全文获取类型
收费全文 | 1125篇 |
免费 | 136篇 |
国内免费 | 110篇 |
专业分类
电工技术 | 28篇 |
综合类 | 78篇 |
化学工业 | 76篇 |
金属工艺 | 25篇 |
机械仪表 | 24篇 |
建筑科学 | 176篇 |
矿业工程 | 10篇 |
能源动力 | 4篇 |
轻工业 | 44篇 |
水利工程 | 2篇 |
石油天然气 | 6篇 |
武器工业 | 7篇 |
无线电 | 196篇 |
一般工业技术 | 32篇 |
冶金工业 | 48篇 |
自动化技术 | 615篇 |
出版年
2024年 | 3篇 |
2023年 | 42篇 |
2022年 | 50篇 |
2021年 | 39篇 |
2020年 | 62篇 |
2019年 | 32篇 |
2018年 | 24篇 |
2017年 | 39篇 |
2016年 | 47篇 |
2015年 | 28篇 |
2014年 | 77篇 |
2013年 | 51篇 |
2012年 | 82篇 |
2011年 | 115篇 |
2010年 | 77篇 |
2009年 | 104篇 |
2008年 | 95篇 |
2007年 | 89篇 |
2006年 | 74篇 |
2005年 | 69篇 |
2004年 | 32篇 |
2003年 | 35篇 |
2002年 | 30篇 |
2001年 | 18篇 |
2000年 | 15篇 |
1999年 | 9篇 |
1998年 | 8篇 |
1997年 | 3篇 |
1996年 | 5篇 |
1995年 | 1篇 |
1994年 | 5篇 |
1993年 | 6篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1989年 | 2篇 |
排序方式: 共有1371条查询结果,搜索用时 15 毫秒
1.
Jiming Xu Howard M. Heys 《International Journal of Circuit Theory and Applications》2019,47(6):971-990
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library. 相似文献
2.
Hamidreza Jafarnejadsani Neng Wan Naira Hovakimyan Petros G. Voulgaris 《国际强度与非线性控制杂志
》2020,30(3):1071-1097
》2020,30(3):1071-1097
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings. 相似文献
3.
This paper presents a new method for copy-move forgery detection of duplicated objects. A bounding rectangle is drawn around the detected object to form a sub-image. Morphological operator is used to remove the unnecessary small objects. Highly accurate polar complex exponential transform moments are used as features for the detected objects. Euclidian distance and correlation coefficient between the feature vectors are calculated and used for searching the similar objects. A set of 20 forged images with duplicated objects is carefully selected from previously published works. Additional 80 non-forged images are edited by the authors and forged by duplicating different kinds of objects. Numerical simulation is performed where the results show that the proposed method successfully detect different kinds of duplicated objects. The proposed method is much faster than the previously existing methods. Also, it exhibits high robustness to various attacks such as additive white Gaussian noise, JPEG compression, rotation, and scaling. 相似文献
4.
Intrusion Detection Networks (IDN) are distributed cyberdefense systems composed of different nodes performing local detection and filtering functions, as well as sharing information with other nodes in the IDN. The security and resilience of such cyberdefense systems are paramount, since an attacker will try to evade them or render them unusable before attacking the end systems. In this paper, we introduce a system model for IDN nodes in terms of their logical components, functions, and communication channels. This allows us to model different IDN node roles (e.g., detectors, filters, aggregators, correlators, etc.) and architectures (e.g., hierarchical, centralized, fully distributed, etc.). We then introduce a threat model that considers adversarial actions executed against particular IDN nodes, and also the propagation of such actions throughout connected nodes. Based on such models, we finally introduce a countermeasure allocation model based on a multi-objective optimization algorithm to obtain optimal allocation strategies that minimize both risk and cost. Our experimental results obtained through simulation with different IDN architectures illustrate the benefit of our framework to design and reconfigure cyberdefense systems optimally. 相似文献
5.
从包含相关SCI、CPCI-S与BKCI-S等数据库的Web of Science核心合集数据库出发,对数据库中存在的近13年的国内外文献使用Cite Space与Carrot2分析工具进行聚类分析。力求系统客观地得到国际上钓鱼网站检测技术研究领域的关注热点、研究脉络、著名机构以及核心刊物等研究现状。筛选出具有代表性的文章,采取少量顶级文章精读、部分知名文章粗读的方式对目前钓鱼网站检测技术所涉及到的方法做整理与归类。根据上文的分析对钓鱼网站检测技术的发展方向做了规律性展望,以求对此方向下相关研究人员的研究提供一定的参考。 相似文献
6.
Muhammad Shamrooz Aslam 《International Journal of Adaptive Control and Signal Processing》2021,35(7):1336-1353
This article concerns the event-triggered fuzzy filter design for Takagi-Sugeno (T-S) fuzzy systems subject to deception attacks under the stochastic multiple time-varying delays. A sequence of random variables, which are mutually independent but obey the Bernoulli distribution, is introduced to account for the randomly occurring communication delays. In order to efficiently utilize limited network communication bandwidth resources, the event-triggering scheme is adopted. A fuzzy filter with the attacked input signal is presented. Moreover, due to communication delays caused by event-triggering schemes and transmission, the filter adopts non-synchronous premise variables with the system. Then, by utilizing a model transformation technique, the fuzzy systems are developed. Furthermore, using the piecewise Lyapunov functional method technique, the resulting criterion provides sufficient conditions to ensure that fuzzy systems under deception attacks are stochastically stable with an H∞ performance. Accordingly, the conditions for the co-design of the fuzzy filter and event-triggering schemes are given. Finally, numerical simulation with the industrial process provided to verify the proposed event-triggered design. 相似文献
7.
Xiehuan Li Dan Ye 《International Journal of Adaptive Control and Signal Processing》2022,36(1):104-121
In this article, the memory-based dynamic event-triggered controller design issue is investigated for networked interval type-2 (IT2) fuzzy systems under non-periodic denial-of-service (DoS) attacks. For saving limited network bandwidth, a novel memory-based dynamic event-triggered mechanism (DETM) is proposed to schedule data communication. Unlike existing event-triggered generators, the developed memory-based DETM can utilize a series of newly released signals and further save network resources by introducing interval dynamic variables. Moreover, to improve design flexibility, an IT2 fuzzy controller with freely selectable fuzzy rule number and premise membership functions (MFs) is synthesized. Then, a new switched time-delay system with imperfectly matched MFs is established under the consideration of memory-based DETM and DoS attacks simultaneously. Besides, based on the property of MFs, the boundary information of membership grades and slack matrices are introduced in the stability analysis. Furthermore, by using a piecewise Lyapunov–Krasovskii method, membership-functions-dependent criteria are deduced to ensure the asymptotic stability of built fuzzy switched systems. Finally, the effectiveness of proposed control strategies is demonstrated by simulation examples. 相似文献
8.
9.
10.
英国应力蒙皮设计规范BS5950-9对屋面和墙面维护结构所用压型钢板的应力蒙皮作用包括设计与施工作了详细的规定。本文介绍了该规范主要内容的第三部分。 相似文献