首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58篇
  免费   1篇
  国内免费   1篇
化学工业   1篇
建筑科学   1篇
能源动力   1篇
水利工程   2篇
无线电   12篇
一般工业技术   6篇
冶金工业   9篇
自动化技术   28篇
  2024年   1篇
  2021年   2篇
  2019年   1篇
  2018年   1篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2007年   1篇
  2006年   1篇
  2005年   2篇
  2003年   1篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   4篇
  1997年   1篇
  1996年   3篇
  1995年   1篇
  1994年   2篇
  1993年   2篇
  1991年   1篇
  1989年   1篇
  1988年   1篇
  1985年   1篇
  1984年   3篇
  1983年   1篇
  1982年   1篇
  1981年   3篇
  1980年   1篇
  1979年   2篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
  1975年   4篇
  1970年   1篇
排序方式: 共有60条查询结果,搜索用时 15 毫秒
11.
12.
We study the robustness of linear systems with respect to the disturbances and the uncertainties in the actuator input output characteristics. Disturbances either bounded in energy or bounded in magnitude are considered. The actuator input output characteristics are assumed to reside in a so-called generalized sector bounded by piecewise linear curves. Robust bounded state stability of the closed-loop system is first defined and characterized in terms of linear matrix inequalities (LMIs). Based on this characterization, the evaluation of the disturbance tolerance and disturbance rejection capabilities of the closed-loop system under a given feedback law is formulated into and solved as optimization problems with LMI constraints.  相似文献   
13.
14.
In this paper, we introduce a family of filter kernels, the gray-code kernels (GCK) and demonstrate their use in image analysis. Filtering an image with a sequence of gray-code kernels is highly efficient and requires only two operations per pixel for each filter kernel, independent of the size or dimension of the kernel. We show that the family of kernels is large and includes the Walsh-Hadamard kernels, among others. The GCK can be used to approximate any desired kernel and, as such forms, a complete representation. The efficiency of computation using a sequence of GCK filters can be exploited for various real-time applications, such as, pattern detection, feature extraction, texture analysis, texture synthesis, and more  相似文献   
15.
In this paper we propose a nonrecursive method for solving the general discrete-time algebraic Riccati equation related to the H control problem (H-DARE). We have achieved this by casting the problem of solving a given H-DARE to the problem of solving an auxiliary continuous-time algebraic Riccati equation associated with the H control problem (H-CARE) for which the well known nonrecursive methods of solving are available. The advantages of our approach are: it reduces the computation involved in the recursive algorithms while giving much more accurate solutions, and it readily provides the properties of the general H-DARE.  相似文献   
16.
In this note we exhibit some weaknesses in two key certification schemes. We show how a legitimate user can impersonate any other user in an ElGamal-based certification scheme, even if hashing is applied first. Furthermore, we show how anybody can impersonate users of the modular square root key certification scheme, if no hashing occurs before the certification. This shows that it is essential for this certification scheme to hash a message before signing it.  相似文献   
17.
This paper investigates the characteristics of extreme events for series systems. A methodology is developed to determine the Gumbel Type of a series system, given that the Gumbel Types of the components are known. Determining the propagation of the Gumbel Types can be accomplished without knowing the exact probability density functions of the components and without calculating the analytic form for the distribution of the overall system. In addition, an analytical technique is developed to determine the parameters of the extreme value distribution—the characteristic largest value, and the inverse measure of dispersion—for the overall series system. Finally, these three pieces of information—the Gumbel Type, the characteristic largest value, and the inverse measure of dispersion—are combined to calculate a conditional expected value of extreme events of the overall series system.  相似文献   
18.
An algorithm is given for computing the inverse of a linear time-invariant multivariable system. The algorithm, which is an extension of an existing algorithm, reduces the problem to that of inverting a polynomial matrix, and hence requires less computations. A more efficient test for determining whether a system is invertible is also given.  相似文献   
19.
Estimation of the location of a source of radiation from antenna-array phase measurements is considered. A least-squares technique for estimation is analysed for performance.  相似文献   
20.
Shamash  Y. 《Electronics letters》1977,13(6):166-167
An algorithm is given to determine the transfer function or minimal realisation of a finite-dimensional linear time-invariant system from its Markov parameters or time moments. The method makes a direct computation of the minimal polynomial by using Koenig's theorem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号