全文获取类型
收费全文 | 2129篇 |
免费 | 473篇 |
国内免费 | 513篇 |
专业分类
电工技术 | 44篇 |
综合类 | 217篇 |
化学工业 | 7篇 |
金属工艺 | 1篇 |
机械仪表 | 11篇 |
建筑科学 | 35篇 |
矿业工程 | 9篇 |
能源动力 | 2篇 |
轻工业 | 5篇 |
武器工业 | 9篇 |
无线电 | 626篇 |
一般工业技术 | 71篇 |
冶金工业 | 58篇 |
自动化技术 | 2020篇 |
出版年
2024年 | 19篇 |
2023年 | 105篇 |
2022年 | 182篇 |
2021年 | 190篇 |
2020年 | 214篇 |
2019年 | 146篇 |
2018年 | 143篇 |
2017年 | 154篇 |
2016年 | 155篇 |
2015年 | 165篇 |
2014年 | 205篇 |
2013年 | 178篇 |
2012年 | 198篇 |
2011年 | 201篇 |
2010年 | 149篇 |
2009年 | 150篇 |
2008年 | 126篇 |
2007年 | 108篇 |
2006年 | 87篇 |
2005年 | 68篇 |
2004年 | 44篇 |
2003年 | 31篇 |
2002年 | 23篇 |
2001年 | 13篇 |
2000年 | 14篇 |
1999年 | 4篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1990年 | 2篇 |
1985年 | 3篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1973年 | 1篇 |
1969年 | 1篇 |
1966年 | 2篇 |
1965年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有3115条查询结果,搜索用时 20 毫秒
1.
Xiehuan Li Dan Ye 《International Journal of Adaptive Control and Signal Processing》2022,36(1):104-121
In this article, the memory-based dynamic event-triggered controller design issue is investigated for networked interval type-2 (IT2) fuzzy systems under non-periodic denial-of-service (DoS) attacks. For saving limited network bandwidth, a novel memory-based dynamic event-triggered mechanism (DETM) is proposed to schedule data communication. Unlike existing event-triggered generators, the developed memory-based DETM can utilize a series of newly released signals and further save network resources by introducing interval dynamic variables. Moreover, to improve design flexibility, an IT2 fuzzy controller with freely selectable fuzzy rule number and premise membership functions (MFs) is synthesized. Then, a new switched time-delay system with imperfectly matched MFs is established under the consideration of memory-based DETM and DoS attacks simultaneously. Besides, based on the property of MFs, the boundary information of membership grades and slack matrices are introduced in the stability analysis. Furthermore, by using a piecewise Lyapunov–Krasovskii method, membership-functions-dependent criteria are deduced to ensure the asymptotic stability of built fuzzy switched systems. Finally, the effectiveness of proposed control strategies is demonstrated by simulation examples. 相似文献
2.
云计算应用层中的组合服务具有演化属性,因此,隐私数据在服务组合过程中,用户的隐私数据可能会因为服务或服务流程的演化而暴露。根据服务演化的特征,以描述逻辑为基础,提出了一种面向云计算应用层演化的隐私保护方法。对隐私协议进行形式化描述;根据服务的演化特征,对服务的演化进行监控,保证满足用户的隐私需求;利用实例研究证明该方法的正确性与可行性。 相似文献
3.
针对连续查询位置服务中构造匿名区域未考虑语义位置信息导致敏感隐私泄露问题,通过设计[(K,θ)]-隐私模型,提出一种路网环境下面向连续查询的敏感语义位置隐私保护方案。该方案利用Voronoi图将城市路网预先划分为独立的Voronoi单元,依据用户的移动路径和移动速度,选择具有相似特性的其他[K-1]个用户,构建匿名用户集;利用匿名用户集用户设定的敏感语义位置类型和语义安全阈值,以及用户所处语义位置的Voronoi单元,构建满足[(K,θ)]-隐私模型的语义安全匿名区域,可以同时防止连续查询追踪攻击和语义推断攻击。实验结果表明,与SCPA算法相比,该方案在隐私保护程度上提升约15%,系统开销上降低约20%。 相似文献
4.
