咨询与建议

限定检索结果

文献类型

  • 36,369 篇 会议
  • 923 篇 期刊文献
  • 37 册 图书
  • 29 篇 学位论文
  • 1 篇 专利

馆藏范围

  • 37,359 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 23,055 篇 工学
    • 12,799 篇 计算机科学与技术...
    • 9,077 篇 控制科学与工程
    • 8,328 篇 电气工程
    • 6,147 篇 软件工程
    • 5,360 篇 信息与通信工程
    • 2,259 篇 机械工程
    • 1,423 篇 电子科学与技术(可...
    • 1,157 篇 交通运输工程
    • 937 篇 动力工程及工程热...
    • 898 篇 仪器科学与技术
    • 886 篇 石油与天然气工程
    • 737 篇 航空宇航科学与技...
    • 510 篇 生物工程
    • 455 篇 生物医学工程(可授...
    • 424 篇 材料科学与工程(可...
    • 378 篇 力学(可授工学、理...
    • 349 篇 土木工程
    • 326 篇 安全科学与工程
    • 304 篇 化学工程与技术
    • 261 篇 光学工程
  • 5,795 篇 理学
    • 2,937 篇 数学
    • 1,553 篇 物理学
    • 1,400 篇 系统科学
    • 751 篇 统计学(可授理学、...
    • 614 篇 生物学
    • 284 篇 化学
  • 3,053 篇 管理学
    • 2,696 篇 管理科学与工程(可...
    • 729 篇 工商管理
    • 478 篇 图书情报与档案管...
  • 595 篇 医学
    • 482 篇 临床医学
  • 262 篇 经济学
  • 222 篇 法学
  • 96 篇 军事学
  • 85 篇 教育学
  • 74 篇 农学
  • 56 篇 文学
  • 8 篇 艺术学

主题

  • 3,949 篇 control systems
  • 2,135 篇 neural networks
  • 1,640 篇 traffic control
  • 1,301 篇 telecommunicatio...
  • 1,058 篇 protocols
  • 907 篇 throughput
  • 905 篇 network topology
  • 880 篇 bandwidth
  • 825 篇 quality of servi...
  • 803 篇 communication sy...
  • 800 篇 performance anal...
  • 763 篇 delay
  • 761 篇 adaptive control
  • 747 篇 real-time system...
  • 727 篇 artificial neura...
  • 691 篇 routing
  • 648 篇 switches
  • 605 篇 voltage control
  • 567 篇 fuzzy control
  • 563 篇 mathematical mod...

机构

  • 36 篇 shanghai jiao to...
  • 33 篇 univ chinese aca...
  • 27 篇 tsinghua univers...
  • 27 篇 georgia inst tec...
  • 27 篇 department of el...
  • 26 篇 hubei key labora...
  • 26 篇 college of infor...
  • 26 篇 ieee
  • 25 篇 school of automa...
  • 25 篇 beijing inst tec...
  • 24 篇 natl univ singap...
  • 24 篇 univ carlos iii ...
  • 23 篇 universidad carl...
  • 22 篇 indian inst tech...
  • 22 篇 northeastern uni...
  • 21 篇 college of contr...
  • 20 篇 southeast univ s...
  • 20 篇 school of electr...
  • 19 篇 univ sci & techn...
  • 19 篇 delft univ techn...

作者

  • 27 篇 jun wang
  • 27 篇 liu yang
  • 26 篇 singh bhim
  • 20 篇 li li
  • 18 篇 li yang
  • 17 篇 zhang tao
  • 17 篇 zhang lei
  • 16 篇 wang lei
  • 16 篇 li xin
  • 16 篇 wu min
  • 16 篇 zhang chao
  • 15 篇 chih-min lin
  • 14 篇 lei wang
  • 14 篇 wang jian
  • 13 篇 lin chih-min
  • 13 篇 yu wang
  • 13 篇 wang jing
  • 13 篇 tsu-tian lee
  • 13 篇 hou zeng-guang
  • 12 篇 jian wang

