咨询与建议

限定检索结果

文献类型

  • 156 篇 会议
  • 123 篇 期刊文献

馆藏范围

  • 279 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 111 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 33 篇 船舶与海洋工程
    • 30 篇 信息与通信工程
    • 29 篇 土木工程
    • 28 篇 生物工程
    • 19 篇 控制科学与工程
    • 15 篇 机械工程
    • 11 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 10 篇 化学工程与技术
    • 8 篇 光学工程
    • 8 篇 材料科学与工程(可...
    • 8 篇 生物医学工程(可授...
    • 7 篇 水利工程
    • 7 篇 航空宇航科学与技...
    • 6 篇 建筑学
    • 6 篇 安全科学与工程
  • 121 篇 理学
    • 46 篇 数学
    • 32 篇 海洋科学
    • 29 篇 生物学
    • 22 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 10 篇 地球物理学
    • 8 篇 化学
  • 40 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 6 篇 军事学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 教育学
  • 3 篇 法学
  • 2 篇 医学

主题

  • 10 篇 software testing
  • 8 篇 software quality
  • 7 篇 reinforcement le...
  • 6 篇 simulation
  • 6 篇 software reliabi...
  • 6 篇 security
  • 5 篇 information syst...
  • 5 篇 deep neural netw...
  • 5 篇 cosmology
  • 5 篇 feature extracti...
  • 4 篇 task analysis
  • 4 篇 generative adver...
  • 4 篇 education
  • 4 篇 unmanned aerial ...
  • 4 篇 decision making
  • 4 篇 genetic algorith...
  • 4 篇 fuzzy control
  • 4 篇 training
  • 3 篇 data integrity
  • 3 篇 deep learning

机构

  • 42 篇 college of comma...
  • 40 篇 command and cont...
  • 18 篇 command & contro...
  • 15 篇 college of comma...
  • 11 篇 department of as...
  • 11 篇 college of comma...
  • 10 篇 institute for as...
  • 9 篇 institute for fr...
  • 7 篇 army engineering...
  • 6 篇 academy of milit...
  • 6 篇 college of commu...
  • 5 篇 command&control ...
  • 5 篇 command and cont...
  • 4 篇 xi'an satellite ...
  • 4 篇 college of comma...
  • 4 篇 department of as...
  • 4 篇 kavli institute ...
  • 4 篇 army engineering...
  • 4 篇 department of co...
  • 3 篇 department of in...

作者

  • 23 篇 huang song
  • 15 篇 zhang tingting
  • 14 篇 pan zhisong
  • 13 篇 song huang
  • 11 篇 zhang tong-jie
  • 10 篇 miao zhuang
  • 9 篇 li yang
  • 9 篇 wang jiabao
  • 7 篇 pan yu
  • 6 篇 yang li
  • 5 篇 yang sen
  • 5 篇 jiabao wang
  • 5 篇 wang yu-chen
  • 5 篇 zhuang miao
  • 5 篇 jinyu song
  • 5 篇 li wei
  • 4 篇 zhisong pan
  • 4 篇 zheng qibin
  • 4 篇 hui zhanwei
  • 4 篇 yuchan liu