从包含相关SCI、CPCI-S与BKCI-S等数据库的Web of Science核心合集数据库出发,对数据库中存在的近13年的国内外文献使用Cite Space与Carrot2分析工具进行聚类分析。力求系统客观地得到国际上钓鱼网站检测技术研究领域的关注热点、研究脉络、著名机构以及核心刊物等研究现状。筛选出具有代表性的文章,采取少量顶级文章精读、部分知名文章粗读的方式对目前钓鱼网站检测技术所涉及到的方法做整理与归类。根据上文的分析对钓鱼网站检测技术的发展方向做了规律性展望,以求对此方向下相关研究人员的研究提供一定的参考。 相似文献
5.
伴随着互联网+的风生水起,信息量暴增的大数据时代应运而来,"网络原住民"大学生不可避免、理所当然地处于大数据洪流之中,但也为其个人隐私保护带来了极大挑战。文章针对大数据带来的安全隐私问题,指出大学生个人隐私泄露的可能原因,提出可以采取的个人隐私保护措施,给出大数据时代隐私保护几种技术,期望能给相关人士提供有效参考。 相似文献
6.
Hamidreza Jafarnejadsani Neng Wan Naira Hovakimyan Petros G. Voulgaris 《国际强度与非线性控制杂志
》2020,30(3):1071-1097
》2020,30(3):1071-1097
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings. 相似文献
7.
针对基于位置服务中连续查询情况下,用户自身属性信息很容易被攻击者获取,并通过关联获得用户位置隐私的情况,提出了一种利用粒子群聚类加速相似属性用户寻找,并由相似属性匿名实现用户位置泛化的隐私保护方法。该方法利用位置隐私保护中常用的可信中心服务器,通过对发送到中心服务器中的查询信息进行粒子群属性聚类,在聚类的过程中加速相似属性用户的寻找过程,由相似属性用户完成位置泛化,以此实现位置隐私保护。实验结果证明,这种基于粒子群属性聚类的隐私保护方法具有高于同类算法的隐私保护能力,以及更快的计算处理速度。 相似文献
8.
Jiming Xu Howard M. Heys 《International Journal of Circuit Theory and Applications》2019,47(6):971-990
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library. 相似文献
9.
为了保证无线传感器网络(Wireless Sensor Networks,WSNs)中的源节点位置隐私安全,同时实现安全性能和网络能耗的均衡,提出了WSNs中规避攻击者的源节点位置隐私路由协议,该协议假设节点具有检测攻击者的能力,通过发出危险警告消息使路由路径上的节点采取路由改变策略,使攻击者无法回溯到源节点,延长了源节点保持位置隐私的安全时间。理论分析和仿真实验表明,该协议在消耗较少的通信开销的情况下保证了源节点位置的高度隐私。 相似文献
10.
Unmanned aircraft systems (UAS) are susceptible to malicious attacks originated by intelligent adversaries, and the actuators constitute one of the critical attack surfaces. In this paper, the problem of detecting and mitigating attacks on the actuators of a small UAS is addressed. Three possible solutions of differing complexity and effectiveness are proposed to address the problem. The first method involves an active detection strategy, whereby carefully designed excitation signals are superimposed on the control commands to increase the detectability of the attack. In the second method, an unknown input observer is designed, which in addition to detecting the attack also estimates the magnitude of the attack. The third method entails designing an actuator system that makes use of variable frequency pulse-width modulated signals to improve the resilience of the actuator against malicious attacks. The effectiveness of the proposed methods is demonstrated using flight experiments and realistic MATLAB simulations that incorporate exogenous disturbances, such as steady winds, atmospheric turbulence, and measurement noise. 相似文献