咨询与建议

限定检索结果

文献类型

  • 1,620 篇 会议
  • 27 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,143 篇 工学
    • 662 篇 计算机科学与技术...
    • 456 篇 电气工程
    • 409 篇 控制科学与工程
    • 325 篇 软件工程
    • 247 篇 信息与通信工程
    • 143 篇 动力工程及工程热...
    • 125 篇 电子科学与技术(可...
    • 107 篇 机械工程
    • 100 篇 石油与天然气工程
    • 80 篇 环境科学与工程(可...
    • 76 篇 交通运输工程
    • 49 篇 材料科学与工程(可...
    • 49 篇 安全科学与工程
    • 44 篇 仪器科学与技术
    • 43 篇 生物工程
    • 28 篇 土木工程
    • 27 篇 网络空间安全
    • 26 篇 航空宇航科学与技...
    • 25 篇 力学(可授工学、理...
    • 22 篇 化学工程与技术
  • 410 篇 理学
    • 304 篇 数学
    • 72 篇 系统科学
    • 58 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 49 篇 生物学
  • 219 篇 管理学
    • 197 篇 管理科学与工程(可...
    • 72 篇 工商管理
    • 29 篇 图书情报与档案管...
  • 29 篇 经济学
    • 29 篇 应用经济学
  • 14 篇 医学
  • 12 篇 法学
  • 12 篇 农学
  • 7 篇 军事学
  • 1 篇 教育学

主题

  • 134 篇 optimization
  • 39 篇 particle swarm o...
  • 35 篇 neural networks
  • 35 篇 genetic algorith...
  • 31 篇 genetic algorith...
  • 30 篇 wireless sensor ...
  • 26 篇 neural network
  • 25 篇 quality of servi...
  • 24 篇 routing
  • 22 篇 reinforcement le...
  • 22 篇 heuristic algori...
  • 21 篇 model predictive...
  • 21 篇 simulation
  • 21 篇 control systems
  • 21 篇 voltage control
  • 21 篇 mathematical mod...
  • 20 篇 reactive power
  • 19 篇 ant colony optim...
  • 19 篇 resource managem...
  • 18 篇 controllers

机构

  • 6 篇 china electric p...
  • 6 篇 beijing jiaotong...
  • 5 篇 school of new en...
  • 4 篇 school of electr...
  • 4 篇 faculty of trans...
  • 4 篇 changsha univers...
  • 4 篇 state grid corpo...
  • 4 篇 college of elect...
  • 4 篇 power dispatchin...
  • 4 篇 school of manage...
  • 3 篇 state key labora...
  • 3 篇 shanghai jiao to...
  • 3 篇 indian inst tech...
  • 3 篇 global energy in...
  • 3 篇 school of electr...
  • 3 篇 china elect powe...
  • 3 篇 key lab measurem...
  • 3 篇 shanghai jiao to...
  • 3 篇 guangzhou power ...
  • 3 篇 institute of sha...

作者

  • 5 篇 zhang yan
  • 5 篇 wang jun
  • 4 篇 wang jian
  • 4 篇 wang wei
  • 4 篇 yang xu
  • 4 篇 liu yu
  • 4 篇 chen wei
  • 4 篇 zhang yong
  • 3 篇 zhou jie
  • 3 篇 choudhury subhas...
  • 3 篇 yu yixiao
  • 3 篇 roy provas kumar
  • 3 篇 zhang zhang
  • 3 篇 sha linxiu
  • 3 篇 lin zhichao
  • 3 篇 li hengjie
  • 3 篇 peng chen
  • 3 篇 wang li
  • 3 篇 yong zhang
  • 3 篇 zhao liang

