全文获取类型
收费全文 | 1150篇 |
免费 | 195篇 |
国内免费 | 96篇 |
专业分类
电工技术 | 132篇 |
综合类 | 102篇 |
化学工业 | 7篇 |
机械仪表 | 18篇 |
建筑科学 | 17篇 |
矿业工程 | 9篇 |
能源动力 | 6篇 |
轻工业 | 8篇 |
水利工程 | 3篇 |
武器工业 | 81篇 |
无线电 | 296篇 |
一般工业技术 | 40篇 |
冶金工业 | 225篇 |
原子能技术 | 3篇 |
自动化技术 | 494篇 |
出版年
2024年 | 3篇 |
2023年 | 43篇 |
2022年 | 60篇 |
2021年 | 86篇 |
2020年 | 84篇 |
2019年 | 74篇 |
2018年 | 48篇 |
2017年 | 41篇 |
2016年 | 55篇 |
2015年 | 47篇 |
2014年 | 88篇 |
2013年 | 86篇 |
2012年 | 87篇 |
2011年 | 117篇 |
2010年 | 81篇 |
2009年 | 75篇 |
2008年 | 61篇 |
2007年 | 63篇 |
2006年 | 56篇 |
2005年 | 49篇 |
2004年 | 34篇 |
2003年 | 19篇 |
2002年 | 14篇 |
2001年 | 10篇 |
2000年 | 7篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1996年 | 6篇 |
1995年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1976年 | 1篇 |
1968年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
1964年 | 5篇 |
1963年 | 5篇 |
1962年 | 2篇 |
1961年 | 3篇 |
1960年 | 1篇 |
1958年 | 1篇 |
1957年 | 2篇 |
1956年 | 3篇 |
1955年 | 3篇 |
1954年 | 3篇 |
排序方式: 共有1441条查询结果,搜索用时 15 毫秒
1.
Hamidreza Jafarnejadsani Neng Wan Naira Hovakimyan Petros G. Voulgaris 《国际强度与非线性控制杂志
》2020,30(3):1071-1097
》2020,30(3):1071-1097
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings. 相似文献
2.
One of the main issues related to the reliable operation of network control systems concerns the design of mechanisms able to detect anomalies in the functioning of the communication network through which the control loops are closed. In this article, we address the problem of detecting the occurrence of packet losses and design a mechanism that can detect the occurrence of packet losses directly from process sensor data. Specifically, we propose a moving‐horizon estimation scheme that permits to detect if the packet‐loss rate exceeds prescribed thresholds, which are representative of stability and performance of the control system. We discuss theoretical properties of the proposed solution along with an approximation scheme with reduced computational burden. A numerical example is discussed to substantiate the analysis. 相似文献
3.
《工程(英文)》2019,5(4):624-636
An intelligent manufacturing system is a composite intelligent system comprising humans, cyber systems, and physical systems with the aim of achieving specific manufacturing goals at an optimized level. This kind of intelligent system is called a human–cyber–physical system (HCPS). In terms of technology, HCPSs can both reveal technological principles and form the technological architecture for intelligent manufacturing. It can be concluded that the essence of intelligent manufacturing is to design, construct, and apply HCPSs in various cases and at different levels. With advances in information technology, intelligent manufacturing has passed through the stages of digital manufacturing and digital-networked manufacturing, and is evolving toward new-generation intelligent manufacturing (NGIM). NGIM is characterized by the in-depth integration of new-generation artificial intelligence (AI) technology (i.e., enabling technology) with advanced manufacturing technology (i.e., root technology); it is the core driving force of the new industrial revolution. In this study, the evolutionary footprint of intelligent manufacturing is reviewed from the perspective of HCPSs, and the implications, characteristics, technical frame, and key technologies of HCPSs for NGIM are then discussed in depth. Finally, an outlook of the major challenges of HCPSs for NGIM is proposed. 相似文献
4.
Weidong Fang Wuxiong Zhang QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《计算机、材料和连续体(英文)》2019,61(2):583-599
As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN. In consideration of IWSN, we firstly review the security requirements and techniques in WSN data aggregation in this paper. Then, we give a holistic overview of the classical secure data aggregation protocols, which are divided into three categories: hop-by-hop encrypted data aggregation, end-to-end encrypted data aggregation and unencrypted secure data aggregation. Along this way, combining with the characteristics of industrial applications, we analyze the pros and cons of the existing security schemes in each category qualitatively, and realize that the security and the energy efficiency are suitable for IWSN. Finally, we make the conclusion about the techniques and approach in these categories, and highlight the future research directions of privacy preserving data aggregation in IWSN. 相似文献
5.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
6.
伴随企业业务的不断扩增和电子化发展,企业自身数据和负载数据都开始暴增。然而,作为企业核心资产之一的内部数据,却面临着日益严峻的安全威胁。越来越多以周期长、频率低、隐蔽强为典型特征的非明显攻击绕过传统安全检测方法,对大量数据造成损毁。当前,用户实体行为分析(User and Entity Behavior Analytics,UEBA)系统正作为一种新兴的异常用户检测体系在逐步颠覆传统防御手段,开启网络安全保卫从“被动防御”到“主动出击”的新篇章。因此,将主要介绍UEBA在企业异常用户检测中的应用情况。首先,通过用户、实体、行为三要素的关联,整合可以反映用户行为基线的各类数据;其次,定义4类特征提取维度,有效提取几十种最能反映用户异常的基础特征;再次,将3种异常检测算法通过集成学习方法用于异常用户建模;最后,通过异常打分,定位异常风险最大的一批用户。在实践中,对排名前10的异常用户进行排查,证明安恒信息的UEBA落地方式在异常用户检测中极其高效。 相似文献
7.
利用传统的k匿名技术在社会网络中进行隐私保护时会存在聚类准则单一、图中数据信息利用不足等问题. 针对该问题, 提出了一种利用Kullback-Leibler (KL)散度衡量节点1-邻居图相似性的匿名技术(anonymization techniques for measuring the similarity of node 1-neighbor graph based on Kullback-Leibler divergence, SNKL). 根据节点1-邻居图分布的相似性对原始图节点集进行划分, 按照划分好的类进行图修改, 使修改后的图满足k匿名, 完成图的匿名发布. 实验结果表明, SNKL方法与HIGA方法相比在聚类系数上的改变量平均降低了17.3%, 同时生成的匿名图与原始图重要性节点重合度保持在95%以上. 所提方法在有效保证隐私的基础上, 可以显著的降低对原始图结构信息的改变. 相似文献
8.
9.
通过对中关村“电子一条街”城市空间和景观演化的分析,初步讨论了信息产业专门化街区形成的原因。通过对信息产业专门化街区构成要素以及要素间邻近度的分析,总结了信息产业专门化街区的发展趋势,并在此基础上提出了“电子街区”的规划结构图。 相似文献
10.
Fire extinguishment tests were conducted in a simulated shipboard space. Portable extinguishers, a low flow water hose reel system, and 3.8 cm diameter water hand lines were used to extinguish the fires. Various protective ensembles were used by the fire fighters, ranging from minimum protection to full protection. Personnel with both a limited and high degree of fire fighting experience were used. Response time was influenced by visibility and the fire fighters' knowledge of the compartment. The low flow water hose reel system was found to be an effective and efficient quick response fire fighting tool. Efficiency, in terms of total water used, was better with the hose reel system compared to the larger, higher flow water hand lines. 相似文献