咨询与建议

限定检索结果

文献类型

  • 2,248 篇 会议
  • 1,710 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,579 篇 工学
    • 1,365 篇 计算机科学与技术...
    • 1,149 篇 软件工程
    • 725 篇 控制科学与工程
    • 464 篇 信息与通信工程
    • 432 篇 电气工程
    • 325 篇 电子科学与技术(可...
    • 323 篇 机械工程
    • 244 篇 生物工程
    • 218 篇 生物医学工程(可授...
    • 189 篇 光学工程
    • 171 篇 仪器科学与技术
    • 144 篇 化学工程与技术
    • 143 篇 动力工程及工程热...
    • 97 篇 材料科学与工程(可...
    • 88 篇 土木工程
    • 88 篇 交通运输工程
    • 82 篇 安全科学与工程
    • 79 篇 建筑学
  • 1,490 篇 理学
    • 747 篇 数学
    • 409 篇 物理学
    • 282 篇 生物学
    • 264 篇 系统科学
    • 213 篇 统计学(可授理学、...
    • 134 篇 化学
  • 594 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 103 篇 工商管理
  • 239 篇 医学
    • 195 篇 临床医学
    • 147 篇 基础医学(可授医学...
    • 102 篇 药学(可授医学、理...
  • 71 篇 法学
  • 47 篇 经济学
  • 47 篇 农学
  • 28 篇 教育学
  • 8 篇 艺术学
  • 7 篇 军事学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 109 篇 feature extracti...
  • 86 篇 educational inst...
  • 84 篇 control systems
  • 69 篇 computational mo...
  • 69 篇 training
  • 65 篇 mathematical mod...
  • 64 篇 optimization
  • 61 篇 deep learning
  • 56 篇 robustness
  • 51 篇 accuracy
  • 49 篇 neural networks
  • 46 篇 image segmentati...
  • 45 篇 semantics
  • 41 篇 support vector m...
  • 37 篇 algorithm design...
  • 36 篇 object detection
  • 35 篇 stability analys...
  • 35 篇 visualization
  • 35 篇 machine learning
  • 33 篇 real-time system...

机构

  • 255 篇 college of compu...
  • 106 篇 college of contr...
  • 104 篇 college of compu...
  • 80 篇 college of compu...
  • 61 篇 college of compu...
  • 52 篇 fujian provincia...
  • 45 篇 school of contro...
  • 36 篇 college of elect...
  • 31 篇 northeast forest...
  • 28 篇 school of comput...
  • 26 篇 college of compu...
  • 26 篇 college of compu...
  • 24 篇 college of compu...
  • 24 篇 tianjin key labo...
  • 23 篇 fujian provincia...
  • 22 篇 computer enginee...
  • 22 篇 college of mecha...
  • 22 篇 control and inte...
  • 21 篇 department of co...
  • 20 篇 school of inform...

作者

  • 51 篇 li zuoyong
  • 40 篇 chen zengqiang
  • 38 篇 zengqiang chen
  • 27 篇 dai xuefeng
  • 24 篇 el-sayed m.el-ke...
  • 24 篇 zuoyong li
  • 22 篇 abdelhameed ibra...
  • 18 篇 abdelaziz a.abde...
  • 18 篇 zhang jianfei
  • 18 篇 zhongxin liu
  • 17 篇 johansson karl h...
  • 17 篇 feng duan
  • 16 篇 doaa sami khafag...
  • 15 篇 liu zhongxin
  • 15 篇 fan haoyi
  • 14 篇 wang tao
  • 14 篇 wu junfeng
  • 14 篇 teng shenghua
  • 14 篇 kai-tai song
  • 13 篇 jian wang