语言

  • 267 篇 英文
  • 7 篇 其他
  • 5 篇 中文
检索条件"机构=Command and Control Engineering College"
279 条 记 录,以下是91-100 订阅
排序:
Container Networking Performance Analysis for Large-Scale User Behavior Simulation
Container Networking Performance Analysis for Large-Scale Us...
收藏 引用
作者: Yifang Ji Guomin Zhang Shengxu Xie Xiulei Wang Command & Control Engineering College Army Engineering University of PLA
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network *** Linux Container provides a method to simulate the behavior of large-scale users u... 详细信息
来源: 评论
Learning predictive control of wheeled mobile robot with communication delays  3
Learning predictive control of wheeled mobile robot with com...
收藏 引用
2024 3rd International Conference on Electrical, control and Information Technology, ECITech 2024
作者: Wu, Ruizhuo Xu, Xin He, Ming Liu, Daxue Zhang, Xinglong College of Intelligence Science and Technology National University of Defense Technology Hunan Changsha410073 China Institute of Command and Control Engineering Army Engineering University Jiangsu Nanjing210007 China
This paper proposed a learning predictive control method for wheeled mobile robots with communication delays. In consideration of the property in the Networked control System (NCS), communication delay was divided int... 详细信息
来源: 评论
Deep Reinforcement Learning based Recommend System using stratified sampling  2
Deep Reinforcement Learning based Recommend System using str...
收藏 引用
2018 2nd Annual International Conference on Cloud Technology and Communication engineering, CTCE 2018
作者: Zhao, Zhiruo Chen, Xiliang Command and Control Engineering College Army Engineering University No. 1 HaiFu Road Guang Hua Road Qin Huai District Nanjing City Jiangsu Province210007 China
Typically personalized movie recommendation algorithms often adopt a static view of recommend process and only take current rewards into consideration. Thus, they are hard to adapt to the dynamic change of users and i... 详细信息
来源: 评论
Research on ldos attack detection and defense mechanism in software defined networks  6th
Research on ldos attack detection and defense mechanism in s...
收藏 引用
6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020
作者: Xie, Shengxu Xing, Changyou Zhang, Guomin Wei, Xianglin Hu, Guyu Command and Control Engineering College Army Engineering University of PLA Nanjing210007 China The 63rd Research Institute National University of Defense Technology Nanjing210007 China
The LDoS (Low rate Denial of Service) attack that aims at exhausting the limited SDN switch buffer resource is hard to detect and degrade network performance seriously. To solve such a problem, this paper proposes an ... 详细信息
来源: 评论
Optimization design of TS-PID fuzzy controllers based on genetic algorithms
Optimization design of TS-PID fuzzy controllers based on gen...
收藏 引用
WCICA 2004 - Fifth World Congress on Intelligent control and Automation, Conference Proceedings
作者: Xiu, Zhihong Ren, Guang Marine Engineering College Dalian Maritime University Dalian Liaoning Province China Department of Command Control Dalian Naval Academy Dalian Liaoning Province China
TS-PID fuzzy controllers are a class of Tagagi-Sugeno (TS) fuzzy controllers whose rule consequences employ PID expressions. The analytical model of typical TS-PID fuzzy controllers is proposed in this paper. It can b... 详细信息
来源: 评论
A High-Performance Extraction Method for Public Opinion on Internet
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第5期12卷 902-906页
作者: LI Yanling DAI Guanzhong ZHU Yehang QIN Sen School of Automatic Control Northwestern Polytechnical University Xi'an 710072 Shaanxi China Department of Computer and Command Automation The Secondary Artillery Engineering College Xi'an 710025 Shaanxi China
Aiming at the importance of the analysis for public opinion on Internet, the authors propose a high-performance extraction method for public opinion. In this method, the space model for classification is adopted to de... 详细信息
来源: 评论
User's Permission Reasoning Method Based on Knowledge Graph Reward Guidance Reinforcement Learning in Data Center  7th
User's Permission Reasoning Method Based on Knowledge Graph ...
收藏 引用
7th International Conference on Data Mining and Big Data, DMBD 2022
作者: Pan, Yu Li, Hongmei Li, Wei Liu, Yi Li, Xiang Zheng, Qibin Qin, Wei National University of Defense Technology Changsha410073 China Command and Control Engineering College Army Engineering University of PLA Nanjing210007 China Academy of Military Science Beijing100091 China
In general, multiple domain cyberspace security assessments are very important for data center security and can be implemented by reasoning user's permissions. However, while existing methods include some informat... 详细信息
来源: 评论
Real-time mobile robot teleoperation via Internet based on predictive control
收藏 引用
中国高等学校学术文摘·机械工程 2008年 第3期3卷 299-306页
作者: Shihua WANG Bugong XU YunHui LIU Yeming ZHOU Laboratory of Real-Time Control Through Internet and Fieldbuses College of Automation Science and Engineering South China University of Technology Guangzhou 510640 China Naval Arms Command Academy of Guangzhou Guangzhou 510430 China Laboratory of Real-Time Control Through Internet and Fieldbuses College of Automation Science and Engineering South China University of Technology Guangzhou 510640 China Naval Arms Command Academy of Guangzhou Guangzhou 510430 China Department of Automation and Computer Aided Engineering The Chinese University of Hong Kong Shatin N.T. HK China
A remote control system that can control a mobile robot in real time via the internet is proposed. To compensate for the network delay and counteract its impact on the teleoperation system, a predictive control scheme... 详细信息
来源: 评论
Design and Practice of Flipping Classroom under Blended Learning
Design and Practice of Flipping Classroom under Blended Lear...
收藏 引用
International Conference on Information Systems and Computer Aided Education (ICISCAE)
作者: Yang Lanjuan Wang Jinshuang Chen Ping Pan Lin Zhao Min Command and Control Engineering College Army Engineering University Nanjing Jiangsu
Be aimed at the characteristics of the course of Applied Cryptography and the existing problems in teaching, this paper puts forward the application of blended flipped classroom mode in the course to improve teaching,... 详细信息
来源: 评论
QMPS: Q-learning based Message Prioritizing and Scheduling Algorithm for Flying Ad hoc Networks
QMPS: Q-learning based Message Prioritizing and Scheduling A...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Jun Li Ming Chen Command & Control Engineering College Army Engineering University Nanjing China
Flying ad hoc networks have become increasingly important in civilian applications, organized by several autonomous, small, and low-cost drones. Flying ad hoc networks often suffer from the degradation of performance ... 详细信息
来源: 评论