咨询与建议

限定检索结果

文献类型

  • 6,199 篇 会议
  • 204 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 6,412 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 3,557 篇 工学
    • 2,654 篇 计算机科学与技术...
    • 1,841 篇 控制科学与工程
    • 1,184 篇 软件工程
    • 1,116 篇 电气工程
    • 274 篇 机械工程
    • 270 篇 信息与通信工程
    • 221 篇 交通运输工程
    • 192 篇 电子科学与技术(可...
    • 118 篇 仪器科学与技术
    • 111 篇 生物工程
    • 109 篇 安全科学与工程
    • 107 篇 生物医学工程(可授...
    • 89 篇 动力工程及工程热...
    • 83 篇 力学(可授工学、理...
    • 70 篇 航空宇航科学与技...
    • 69 篇 化学工程与技术
    • 64 篇 光学工程
    • 55 篇 建筑学
    • 51 篇 石油与天然气工程
  • 960 篇 理学
    • 624 篇 数学
    • 198 篇 物理学
    • 178 篇 系统科学
    • 139 篇 生物学
    • 138 篇 统计学(可授理学、...
    • 58 篇 化学
  • 729 篇 管理学
    • 684 篇 管理科学与工程(可...
    • 130 篇 工商管理
    • 81 篇 图书情报与档案管...
  • 94 篇 医学
    • 70 篇 基础医学(可授医学...
    • 61 篇 临床医学
  • 43 篇 法学
  • 34 篇 经济学
  • 16 篇 教育学
  • 12 篇 军事学
  • 11 篇 农学
  • 1 篇 艺术学

主题

  • 675 篇 computational mo...
  • 553 篇 control systems
  • 335 篇 computational in...
  • 287 篇 artificial intel...
  • 265 篇 mobile robots
  • 233 篇 automation
  • 231 篇 neural networks
  • 213 篇 humans
  • 211 篇 robot sensing sy...
  • 205 篇 mathematical mod...
  • 202 篇 fuzzy control
  • 173 篇 automatic contro...
  • 170 篇 process control
  • 167 篇 robots
  • 158 篇 intelligent robo...
  • 152 篇 optimization
  • 149 篇 robot control
  • 127 篇 navigation
  • 127 篇 genetic algorith...
  • 125 篇 computer archite...

机构

  • 46 篇 ieee
  • 38 篇 chinese acad sci...
  • 30 篇 state key labora...
  • 27 篇 school of artifi...
  • 27 篇 department of au...
  • 26 篇 beijing key labo...
  • 24 篇 politehn univ ti...
  • 22 篇 univ chinese aca...
  • 21 篇 computer and aut...
  • 21 篇 school of automa...
  • 19 篇 institute of aut...
  • 19 篇 department of au...
  • 18 篇 school of automa...
  • 18 篇 obuda univ docto...
  • 18 篇 department of au...
  • 18 篇 school of automa...
  • 18 篇 dept. of automat...
  • 17 篇 school of artifi...
  • 16 篇 hubei key labora...
  • 16 篇 university of ch...

作者

  • 43 篇 wang fei-yue
  • 36 篇 radu-emil precup
  • 35 篇 fei-yue wang
  • 31 篇 precup radu-emil
  • 27 篇 levente kovács
  • 23 篇 tar jozsef k.
  • 22 篇 józsef k. tar
  • 21 篇 preitl stefan
  • 21 篇 stefan preitl
  • 20 篇 kovacs levente
  • 17 篇 dongbin zhao
  • 17 篇 ioan filip
  • 15 篇 dániel andrás dr...
  • 14 篇 prostean octavia...
  • 13 篇 a. meystel
  • 13 篇 kovács levente
  • 13 篇 drexler daniel a...
  • 13 篇 gaspar peter
  • 13 篇 hirota kaoru
  • 13 篇 zhao dongbin

