咨询与建议

限定检索结果

文献类型

  • 9,185 篇 会议
  • 14 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 9,201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,194 篇 工学
    • 2,999 篇 计算机科学与技术...
    • 2,311 篇 控制科学与工程
    • 2,188 篇 软件工程
    • 1,513 篇 电气工程
    • 1,344 篇 信息与通信工程
    • 984 篇 机械工程
    • 907 篇 电子科学与技术(可...
    • 579 篇 仪器科学与技术
    • 379 篇 动力工程及工程热...
    • 302 篇 生物工程
    • 257 篇 交通运输工程
    • 256 篇 航空宇航科学与技...
    • 246 篇 光学工程
    • 192 篇 生物医学工程(可授...
    • 182 篇 土木工程
    • 179 篇 化学工程与技术
    • 176 篇 安全科学与工程
    • 154 篇 网络空间安全
    • 142 篇 建筑学
    • 126 篇 力学(可授工学、理...
  • 2,328 篇 理学
    • 1,215 篇 数学
    • 585 篇 系统科学
    • 501 篇 物理学
    • 320 篇 生物学
    • 299 篇 统计学(可授理学、...
    • 167 篇 化学
  • 1,108 篇 管理学
    • 813 篇 管理科学与工程(可...
    • 365 篇 图书情报与档案管...
    • 265 篇 工商管理
  • 148 篇 医学
  • 129 篇 法学
  • 128 篇 经济学
    • 128 篇 应用经济学
  • 80 篇 军事学
  • 55 篇 农学
  • 37 篇 教育学
  • 33 篇 艺术学
  • 14 篇 文学
  • 1 篇 历史学

主题

  • 383 篇 automation
  • 367 篇 information tech...
  • 266 篇 feature extracti...
  • 216 篇 control systems
  • 176 篇 simulation
  • 169 篇 optimization
  • 166 篇 process control
  • 150 篇 information mana...
  • 131 篇 analytical model...
  • 126 篇 real-time system...
  • 118 篇 neural networks
  • 114 篇 monitoring
  • 114 篇 predictive model...
  • 106 篇 computational mo...
  • 97 篇 mathematical mod...
  • 89 篇 conferences
  • 89 篇 reliability
  • 84 篇 data mining
  • 83 篇 wireless communi...
  • 83 篇 wireless sensor ...

机构

  • 69 篇 school of inform...
  • 56 篇 college of elect...
  • 49 篇 school of electr...
  • 43 篇 school of automa...
  • 42 篇 beijing universi...
  • 39 篇 faculty of infor...
  • 39 篇 university of ch...
  • 36 篇 school of electr...
  • 31 篇 school of inform...
  • 30 篇 wuhan university...
  • 30 篇 school of electr...
  • 29 篇 china electric p...
  • 28 篇 school of automa...
  • 25 篇 school of automa...
  • 24 篇 college of elect...
  • 22 篇 college of elect...
  • 21 篇 shenyang institu...
  • 21 篇 beijing jiaotong...
  • 21 篇 college of infor...
  • 20 篇 xi'an peihua uni...

作者

  • 43 篇 wang wei
  • 23 篇 xiuzhi li
  • 19 篇 wei li
  • 18 篇 li xiuzhi
  • 18 篇 lei zhang
  • 17 篇 xiaolin ma
  • 17 篇 shuxiang guo
  • 17 篇 li tieshan
  • 17 篇 songmin jia
  • 17 篇 wei wang
  • 16 篇 li meng
  • 16 篇 wang hao
  • 15 篇 jian wang
  • 15 篇 zhang lei
  • 14 篇 lei wang
  • 14 篇 linhua piao
  • 14 篇 zhang yan
  • 14 篇 yan li
  • 14 篇 bing yao
  • 13 篇 jing zhang