语言

  • 35,088 篇 英文
  • 1,978 篇 其他
  • 324 篇 中文
  • 9 篇 西班牙文
  • 4 篇 土耳其文
  • 2 篇 捷克文
  • 2 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 乌克兰文
检索条件"任意字段=Conference on Performance and Control of Network Systems III"
37359 条 记 录,以下是31-40 订阅
排序:
Single Model Scheme-based Smith Predictor for the Mitigation of the effects of network Imperfections in Consensus control of Multi Agent systems  10
Single Model Scheme-based Smith Predictor for the Mitigation...
收藏 引用
10th International conference on control, Decision and Information Technologies (CoDIT)
作者: Solyman, Loaie Elbadawyl, Ayman Meroth, Ansgar German Univ Cairo Fac Engn & Mat Sci Mechatron Engn Dept Cairo Egypt Heilbronn Univ Automot Syst Engn Dept Heilbronn Germany
This paper addresses the problem of network modelling and its application in consensus control of networked Multi Agent systems (NMASs). These NMASs experience network imperfections such as variable time delays and pa... 详细信息
来源: 评论
Model Predictive control for Offset-free Tracking: a new data-driven application for Secondary Voltage Regulation on Transmission network
Model Predictive Control for Offset-free Tracking: a new dat...
收藏 引用
International conference on Smart Energy systems and Technologies (SEST) - Driving the Advances for Future Electrification
作者: Acerbi, Federica Piccagli, Davide Stefano Pozzi, Fabio Sciarpa, Luca Giannuzzi, Giorgio Maria Pisani, Cosimo Bruno, Gianluca CESI SpA Milan Italy Terna SpA Rome Italy
This paper investigates the evolution of Secondary Voltage Regulation (SVR) in response to the increasing penetration of enewable energy sources (RES) within power systems. Traditional SVR, historically reliant on fos... 详细信息
来源: 评论
Security Tracking control for Discrete-Time Stochastic Delayed networked systems With Cyber-Attacks by Dynamic Event-Triggered Approach  36
Security Tracking Control for Discrete-Time Stochastic Delay...
收藏 引用
36th Chinese control and Decision conference (CCDC)
作者: Xu, Shiqiang Yang, Jun Wu, Qiong Southwest Minzu Univ Coll Elect Engn Key Lab Elect & Informat Engn State Ethn Affairs Chengdu Peoples R China
The purpose of this paper is to develop a security tracking controller for discrete-time delayed stochastic network control systems (SNCSs) that are vulnerable to stochastic cyber attacks. The presented strategy, call... 详细信息
来源: 评论
Input-to-State Stable Coupled Oscillator networks for Closed-form Model-based control in Latent Space  38
Input-to-State Stable Coupled Oscillator Networks for Closed...
收藏 引用
38th conference on Neural Information Processing systems, NeurIPS 2024
作者: Stölzle, Maximilian Della Santina, Cosimo Department of Cognitive Robotics Delft University of Technology Netherlands
Even though a variety of methods have been proposed in the literature, efficient and effective latent-space control (i.e., control in a learned low-dimensional space) of physical systems remains an open challenge. We ...
来源: 评论
Anomaly Detection networks and Fuzzy control Modules for Energy Grid Management with Q-Learning-Based Decision Making
Anomaly Detection Networks and Fuzzy Control Modules for Ene...
收藏 引用
SIAM International conference on Data Mining (SDM)
作者: Syu, Jia-Hao Lin, Jerry Chun-Wei Yu, Philip S. Natl Taiwan Univ Dept Comp Sci & Informat Engn Taipei Taiwan Western Norway Univ Appl Sci Dept Comp Sci Elect Engn & Math Sci Bergen Norway Univ Illinois Dept Comp Sci Chicago IL USA
Renewable energy generation has attracted the interest of researchers, but it is volatile, and management systems are vulnerable to malicious attacks. Therefore, security issues are of paramount importance for energy ...
来源: 评论
Research on the Physical Layer Vulnerability of Industrial control systems Based on Deterministic and Stochastic Petri Nets  24
Research on the Physical Layer Vulnerability of Industrial C...
收藏 引用
International conference on Algorithms, Software Engineering, and network Security (ASENS)
作者: Tang, Jin Shuang, Wei China Three Gorges Grp Corp Digital Management Ctr Wuhan 430000 Hubei Peoples R China China Three Gorges Corp Yangtze River Basin Hub Operat & Management Ctr Wuhan 430000 Hubei Peoples R China
With the development of modern industrialization, the network security issues of industrial control systems have become increasingly severe, necessitating enhanced research on the vulnerability mechanisms of industria... 详细信息
来源: 评论
Decentralized Cooperative Multi-Agent Deep Reinforcement Learning for Real-Time Optimization of Emulated Ad-Hoc Radio networks
Decentralized Cooperative Multi-Agent Deep Reinforcement Lea...
收藏 引用
2024 Military Communications conference
作者: Moehlenhof, Thies Jansen, Norman Fraunhofer FKIE Informat Technol Command & Control ITF Wachtberg Germany
This research explores the application of policy gradient methods in multi-agent reinforcement learning, augmented with offline reinforcement Learning techniques. The goal is to leverage these methods to improve commu... 详细信息
来源: 评论
Research and Design of PID control System Based on BP Neural network  24
Research and Design of PID Control System Based on BP Neural...
收藏 引用
4th International conference on Artificial Intelligence, Automation and High performance Computing, AIAHPC 2024
作者: Shi, Wei Qingdao Institute of Technology China
As a widely adopted control strategy in industry, PID control is widely recognized for its simplicity, efficiency and reliability. However, in the face of complex and variable nonlinear industrial control systems, tra... 详细信息
来源: 评论
Optimization of ReLU Activation Function for Deep-Learning-based Breast Cancer Classification on Mammogram Images
Optimization of ReLU Activation Function for Deep-Learning-b...
收藏 引用
IEEE International conference on Automatic control and Intelligent systems (I2CACIS)
作者: Razali, Noor Fadzilah Isa, Iza Sazanita Sulaiman, Siti Noraini Osman, Muhammad Khusairi Karim, Noor Khairiah A. Nordin, Siti Aminah Univ Teknol MARA Coll Engn Elect Engn Studies Permatang Pauh Campus George Town Malaysia Univ Sains Malaysia Bertam Adv Med & Dent Inst Dept Biomed Imaging George Town Malaysia Univ Teknol MARA Coll Engn Elect Engn Studies Pasir Gudang Campus Johor Baharu Malaysia
The use of the deep Convolutional Neural network (CNN) in breast cancer classification of mammogram images has been widely investigated to aid radiologists in better clinical diagnoses. Multiple levels of convolution ... 详细信息
来源: 评论
Explainable Intrusion Detection in Industrial control systems  7
Explainable Intrusion Detection in Industrial Control System...
收藏 引用
IEEE 7th International conference on Industrial Cyber-Physical systems (ICPS)
作者: Eltomy, Reham Lalouani, Wassila Towson Univ Dept Comp & Informat Sci Towson MD 21252 USA
In the realm of smart manufacturing, Industrial control systems (ICSs) play a critical role in supervising essential operations across various manufacturing facilities. As ICSs become increasingly integral to critical... 详细信息
来源: 评论