首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   171篇
  免费   22篇
  国内免费   40篇
电工技术   2篇
综合类   2篇
建筑科学   2篇
石油天然气   1篇
无线电   40篇
一般工业技术   9篇
自动化技术   177篇
  2024年   5篇
  2023年   30篇
  2022年   39篇
  2021年   31篇
  2020年   15篇
  2019年   6篇
  2018年   7篇
  2017年   20篇
  2016年   18篇
  2015年   3篇
  2014年   11篇
  2013年   2篇
  2012年   4篇
  2011年   4篇
  2010年   2篇
  2009年   5篇
  2008年   2篇
  2007年   4篇
  2006年   3篇
  2005年   2篇
  2004年   1篇
  2003年   2篇
  2002年   1篇
  2001年   1篇
  2000年   3篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   2篇
排序方式: 共有233条查询结果,搜索用时 171 毫秒
1.
Users are inclined to share sensitive data in a remote server if no strong security mechanism is in place. Searchable encryption satisfies the need of users to execute a search encrypted data. Previous searchable encryption methods such as “public key encryption with keyword search (PEKS)” restricted the data access to certain users, because only the assigned users were able to search the encrypted data. In this paper we will discuss the relation between Attribute Based Encryption (ABE) and searchable encryption and define a weak anonymity of the ABE scheme, named “attribute privacy”. With this weak anonymity, we propose a general transformation from ABE to Attribute Based Encryption with Keyword Search (ABEKS) and a concrete attribute private key-policy ABE (KP-ABE) scheme. We present an ABEKS scheme based on this KP-ABE scheme and permit multi-users to execute a flexible search on the remote encrypted data.  相似文献   
2.
传统的KNN算法存在分类效率低等缺点.针对这些缺点,本文提出一种高效的结合多代表点思想的加权KNN算法,利用变精度粗糙集上下近似区域的概念,结合聚类算法生成代表点集合构造分类模型,再运用结构风险最小化理论优化分类模型并对影响分类模型的因素进行分析.分类过程中根据测试样本与各代表点的相似度,得到测试样本的相对位置.其中属于样本点下近似区域的测试样本可直接判断其类别.若测试样本在其他区域,则根据测试样本与各代表点的相对位置对各代表点覆盖范围内的样本进行加权后判断测试样本的类别.在文本分类领域的数据集上进行实验,结果表明该算法能有效的提高分类模型的性能.  相似文献   
3.
为了求解同时实现空间协同和时间协同的多无人机时空协同问题,提出了基于分布式模型预测控制的多无人机在线协同航迹规划的方法。建立了由MPC(Model Predictive Control,)控制器、空间协同模块和时间协同模块组成的多无人机分布式时空协同航迹规划框架结构。MPC将时空协同问题转化为滚动优化问题,优先级的方法实现了空间协同和时间协同的解耦,同时改进了碰撞冲突消解规则,并设计了时间冲突消解规则,解决了分布式时空协同问题的动作一致性问题。仿真实验表明,该方法可以有效地实现多无人时空协同航迹规划。  相似文献   
4.
康文轩    陈黎飞      郭躬德     《智能系统学报》2023,18(2):240-250
运动序列是一种与运动信号相关的多维时间序列,各个维度序列之间具有高耦合性的特点。现有的多维序列表征方法大多基于维度间相互独立的假设或缺乏可解释性,为此,提出一种适用于运动序列的时空结构特征表示模型及其两阶段构造方法。首先,基于空间变化事件的转换方法,将多维时间序列变换成一维事件序列,以保存序列中的空间结构特性。接着,定义了一种时空结构特征的无监督挖掘算法。基于新定义的表示度度量,该算法从事件序列中提取一组具有代表性的低冗余变长事件元组为时空结构特征。在多个人类行为识别数据集上的实验结果表明,与现有多维时间序列表示方法相比,新模型的特征集更具代表性,在运动序列模式识别领域可以有效提升分类精度。  相似文献   
5.
针对多变量时间序列复杂的时间相关性和高维度使得异常检测性能较差的问题,以对抗训练框架为基础提出基于图自编码的无监督多变量时间序列异常检测模型.首先,将特征转换为嵌入向量来表示;其次,将划分好的时间序列结合嵌入向量转换为图结构数据;然后,用两个图自编码器模拟对抗训练重构数据样本;最后,根据测试数据在模型训练下的重构误差进行异常判定.将提出的方法与5种基线异常检测方法进行比较.实验结果表明,提出的模型在测试数据集获得了最高的F1分数,总体性能分F1分数比最新的异常检测模型USAD提高了28.4%.可见提出的模型有效提高异常检测性能.  相似文献   
6.
With the development of the Internet of Things (IoT), the massive data sharing between IoT devices improves the Quality of Service (QoS) and user experience in various IoT applications. However, data sharing may cause serious privacy leakages to data providers. To address this problem, in this study, data sharing is realized through model sharing, based on which a secure data sharing mechanism, called BP2P-FL, is proposed using peer-to-peer federated learning with the privacy protection of data providers. In addition, by introducing the blockchain to the data sharing, every training process is recorded to ensure that data providers offer high-quality data. For further privacy protection, the differential privacy technology is used to disturb the global data sharing model. The experimental results show that BP2P-FL has high accuracy and feasibility in the data sharing of various IoT applications.  相似文献   
7.
The demand for cloud computing has increased manifold in the recent past. More specifically, on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing needs. The cloud service provider fulfills different user requirements using virtualization - where a single physical machine can host multiple Virtual Machines. Each virtual machine potentially represents a different user environment such as operating system, programming environment, and applications. However, these cloud services use a large amount of electrical energy and produce greenhouse gases. To reduce the electricity cost and greenhouse gases, energy efficient algorithms must be designed. One specific area where energy efficient algorithms are required is virtual machine consolidation. With virtual machine consolidation, the objective is to utilize the minimum possible number of hosts to accommodate the required virtual machines, keeping in mind the service level agreement requirements. This research work formulates the virtual machine migration as an online problem and develops optimal offline and online algorithms for the single host virtual machine migration problem under a service level agreement constraint for an over-utilized host. The online algorithm is analyzed using a competitive analysis approach. In addition, an experimental analysis of the proposed algorithm on real-world data is conducted to showcase the improved performance of the proposed algorithm against the benchmark algorithms. Our proposed online algorithm consumed 25% less energy and performed 43% fewer migrations than the benchmark algorithms.  相似文献   
8.
A new fusion algorithm for multi-sensor images based on Self-Generating Neural Network (SGNN) and fuzzy logic is proposed in this paper. This study is an extension of the work described in Qin and Bao (2005). First, the order and frequency modifications for the current McKusick and Langley (M–L) optimization are proposed; next, by combining optimization and pruning together, the Pruning-And-One-Optimization-Composite (PAOOC) processing method is raised; and finally, a modified fuzzy fusion scheme using improved SGNN is put forward. Experimental results demonstrate that the posed fuzzy fusion scheme outperforms region-based fusion using wavelet multi-resolution (MR) segmentation, and region-based fusion using tree-structure wavelet MR segmentation, both in visual effect and objective evaluation criteria. In the meantime, simulations also show the effectiveness of our modifications for the current optimization and pruning methods, visually and objectively.  相似文献   
9.
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes. Then we give an efficient certificateless aggregate signature scheme. Our scheme is existentially unforgeable under adaptive chosen-message attacks assuming the computational Diffie–Hellman problem is hard.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号