语言

  • 8,978 篇 英文
  • 130 篇 中文
  • 94 篇 其他
  • 2 篇 法文
  • 1 篇 葡萄牙文
检索条件"任意字段=IEEE Information Technology, Networking, Electronic and Automation Control Conference"
9201 条 记 录,以下是61-70 订阅
排序:
Optimization of fuel supply map during starting process for electronic controlled diesel engine  2
Optimization of fuel supply map during starting process for ...
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: LIANG Jinguang Department of Mechanical and Power Engineering Yingkou Institute of Technology
Tests were done to research the influence of fuel supply map during the starting process of electronic controlled diesel engine in using the electronic controlled diesel engine which was combined with CA498 Z diesel e... 详细信息
来源: 评论
Design of Heading control System for USV Based on Moos-IvP  2
Design of Heading Control System for USV Based on Moos-IvP
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: Lingyan Dong Hongli Xu State Key Laboratory of Robotics Shenyang Institute of Automation Chinese Academy of Science University of Chinese Academy of Science
This paper presents a design scheme of control system for a small fixed double propulsion unmanned surface vehicle(USV). The system is based on MOOS-IvP star topology, with distributed and modular features. The system... 详细信息
来源: 评论
Research on The Power Switching control Strategy of Hybrid Electric Vehicle  3
Research on The Power Switching Control Strategy of Hybrid E...
收藏 引用
ieee 3rd information technology, networking, electronic and automation control conference (ITNEC)
作者: Cao, Zhuming Guo, Jiatian Su, Liang Beijing Polytech Sch Automot Engn Beijing 100176 Peoples R China Shandong Vocat Coll Sci & Technol Dept Automot Engn Weifang 261053 Shandong Peoples R China
Establish the hybrid electric vehicle power switching threshold and fuzzy logic control simulation model. Simulate and analyze the change speed of power under different accelerator pedal opening degrees and the influe... 详细信息
来源: 评论
Research on performance of linear motor active suspension  2
Research on performance of linear motor active suspension
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: Farong Kou Quan Ren Tao Fang College of Mechanical Engineering Xi'an University of Science and Technology
In order to improve ride comfort, a linear motor active suspension system is *** quarter model of active suspension is established,the structure design of actuator is carried out, the finite element model is establish... 详细信息
来源: 评论
Research on attitude controller of quadcopter based on cascade PID control algorithm  2
Research on attitude controller of quadcopter based on casca...
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: Nengsheng Bao Xie Ran Zhanfu Wu Yanfen Xue Keyan Wang Engineering College Shantou University
The quadcopter is a four-input, six-output and underactuated system. The attitude estimation and control strategy of quadcopter are the hotspot and difficult research problems in this field due to the dynamic characte... 详细信息
来源: 评论
Index Weighting Methods  2
Index Weighting Methods
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: Zhuying Huang Jianping Chai Bo Li Xi Feng Communication University of China
In this paper, some methods of weighting weights are introduced through analyzing the relevant documents of the existing weighting methods. At the same time, the summaries and the suggestions and ideas are given for e... 详细信息
来源: 评论
Dim Target Detection based on Multi-scale Fractal Feature  2
Dim Target Detection based on Multi-scale Fractal Feature
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: Qiang Wang Jiangsu Automation Research Institute
A method to solve the problem of dim target detection under complex background based on their multi-scale fractal feature is presented in this paper. It is realized by calculating the difference of fractal features be... 详细信息
来源: 评论
Fault-tolerant control Strategy for the Suspension Module of EMS High-speed Maglev Train  2
Fault-tolerant Control Strategy for the Suspension Module of...
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: Mingda Zhai Xiaolong Li Zhiqiang Long College of Mechatronics and Automation National University of Defense Technology
The accurate model that is corresponding with the EMS-type High-speed Magnetic-levitation Train is very difficult to be acquired due to the fault. A kind of passive fault-tolerant controller is designed by using simul... 详细信息
来源: 评论
Modified FCM Image Segmentation Based on Gaussian Kernel and Spatial information  2
Modified FCM Image Segmentation Based on Gaussian Kernel and...
收藏 引用
2017 ieee 2nd information technology, networking, electronic and automation control conference (ITNEC 2017)
作者: Kun Li AiMin Li School of Information Qilu University of Technology
This paper proposed a modified FCM image segmentation method based on Gaussian kernel and spatial information. FCM is especially effective in image segmentation, however, it lacks enough robustness to noise and outlie... 详细信息
来源: 评论
Survey on Memory Corruption Mitigation  3
Survey on Memory Corruption Mitigation
收藏 引用
ieee 3rd information technology, networking, electronic and automation control conference (ITNEC)
作者: Jiang, Chu Wang, Yongjie Natl Univ Def Technol Hefei Anhui Peoples R China
Memory corruption is one of the oldest problems in computer security. This problem has existed for many years and a number of solutions have been proposed, but memory corruption attacks continue to pose a serious thre... 详细信息
来源: 评论