首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54篇
  免费   4篇
  58篇
  2021年   1篇
  2019年   1篇
  2018年   2篇
  2017年   3篇
  2016年   3篇
  2015年   2篇
  2014年   10篇
  2013年   6篇
  2012年   4篇
  2011年   7篇
  2010年   4篇
  2009年   2篇
  2008年   2篇
  2007年   1篇
  2006年   3篇
  2005年   1篇
  2003年   1篇
  2002年   2篇
  2000年   1篇
  1996年   1篇
  1990年   1篇
排序方式: 共有58条查询结果,搜索用时 15 毫秒
41.
流媒体的RTP传输与QoS管理策略研究   总被引:1,自引:0,他引:1  
应用RTP协议进行传输和实现QoS管理是当前数据传输方面的热点问题,通过分析RTP协议的结构和原理,提出了一种RTP的传输模型,实现了数据流的RTP传输,同时就RTCP协议(RTP协议的传输控制部分)对QoS的管理策略进行了理论探讨.  相似文献   
42.
总结了具有代表性的竞争式MAC接入协议:冲突避免多址接入MACA、IEEE 802.11 DCF和信道获得多址接入FAMA传输介质访问控制接入的一般性规律,建立了一个竞争式MAC接入数学模型,研究哪些因素影响网络通信。通过NS2网络模拟实验,验证了这些影响的存在,并初步了解如何减少这些负面影响。与无线网络物理层或高层网络比起来,MAC接入对于无线网络高效可靠通信的负面影响容易被忽略,实际却存在,该研究对无线网络可靠通信具有一定参考价值。  相似文献   
43.
空域格林函数的求解是矩量法分析分层介质结构的主要困难 ,也是关键所在。在离散复镜像技术的基础上 ,注意到逆问题解的不唯一性 ,提出了一种新方法———固定实镜像法 (FRIM ) ,即在用一组空域复镜像 (表示为复指数级数和 )来拟合谱域格林函数时 ,根据经典镜像理论给定镜像的实位置 ,然后用简单的点匹配法来求出相应实镜像的复幅度。该方法避免了复镜像法中用Prony法或广义函数束法 (GPOF)拟合的复杂计算过程 ,提高了计算速度 ,且物理含义也更加明确。文中给出了该方法的基本原理 ,给出一组数值模拟结果 ,与复镜像法吻合得很好 ,证实了该方法的有效性  相似文献   
44.
为了检测无线局域网MAC层的6种DOS攻击方式,提出一种基于Hybrid特征选择和支持向量机的入侵检测算法.该算法先用混合器模式的Hybrid特征选择算法提取8个识别攻击的流量统计特征,然后利用支持向量机对待检测对象进行识别分类.通过建立仿真环境对检测模型的检测效果进行统计验证,表明检测模型在具有较高检测准确率和较低的虚警率,能够有效地检测MAC层DOS攻击,具有实用价值.  相似文献   
45.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
46.
为识别链路层加密比特流,以未加密与加密数据在随机统计特性上的差异为依据,对4种典型的随机性检测方法在比特流长度不同时的识别率进行了比较研究.针对块内最长游程检测过程中出现的比特流尾部比特位不能构成完整子块的问题,提出了2种可行的处理方案.通过对块内最长游程检测门限值函数的研究,基于参数优化的方法改进了块内最长游程的检测方案,在一定程度上提高了识别率.最后,以某无线网络链路层加密比特流为识别对象,对提出方案的有效性进行了验证.  相似文献   
47.
孙定宇 《国防科技》2021,42(1):60-65
互联网进入2.0时代后,以社交媒体为主要信息传播平台的新媒体已逐步变为相对独立的社会力量,成为新的战略制高点.社交媒体平台以其传播信息的速度与广度,对庞大的用户人群产生巨大的影响.各国政府和军队意识到社交媒体的飞速发展不仅让其成为新型战略传播工具,更在网络信息战领域成为强大的\"心理\"干预武器.本文介绍了社交网络通过舆论...  相似文献   
48.
利用互联网资源提供大数据计算服务面临着资源异构性、动态性与通信长延迟等方面的挑战,现有分布式计算模型仍存在一些不足。运用流计算模型提出分布式流体系结构,包括分布式流编程模型与资源管理等,能够高效支持多种并行执行模式。在10个CPU-GPU异构结点上实现了原型系统,仿真实验验证了7个不同的测试用例。实验结果表明,与本地串行计算相比,分布式流体系结构可以平均提高39倍计算性能,具有较大的应用潜力。  相似文献   
49.
随着信息技术和网络技术的快速发展,社会信息呈现高度公开化、透明化、大众化趋势,给武警部队遂行多样化任务提出了严峻的考验,也给指挥员媒介素养提出了更高的要求。培养指挥员的媒介素养,应着力提高指挥员应对媒体的解读能力、沟通能力、利用能力和管控能力。  相似文献   
50.
This article explores how armed forces in EU member states work with and view social media in national and international settings, and what the patterns of convergence/divergence are on these issues. To that end, a questionnaire targeted at EU armed forces was constructed. An index of qualitative variation was calculated to explore the relative convergence among respondents (n = 25) on issues of risks and opportunities with using social media nationally and internationally. Consistent with previous research on European armed forces, we found higher levels of divergence than convergence. Contrary to our expectations that similar challenges, joint international standards, and membership in international organizations would foster convergence with regard to social media use in areas of deployment, we found that convergence appeared foremost pertaining to the domestic level. Policy divergence was strongest in areas of deployment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号