全文获取类型
收费全文 | 411篇 |
免费 | 25篇 |
国内免费 | 26篇 |
专业分类
电工技术 | 6篇 |
综合类 | 9篇 |
化学工业 | 23篇 |
金属工艺 | 3篇 |
机械仪表 | 13篇 |
建筑科学 | 3篇 |
轻工业 | 1篇 |
石油天然气 | 2篇 |
无线电 | 74篇 |
一般工业技术 | 12篇 |
冶金工业 | 3篇 |
原子能技术 | 1篇 |
自动化技术 | 312篇 |
出版年
2022年 | 3篇 |
2021年 | 4篇 |
2020年 | 2篇 |
2019年 | 10篇 |
2018年 | 9篇 |
2017年 | 6篇 |
2016年 | 10篇 |
2015年 | 16篇 |
2014年 | 24篇 |
2013年 | 23篇 |
2012年 | 24篇 |
2011年 | 34篇 |
2010年 | 31篇 |
2009年 | 36篇 |
2008年 | 28篇 |
2007年 | 39篇 |
2006年 | 39篇 |
2005年 | 17篇 |
2004年 | 12篇 |
2003年 | 7篇 |
2002年 | 11篇 |
2001年 | 4篇 |
2000年 | 6篇 |
1999年 | 1篇 |
1998年 | 6篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 5篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 4篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1976年 | 1篇 |
排序方式: 共有462条查询结果,搜索用时 15 毫秒
1.
针对多角度下车辆出现一定的尺度变化和形变导致很难被准确识别的问题,提出基于多尺度双线性卷积神经网络(MS-B-CNN)的车型精细识别模型。首先,对双线性卷积神经网络(B-CNN)算法进行改进,提出MS-B-CNN算法对不同卷积层的特征进行了多尺度融合,以提高特征表达能力;此外,还采用基于中心损失函数与Softmax损失函数联合学习的策略,在Softmax损失函数基础上分别对训练集每个类别在特征空间维护一个类中心,在训练过程中新增加样本时,网络会约束样本的分类中心距离,以提高多角度情况下的车型识别的能力。实验结果显示,该车型识别模型在CompCars数据集上的正确率达到了93.63%,验证了模型在多角度情况下的准确性和鲁棒性。 相似文献
2.
In this paper, permanent magnet synchronous motors (PMSMs) are investigated. According to the feature of PMSMs, a novel state equation of PMSMs is obtained by choosing suitable state variables. Based on the state equation, robust controllers are designed via interval matrix and PI control idea. In terms of bilinear matrix inequations, sufficient conditions for the existence of the robust controller are derived. In order to reduce the conservation and the dependence on parameter, the control inputs of PMSMs are divided into two parts, a feedforward control input and a feedback control input, and relevant sufficient conditions for the existence of the controller are obtained. Because of the suitable choice of state variables, the proposed control strategies can cope with the load uncertainty and have robustness for disturbance. Finally, simulations are carried out via Matlab/Simulink soft to verify the effectiveness of the proposed control strategies. The performance of the proposed control strategies are demonstrated by the simulation results. 相似文献
3.
This paper compares state-space and input–output realizations for nonlinear discrete-time dynamic models. For linear models, these two realizations are essentially equivalent and their structures are closely related, but these statements do not hold for nonlinear models. We illustrate this point with simple, realistic examples for which only one of the two realizations exists or for which both exist but their structures are profoundly different. Overall, the main point of this paper is the importance of the choice of realization in the development of nonlinear dynamic models. 相似文献
4.
Yu Long Author Vitae Kefei Chen Author Vitae Shengli Liu Author Vitae 《Computers & Electrical Engineering》2007,33(3):166-176
This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems. 相似文献
5.
Eduardo D. Sontag 《Systems & Control Letters》1987,9(5):361-367
Explicit equations are given for the moduli space of framed instantons as a quasi-affine variety, based on the representation theory of noncommutative power series, or equivalently, the minimal realization theory of bilinear systems. 相似文献
6.
7.
This note considers the problem of local stability of bilinear systems with aperiodic sampled-data linear state feedback control. The sampling intervals are time-varying and upper bounded. It is shown that the feasibility of some linear matrix inequalities (LMIs), implies the local asymptotic stability of the sampled-data system in an ellipsoidal region containing the equilibrium. The method is based on the analysis of contractive invariant sets, and it is inspired by the dissipativity theory. The results are illustrated by means of numerical examples. 相似文献
8.
对新近提出的两个高效无证书签名方案进行安全性分析,指出这两个签名方案都能受到替换公钥攻击。任意攻击者都可以通过替换签名人的公钥从而达到对任意选择的消息成功伪造签名,分析这两个签名方案能受到替换公钥攻击的根本原因。最后通过这两个攻击总结分析了无证书签名方案设计过程需要注意的要点,这对无证书签名方案的设计具有借鉴意义。 相似文献
9.
Abstract. In this paper we define subset bilinear time series models, and then describe an algorithm for the estimation of these models. It is also pointed out that for this class of non-linear time series models, it is possible to obtain optimal several step predictors. The estimation technique of these models is illustrated with respect to three time series, and the optimal several steps ahead forecasts of these time series models are calculated. A comparison of these forecasts is made with the forecasts obtained by the best linear autoregressive and threshold autoregressive models. The residuals obtained from the models are tested for independence and Gaussianity using higher order moments. 相似文献
10.
针对随机预言模型下的签密密钥封装机制依赖现实世界无法实现的随机预言假设的问题,提出在标准模型下可证明安全的基于身份签密密钥封装机制(IBSC-KEM)。新提出的IBSC-KEM方案基于一种受到广泛研究的身份加密机制,在标准模型下被规约为求解q-ABDHE问题和判定性q-ABDHE问题,具有机密性和不可伪造性。新方案主要计算开销为5次群G上的指数运算、3次群GT上的指数运算和3次双线性对运算,与类似的签密方案比较,计算开销较低。此外,新方案还具有公开可验证性,适用于构建安全的端到端传输。 相似文献