咨询与建议

限定检索结果

文献类型

  • 2,243 篇 会议
  • 1,702 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 3,954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,568 篇 工学
    • 1,368 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 722 篇 控制科学与工程
    • 464 篇 信息与通信工程
    • 434 篇 电气工程
    • 325 篇 电子科学与技术(可...
    • 322 篇 机械工程
    • 243 篇 生物工程
    • 217 篇 生物医学工程(可授...
    • 178 篇 光学工程
    • 172 篇 仪器科学与技术
    • 145 篇 动力工程及工程热...
    • 142 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 86 篇 土木工程
    • 85 篇 交通运输工程
    • 83 篇 安全科学与工程
    • 78 篇 力学(可授工学、理...
  • 1,491 篇 理学
    • 754 篇 数学
    • 410 篇 物理学
    • 280 篇 生物学
    • 262 篇 系统科学
    • 218 篇 统计学(可授理学、...
    • 133 篇 化学
  • 587 篇 管理学
    • 382 篇 管理科学与工程(可...
    • 200 篇 图书情报与档案管...
    • 103 篇 工商管理
  • 239 篇 医学
    • 193 篇 临床医学
    • 148 篇 基础医学(可授医学...
    • 103 篇 药学(可授医学、理...
  • 72 篇 法学
  • 47 篇 经济学
  • 45 篇 农学
  • 28 篇 教育学
  • 8 篇 艺术学
  • 7 篇 军事学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 107 篇 feature extracti...
  • 86 篇 educational inst...
  • 83 篇 control systems
  • 70 篇 computational mo...
  • 66 篇 training
  • 65 篇 mathematical mod...
  • 64 篇 optimization
  • 60 篇 deep learning
  • 57 篇 robustness
  • 49 篇 neural networks
  • 48 篇 accuracy
  • 45 篇 image segmentati...
  • 45 篇 semantics
  • 41 篇 support vector m...
  • 37 篇 algorithm design...
  • 35 篇 object detection
  • 35 篇 stability analys...
  • 35 篇 visualization
  • 34 篇 machine learning
  • 34 篇 heuristic algori...

机构

  • 254 篇 college of compu...
  • 105 篇 college of compu...
  • 104 篇 college of contr...
  • 81 篇 college of compu...
  • 61 篇 college of compu...
  • 52 篇 fujian provincia...
  • 46 篇 school of contro...
  • 36 篇 college of elect...
  • 29 篇 northeast forest...
  • 28 篇 school of comput...
  • 26 篇 college of compu...
  • 25 篇 college of compu...
  • 24 篇 college of compu...
  • 24 篇 tianjin key labo...
  • 24 篇 fujian provincia...
  • 23 篇 control and inte...
  • 22 篇 computer enginee...
  • 22 篇 department of co...
  • 20 篇 school of inform...
  • 20 篇 department of el...

作者

  • 49 篇 li zuoyong
  • 40 篇 chen zengqiang
  • 38 篇 zengqiang chen
  • 27 篇 dai xuefeng
  • 24 篇 el-sayed m.el-ke...
  • 23 篇 abdelhameed ibra...
  • 22 篇 zuoyong li
  • 18 篇 abdelaziz a.abde...
  • 18 篇 zhongxin liu
  • 17 篇 zhang jianfei
  • 17 篇 johansson karl h...
  • 17 篇 feng duan
  • 16 篇 doaa sami khafag...
  • 15 篇 liu zhongxin
  • 15 篇 fan haoyi
  • 14 篇 wu junfeng
  • 14 篇 kai-tai song
  • 13 篇 yang kailun
  • 13 篇 wang tao
  • 13 篇 teng shenghua

