首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56篇
  免费   5篇
电工技术   6篇
建筑科学   1篇
无线电   1篇
一般工业技术   3篇
冶金工业   2篇
自动化技术   48篇
  2024年   1篇
  2023年   2篇
  2022年   3篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   5篇
  2016年   2篇
  2015年   2篇
  2014年   2篇
  2013年   7篇
  2012年   7篇
  2011年   6篇
  2010年   5篇
  2009年   4篇
  2008年   3篇
  2007年   1篇
  2005年   3篇
  2004年   1篇
  2003年   1篇
  2001年   1篇
  1996年   1篇
  1995年   1篇
排序方式: 共有61条查询结果,搜索用时 31 毫秒
31.
32.
This paper presents the so‐called measures of simultaneous belongingness. These measures are used in clustering for establishing in which extent two objects belong to the same clusters. In the case of fuzzy clustering, the measure also takes into account fuzzy membership. In this paper, we establish a more general framework and, in particular, we introduce a definition that permits to compute this measure for sets of objects (instead of only to pairs of them). © 2008 Wiley Periodicals, Inc.  相似文献   
33.
In data privacy, record linkage can be used as an estimator of the disclosure risk of protected data. To model the worst case scenario one normally attempts to link records from the original data to the protected data. In this paper we introduce a parametrization of record linkage in terms of a weighted mean and its weights, and provide a supervised learning method to determine the optimum weights for the linkage process. That is, the parameters yielding a maximal record linkage between the protected and original data. We compare our method to standard record linkage with data from several protection methods widely used in statistical disclosure control, and study the results taking into account the performance in the linkage process, and its computational effort.  相似文献   
34.
This paper suggests the use of zonotopes for the design of watermark signals. The proposed approach exploits the recent analogy found between stochastic and zonotopic-based estimators to propose a deterministic counterpart to current approaches that study the replay attack in the context of stationary Gaussian processes. In this regard, the zonotopic analogous case where the control loop is closed based on the estimates of a zonotopic Kalman filter (ZKF) is analyzed. This formulation allows to propose a new performance metric that is related to the Frobenius norm of the prediction zonotope. Hence, the steady-state operation of the system can be related with the size of the minimal Robust Positive Invariant set of the estimation error. Furthermore, analogous expressions concerning the impact that a zonotopic/Gaussian watermark signal has on the system operation are derived. Finally, a novel zonotopically bounded watermark signal that ensures the attack detection by causing the residual vector to exit the healthy residual set during the replay phase of the attack is introduced. The proposed approach is illustrated in simulation using a quadruple-tank process.   相似文献   
35.
36.
Dissemination of data with sensitive information about individuals has an implicit risk of unauthorized disclosure. Perturbative masking methods propose the distortion of the original data sets before publication, tackling a difficult tradeoff between data utility (low information loss) and protection against disclosure (low disclosure risk). In this paper, we describe how information loss and disclosure risk measures can be integrated within an evolutionary algorithm to seek new and enhanced masking protections for continuous microdata. The proposed technique constitutes a hybrid approach that combines state-of-the-art protection methods with an evolutionary algorithm optimization. We also provide experimental results using three data sets in order to illustrate and empirically evaluate the application of this technique.  相似文献   
37.
38.
39.
In this paper, robust fault detection is addressed on the basis of evaluating the residual energy that it is compared against worst‐case value (threshold) generated considering parametric modeling uncertainty using interval models. The evaluation of the residual/threshold energy can be performed either in the time or frequency domain. This paper proposes methods to compute such energy in the two domains. The first method generates the adaptive threshold in the time domain through determining the worst‐case time evolution of the residual energy using a zonotope‐based algorithm. The second method evaluates the worst‐case energy evolution in the frequency domain using the Kharitonov polynomials. Results obtained using both approaches are related through the Parseval's theorem. Finally, two application examples (a smart servoactuator and a two DOFs helicopter) will be used to assess the validity of the proposed approaches and compare the results obtained. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   
40.
This work proposes re-identification algorithms to select records that are interesting from the point of view of giving new information. Instead of focusing on re-identified elements, we focus on non re-identified records (non linked records) as they are the ones that potentially supply new and relevant information. Moreover, these relevant characteristics can correspond to chances for improving the knowledge of a system.To evaluate our approach, we have applied it to a example using publicly available data from the UCI repository. We have used the data of theionosphere data base to build a re-identification problem for 35 non-common variables.We show that the use of a simple heuristic rule base can effectively select potentially interesting records.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号