咨询与建议

限定检索结果

文献类型

  • 14,870 篇 会议
  • 7,484 篇 期刊文献
  • 89 册 图书

馆藏范围

  • 22,443 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 13,147 篇 工学
    • 6,388 篇 计算机科学与技术...
    • 5,425 篇 软件工程
    • 4,505 篇 控制科学与工程
    • 2,428 篇 电气工程
    • 2,032 篇 信息与通信工程
    • 1,705 篇 机械工程
    • 1,570 篇 电子科学与技术(可...
    • 1,017 篇 动力工程及工程热...
    • 958 篇 生物工程
    • 803 篇 仪器科学与技术
    • 782 篇 生物医学工程(可授...
    • 727 篇 光学工程
    • 599 篇 化学工程与技术
    • 497 篇 交通运输工程
    • 424 篇 土木工程
    • 410 篇 安全科学与工程
    • 407 篇 力学(可授工学、理...
    • 370 篇 建筑学
    • 361 篇 材料科学与工程(可...
  • 7,470 篇 理学
    • 4,061 篇 数学
    • 2,006 篇 系统科学
    • 1,713 篇 物理学
    • 1,191 篇 统计学(可授理学、...
    • 1,105 篇 生物学
    • 536 篇 化学
  • 2,773 篇 管理学
    • 1,954 篇 管理科学与工程(可...
    • 871 篇 图书情报与档案管...
    • 734 篇 工商管理
  • 694 篇 医学
    • 573 篇 临床医学
    • 477 篇 基础医学(可授医学...
  • 338 篇 法学
  • 302 篇 经济学
  • 158 篇 农学
  • 132 篇 教育学
  • 37 篇 军事学
  • 25 篇 文学
  • 25 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 947 篇 control systems
  • 373 篇 mathematical mod...
  • 311 篇 computational mo...
  • 271 篇 optimization
  • 265 篇 neural networks
  • 259 篇 robustness
  • 234 篇 robust control
  • 233 篇 feature extracti...
  • 227 篇 computer science
  • 202 篇 stability analys...
  • 198 篇 deep learning
  • 174 篇 predictive model...
  • 171 篇 uncertainty
  • 168 篇 simulation
  • 166 篇 support vector m...
  • 154 篇 nonlinear system...
  • 153 篇 computer archite...
  • 152 篇 educational inst...
  • 145 篇 image segmentati...
  • 144 篇 training

机构

  • 1,279 篇 school of contro...
  • 200 篇 school of comput...
  • 187 篇 school of contro...
  • 177 篇 college of compu...
  • 168 篇 school of comput...
  • 109 篇 college of compu...
  • 109 篇 college of contr...
  • 106 篇 school of contro...
  • 104 篇 department of el...
  • 88 篇 department of co...
  • 83 篇 college of compu...
  • 70 篇 department of co...
  • 68 篇 institute of com...
  • 59 篇 ieee
  • 56 篇 department of co...
  • 56 篇 college of compu...
  • 50 篇 department of co...
  • 50 篇 fujian provincia...
  • 47 篇 school of electr...
  • 40 篇 hubei key labora...

作者

  • 88 篇 johansson karl h...
  • 63 篇 e. rogers
  • 57 篇 krzysztof galkow...
  • 42 篇 jiming chen
  • 39 篇 byung-ju yi
  • 35 篇 ondrej krejcar
  • 34 篇 macii enrico
  • 33 篇 galkowski krzysz...
  • 33 篇 li li
  • 31 篇 karl h. johansso...
  • 31 篇 wu kehe
  • 30 篇 li yuancheng
  • 29 篇 bo ai
  • 29 篇 wei li
  • 28 篇 wang lei
  • 28 篇 rojas cristian r...
  • 28 篇 yang yang
  • 27 篇 chen zengqiang
  • 26 篇 hou guolian
  • 25 篇 el-sayed m.el-ke...