语言

  • 6,286 篇 英文
  • 64 篇 其他
  • 64 篇 中文
  • 2 篇 葡萄牙文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Control and Automation"
6412 条 记 录,以下是4951-4960 订阅
排序:
Generating mimicry attacks using genetic programming: A benchmarking study
Generating mimicry attacks using genetic programming: A benc...
收藏 引用
ieee symposium on computational intelligence in Cyber Security, CICS
作者: H. Gunes Kayacik A. Nur Zincir-Heywood Malcolm I. Heywood Stefan Burschka Faculty of Computer Science Dalhousie University Halifax NS Canada Software & Security Technologies Swisscom Innovations Switzerland
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate multiple attacks satisfying the same generic exploit goals for a given vulnerability. In this work, multi-obj... 详细信息
来源: 评论
Fuzzy Logic control and Fault Detection in Centralized Chilled Water System
Fuzzy Logic Control and Fault Detection in Centralized Chill...
收藏 引用
ieee symposium Series on computational intelligence (SSCI)
作者: Noor Asyikin Sulaiman Mohd Fauzi Othman Hayati Abdullah Faculty of Electronic and Computer Engineering Universiti Teknikal Malaysia Skudai Johor Malaysia Electronic System Engineering Department Malaysia-Japan International Institute of Technology Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Electrical Energy System (CEES) Universiti Teknologi Malaysia Skudai Johor Malaysia
The objective of this work is to develop and implement a fuzzy controller and fuzzy fault detection for centralized chilled water system. Both controller and fault detector are implemented in supply air dampers of air... 详细信息
来源: 评论
Data Augmentation for Vulnerability Detection Based on Code Refactoring and Mixup  35
Data Augmentation for Vulnerability Detection Based on Code ...
收藏 引用
35th ieee International symposium on Software Reliability Engineering Workshops, ISSREW 2024
作者: Xing, Ying Huang, Jiaqi Wang, Guilong You, Yehao Yang, Bin Li, Xiaofeng Luo, Yixing Beijing University of Posts and Telecommunications School of Intelligent Engineering and Automation Beijing China Beijing University of Posts and Telecommunications School of Artifcial Intelligence Beijing China Yunnan Key Laboratory of Software Engineering Yunnan China China Unicom Research Institute Beijing China Beijing Institute of Control Engineering Software Development Center Beijing China
In recent years, the number of software vulnerabilities has gradually increased, posing a threat to the security of software, and identifying whether there are vulnerabilities in software is crucial for assuring its q... 详细信息
来源: 评论
Induced Generalized Ordered Weighted Logarithmic Aggregation Operators
Induced Generalized Ordered Weighted Logarithmic Aggregation...
收藏 引用
ieee symposium Series on computational intelligence
作者: Victor G. Alfaro-Garcia Anna M. Gil-Lafuente José M. Merigó Dept. of Business Administration University of Barcelona Barcelona Spain Dept. of Management Control and Information Systems University of Chile Santiago Chile
We present the induced generalized ordered weighted logarithmic aggregation (IGOWLA) operator. It is an extension of the generalized ordered weighted logarithmic aggregation (GOWLA) operator. The IGOWLA operator uses ... 详细信息
来源: 评论
A novel computationally intelligent architecture for identification and control of nonlinear systems
A novel computationally intelligent architecture for identif...
收藏 引用
ieee International Conference on Robotics and automation (ICRA)
作者: M.O. Efe O. Kaynak I.J. Rudas Mechatronics Research and Application Center Bogaziçi University Istanbul Turkey Department of Information Technology Banki Donat Polytechnic Budapest Hungary
In this study, a novel method for identification and control of nonlinear systems is developed. The method proposed realizes the dynamics of a system by employing the Runge-Kutta method at the upper level. The interme... 详细信息
来源: 评论
Measuring Data Quality for Dataset Selection in Offline Reinforcement Learning
Measuring Data Quality for Dataset Selection in Offline Rein...
收藏 引用
ieee symposium Series on computational intelligence (SSCI)
作者: Phillip Swazinna Steffen Udluft Thomas Runkler Siemens Technology & Technical University of Munich Munich Germany Siemens Technology Munich Germany
Recently developed offline reinforcement learning algorithms have made it possible to learn policies directly from pre-collected datasets, giving rise to a new dilemma for practitioners: Since the performance the algo... 详细信息
来源: 评论
Machine learning based encrypted traffic classification: Identifying SSH and Skype
Machine learning based encrypted traffic classification: Ide...
收藏 引用
ieee symposium on computational intelligence in Security and Defense Applications, CISDA
作者: Riyad Alshammari A. Nur Zincir-Heywood Dalhousie University Halifax NS Canada
The objective of this work is to assess the robustness of machine learning based traffic classification for classifying encrypted traffic where SSH and Skype are taken as good representatives of encrypted traffic. Her... 详细信息
来源: 评论
ExSAIS: Workshop on Extreme Scaling of AI for Science Message from the workshop chairs
ExSAIS: Workshop on Extreme Scaling of AI for Science Messag...
收藏 引用
ieee International symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW)
作者: Svitlana Volkova Robert Rallo
ExSAIS: Workshop on Extreme Scaling of AI for Science, brings together researchers in Artificial intelligence (AI) and High Performance Computing (HPC) to enable scientific discovery at scale. The evolution of machine... 详细信息
来源: 评论
Advanced Remote Tower project validation results
Advanced Remote Tower project validation results
收藏 引用
11th IFAC/IFIP/IFORS/IEA symposium on Analysis, Design, and Evaluation of Human-Machine Systems, HMS 2010
作者: Van Schaik, F.J. Roessingh, J.J.M. Bengtsson, J. Lindqvist, G. Fält, K. National Aerospace Laboratory NLR Amsterdam Netherlands Luftfartsverket LFV Malmö - Sturup Sweden Saab Security Systems AB Järfälla Sweden
The Advanced Remote Tower project (ART) studies enhancements to an existing LFV prototype facility for a remotely operated tower: projection on a 360 degrees panorama screen, adding synthesized geographic information ... 详细信息
来源: 评论
Experimental study on robust force control of a flexible arm with a symmetric rigid tip body
Experimental study on robust force control of a flexible arm...
收藏 引用
ieee International Conference on Robotics and automation (ICRA)
作者: F. Matsuno S. Umeyama S. Kasai Department of Computational Intelligence and Systems Science Interdisciplinary Graduate School of Science and Engineering Tokyo Institute of Technology Yokohama Japan Department of Computer and Systems Engineering Faculty of Engineering Kobe University Kobe Japan Department of Electronic Engineering Kobe College of Technology Kobe Japan
In this paper, an experimental study on robust control of bending and torsional vibrations and contact force of a one-link flexible arm is discussed. The flexible arm carries a symmetric rigid tip body, of which the m... 详细信息
来源: 评论