语言

  • 1,405 篇 英文
  • 239 篇 其他
  • 8 篇 中文
检索条件"任意字段=3rd Euro-NF Conference on Network Control and Optimization"
1649 条 记 录,以下是751-760 订阅
排序:
Research on Key Technologies of SNOP Suitable for Distribution network
Research on Key Technologies of SNOP Suitable for Distributi...
收藏 引用
IEEE International conference on Circuits and Systems (ICCS)
作者: Jianfeng Gong Dongsheng Dang Yan Li Yongning Chi XiaoJing Dong Panlong Jin State Grid Ningxia Electric Power Co.ltd Yinchuan China Institute of Technology and International Standard Beijing China
To ensure power quality and power supply reliability, the architecture and mode of the power distribution system are undergoing major changes. In order to further solve these problems and ensure the power quality and ... 详细信息
来源: 评论
An obstacle avoidance design of UAV based on genetic algorithm  3
An obstacle avoidance design of UAV based on genetic algorit...
收藏 引用
3rd International conference on Mechanical, Electric and Industrial Engineering, MEIE 2020
作者: Hu, Xusheng Liu, Juan Key Laboratory of Unmanned Aerial Vehicle Development Data Application of Anhui Higher Education Institutes Wanjiang University of Technology Ma'anshan243031 China Ma'anshan Engineering Technology Research Center for Wireless Sensor Network and IntelliSense Ma'anshan243031 China Ma'anshan Technical College Ma'anshan243030 China
In order to improve the effect of obstacle avoidance, a PID control algorithm combined with genetic algorithm is proposed. By establishing the mathematical model of UAV, the auxiliary control system of UAV is analyzed... 详细信息
来源: 评论
3rd International Scientific conference on Convergent Cognitive Information Technologies, Convergent 2018
3rd International Scientific Conference on Convergent Cognit...
收藏 引用
3rd International Scientific conference on Convergent Cognitive Information Technologies, Convergent 2018
The proceedings contain 35 papers. The special focus in this conference is on Convergent Cognitive Information Technologies. The topics include: Path Planning of Mobile Robot Based on an Improved Ant Colony Algorithm;...
来源: 评论
QoS Investigation for Power network with Distributed control Services  1
收藏 引用
3rd International conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Jin, Shen Liang, Xuesong Tian, Hao State Grid Jibei Information and Company Langfang China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
In this paper, a distributed control scheme of key technologies is designed, which mainly includes QoS (quality of service) identification module and QoS routing optimization module. At the same time, a new routing me... 详细信息
来源: 评论
Research on optimization of cathodic protection effect of buried pipeline  3
Research on optimization of cathodic protection effect of bu...
收藏 引用
3rd International conference on Computer network, Electronic and Automation, ICCNEA 2020
作者: Zhang, Qizhi Li, Lin Quan, Bo School of Electronic Engineering Xi'An Shiyou University Xi'an China Shaanxi Key Laboratory of Oil and Gas Well Measurement and Control Technology Xi'an China Xi'An Shiyou University School of Electronic Engineering Xi'an China
Cathodic protection is an important means to inhibit the electrochemical corrosion of pipelines, and the distribution of its potential directly affects the effectiveness of pipeline protection. By establishing a mathe... 详细信息
来源: 评论
CAD System for Detection and Classification of Liver Cancer using optimization Neural network Convolution Neural network Classifiers  3
CAD System for Detection and Classification of Liver Cancer ...
收藏 引用
3rd IEEE International conference on Power, Instrumentation, control and Computing, PICC 2020
作者: Jose, Reshma Chacko, Shanty Karunya Institute of Technology and Sciences Karunyanagar Department of ECE Coimbatore India
Deep learning is a recent field of machine learning that has garnered a great deal of attention in recent years. It has been commonly used for a variety of applications and has proved to be a strong machine learning m... 详细信息
来源: 评论
Deep Reinforcement Learning using Cyclical Learning Rates  3
Deep Reinforcement Learning using Cyclical Learning Rates
收藏 引用
3rd International conference on Artificial Intelligence for Industries (AI4I)
作者: Gulde, Ralf Tuscher, Marc Csiszar, Akos Riedel, Oliver Verl, Alexander Univ Stuttgart Inst Control Engn Machine Tools & Mfg Units D-70174 Stuttgart Germany
Deep Reinforcement Learning (DRL) methods often rely on the meticulous tuning of hyperparameters to successfully resolve problems. One of the most influential parameters in optimization procedures based on stochastic ... 详细信息
来源: 评论
Automatic Finite Deterministic Algorithm and PSO Based Secured Energy Efficient Routing in Wireless Sensor network
Automatic Finite Deterministic Algorithm and PSO Based Secur...
收藏 引用
Advances in Computing, Communication control and networking (ICAC3N), International conference on
作者: Priyanka Shah Tanmay Kasbe Oriental University Indore Madhya Pradesh India
Economic sensor networks have always been a boon to disaster management applications due to their ease of setup. Communication is difficult for them due of their vulnerability to a variety of security dangers. This st... 详细信息
来源: 评论
Vulnerability Discovery in network Systems Based on Human-Machine Collective Intelligence  3rd
Vulnerability Discovery in Network Systems Based on Human-Ma...
收藏 引用
3rd International conference on Intelligent Human Systems Integration (IHSI) - Integrating People and Intelligent Systems
作者: Han, Ye Chen, Jianfeng Rao, Zhihong Wang, Yifan Liu, Jie China Elect Technol Cyber Secur Co Ltd Chengdu 610041 Peoples R China Cyberspace Secur Key Lab Sichuan Prov Chengdu 610041 Peoples R China
network vulnerability mining is an important topic in cyberspace security. network vulnerabilities enable attackers to obtain sensitive information from computer systems, control computer systems illegally and cause s... 详细信息
来源: 评论
Hybrid WSN Node Deployment optimization Strategy Based on CS Algorithm  3
Hybrid WSN Node Deployment Optimization Strategy Based on CS...
收藏 引用
IEEE 3rd Information Technology, networking, Electronic and Automation control conference (ITNEC)
作者: Xiang, Tingli Wang, Hongjun Shi, Yingchun Natl Univ Def Technol Hefei Anhui Peoples R China
The performance of wireless sensor network (WSN) system is significantly affected by the coverage quality. For the problem of low coverage of static sensor network nodes and high deployment cost of mobile sensor netwo... 详细信息
来源: 评论