首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   122篇
  免费   1篇
电工技术   4篇
化学工业   19篇
金属工艺   1篇
机械仪表   2篇
建筑科学   12篇
能源动力   2篇
轻工业   4篇
石油天然气   4篇
无线电   9篇
一般工业技术   28篇
冶金工业   16篇
自动化技术   22篇
  2024年   1篇
  2023年   1篇
  2022年   4篇
  2021年   3篇
  2020年   1篇
  2019年   1篇
  2018年   6篇
  2017年   4篇
  2016年   1篇
  2015年   2篇
  2014年   1篇
  2013年   6篇
  2012年   5篇
  2011年   5篇
  2010年   1篇
  2009年   2篇
  2008年   5篇
  2006年   3篇
  2005年   2篇
  2004年   3篇
  2003年   4篇
  2002年   1篇
  2001年   3篇
  2000年   5篇
  1999年   2篇
  1998年   1篇
  1997年   3篇
  1996年   3篇
  1995年   6篇
  1994年   7篇
  1993年   2篇
  1992年   4篇
  1991年   7篇
  1990年   1篇
  1988年   2篇
  1985年   1篇
  1984年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   2篇
  1978年   1篇
  1976年   4篇
排序方式: 共有123条查询结果,搜索用时 15 毫秒
91.
We consider the problem of minimizing the 2 norm of a feedback system subject to the constraint that the controller robustly regulate against constants and sinusoids. We show that, for any ε > 0, there exists a controller that both achieves robust regulation and renders the closed-loop 2 norm within ε of the optimal norm (the norm achievable without the robust regulation constraint). We also provide conditions that are both necessary and sufficient for there to exist a robustly regulating controller that achieves the optimal 2 norm. All proofs are constructive.  相似文献   
92.
93.
94.
95.
Time series determination of the transfer function which relates the input random excitation and the output response in random fatigue experiment is established. This process involves determination of univariate time series of input and output, transfer function and noise models, and the transfer functionnoise model.  相似文献   
96.
P.T. John  D.K. Suri  K.C. Nagpal   《Carbon》1984,22(6):575-578
It is shown that one can predict the adsorption of binary and ternary mixtures in any percentage ratio from the adsorption of individual component gases by means of John's isotherm equation. The surface area of mesoporous materials or the limiting micropore volume of microporous materials from binary and ternary mixture adsorption isotherms is given. The relation given by Lewis et al. may be used to prove the validity of the above method and determine the contribution of each component of the mixture.  相似文献   
97.
    
A two-stage solution procedure has been presented for the gravity loading (live load) analysis of framed-tube buildings. In the first stage, the solution is estimated by solving a simplified model and a number of substructures with much reduced numbers of degrees of freedom. In the second stage, the Gauss-Seidel iterative procedure is used to obtain the accurate solution. The proposed two-stage solution procedure requires a CPU time that is only a fraction of that needed in the standard solution procedure. The number of computer storage locations required is also small. Additionally, by using the proposed procedure, framed-tubed buildings of practically any size can be analysed on microcomputers.  相似文献   
98.
    
Owners of large building portfolios such as university campuses have long relied on building energy models to predict potential energy savings from various efficiency upgrades. Traditional calibration procedures for individual building model are time intensive and require specially trained personnel, making their applications to campuses with hundreds of buildings prohibitive. Recently proposed automatic calibration techniques reduce the manual effort during calibration but require hundreds of thousands of energy simulations which increase their cost. To reduce the computational effort of these methods, this paper proposes a methodology that uses a data-driven approximation technique. Instead of brute-force simulations using detailed engineering models, this study employs statistical surrogate models with an optimization algorithm to estimate properties of unknown building parameters. Results demonstrate that when envelope information is available, this workflow yields sufficiently accurate estimates of hard to observe building characteristics, about 500 times faster than traditional approaches.  相似文献   
99.

The swift proliferation in traffic across computer networks has led to certain types of attacks and intrusions, raising a serious global concern of information security. Attack detection is possible by monitoring and observing occurrences in intrusion detection systems, however these systems tend to suffer from problem of curse of dimensionality, high false alarm rate, high time complexity and low detections. In order to overcome these limitations, we propose a feature reduced intrusion detection system employing optimized SVM as a classifier. Feature Reduction has been performed by fusing ranked features from information gain and chi square in a way that it has helped in retaining only important features and discarding the rest. The study further proposes an optimized version of SVM classifier using Big Bang Big Crunch (BBBC) optimization that simulates the big bang and big crunch theory of evolution of universe. BBBC has helped in finding an optimal set of SVM parameters quickly that are further used for classification. We also experimented with a number of fitness functions for gauging the performance of IDS and propose a new fitness function based on the weighted F1 score of various traffic classes. KDD-99 dataset has been used for experimentation and analysis. The paper further experiments the effects of under-sampling and oversampling of various traffic classes on the proposed IDS performance and recommends that maintaining a desired ratio for a mix of under-sampling and over-sampling of desired classes produces the best results.

  相似文献   
100.
Commonly used security mechanisms such as cryptography and steganography suffer from weaknesses when used in a standalone manner. Extra efforts in the form of additional permutations/diffusions etc. result in higher ciphering/deciphering time complexity. Thus, there is a requirement for a security mechanism(s) which can provide adequate security without putting a considerable burden on ciphering/deciphering time complexity. This paper is an effort in this direction. The paper proposes a hybrid mechanism that employs chaotic based encryption scheme to encrypt data and an improved Bit-Plane Complexity Segmentation Steganography algorithm to embed the data. The proposed mechanism uses two new complexity measures to differentiate between noisy regions and simple ones appropriately. The scheme was implemented in MATLAB, and the simulation results show that the proposed mechanism has high embedding capacity, high security with a moderate decrease in PSNR value and is computationally fast.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号