirements, followed by a discussion of possible ATM LAN architectures to support these requirements. The article then covers current standards and their relation to the possible architectures, and concludes with a discussion of current ATM LAN issues and directions 相似文献