全文获取类型
收费全文 | 58篇 |
免费 | 1篇 |
国内免费 | 1篇 |
专业分类
化学工业 | 1篇 |
建筑科学 | 1篇 |
能源动力 | 1篇 |
水利工程 | 2篇 |
无线电 | 12篇 |
一般工业技术 | 6篇 |
冶金工业 | 9篇 |
自动化技术 | 28篇 |
出版年
2024年 | 1篇 |
2021年 | 2篇 |
2019年 | 1篇 |
2018年 | 1篇 |
2013年 | 1篇 |
2012年 | 1篇 |
2011年 | 1篇 |
2010年 | 1篇 |
2009年 | 1篇 |
2008年 | 1篇 |
2007年 | 1篇 |
2006年 | 1篇 |
2005年 | 2篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1975年 | 4篇 |
1970年 | 1篇 |
排序方式: 共有60条查询结果,搜索用时 15 毫秒
11.
12.
We study the robustness of linear systems with respect to the disturbances and the uncertainties in the actuator input output characteristics. Disturbances either bounded in energy or bounded in magnitude are considered. The actuator input output characteristics are assumed to reside in a so-called generalized sector bounded by piecewise linear curves. Robust bounded state stability of the closed-loop system is first defined and characterized in terms of linear matrix inequalities (LMIs). Based on this characterization, the evaluation of the disturbance tolerance and disturbance rejection capabilities of the closed-loop system under a given feedback law is formulated into and solved as optimization problems with LMI constraints. 相似文献
13.
14.
Ben-Artzi G Hel-Or H Hel-Or Y 《IEEE transactions on pattern analysis and machine intelligence》2007,29(3):382-393
In this paper, we introduce a family of filter kernels, the gray-code kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of gray-code kernels is highly efficient and requires only two operations per pixel for each filter kernel, independent of the size or dimension of the kernel. We show that the family of kernels is large and includes the Walsh-Hadamard kernels, among others. The GCK can be used to approximate any desired kernel and, as such forms, a complete representation. The efficiency of computation using a sequence of GCK filters can be exploited for various real-time applications, such as, pattern detection, feature extraction, texture analysis, texture synthesis, and more 相似文献
15.
In this paper we propose a nonrecursive method for solving the general discrete-time algebraic Riccati equation related to the H∞ control problem (H∞-DARE). We have achieved this by casting the problem of solving a given H∞-DARE to the problem of solving an auxiliary continuous-time algebraic Riccati equation associated with the H∞ control problem (H∞-CARE) for which the well known nonrecursive methods of solving are available. The advantages of our approach are: it reduces the computation involved in the recursive algorithms while giving much more accurate solutions, and it readily provides the properties of the general H∞-DARE. 相似文献
16.
In this note we exhibit some weaknesses in two key certification schemes. We show how a legitimate user can impersonate any other user in an ElGamal-based certification scheme, even if hashing is applied first. Furthermore, we show how anybody can impersonate users of the modular square root key certification scheme, if no hashing occurs before the certification. This shows that it is essential for this certification scheme to hash a message before signing it. 相似文献
17.
This paper investigates the characteristics of extreme events for series systems. A methodology is developed to determine the Gumbel Type of a series system, given that the Gumbel Types of the components are known. Determining the propagation of the Gumbel Types can be accomplished without knowing the exact probability density functions of the components and without calculating the analytic form for the distribution of the overall system. In addition, an analytical technique is developed to determine the parameters of the extreme value distribution—the characteristic largest value, and the inverse measure of dispersion—for the overall series system. Finally, these three pieces of information—the Gumbel Type, the characteristic largest value, and the inverse measure of dispersion—are combined to calculate a conditional expected value of extreme events of the overall series system. 相似文献
18.
An algorithm is given for computing the inverse of a linear time-invariant multivariable system. The algorithm, which is an extension of an existing algorithm, reduces the problem to that of inverting a polynomial matrix, and hence requires less computations. A more efficient test for determining whether a system is invertible is also given. 相似文献
19.
Estimation of the location of a source of radiation from antenna-array phase measurements is considered. A least-squares technique for estimation is analysed for performance. 相似文献
20.
An algorithm is given to determine the transfer function or minimal realisation of a finite-dimensional linear time-invariant system from its Markov parameters or time moments. The method makes a direct computation of the minimal polynomial by using Koenig's theorem. 相似文献