语言

  • 21,310 篇 英文
  • 718 篇 其他
  • 402 篇 中文
  • 18 篇 日文
  • 7 篇 朝鲜文
  • 5 篇 德文
  • 3 篇 法文
  • 2 篇 俄文
检索条件"机构=Computer and Control Engineering"
22443 条 记 录,以下是451-460 订阅
排序:
A Distributed Automatic Domain-Specific Multi-Word Term Recognition Architecture using Spark Ecosystem  22
A Distributed Automatic Domain-Specific Multi-Word Term Reco...
收藏 引用
22nd International Symposium on Parallel and Distributed Computing, ISPDC 2023
作者: Truica, Ciprian-Octavian Istrate, Neculai-Ovidiu Apostol, Elena-Simona University Politehnica of Bucharest Faculty of Automatic Control and Computers Computer Science and Engineering Department Bucharest Romania
Automatic Term Recognition is used to extract domain-specific terms that belong to a given domain. In order to be accurate, these corpus and language-dependent methods require large volumes of textual data that need t... 详细信息
来源: 评论
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3183-3198页
作者: Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt The Department of Civil and Environmental Engineering Florida International UniversityMiamiFLUSA Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t... 详细信息
来源: 评论
Indoor Uncertain Semantic Trajectory Similarity Join
收藏 引用
Journal of computer Science & Technology 2024年 第6期39卷 1441-1465页
作者: Hong-Bo Yin Dong-Hua Yang Kai-Qi Zhang Hong Gao Jian-Zhong Li Faculty of Computing Harbin Institute of TechnologyHarbin 150001China Center of Analysis Measurement and ComputingHarbin Institute of TechnologyHarbin 150001China Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an in... 详细信息
来源: 评论
A Modified Dempster Shafer Approach to Classification in Surgical Skill Assessment  31
A Modified Dempster Shafer Approach to Classification in Sur...
收藏 引用
31st International Conference on Electrical engineering, ICEE 2023
作者: Iranfar, Arash Soleymannejad, Mohammad Moshiri, Behzad Taghirad, Hamid D. School of Electrical and Computer Engineering University College of Engineering University of Tehran Tehran Iran University of Waterloo Department of Electrical and Computer Engineering Waterloo Canada Industrial Control Center of Excellence Faculty of Electrical Engineering Tehran Iran
Artificial intelligence systems are usually implemented either using machine learning or expert systems. Machine learning methods are usually more accurate and applicable to a broader range of applications. Expert sys... 详细信息
来源: 评论
Robust Image Encryption Based on Improved Logistic Chaos and Cross Chaotic Diffusion  16
Robust Image Encryption Based on Improved Logistic Chaos and...
收藏 引用
16th International Congress on Image and Signal Processing, BioMedical engineering and Informatics, CISP-BMEI 2023
作者: Guo, Yuan Zhai, Ping Wang, Chong Li, Haibo Liu, Ziqi Heilongjiang University Department of Computer Science and Technology Harbin150080 China Qiqihar University Department of Computer and Control Engineering Qiqihar161006 China
To address the problem of weak robustness of some current image encryption algorithms, this paper proposes a strong robust encryption algorithm. The Logistic chaotic system is improved to produce more random sequence ... 详细信息
来源: 评论
Equalizer Zero-Determinant Strategy in Discounted Repeated Stackelberg Asymmetric Game
收藏 引用
Journal of Systems Science & Complexity 2024年 第1期37卷 184-203页
作者: CHENG Zhaoyang CHEN Guanpu HONG Yiguang Key Laboratory of Systems and Control Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China School of Electrical Engineering and Computer Science KTH Royal Institute of Technology10044 StockholmSweden. Department of Control Science and Engineering Tongji UniversityShanghai 201804China Shanghai Research Institute for Intelligent Autonomous Systems Tongji UniversityShanghai 210201China
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriv... 详细信息
来源: 评论
A Registration and Fusion Method of 3D Cross-source Point Cloud Data for Modeling Accurate Models of Small Celestial Bodies
A Registration and Fusion Method of 3D Cross-source Point Cl...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: He, Xuan Zhao, Qingjie Lv, Xingchen Wang, Lei Liu, Wangwang School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Beijing Institute of Control Engineering Beijing100190 China
High-precision three-dimensional models of small celestial bodies are important for deep space exploration tasks. The homologous point cloud obtained from a single sensor has limitations in terms of accuracy and densi... 详细信息
来源: 评论
Some Remarks on Fault-Tolerant Dynamic control Allocation for Weakly Redundant Systems  32
Some Remarks on Fault-Tolerant Dynamic Control Allocation fo...
收藏 引用
32nd Mediterranean Conference on control and Automation, MED 2024
作者: Cristofaro, Andrea Faleschini, Michelangelo Sapienza University of Rome Department of Computer Control and Management Engineering Italy School of Science and Technology Mathematics Division University of Camerino Italy
We consider the problem of control allocation for weakly redundant systems subject to actuator faults. In particular, the design of a suitable allocator will be devised with the aim of compensating for the fault effec...
来源: 评论
4K Video Coding Efficiency in UAV Systems  45
4K Video Coding Efficiency in UAV Systems
收藏 引用
45th Jubilee International Convention on Information, Communication and Electronic Technology, MIPRO 2022
作者: Benjak, J. Hofman, D. Faculty of Electrical Engineering and Computing Department of Control and Computer Engineering Zagreb Croatia
With increasing requirements for high quality, low bandwidth video transmission systems, comes a demand for more ad hoc video encoders. Unmanned Aerial Vehicles (UAVs), or just drones, have recently grown in popularit... 详细信息
来源: 评论
CORMAND2--针对工业机器人的欺骗攻击
收藏 引用
engineering 2024年 第1期32卷 186-201页
作者: Hongyi Pu Liang He Peng Cheng Jiming Chen Youxian Sun College of Control Science and Engineering Zhejiang UniversityHangzhou 310000China Department of Computer Science and Engineering University of Colorado Denver DenverCO 999039USA
Industrial robots are becoming increasingly vulnerable to cyber incidents and attacks,particularly with the dawn of the Industrial Internet-of-Things(IIoT).To gain a comprehensive understanding of these cyber risks,vu... 详细信息
来源: 评论