全文获取类型
收费全文 | 136篇 |
免费 | 5篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 2篇 |
综合类 | 9篇 |
化学工业 | 3篇 |
金属工艺 | 4篇 |
机械仪表 | 7篇 |
建筑科学 | 1篇 |
能源动力 | 24篇 |
水利工程 | 1篇 |
石油天然气 | 1篇 |
无线电 | 24篇 |
一般工业技术 | 9篇 |
自动化技术 | 59篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2021年 | 2篇 |
2019年 | 1篇 |
2018年 | 2篇 |
2017年 | 3篇 |
2016年 | 3篇 |
2015年 | 5篇 |
2014年 | 9篇 |
2013年 | 5篇 |
2012年 | 6篇 |
2011年 | 9篇 |
2010年 | 9篇 |
2009年 | 10篇 |
2008年 | 9篇 |
2007年 | 6篇 |
2006年 | 11篇 |
2005年 | 6篇 |
2004年 | 10篇 |
2003年 | 6篇 |
2002年 | 3篇 |
2001年 | 5篇 |
2000年 | 2篇 |
1998年 | 4篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有144条查询结果,搜索用时 0 毫秒
1.
2.
Zhang’s three countermeasures are known to be secure against certain first-order side channel attacks such as differential power analysis and correlation power analysis. This security comes from the countermeasures’ use of random points to blind the message and random integers to blind the secret scalar. In this paper, we propose first-order side channel attack methods that can perfectly break these three countermeasures. Even though Zhang’s countermeasures use random points and random integers our attacks are made possible by the fact that intermediate values computed by these countermeasures are dependent on specific values that we can guess. The experimental results verify that the proposed attack methods can successfully break existing countermeasures. 相似文献
3.
I. Burhan Türken 《Applied Soft Computing》2008,8(3):1178-1188
“Fuzzy Functions” are proposed to be determined by the least squares estimation (LSE) technique for the development of fuzzy system models. These functions, “Fuzzy Functions with LSE” are proposed as alternate representation and reasoning schemas to the fuzzy rule base approaches. These “Fuzzy Functions” can be more easily obtained and implemented by those who are not familiar with an in-depth knowledge of fuzzy theory. Working knowledge of a fuzzy clustering algorithm such as FCM or its variations would be sufficient to obtain membership values of input vectors. The membership values together with scalar input variables are then used by the LSE technique to determine “Fuzzy Functions” for each cluster identified by FCM. These functions are different from “Fuzzy Rule Base” approaches as well as “Fuzzy Regression” approaches. Various transformations of the membership values are included as new variables in addition to original selected scalar input variables; and at times, a logistic transformation of non-scalar original selected input variables may also be included as a new variable. A comparison of “Fuzzy Functions-LSE” with Ordinary Least Squares Estimation (OLSE)” approach show that “Fuzzy Function-LSE” provide better results in the order of 10% or better with respect to RMSE measure for both training and test cases of data sets. 相似文献
4.
一种新型的量化方法与基于小波变换的指纹图像压缩 总被引:1,自引:0,他引:1
针对矢量量化和标量量化各有优劣的现状,一种简单,有效的新型量佛方法被提出来了。本文把应用于基于小波变换的指纹压缩,改进了EBI的WSQ算法,大大降低了量化计算复杂度。即获得较高的压缩比,又有较好的主客观质量,并与JPEG标准进行了对比。 相似文献
5.
《Measurement》2016
This paper presents an adaptive fuzzy logic controller (FLC) design technique for controlling an induction motor speed drive using backtracking search algorithm (BSA). This technique avoids the exhaustive traditional trial-and-error procedure for obtaining membership functions (MFs). The generated adaptive MFs are implemented in speed controller design for input and output based on the evaluation results of the fitness function formulated by the BSA. In this paper, the mean absolute error (MAE) of the rotor speed response for three phase induction motor (TIM) is used as a fitness function. An optimal BSA-based FLC (BSAF) fitness function is also employed to tune and minimize the MAE to improve the performance of the TIM in terms of changes in speed and torque. Moreover, the measurement of the real TIM parameters via three practical tests is used for simulation the TIM. Results obtained from the BSAF are compared with those obtained through gravitational search algorithm (GSA) and particle swarm optimization (PSO) to validate the developed controller. Design procedure and accuracy of the develop FLC are illustrated and investigated via simulation tests for TIM in a MATLAB/Simulink environment. Results show that the BSAF controller is better than the GSA and PSO controllers in all tested cases in terms of damping capability, and transient response under different mechanical loads and speeds. 相似文献
6.
7.
8.
本文采用约束哈密顿体系的正则描述对与共形不变标量场耦合的Robertson—Walker宇宙量子化,得到了相应的Wheeler—Dewitt方程的精确解,并且证明了在这种情况下代表量子引力中算符次序模糊的参数P等于零。最后,我们还证明了宇宙标度因子的最小值为普朗克长度,从而避免了宇宙向奇点的塌缩。 相似文献
9.
General IF-sets with triangular norms and their applications to group decision making 总被引:1,自引:0,他引:1
Anna Pankowska 《Information Sciences》2006,176(18):2713-2754
A concept of general IF-sets, i.e. “intuitionistic” fuzzy sets according to Atanassov, with triangular norm-based hesitation degrees is introduced and developed. That concept is used to construct flexible algorithms of group decision making which involve relative scalar cardinalities defined by means of generalized sigma counts of fuzzy sets. Two cases of group decisions, based on individual or social fuzzy preference relations, are considered. 相似文献
10.
This paper presents four algorithms for securing elliptic curve scalar multiplication against power analysis. The highest-weight binary form (HBF) of scalars and randomization are applied to resist power analysis. By using a special method to recode the scalars, the proposed algorithms do not suffer from simple power analysis (SPA). With the randomization of the secret scalar or base point, three of the four algorithms are secure against differential power analysis (DPA), refined power analysis (RPA) and zero-value point attacks (ZPA). The countermeasures are also immune to the doubling attack. Fast Shamir’s method is used in order to improve the efficiency of parallel scalar multiplication. Compared with previous countermeasures, the new countermeasures achieve higher security and do not impact overall performance. 相似文献