首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   127篇
  免费   3篇
工业技术   130篇
  2022年   1篇
  2020年   3篇
  2019年   2篇
  2017年   1篇
  2016年   3篇
  2014年   2篇
  2013年   9篇
  2012年   2篇
  2011年   6篇
  2010年   5篇
  2009年   9篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   6篇
  2004年   11篇
  2003年   2篇
  2002年   11篇
  2001年   9篇
  2000年   4篇
  1999年   5篇
  1998年   1篇
  1997年   5篇
  1996年   6篇
  1995年   4篇
  1994年   1篇
  1993年   2篇
  1991年   2篇
  1990年   1篇
  1989年   3篇
  1988年   3篇
  1987年   1篇
排序方式: 共有130条查询结果,搜索用时 15 毫秒
1.
Bulletin of Engineering Geology and the Environment - A novel classification approach was proposed for prediction of flyrock throw distance based on the site measurements performed in a sandstone...  相似文献   
2.
Nanonetworks consist of nano-sized communicating devices which are able to perform simple tasks at the nanoscale. The limited capabilities of individual nanomachines and the Terahertz (THz) band channel behavior lead to error-prone wireless links. In this paper, a cross-layer analysis of error-control strategies for nanonetworks in the THz band is presented. A mathematical framework is developed and used to analyze the tradeoffs between Bit Error Rate, Packet Error Rate, energy consumption and latency, for five different error-control strategies, namely, Automatic Repeat reQuest (ARQ), Forward Error Correction (FEC), two types of Error Prevention Codes (EPC) and a hybrid EPC. The cross-layer effects between the physical and the link layers as well as the impact of the nanomachine capabilities in both layers are taken into account. At the physical layer, nanomachines are considered to communicate by following a time-spread on-off keying modulation based on the transmission of femtosecond-long pulses. At the link layer, nanomachines are considered to access the channel in an uncoordinated fashion, by leveraging the possibility to interleave pulse-based transmissions from different nodes. Throughout the analysis, accurate path loss, noise and multi-user interference models, validated by means of electromagnetic simulation, are utilized. In addition, the energy consumption and latency introduced by a hardware implementation of each error control technique, as well as, the additional constraints imposed by the use of energy-harvesting mechanisms to power the nanomachines, are taken into account. The results show that, despite their simplicity, EPCs outperform traditional ARQ and FEC schemes, in terms of error correcting capabilities, which results in further energy savings and reduced latency.  相似文献   
3.
4.
BorderSense: Border patrol through advanced wireless sensor networks   总被引:1,自引:0,他引:1  
The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discussed.  相似文献   
5.
Medium access control protocols for multimedia traffic in wirelessnetworks   总被引:1,自引:0,他引:1  
This article presents a survey on medium access control protocols for multimedia traffic in wireless networks. A basic overview of MAC protocol concepts is presented, and a framework is developed on which to base qualitative comparisons. The MAC protocols covered include third-generation TDMA and CDMA schemes intended for use in a single-hop wireless system. The operation of each protocol is explained, and its advantages and disadvantages ore presented. Finally, a qualitative comparative outline of the discussed protocols is provided, based on multimedia traffic requirements  相似文献   
6.
A systematic study based on the self-consistent dynamical simulations is presented for the grain boundary thermal grooving problem by strictly following the irreversible thermodynamic theory of surfaces and interfaces with singularities [T. O. Ogurtani, J. Chem. Phys. 124, 144706 (2006)]. This approach furnishes us to have auto-control on the otherwise free-motion of the grain boundary triple junction without presuming any equilibrium dihedral (wetting) angles at the edges. The effects of physicochemical properties and the anisotropic surface diffusivity on the transient grooving behavior, which takes place at the early stage of the scenario, were considered. We analyzed the experimental thermal grooving data reported for tungsten in the literature, and compared them with the carried simulation results. This investigation showed that the observed changes in the dihedral angles are strictly connected to the transient behavior of the simulated global system, and manifest themselves at the early stage of the thermal grooving phenomenon.  相似文献   
7.
I. F. Akyildiz 《Computing》1987,39(3):219-232
The classical mean value analysis approach is extended to single class closed queueing networks containing Erlang service time distributions and FCFS scheduling disciplines. A new formula for the mean residence time of jobs is derived. Each iteration provides self-checks for validity, and is repeated whenever invalid results are detected. On the average, the solutions obtained vary by less than five percent from their respective simulation results.  相似文献   
8.
Summary Open, closed and mixed queueing networks with reversible routing, multiple job classes and rejection blocking are investigated. In rejection blocking networks blocking event occurs when upon completion of its service of a particular station's server, a job attempts to proceed to its next station. If, at that moment, its destination station is full, the job is rejected. The job goes back to the server of the source station and immediately receives a new service. This is repeated until the next station releases a job and a place becomes available. In the model jobs may change their class membership and general service time distributions depending on the job class are allowed. Two station types are considered: Either the scheduling discipline is symmetric, in which case the service time distributions are allowed to be general and dependent on the job class or the service time distributions at a station are all identical exponential distributions, in which case more general scheduling disciplines are allowed. An exact product form solution for equilibrium state probabilities is presented. Using the exact product form solution of the equilibrium state distribution, algorithms for computation of performance measures, such as mean number of jobs and throughputs, are derived. The complexity of the algorithms is discussed.  相似文献   
9.
Performance of TCP protocols in deep space communication networks   总被引:3,自引:0,他引:3  
The communication requirements for space missions necessitate to address the problems due to deep space communication networks. In this letter, the effects of slow start algorithm, propagation delay and the link errors on the throughput performance of transport layer protocols are investigated in deep space communication networks. The objective of this letter is to demonstrate through experimental results that existing TCP protocols are far from satisfying the deep space communication requirements and point out the urgent need for new TCP solutions.  相似文献   
10.
There is increasing interest in deploying ATM technology in local or campus networks. ATM is an ideal technology to overcome many of the limitations of today's LAN technologies. This article focuses on the application of ATM in the LAN environment to interconnect high-end host computers, and on the interworking of ATM-based LANs with legacy LANs. The authors introduce ATM LAN requirements, followed by a discussion of possible ATM LAN architectures to support these requirements. The article then covers current standards and their relation to the possible architectures, and concludes with a discussion of current ATM LAN issues and directions  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号