首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   716篇
  免费   96篇
  国内免费   48篇
电工技术   116篇
综合类   143篇
化学工业   7篇
机械仪表   9篇
建筑科学   48篇
矿业工程   2篇
能源动力   6篇
轻工业   17篇
石油天然气   1篇
武器工业   3篇
无线电   77篇
一般工业技术   26篇
冶金工业   49篇
原子能技术   2篇
自动化技术   354篇
  2024年   5篇
  2023年   32篇
  2022年   47篇
  2021年   74篇
  2020年   58篇
  2019年   57篇
  2018年   23篇
  2017年   31篇
  2016年   35篇
  2015年   29篇
  2014年   57篇
  2013年   52篇
  2012年   37篇
  2011年   59篇
  2010年   33篇
  2009年   17篇
  2008年   28篇
  2007年   34篇
  2006年   31篇
  2005年   27篇
  2004年   23篇
  2003年   18篇
  2002年   5篇
  2001年   13篇
  2000年   4篇
  1999年   7篇
  1998年   2篇
  1995年   3篇
  1992年   1篇
  1988年   1篇
  1987年   4篇
  1986年   1篇
  1985年   2篇
  1984年   1篇
  1983年   2篇
  1982年   4篇
  1971年   1篇
  1963年   1篇
  1962年   1篇
排序方式: 共有860条查询结果,搜索用时 15 毫秒
851.
The problem of hybrid-driven fuzzy filtering for nonlinear semi-linear parabolic partial differential equation systems with dual cyber attacks is investigated. First, a Takagi-Sugeno (T-S) fuzzy model is employed to reconstruct the original nonlinear systems. Second, a hybrid-driven mechanism is applied for filter design to balance the systems' performance and the limited network resource consumption under dual cyber attacks composed of deception and denial of service attacks. Based on the Lyapunov direct method, sufficient conditions to guarantee the stability of the augmented system are obtained, and the parameters of the designed filter are earned with explicit form. Finally, a simulation example with robust analysis and comparative analysis is provided to illustrate the effectiveness of the proposed method.  相似文献   
852.
This paper investigates a security problem in cyber-physical systems (CPSs) under multisensory framework. In the considered system, the feedback and feed-forward channels may suffer from false data injection (FDI) attacks. The attacker aims at disturbing the systems by modifying the sensors' measurements and injecting external control inputs while keep ( ϵ , δ $$ \epsilon, \delta $$ )-stealthiness. Two types of multi-sensor fusion Kalman filters, which are equivalent in the absence of attacks, are adopted by the remote state estimator. When the system is maliciously attacked, the necessary and sufficient condition is obtained to guarantee the equivalence of the sequential Kalman filter and data compression Kalman filter under two-channel attacks. Moreover, suboptimal ( ϵ , δ $$ \epsilon, \delta $$ )-stealthiness attack strategies for these Kalman filters are obtained by applying two-stage optimization method, convex analysis and monotonic optimization techniques. Finally, simulations on a numerical example of a quadrotor are carried out to validate the feasibility of theoretical results.  相似文献   
853.
面向网络取证的网络攻击追踪溯源技术分析   总被引:1,自引:0,他引:1  
首先定位网络攻击事件的源头,然后进行有效的电子数据证据的收集,是网络取证的任务之一.定位网络攻击事件源头需要使用网络攻击追踪溯源技术.然而,现有的网络攻击追踪溯源技术研究工作主要从防御的角度来展开,以通过定位攻击源及时阻断攻击为主要目标,较少会考虑到网络取证的要求,从而导致会在网络攻击追踪溯源过程中产生的大量有价值的数...  相似文献   
854.
855.
856.
This paper is concerned with the issue of hybrid-triggered scheme H asynchronous control for networked Markov jump systems (MJSs) with probabilistic cyber attacks. First, in view of the subsistent phenomenon that the controller cannot capture the system modes synchronously, the hidden Markov model (HMM) with partly unknown probabilities is introduced in this article to describe such asynchronous phenomenon. In addition, the hybrid-triggered scheme includes time-triggered scheme and event-triggered scheme, in which the switching signal between two schemes obeys random Bernoulli distribution. By utilizing Lyapunov stability theory and matrix inequality technique, some sufficient conditions are developed, which can guarantee the networked MJSs mean-square asymptotically stable (MSAS) and H performance; also, the desired controller gains are obtained by singular value decomposition (SVD) methods. Moreover, as the special cases of the results above, three corollaries are given. Finally, a numerical example and a pulse width-modulation-driven boost converter (PWMDBC) model are provided to demonstrate the usefulness and reliability of our developed approaches.  相似文献   
857.
Crime is a focal problem in modern society, affecting social stability, public safety, economic development, and life quality of residents. Promptly predicting crime occurrence places in a relatively high accuracy is a very important and meaningful research direction. Via the rapid development of social media (e.g., Twitter), the online information can act as a strong supplement for the offline information (crime records). Additionally, the geographic information and taxi flow between communities can model the spatial relationship between communities, which has already been confirmed effective in previous work. In order to efficiently solve crime prediction problem, we propose a generalized deep multi-view representation learning framework for crime forecasting. Our extensive experiments on a 4-month city-wide dataset that consists of 77 communities and 22 crime types show our model improve the prediction accuracy on most crime types.  相似文献   
858.
This essay discusses the H $$ {H}_{\infty } $$ control for continuous-time singular systems with two types of stochastic cyber attacks and dynamic event-triggered scheme. So as to economize network resources and reduce communication burden, the novel dynamic event-triggered mechanism is given. Cyber attacks occur randomly during network information transmission, especially the denial of service (DoS) attacks and the deception attacks. By using Lyapunov–Krasovskii functional, some novel sufficient conditions for the impulse free, regular, and asymptotically stable of the studied system are obtained, and a corresponding controller is devised. In addition, a desired controller gain is received through resolving linear matrix inequalities. Eventually, a few numerical examples are supplied to certify the usefulness of provided design ways and results.  相似文献   
859.
网络空间新生威胁日趋复杂多变,传统安全防御手段已经捉肘见襟.网络安全威胁情报作为直接或潜在安全威胁的外部信息资源,可帮助安全人员快速甄别恶意威胁攻击并及时作出响应防御.开源威胁情报挖掘技术可从多方开源情报中获取高质量情报,极大弥补了传统威胁情报挖掘信息量单薄等不足.美国及欧洲是最早在政府层面开展开源情报挖掘技术研究的国...  相似文献   
860.
In this work, the problem of online secure state estimation and attack reconstruction in the face of offensives that corrupt the sensor measurements and modify the actuator commands of cyber–physical systems is investigated for designing a resilient controller for the system. The states of cyber–physical system and its actuator attacks are estimated/reconstructed online using a novel adaptive line-by-line super-twisting observer, whereas sparse stealth attacks on unprotected sensors are reconstructed using a sparse recovery algorithm. The estimated attacks are used for attack compensation by a resilient controller. The efficacy of the proposed technique is illustrated via simulation on a real electric power system under deception actuator attack and stealth sensor attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号