语言

  • 3,732 篇 英文
  • 123 篇 其他
  • 99 篇 中文
  • 15 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=College of Control and Computer Engineering"
3967 条 记 录,以下是41-50 订阅
排序:
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论
Leveraging Data Fitting and Trust Assessment to Improve the Security of Industrial Networks  43
Leveraging Data Fitting and Trust Assessment to Improve the ...
收藏 引用
43rd Chinese control Conference, CCC 2024
作者: Zhang, Heng Wang, Yinchu Xue, Yawen Deng, Ruilong Li, Hongran Zhang, Jian Jiangsu Ocean University School of Computer Engineering China Zhejiang University College of Control Science and Engineering China
Industrial network control systems (INCSs) are easy to be targeted by attackers due to their high economic value. Most of the existing defense methods are deployed at the network boundary, which causes high-security r... 详细信息
来源: 评论
Attention-based Vision Knowledge Adaptation for Constrained Continual Learning
Attention-based Vision Knowledge Adaptation for Constrained ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Guo, Bicheng Zhou, Conghao Liu, Haoyu He, Shibo Chen, Jiming Shen, Xuemin Zhejiang University College of Control Science and Engineering China University of Waterloo Department of Electrical and Computer Engineering Canada
The demand for continual machine learning in the context of limited computational resources and data availability is critical in the evolving landscape of the connected digital world. Current network applications pred... 详细信息
来源: 评论
Distortion Evaluation of EMP Sensors Using Associated-Hermite Functions
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1093-1105页
作者: Rupo Ma Siping Gao College of Command and Control Engineering Army Engineering UniversityNanjing210007China Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Department of Electrical and Computer Engineering National University of Singapore119260Singapore
Electromagnetic pulse(EMP)is a kind of transient electromagnetic phenomenon with short rise time of the leading edge and wide spectrum,which usually disrupts communications and damages electronic equipment and *** is ... 详细信息
来源: 评论
A Review of Security and Information control in Blockchain-Integrated IoT Applications  3
A Review of Security and Information Control in Blockchain-I...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Cholke, Abhijeet Mandhare, V.V. Vikhe, P.S. Matoshri College of Engineering & Research Centre Department of Computer Engineering Nashik India Pravara Rural Engineering College Department of Computer Engineering Loni Ahmednagar India Pravara Rural Engineering College Department of Instrumentation and Control Engineering Loni Ahmednagar India
The convergence of the Internet of Things (IoT) and blockchain technologies has gained substantial traction in recent years, owing to the rapid advancement of communication technologies worldwide. This research introd... 详细信息
来源: 评论
Recommendation System Based on Perceptron and Graph Convolution Network
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 评论
A DDoS Identification Method for Unbalanced Data CVWGG
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3825-3851页
作者: Haizhen Wang Na Jia Yang He Pan Tan College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st... 详细信息
来源: 评论
Multi-Objective Optimization of Asymmetric PM-Assisted Synchronous Reluctance Motor Based on NSGA-III  7
Multi-Objective Optimization of Asymmetric PM-Assisted Synch...
收藏 引用
7th IEEE International Electrical and Energy Conference, CIEEC 2024
作者: Wang, Weinan Wang, Shuo Zhao, Xiaokun Zhu, Liangkuan Liu, Yiqi Wei, Jian College of Computer and Control Engineering Northeast Forestry University Harbin China College of Mechanical and Electrical Engineering Northeast Forestry University Harbin China
Reluctance motor has the advantages of simple structure, low amount of permanent magnet and high stability. But reluctance motor's limited torque density hinders its widespread application. However, the problem of... 详细信息
来源: 评论
Low Conduction-Loss DC Circuit Breaker with Bidirectional Break Capability  7
Low Conduction-Loss DC Circuit Breaker with Bidirectional Br...
收藏 引用
7th IEEE International Electrical and Energy Conference, CIEEC 2024
作者: Wu, Yucheng Yin, Laicheng Gu, Fangning Liu, Jiayi Yu, Xiaohan Liu, Yiqi College of Mechanical and Electrical Engineering Northeast Forestry University Harbin China College of Computer and Control Engineering Northeast Forestry University Harbin China
The Modular Multilevel Converter-based High Voltage Direct Current (MMC-HVDC) transmission system has become the most commonly used transmission technology in DC transmission projects. In order to save transmission an... 详细信息
来源: 评论
Orthogonal Dual-channel based Wireless Charging System with Free Rotation and Simultaneous Data Transmission  2
Orthogonal Dual-channel based Wireless Charging System with ...
收藏 引用
2nd China Power Supply Society Electromagnetic Compatibility Conference, CPEMC 2024
作者: Liu, Hao Chang, Junhao Li, Zhenjie Chen, Henglin College of Electrical Engineering Zhejiang University Hangzhou310027 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China
An orthogonal dual-channel-based wireless charging system is designed to desensitize the wireless charging system to free rotation and transmit energy and data simultaneously. The radial magnetic flux and rectangular ... 详细信息
来源: 评论