全文获取类型
收费全文 | 849篇 |
免费 | 152篇 |
国内免费 | 145篇 |
学科分类
工业技术 | 1146篇 |
出版年
2023年 | 1篇 |
2022年 | 13篇 |
2021年 | 14篇 |
2020年 | 13篇 |
2019年 | 26篇 |
2018年 | 21篇 |
2017年 | 29篇 |
2016年 | 37篇 |
2015年 | 44篇 |
2014年 | 63篇 |
2013年 | 78篇 |
2012年 | 96篇 |
2011年 | 104篇 |
2010年 | 92篇 |
2009年 | 96篇 |
2008年 | 74篇 |
2007年 | 74篇 |
2006年 | 65篇 |
2005年 | 32篇 |
2004年 | 23篇 |
2003年 | 11篇 |
2002年 | 16篇 |
2001年 | 6篇 |
2000年 | 9篇 |
1999年 | 8篇 |
1998年 | 11篇 |
1997年 | 7篇 |
1996年 | 8篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 9篇 |
1992年 | 5篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 5篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1976年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有1146条查询结果,搜索用时 15 毫秒
1.
This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers. 相似文献
2.
针对多角度下车辆出现一定的尺度变化和形变导致很难被准确识别的问题,提出基于多尺度双线性卷积神经网络(MS-B-CNN)的车型精细识别模型。首先,对双线性卷积神经网络(B-CNN)算法进行改进,提出MS-B-CNN算法对不同卷积层的特征进行了多尺度融合,以提高特征表达能力;此外,还采用基于中心损失函数与Softmax损失函数联合学习的策略,在Softmax损失函数基础上分别对训练集每个类别在特征空间维护一个类中心,在训练过程中新增加样本时,网络会约束样本的分类中心距离,以提高多角度情况下的车型识别的能力。实验结果显示,该车型识别模型在CompCars数据集上的正确率达到了93.63%,验证了模型在多角度情况下的准确性和鲁棒性。 相似文献
3.
In this paper, permanent magnet synchronous motors (PMSMs) are investigated. According to the feature of PMSMs, a novel state equation of PMSMs is obtained by choosing suitable state variables. Based on the state equation, robust controllers are designed via interval matrix and PI control idea. In terms of bilinear matrix inequations, sufficient conditions for the existence of the robust controller are derived. In order to reduce the conservation and the dependence on parameter, the control inputs of PMSMs are divided into two parts, a feedforward control input and a feedback control input, and relevant sufficient conditions for the existence of the controller are obtained. Because of the suitable choice of state variables, the proposed control strategies can cope with the load uncertainty and have robustness for disturbance. Finally, simulations are carried out via Matlab/Simulink soft to verify the effectiveness of the proposed control strategies. The performance of the proposed control strategies are demonstrated by the simulation results. 相似文献
4.
Bo Gyeong Kang 《Information Processing Letters》2006,97(6):219-224
In this paper, we investigate the relationship between the squared Weil/Tate pairing and the plain Weil/Tate pairing. Along these lines, we first show that the squared pairing for an arbitrary chosen point can be transformed into the plain pairing for a trace zero point which has a special form to compute them more efficiently. Then the optimizations made for computing squared pairings are combined with the computation of pairings on these trace zero points, to achieve even better performance for the computation of the 4th powered Weil pairing. 相似文献
5.
This paper compares state-space and input–output realizations for nonlinear discrete-time dynamic models. For linear models, these two realizations are essentially equivalent and their structures are closely related, but these statements do not hold for nonlinear models. We illustrate this point with simple, realistic examples for which only one of the two realizations exists or for which both exist but their structures are profoundly different. Overall, the main point of this paper is the importance of the choice of realization in the development of nonlinear dynamic models. 相似文献
6.
Yu Long Author Vitae Kefei Chen Author Vitae Shengli Liu Author Vitae 《Computers & Electrical Engineering》2007,33(3):166-176
This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems. 相似文献
7.
Eduardo D. Sontag 《Systems & Control Letters》1987,9(5):361-367
Explicit equations are given for the moduli space of framed instantons as a quasi-affine variety, based on the representation theory of noncommutative power series, or equivalently, the minimal realization theory of bilinear systems. 相似文献
8.
9.
This note considers the problem of local stability of bilinear systems with aperiodic sampled-data linear state feedback control. The sampling intervals are time-varying and upper bounded. It is shown that the feasibility of some linear matrix inequalities (LMIs), implies the local asymptotic stability of the sampled-data system in an ellipsoidal region containing the equilibrium. The method is based on the analysis of contractive invariant sets, and it is inspired by the dissipativity theory. The results are illustrated by means of numerical examples. 相似文献
10.
为了使多目标粒子群算法中种群粒子能够快速地收敛于怕累托最优边界,针对标准多目标粒子群算法中缺乏粒子评价标准以及种群个体历史最优值位置和全局最优值位置选择问题,提出了一种基于环境选择和配对选择策略的多目标粒子群算法.该算法在每次迭代时,采用SPEA2中的环境选择和配对选择策略及适应度值计算方法,以此来提高种群粒子之间的信息交换力度,减少标准多目标粒子群算法中大量的随机性,使种群粒子能够更快速地收敛于怕累托最优边界.经典测试函数的仿真实验结果表明,在标准多目标粒子群算法中运用SPEA2的环境选择、配对选择策略和适应度值计算方法,能够使种群粒子更快速地收敛于帕累托最优边界,验证了算法改进的可行性和有效性. 相似文献