首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   969篇
  免费   142篇
  国内免费   137篇
电工技术   44篇
综合类   64篇
化学工业   9篇
金属工艺   1篇
机械仪表   15篇
建筑科学   13篇
矿业工程   9篇
能源动力   3篇
轻工业   8篇
石油天然气   4篇
武器工业   7篇
无线电   223篇
一般工业技术   44篇
冶金工业   91篇
自动化技术   713篇
  2024年   4篇
  2023年   43篇
  2022年   44篇
  2021年   47篇
  2020年   65篇
  2019年   39篇
  2018年   24篇
  2017年   32篇
  2016年   46篇
  2015年   26篇
  2014年   76篇
  2013年   57篇
  2012年   79篇
  2011年   116篇
  2010年   81篇
  2009年   96篇
  2008年   80篇
  2007年   74篇
  2006年   64篇
  2005年   46篇
  2004年   39篇
  2003年   28篇
  2002年   16篇
  2001年   10篇
  2000年   4篇
  1999年   2篇
  1998年   4篇
  1997年   1篇
  1996年   2篇
  1994年   1篇
  1965年   1篇
  1960年   1篇
排序方式: 共有1248条查询结果,搜索用时 15 毫秒
1.
In this article, the memory-based dynamic event-triggered controller design issue is investigated for networked interval type-2 (IT2) fuzzy systems under non-periodic denial-of-service (DoS) attacks. For saving limited network bandwidth, a novel memory-based dynamic event-triggered mechanism (DETM) is proposed to schedule data communication. Unlike existing event-triggered generators, the developed memory-based DETM can utilize a series of newly released signals and further save network resources by introducing interval dynamic variables. Moreover, to improve design flexibility, an IT2 fuzzy controller with freely selectable fuzzy rule number and premise membership functions (MFs) is synthesized. Then, a new switched time-delay system with imperfectly matched MFs is established under the consideration of memory-based DETM and DoS attacks simultaneously. Besides, based on the property of MFs, the boundary information of membership grades and slack matrices are introduced in the stability analysis. Furthermore, by using a piecewise Lyapunov–Krasovskii method, membership-functions-dependent criteria are deduced to ensure the asymptotic stability of built fuzzy switched systems. Finally, the effectiveness of proposed control strategies is demonstrated by simulation examples.  相似文献   
2.
为使可重构扫描网络免受未经授权的访问、恶意仪器对传输数据的窜改和嗅探3种安全攻击的影响,提出了锁定隔离安全结构.该结构首先把彼此不具有安全威胁的仪器分成一组,通过控制隔离信号实现组与组之间的单独访问,以防止恶意仪器对传输数据的窜改和嗅探.然后通过使用锁段插入位保护关键的仪器,只有扫描网络中处于特定位置的多个键值被设置成特定值(0,1序列)时锁段插入位才能打开,能加大未经授权访问的难度.此外,为解决仪器分组多导致硬件开销大和布线困难的问题,提出了仪器分组算法,根据仪器间的安全关系构建无向图,然后对无向图求极大独立集,能有效地减少仪器分组数.在ITC 02基准电路上的实验结果表明,与国际上同类方法相比,所提的安全结构打开锁段插入位所需要的时间增大了7倍,在面积、功耗和布线上的平均减少百分比分别为3.81%,9.02%和4.55%.  相似文献   
3.
针对图像识别领域中的黑盒对抗攻击问题,基于强化学习中DDQN框架和Dueling网络结构提出一种黑盒对抗攻击算法。智能体通过模仿人类调整图像的方式生成对抗样本,与受攻击模型交互获得误分类结果,计算干净样本和对抗样本的结构相似性后获得奖励。攻击过程中仅获得了受攻击模型的标签输出信息。实验结果显示,攻击在CIFAR10和CIFAR100数据集上训练的4个深度神经网络模型的成功率均超过90%,生成的对抗样本质量与白盒攻击算法FGSM相近且成功率更有优势。  相似文献   
4.