语言

  • 3,722 篇 英文
  • 121 篇 其他
  • 98 篇 中文
  • 15 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=College of Computer and Control Engineering"
3954 条 记 录,以下是241-250 订阅
排序:
An Influence Maximization Algorithm Based on Improved K-Shell in Temporal Social Networks
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3111-3131页
作者: Wenlong Zhu Yu Miao Shuangshuang Yang Zuozheng Lian Lianhe Cui College of Computer and Control Engineering of Qiqihar University Qiqihar161006China College of Teacher Education of Qiqihar University Qiqihar161006China
Influence maximization of temporal social networks(IMT)is a problem that aims to find the most influential set of nodes in the temporal network so that their information can be the most widely *** solve the IMT proble... 详细信息
来源: 评论
Error propagation determined iterative channel estimation with ICI mitigation for fast time-varying OFDM channels
收藏 引用
High Technology Letters 2014年 第4期20卷 415-420页
作者: 张杰 Yang Ruizhe Si Pengbo Zhang Yanhua Yu Richard College of Electronics Information and Control Engineering Beijing University of Technology Department of Systems and Computer Engineering Carleton University
The intersubcarrier interference(ICI) degrades the performance of the pilot-aided channel estimation in fast time-varying orthogonal frequency division multiplexing(OFDM) *** solve the error propagation in joint chann... 详细信息
来源: 评论
Privacy Preservation for Cloud-Edge-Collaborative Energy Management System Using Post-Quantum Homomorphic Encryption
收藏 引用
IEEE Transactions on Smart Grid 2025年
作者: Jiang, Cheng Li, Xue Du, Dajun Qian, Hong Wen, Mi Wu, Lei Findeisen, Rolf Shanghai University of Electric Power Shanghai Key Laboratory of Power Station Automation Technology College of Automation Engineering Shanghai200090 China Shanghai University Shanghai Key Laboratory of Power Station Automation Technology School of Mechatronical Engineering and Automation Shanghai200072 China Shanghai University of Electric Power College of Computer Science and Technology Shanghai201306 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ07030 United States TU Darmstadt Control and Cyber-Physical Systems Laboratory Darmstadt64227 Germany
Cloud-based energy management systems (EMS) in smart grids face privacy challenges, as existing methods based on traditional homomorphic encryption support limited operations and are vulnerable to quantum attacks. We ... 详细信息
来源: 评论
Modeling and reachability of probabilistic finite automata based on semi-tensor product of matrices
收藏 引用
Science China(Information Sciences) 2018年 第12期61卷 202-204页
作者: Zhipeng ZHANG Zengqiang CHEN Zhongxin LIU College of Computer and Control Engineering Nankai University Tianjin Key Laboratory of Intelligent Robotics Nankai University
Dear editor,As mathematical models, finite automata have been a powerful synthesis tool for modeling and analyzing discrete event systems where states and events are a finite logical or discrete set. In deterministic ... 详细信息
来源: 评论
Disturbance Observers for Robust Backup control Barrier Functions
arXiv
收藏 引用
arXiv 2025年
作者: van Wijk, David E.J. Daş, Ersin Alan, Anil Coogan, Samuel Molnar, Tamas G. Burdick, Joel W. Majji, Manoranjan Hobbs, Kerianne L. Aerospace Engineering Texas A&M University College StationTX77845 United States Mechanical and Civil Engineering California Institute of Technology PasadenaCA91125 United States Delft Center for Systems and Control Delft University of Technology Delft Netherlands Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States Mechanical Engineering Wichita State University WichitaKS67260 United States Safe Autonomy Lead Air Force Research Laboratory Wright-Patterson Air Force BaseOH45433 United States
Designing safe controllers is crucial and notoriously challenging for input-constrained safety-critical control systems. Backup control barrier functions offer an approach for the construction of safe controllers onli... 详细信息
来源: 评论
A calibration and compensation method for an industrial robot with high accuracy harmonic reducers
收藏 引用
Science China(Technological Sciences) 2024年 第3期67卷 725-739页
作者: ZHAO YiYang LIU Xun CAO JiaBin LIU JinYu XU Yan YAN WeiXin School of Mechanical Engineering Shanghai Jiao Tong UniversityShanghai 200240China College of Computer and Control Engineering Northeast Forestry UniversityHarbin 150040China
Industrial serial robots need high stiffness to keep absolute pose accuracy and meet the requirements in practical applications. However, the weak stiffness feature of robot joints and the payloads affected on robot e... 详细信息
来源: 评论
An Automatic Parts Detection System Based on computer Vision  35
An Automatic Parts Detection System Based on Computer Vision
收藏 引用
第35届中国控制会议
作者: LI Liang HAN Shun ASAMA Hajime DUAN Feng College of Computer and Control Engineering Nankai University
This paper proposes a new approach for parts detecting based on the Gaussian mixture *** this work,firstly,an industrial camera is mounted over the moving conveyor belt to acquire the images of the parts which will be... 详细信息
来源: 评论
Decomposition method-based global Mittag-Leffler synchronization for fractional-order Clifford-valued neural networks with transmission delays and impulses
收藏 引用
Neural Networks 2025年 189卷 107564页
作者: Sriraman, R. Manoj, N. Pratap, Anbalagan Department of Mathematics College of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India College of Mechatronics and Control Engineering Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
This study examines the global Mittag-Leffler synchronization (GMLS) problem for fractional-order Clifford-valued neural networks (FOCLVNNs) including transmission delays and impulses. Firstly, a novel kind of FOCLVNN... 详细信息
来源: 评论
Distributed containment control for multi-robot system based on binocular vision and RBF neural network
International Journal of Control and Automation
收藏 引用
International Journal of control and Automation 2015年 第9期8卷 139-152页
作者: Shao, Nuan Li, Huiguang Liu, Le Li, Guoyou Key Lab of Industrial Computer Control Engineering of Hebei Province College of Electrical Engineering Yanshan University Qinhuangdao China
Aiming at the distributed containment control problem for Multi-Robot system with dynamic leaders, we use binocular vision as the sensing device, so firstly, a binocular visual model for dynamic target is established ... 详细信息
来源: 评论
Bayesian network structure learning method with insufficient data based on cuckoo search algorithm with cauchy mutation
International Journal of Control and Automation
收藏 引用
International Journal of control and Automation 2015年 第9期8卷 221-228页
作者: Bo, Wang Zhang, Jian-Fei Du, Xiao-Xin Liu, Yan-Ju Computer Center Qiqihar University Qiqihar Heilongjiang China College of Computer and Control Engineering Qiqihar University Qiqihar Heilongjiang China
Aiming at the cuckoo search algorithm (CSA) with disadvantages of slow convergence speed, getting into local extremum easily and low accuracy, we put forward cuckoo search algorithm with cauchy mutation(CCSA). For Bay... 详细信息
来源: 评论