首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3863篇
  免费   660篇
  国内免费   662篇
电工技术   193篇
综合类   371篇
化学工业   52篇
金属工艺   57篇
机械仪表   481篇
建筑科学   180篇
矿业工程   57篇
能源动力   19篇
轻工业   89篇
水利工程   37篇
石油天然气   13篇
武器工业   43篇
无线电   472篇
一般工业技术   290篇
冶金工业   85篇
原子能技术   1篇
自动化技术   2745篇
  2024年   19篇
  2023年   133篇
  2022年   197篇
  2021年   238篇
  2020年   258篇
  2019年   193篇
  2018年   167篇
  2017年   195篇
  2016年   218篇
  2015年   228篇
  2014年   320篇
  2013年   320篇
  2012年   306篇
  2011年   354篇
  2010年   288篇
  2009年   275篇
  2008年   240篇
  2007年   290篇
  2006年   198篇
  2005年   206篇
  2004年   148篇
  2003年   129篇
  2002年   89篇
  2001年   50篇
  2000年   31篇
  1999年   15篇
  1998年   12篇
  1997年   13篇
  1996年   13篇
  1995年   9篇
  1994年   8篇
  1993年   4篇
  1992年   5篇
  1991年   1篇
  1990年   4篇
  1989年   3篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1980年   1篇
  1955年   1篇
排序方式: 共有5185条查询结果,搜索用时 15 毫秒
1.
In this article, the memory-based dynamic event-triggered controller design issue is investigated for networked interval type-2 (IT2) fuzzy systems under non-periodic denial-of-service (DoS) attacks. For saving limited network bandwidth, a novel memory-based dynamic event-triggered mechanism (DETM) is proposed to schedule data communication. Unlike existing event-triggered generators, the developed memory-based DETM can utilize a series of newly released signals and further save network resources by introducing interval dynamic variables. Moreover, to improve design flexibility, an IT2 fuzzy controller with freely selectable fuzzy rule number and premise membership functions (MFs) is synthesized. Then, a new switched time-delay system with imperfectly matched MFs is established under the consideration of memory-based DETM and DoS attacks simultaneously. Besides, based on the property of MFs, the boundary information of membership grades and slack matrices are introduced in the stability analysis. Furthermore, by using a piecewise Lyapunov–Krasovskii method, membership-functions-dependent criteria are deduced to ensure the asymptotic stability of built fuzzy switched systems. Finally, the effectiveness of proposed control strategies is demonstrated by simulation examples.  相似文献   
2.
从包含相关SCI、CPCI-S与BKCI-S等数据库的Web of Science核心合集数据库出发,对数据库中存在的近13年的国内外文献使用Cite Space与Carrot2分析工具进行聚类分析。力求系统客观地得到国际上钓鱼网站检测技术研究领域的关注热点、研究脉络、著名机构以及核心刊物等研究现状。筛选出具有代表性的文章,采取少量顶级文章精读、部分知名文章粗读的方式对目前钓鱼网站检测技术所涉及到的方法做整理与归类。根据上文的分析对钓鱼网站检测技术的发展方向做了规律性展望,以求对此方向下相关研究人员的研究提供一定的参考。  相似文献   
3.
Autonomous systems are rapidly becoming an integrated part of the modern life. Safe and secure navigation and control of these systems present significant challenges in the presence of uncertainties, physical failures, and cyber attacks. In this paper, we formulate a navigation and control problem for autonomous systems using a multilevel control structure, in which the high‐level reference commands are limited by a saturation function, whereas the low‐level controller tracks the reference by compensating for disturbances and uncertainties. For this purpose, we consider a class of nested, uncertain, multiple‐input–multiple‐output systems subject to reference command saturation, possibly with nonminimum phase zeros. A multirate output‐feedback adaptive controller is developed as the low‐level controller. The sampled‐data (SD) design of this controller facilitates the direct implementation on digital computers, where the input/output signals are available at discrete time instances with different sampling rates. In addition, stealthy zero‐dynamics attacks become detectable by considering a multirate SD formulation. Robust stability and performance of the overall closed‐loop system with command saturation and multirate adaptive control are analyzed. Simulation scenarios for navigation and control of a fixed‐wing drone under failures/attacks are provided to validate the theoretical findings.  相似文献   
4.