为研究受到虚假数据注入攻击的单输入单输出非线性多智能体系统的分布式无模型自适应控制问题,提出了一种新的分布式动态线性化方法, 以获得非线性多智能体的等效线性数据模型。与现有多智能体的分布式无模型自适应控制在控制器设计中有所不同, 本文设计的控制器不需要网络拓扑结构的信息, 仅使用系统的输入输出数据。仿真算例验证了所提出的分布式无模型自适应控制算法可以实现多智能体系统的均方有界趋同控制。算法保证了多智能体系统在受到网络攻击时可以实现趋同控制目标。  相似文献   
5.
从包含相关SCI、CPCI-S与BKCI-S等数据库的Web of Science核心合集数据库出发,对数据库中存在的近13年的国内外文献使用Cite Space与Carrot2分析工具进行聚类分析。力求系统客观地得到国际上钓鱼网站检测技术研究领域的关注热点、研究脉络、著名机构以及核心刊物等研究现状。筛选出具有代表性的文章,采取少量顶级文章精读、部分知名文章粗读的方式对目前钓鱼网站检测技术所涉及到的方法做整理与归类。根据上文的分析对钓鱼网站检测技术的发展方向做了规律性展望,以求对此方向下相关研究人员的研究提供一定的参考。  相似文献   
6.
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings.  相似文献   
7.
随着现代电网中反映供用电双方兼容性的电力扰动问题日益突出,如何有效利用监测数据对于科学认知、理解和解决电力扰动相关难题以及电网安全稳定运行与营商环境改善具有重要意义。为此,不同于传统电能质量分析方法在扰动发生后被动采取补救性的分析和治理措施,文中提出在扰动发生、发展和影响之前主动挖掘电力扰动监测数据独特暂态信息以进行"感知-预警-诊断-服务"的主动应用框架。从这4个层面阐述了基于电力扰动数据分析进行敏感负荷辨识、风险预警、隐性故障诊断和优质电力运营模式等不同应用途径的研究价值、主要思路和关键难题。  相似文献   
8.
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library.  相似文献   
9.
Unmanned aircraft systems (UAS) are susceptible to malicious attacks originated by intelligent adversaries, and the actuators constitute one of the critical attack surfaces. In this paper, the problem of detecting and mitigating attacks on the actuators of a small UAS is addressed. Three possible solutions of differing complexity and effectiveness are proposed to address the problem. The first method involves an active detection strategy, whereby carefully designed excitation signals are superimposed on the control commands to increase the detectability of the attack. In the second method, an unknown input observer is designed, which in addition to detecting the attack also estimates the magnitude of the attack. The third method entails designing an actuator system that makes use of variable frequency pulse-width modulated signals to improve the resilience of the actuator against malicious attacks. The effectiveness of the proposed methods is demonstrated using flight experiments and realistic MATLAB simulations that incorporate exogenous disturbances, such as steady winds, atmospheric turbulence, and measurement noise.  相似文献   
10.
ABSTRACT

This research investigates the role of users’ proactive personality when they mitigate the adverse impacts of ICT's (information and communication technologies’) technostress in an experimental setting. Further, this study examines genuinely two types of individuals’ proactive personality, i.e. confront and transform. Both types can handle ICT's technostress creators by different attitudes and behaviours. This article contributes to a novelty by inducing chaos theory. This inducement laid in the experimental setting that the users had been in a chaotic situation. Results of this research show that users’ proactive personality mitigates the negative impact of ICT's technostress on their performance and satisfaction. This study found that the user's proactive personality, rested in a chaotic situation, does mitigate greatly. This research finds that users’ performance and satisfaction are higher to the proactive personality verging to the transform than that of confront. It implies that information system managers should consider the ICT user's characteristics. Besides, it means that ICT's developer should make users do their innovativeness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号