全文获取类型
收费全文 | 2006篇 |
免费 | 224篇 |
国内免费 | 310篇 |
学科分类
工业技术 | 2540篇 |
出版年
2023年 | 4篇 |
2022年 | 9篇 |
2021年 | 12篇 |
2020年 | 12篇 |
2019年 | 8篇 |
2018年 | 17篇 |
2017年 | 14篇 |
2016年 | 19篇 |
2015年 | 40篇 |
2014年 | 83篇 |
2013年 | 101篇 |
2012年 | 133篇 |
2011年 | 177篇 |
2010年 | 163篇 |
2009年 | 132篇 |
2008年 | 179篇 |
2007年 | 218篇 |
2006年 | 197篇 |
2005年 | 225篇 |
2004年 | 164篇 |
2003年 | 161篇 |
2002年 | 146篇 |
2001年 | 86篇 |
2000年 | 75篇 |
1999年 | 29篇 |
1998年 | 30篇 |
1997年 | 25篇 |
1996年 | 25篇 |
1995年 | 16篇 |
1994年 | 10篇 |
1993年 | 10篇 |
1992年 | 6篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1981年 | 1篇 |
排序方式: 共有2540条查询结果,搜索用时 15 毫秒
1.
2.
为了对实际的外部设备进行有效的控制,设计了一种基于 ModBus 协议的负载物理模拟平台控制系统。上位机采用C++ Builder XE2进行主站的通信程序设计,下位机采用西门子 S7-200 SMART,使用 ModBus RTU 协议库设计通信程序,将计算机与 PLC 连接起来,组成高性价比的负载物理模拟平台自动控制系统。通过上位机的数据的发送和接收实验,验证了设计的负载物理模拟平台控制系统的有效性和可行性。 相似文献
3.
Cecília A.C. César Solon V. Carvalho 《International Journal of Communication Systems》2015,28(5):910-927
The IEEE 802.16 standard for wireless broadband networks includes the mesh mode in its specifications, where network nodes interact to deliver packets from a client to a remote destination through intermediate nodes. This paper presents a study of the capacity of IEEE 802.16 wireless networks in mesh mode by using M/G/1/L queuing model that represents each network node by incorporating the features of the standard in order to calculate the average delay and throughput in the node. An iterative method integrates the calculation results at each node, obtaining the end‐to‐end delay from any node of the mesh to the Base Station. Because of multiple hops, a node far from the Base Station may have its flows damaged. To minimize this problem, we propose a criterion for a fair distribution of resources. We show the numerical results of the model which indicate a good fit when compared with simulation results. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
4.
This paper presents the first IEEE 802.16m medium access control (MAC) protocol module embedded in the network simulator version 3 (ns-3). The designed module provides a validation tool for researchers to verify simulated results related to the IEEE 802.16m. This module supports the basic MAC functions which includes an initial ranging (IR) function; four types of bandwidth request (BR) procedures; five types of standard-specified quality-of-service (QoS); a QoS-based transmission scheduler; an adaptive modulation and coding (AMC) selection function; a physical (PHY) layer with a channel propagation model. The designed module provides modification flexibility to adapt to other simulation modules. Various scenarios are simulated to show the capacity of the implemented IEEE 802.16m module in details. Results of different types of traffic are tested with the path loss effect on transmission to visualize the numeric capability of the module. 相似文献
5.
付学 《计算机光盘软件与应用》2012,(4):193-194
计算机节能是节能减排的一项举措,通过编制程序来获取目的计算机的活动性,有效的掌握计算机开机情况。 相似文献
6.
《Computer Languages, Systems and Structures》2014,40(3-4):137-154
It is well-known that the Dolev–Yao adversary is a powerful adversary. Besides acting as the network, intercepting, decomposing, composing and sending messages, he can remember as much information as he needs. That is, his memory is unbounded. We recently proposed a weaker Dolev–Yao like adversary, which also acts as the network, but whose memory is bounded. We showed that this Bounded Memory Dolev–Yao adversary, when given enough memory, can carry out many existing protocol anomalies. In particular, the known anomalies arise for bounded memory protocols, where although the total number of sessions is unbounded, there are only a bounded number of concurrent sessions and the honest participants of the protocol cannot remember an unbounded number of facts or an unbounded number of nonces at a time. This led us to the question of whether it is possible to infer an upper-bound on the memory required by the Dolev–Yao adversary to carry out an anomaly from the memory restrictions of the bounded protocol. This paper answers this question negatively (Theorem 8). 相似文献
7.
该文主要阐述在FPGA(Field—Programmable Gate Array)内千兆以太网协议数据流帧的生成、编码、组帧、解帧及协议帧分析,详细地阐述了BCM5421和FPGA组合的硬件设计技术、协议发生的FPGA设计技术、协议解码、过滤、性能分析的FPGA设计技术等关键技术的实现途径。 相似文献
8.
9.
通过研究和分析Femto与核心网之间的信令协议,探讨了由于不同厂家对3GPP协议中描述理解的不同而造成的设备兼容性问题,并提出了切实可行的故障定位及处理方法,为解决类似问题提供了思路。 相似文献
10.
设计和实现了一个NIDS模型中检测引擎模块,并且在Linux系统下实现了其功能,采用一种新的基于协议分析的检测算法.提高了检测能力,减少了漏报率. 相似文献