全文获取类型
收费全文 | 716篇 |
免费 | 96篇 |
国内免费 | 48篇 |
专业分类
电工技术 | 116篇 |
综合类 | 143篇 |
化学工业 | 7篇 |
机械仪表 | 9篇 |
建筑科学 | 48篇 |
矿业工程 | 2篇 |
能源动力 | 6篇 |
轻工业 | 17篇 |
石油天然气 | 1篇 |
武器工业 | 3篇 |
无线电 | 77篇 |
一般工业技术 | 26篇 |
冶金工业 | 49篇 |
原子能技术 | 2篇 |
自动化技术 | 354篇 |
出版年
2024年 | 5篇 |
2023年 | 32篇 |
2022年 | 47篇 |
2021年 | 74篇 |
2020年 | 58篇 |
2019年 | 57篇 |
2018年 | 23篇 |
2017年 | 31篇 |
2016年 | 35篇 |
2015年 | 29篇 |
2014年 | 57篇 |
2013年 | 52篇 |
2012年 | 37篇 |
2011年 | 59篇 |
2010年 | 33篇 |
2009年 | 17篇 |
2008年 | 28篇 |
2007年 | 34篇 |
2006年 | 31篇 |
2005年 | 27篇 |
2004年 | 23篇 |
2003年 | 18篇 |
2002年 | 5篇 |
2001年 | 13篇 |
2000年 | 4篇 |
1999年 | 7篇 |
1998年 | 2篇 |
1995年 | 3篇 |
1992年 | 1篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1971年 | 1篇 |
1963年 | 1篇 |
1962年 | 1篇 |
排序方式: 共有860条查询结果,搜索用时 15 毫秒
851.
Zhen Zhang Xiaona Song Xiangliang Sun Vladimir Stojanovic 《International Journal of Adaptive Control and Signal Processing》2023,37(2):380-398
The problem of hybrid-driven fuzzy filtering for nonlinear semi-linear parabolic partial differential equation systems with dual cyber attacks is investigated. First, a Takagi-Sugeno (T-S) fuzzy model is employed to reconstruct the original nonlinear systems. Second, a hybrid-driven mechanism is applied for filter design to balance the systems' performance and the limited network resource consumption under dual cyber attacks composed of deception and denial of service attacks. Based on the Lyapunov direct method, sufficient conditions to guarantee the stability of the augmented system are obtained, and the parameters of the designed filter are earned with explicit form. Finally, a simulation example with robust analysis and comparative analysis is provided to illustrate the effectiveness of the proposed method. 相似文献
852.
This paper investigates a security problem in cyber-physical systems (CPSs) under multisensory framework. In the considered system, the feedback and feed-forward channels may suffer from false data injection (FDI) attacks. The attacker aims at disturbing the systems by modifying the sensors' measurements and injecting external control inputs while keep ( )-stealthiness. Two types of multi-sensor fusion Kalman filters, which are equivalent in the absence of attacks, are adopted by the remote state estimator. When the system is maliciously attacked, the necessary and sufficient condition is obtained to guarantee the equivalence of the sequential Kalman filter and data compression Kalman filter under two-channel attacks. Moreover, suboptimal ( )-stealthiness attack strategies for these Kalman filters are obtained by applying two-stage optimization method, convex analysis and monotonic optimization techniques. Finally, simulations on a numerical example of a quadrotor are carried out to validate the feasibility of theoretical results. 相似文献
853.
854.
855.
856.
This paper is concerned with the issue of hybrid-triggered scheme asynchronous control for networked Markov jump systems (MJSs) with probabilistic cyber attacks. First, in view of the subsistent phenomenon that the controller cannot capture the system modes synchronously, the hidden Markov model (HMM) with partly unknown probabilities is introduced in this article to describe such asynchronous phenomenon. In addition, the hybrid-triggered scheme includes time-triggered scheme and event-triggered scheme, in which the switching signal between two schemes obeys random Bernoulli distribution. By utilizing Lyapunov stability theory and matrix inequality technique, some sufficient conditions are developed, which can guarantee the networked MJSs mean-square asymptotically stable (MSAS) and performance; also, the desired controller gains are obtained by singular value decomposition (SVD) methods. Moreover, as the special cases of the results above, three corollaries are given. Finally, a numerical example and a pulse width-modulation-driven boost converter (PWMDBC) model are provided to demonstrate the usefulness and reliability of our developed approaches. 相似文献
857.
Crime is a focal problem in modern society, affecting social stability, public safety, economic development, and life quality of residents. Promptly predicting crime occurrence places in a relatively high accuracy is a very important and meaningful research direction. Via the rapid development of social media (e.g., Twitter), the online information can act as a strong supplement for the offline information (crime records). Additionally, the geographic information and taxi flow between communities can model the spatial relationship between communities, which has already been confirmed effective in previous work. In order to efficiently solve crime prediction problem, we propose a generalized deep multi-view representation learning framework for crime forecasting. Our extensive experiments on a 4-month city-wide dataset that consists of 77 communities and 22 crime types show our model improve the prediction accuracy on most crime types. 相似文献
858.
Heqian Wang Qingsheng Yang Jie Wu Xisheng Zhan Huaicheng Yan 《Asian journal of control》2023,25(3):1991-2000
This essay discusses the control for continuous-time singular systems with two types of stochastic cyber attacks and dynamic event-triggered scheme. So as to economize network resources and reduce communication burden, the novel dynamic event-triggered mechanism is given. Cyber attacks occur randomly during network information transmission, especially the denial of service (DoS) attacks and the deception attacks. By using Lyapunov–Krasovskii functional, some novel sufficient conditions for the impulse free, regular, and asymptotically stable of the studied system are obtained, and a corresponding controller is devised. In addition, a desired controller gain is received through resolving linear matrix inequalities. Eventually, a few numerical examples are supplied to certify the usefulness of provided design ways and results. 相似文献
859.
860.
Shamila Nateghi Yuri Shtessel Christopher Edwards Jean-Pierre Barbot 《Asian journal of control》2023,25(3):1775-1790
In this work, the problem of online secure state estimation and attack reconstruction in the face of offensives that corrupt the sensor measurements and modify the actuator commands of cyber–physical systems is investigated for designing a resilient controller for the system. The states of cyber–physical system and its actuator attacks are estimated/reconstructed online using a novel adaptive line-by-line super-twisting observer, whereas sparse stealth attacks on unprotected sensors are reconstructed using a sparse recovery algorithm. The estimated attacks are used for attack compensation by a resilient controller. The efficacy of the proposed technique is illustrated via simulation on a real electric power system under deception actuator attack and stealth sensor attack. 相似文献