全文获取类型
收费全文 | 122篇 |
免费 | 12篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 13篇 |
综合类 | 5篇 |
化学工业 | 2篇 |
机械仪表 | 2篇 |
建筑科学 | 3篇 |
能源动力 | 2篇 |
水利工程 | 4篇 |
武器工业 | 2篇 |
无线电 | 31篇 |
一般工业技术 | 10篇 |
冶金工业 | 7篇 |
自动化技术 | 73篇 |
出版年
2024年 | 1篇 |
2022年 | 1篇 |
2021年 | 3篇 |
2020年 | 2篇 |
2019年 | 5篇 |
2018年 | 6篇 |
2017年 | 2篇 |
2016年 | 4篇 |
2015年 | 3篇 |
2014年 | 11篇 |
2013年 | 5篇 |
2012年 | 8篇 |
2011年 | 14篇 |
2010年 | 6篇 |
2009年 | 7篇 |
2008年 | 15篇 |
2007年 | 14篇 |
2006年 | 12篇 |
2005年 | 8篇 |
2004年 | 5篇 |
2003年 | 4篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1993年 | 3篇 |
1992年 | 1篇 |
1987年 | 1篇 |
1982年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有154条查询结果,搜索用时 0 毫秒
31.
In order to investigate the enhancement of data privacy by distributing data packets via multiple paths, this paper formulates a security model and analyzes the privacy problem in multipath scenarios leveraging information theoretic concept. Based on proposed model, a privacy function related to the path number is discussed. We heuristically recommend the optimal path number and analyze the tradeoff among the performance, resource consumption and privacy. For reducing the information leakage, the data schedule algorithms are also proposed. The analytical model can provide guidelines for the multipath protocol design. 相似文献
32.
33.
34.
《Journal of Process Control》2014,24(3):22-32
This communication addresses the analytical PID tuning rules for integrating processes. First, this paper provides an analytical tuning method of two-degree-of-freedom (2-Dof) PID controller using an enhanced internal model control (IMC) principle. On the basis of the robustness analyses, the presented method can easily achieve the performance/robustness tradeoff by specifying a desired robustness degree. Second, an analytical tuning method of one-degree-of-freedom (1-Dof) PID also is proposed in terms of performance/robustness and servo/regulator tradeoffs, which are not commonly considered for 1-Dof controller design. The servo/regulator tradeoff is formulated as a constrained optimization problem to provide output responses as similar as possible to those produced by the 2-Dof PID controller. The presented PID settings are applicable for a wide range of integrating processes. Simulation studies show the effectiveness and merits of the proposed method. 相似文献
35.
36.
In this paper we study energy-aware scheduling that trades energy consumption against a traditional performance measure of delay. We use the power-rate function f(x)=c+xα for x>0 and f(0)=0 to model the power consumption, where c>0 represents the base power. We give a definition of a rate-adaptive version of the Weighted Fair Queueing scheduling algorithm, and prove its energy consumption is within a bounded factor of the best possible when the algorithm guarantees the classic end-to-end delay for every connection. 相似文献
37.
Optimisation in changing environments is a challenging research topic since many real-world problems are inherently dynamic. Inspired by the natural evolution process, evolutionary algorithms (EAs) are among the most successful and promising approaches that have addressed dynamic optimisation problems. However, managing the exploration/exploitation trade-off in EAs is still a prevalent issue, and this is due to the difficulties associated with the control and measurement of such a behaviour. The proposal of this paper is to achieve a balance between exploration and exploitation in an explicit manner. The idea is to use two equally sized populations: the first one performs exploration while the second one is responsible for exploitation. These tasks are alternated from one generation to the next one in a regular pattern, so as to obtain a balanced search engine. Besides, we reinforce the ability of our algorithm to quickly adapt after cnhanges by means of a memory of past solutions. Such a combination aims to restrain the premature convergence, to broaden the search area, and to speed up the optimisation. We show through computational experiments, and based on a series of dynamic problems and many performance measures, that our approach improves the performance of EAs and outperforms competing algorithms. 相似文献
38.
39.
40.
In the midst of the COVID-19 pandemic, contact-tracing apps have emerged as reliable tools for public health communication and the promotion of preventative health. However, to function properly, contact-tracing apps require users to provide sensitive information, which has raised concerns about data disclosure, misuse and social surveillance. Little is known about how different types of risk perception simultaneously hinder and motivate individuals' engagement in mobile health apps, particularly in the context of a pandemic. Based on the privacy calculus theory and the risk-risk tradeoff concept, this study examined the risk-risk tradeoff model to enhance the understanding of COVID-19 contact-tracing app users’ decision from the perspective of risk minimization. Findings from PLS-SEM and fsQCA revealed that users engage in health risk-privacy risk tradeoff when evaluating and deciding to use the apps. The focal study therefore contributes to the research on privacy calculus theory and calls for a balanced managerial solution to mitigate this tradeoff dilemma. 相似文献