提出了一种小型轻便的流速仪检定系统的设计方案,并运用改进的多学科协同优化方法求解各学科设计变量的最优解。首先介绍了算法思想及改进措施,并根据系统设计要求建立了各学科的设计变量、目标函数和约束条件;其次,运用遗传算法求解各学科设计变量的最优解,并根据优化结果完善了系统的设计方案,同时运用计算机仿真等方法验证了优化结果的可行性。结果表明,优化后的检定系统满足流体力学效应、匀速运动时间、系统重量等设计要求,同时证明了协同优化算法解决多学科设计优化问题的有效性。  相似文献   
5.
张程  陈付龙  刘超  齐学梅 《计算机应用》2019,39(6):1842-1848
信息物理融合系统(CPS)涉及多种计算模型的集成和协同工作,针对CPS设计方法不统一、重塑性差、复杂度高、难以协同建模验证等问题,提出一种结构化、可描述行为的异元组件模型。首先,用统一组件建模方法进行建模,解决模型不开放问题;然后,用可扩展标记语言(XML)规范描述各类组件,解决不同计算模型描述语言不一致和不可扩展问题;最后,用多级开放组件模型的协同仿真验证方式进行仿真验证,解决验证的不可协同问题。通过通用组件建模方法、XML组件规范描述语言以及验证工具平台XModel对医用恒温箱进行了建模、描述和仿真。医用恒温箱的案例表明,这种模型驱动建立可重塑异元组件并确认其设计正确性的过程,支持信息物理协同设计和边构建边纠正,可避免在系统实现过程中发现问题时再进行反复修改。  相似文献   
6.
7.
Side-channel attacks have shown to be efficient tools in breaking cryptographic hardware. Many conventional algorithms have been proposed to perform side-channel attacks exploiting the dynamic power leakage. In recent years, with the development of processing technology, static power has emerged as a new potential source for side-channel leakage. Both types of power leakage have their advantages and disadvantages. In this work, we propose to use the deep neural network technique to combine the benefits of both static and dynamic power. This approach replaces the classifier in template attacks with our proposed long short-term memory network schemes. Hence, instead of deriving a specific probability density model for one particular type of power leakage, we gain the ability of combining different leakage sources using a structural algorithm. In this paper, we propose three schemes to combine the static and dynamic power leakage. The performance of these schemes is compared using simulated test circuits designed with a 45-nm library.  相似文献   
8.
针对高速数据传输及计算所带来时延和终端设备能耗问题,提出了一种在上行链路采用等功率分配的传输方案。首先,依据增强现实(AR)业务的协作属性建立了针对AR特性的系统模型;其次,详细分析了系统帧结构,建立以最小化系统消耗总能量为优化目标的约束条件;最后,在保障延迟和功耗满足约束的条件下,建立了基于凸优化的移动边缘计算(MEC)资源优化求解数学模型,从而获得最优的通信和计算资源分配方案。与独立传输相比,该方案在最大延迟时间分别为0.1 s和0.15 s时的总能耗降幅均为14.6%。仿真结果表明,在相同条件下,与基于用户独立传输的优化方案相比,考虑用户间协作传输的等功率MEC优化方案能显著减少系统消耗的总能量。  相似文献   
9.
Unmanned aircraft systems (UAS) are susceptible to malicious attacks originated by intelligent adversaries, and the actuators constitute one of the critical attack surfaces. In this paper, the problem of detecting and mitigating attacks on the actuators of a small UAS is addressed. Three possible solutions of differing complexity and effectiveness are proposed to address the problem. The first method involves an active detection strategy, whereby carefully designed excitation signals are superimposed on the control commands to increase the detectability of the attack. In the second method, an unknown input observer is designed, which in addition to detecting the attack also estimates the magnitude of the attack. The third method entails designing an actuator system that makes use of variable frequency pulse-width modulated signals to improve the resilience of the actuator against malicious attacks. The effectiveness of the proposed methods is demonstrated using flight experiments and realistic MATLAB simulations that incorporate exogenous disturbances, such as steady winds, atmospheric turbulence, and measurement noise.  相似文献   
10.
This paper presents a new method for copy-move forgery detection of duplicated objects. A bounding rectangle is drawn around the detected object to form a sub-image. Morphological operator is used to remove the unnecessary small objects. Highly accurate polar complex exponential transform moments are used as features for the detected objects. Euclidian distance and correlation coefficient between the feature vectors are calculated and used for searching the similar objects. A set of 20 forged images with duplicated objects is carefully selected from previously published works. Additional 80 non-forged images are edited by the authors and forged by duplicating different kinds of objects. Numerical simulation is performed where the results show that the proposed method successfully detect different kinds of duplicated objects. The proposed method is much faster than the previously existing methods. Also, it exhibits high robustness to various attacks such as additive white Gaussian noise, JPEG compression, rotation, and scaling.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号