咨询与建议

限定检索结果

文献类型

  • 6,192 篇 会议
  • 3,794 篇 期刊文献
  • 60 册 图书

馆藏范围

  • 10,046 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,472 篇 工学
    • 2,029 篇 计算机科学与技术...
    • 1,731 篇 控制科学与工程
    • 1,663 篇 软件工程
    • 1,529 篇 电气工程
    • 983 篇 电子科学与技术(可...
    • 914 篇 信息与通信工程
    • 588 篇 机械工程
    • 515 篇 动力工程及工程热...
    • 332 篇 光学工程
    • 325 篇 仪器科学与技术
    • 300 篇 生物工程
    • 256 篇 生物医学工程(可授...
    • 245 篇 材料科学与工程(可...
    • 245 篇 化学工程与技术
    • 187 篇 交通运输工程
    • 178 篇 力学(可授工学、理...
    • 161 篇 航空宇航科学与技...
    • 149 篇 土木工程
    • 123 篇 安全科学与工程
  • 3,371 篇 理学
    • 1,688 篇 数学
    • 1,000 篇 物理学
    • 932 篇 系统科学
    • 499 篇 统计学(可授理学、...
    • 381 篇 生物学
    • 271 篇 化学
  • 821 篇 管理学
    • 638 篇 管理科学与工程(可...
    • 280 篇 工商管理
    • 190 篇 图书情报与档案管...
  • 243 篇 医学
    • 206 篇 临床医学
    • 151 篇 基础医学(可授医学...
  • 124 篇 法学
  • 118 篇 经济学
  • 54 篇 农学
  • 41 篇 教育学
  • 20 篇 文学
  • 10 篇 艺术学
  • 9 篇 军事学

主题

  • 498 篇 control systems
  • 466 篇 laboratories
  • 167 篇 neural networks
  • 151 篇 optimization
  • 150 篇 computational mo...
  • 124 篇 robust control
  • 121 篇 frequency
  • 118 篇 convergence
  • 117 篇 voltage
  • 114 篇 switches
  • 109 篇 computer archite...
  • 106 篇 application soft...
  • 99 篇 stability analys...
  • 98 篇 bandwidth
  • 95 篇 vectors
  • 90 篇 throughput
  • 89 篇 robustness
  • 88 篇 state estimation
  • 86 篇 signal to noise ...
  • 85 篇 computer science

机构

  • 108 篇 department of el...
  • 86 篇 ieee
  • 36 篇 department of el...
  • 36 篇 state key labora...
  • 33 篇 hubei key labora...
  • 31 篇 state key labora...
  • 29 篇 beijing key labo...
  • 28 篇 school of electr...
  • 27 篇 department of el...
  • 27 篇 state key labora...
  • 26 篇 department of el...
  • 24 篇 key laboratory o...
  • 24 篇 networking and i...
  • 23 篇 school of automa...
  • 22 篇 school of electr...
  • 22 篇 university of ch...
  • 21 篇 national mobile ...
  • 20 篇 advanced computi...
  • 19 篇 intelligent wave...
  • 19 篇 the state key la...

作者

  • 69 篇 xi zhang
  • 67 篇 johansson karl h...
  • 47 篇 ganesh k. venaya...
  • 40 篇 m. zahn
  • 40 篇 osama a. mohamme...
  • 29 篇 mohammed osama a...
  • 28 篇 venayagamoorthy ...
  • 28 篇 han zhu
  • 26 篇 lin jin
  • 26 篇 mengchu zhou
  • 26 篇 pedrycz witold
  • 25 篇 niyato dusit
  • 23 篇 j.h. lang
  • 23 篇 park namkyoo
  • 22 篇 witold pedrycz
  • 22 篇 karl h. johansso...
  • 21 篇 junping du
  • 21 篇 song yonghua
  • 20 篇 g.w. roberts
  • 19 篇 chen chen

语言

  • 9,454 篇 英文
  • 393 篇 其他
  • 194 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Control Systems Laboratory of the Electrical and Computer Engineering Department"
10046 条 记 录,以下是4911-4920 订阅
排序:
Computational Approaches for Bad Data Handling in Power System Synchrophasor Networks
收藏 引用
IFAC Proceedings Volumes 2014年 第3期47卷 11269-11274页
作者: Ganesh K. Venayagamoorthy Real-Time Power and Intelligent Systems Laboratory Department of Electrical and Computer Engineering Clemson University Clemson SC 29634 USA Tel: +1 864-6565936
The state estimators used in real-time power system control centers now process bad data as a standard routine. With the introduction and deployment of phasor measurement units (PMUs), it is possible to model power sy... 详细信息
来源: 评论
Principal Component Analysis Anomaly Detector for Rotor Broken Bars
Principal Component Analysis Anomaly Detector for Rotor Brok...
收藏 引用
Annual Conference of the IEEE Industrial Electronics Society
作者: Mohammed Obaid Mustafa George Georgoulas George Nikolakopoulos Control Engineering Group Department of Computer Science Electrical and Space Engineering Lulea University of Technology Laboratory of Knowledge and Intelligent Computing (KIC) Department of Computer Engineering Technological Educational Institute of Epirus
In this article a method for the detection of broken rotor bars in asynchronous machines operating under full load is presented. Unlike most Motor Current Signature Analysis (MCSA) approaches, which operate in the fre... 详细信息
来源: 评论
Detecting Integrity Attacks on control systems using Robust Physical Watermarking
Detecting Integrity Attacks on Control Systems using Robust ...
收藏 引用
IEEE Annual Conference on Decision and control
作者: Sean Weerakkody Yilin Mo Bruno Sinopoli Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA USA 15213 Control and Dynamical Systems Department of California Institute of Technology
Ensuring the security of control systems against integrity attacks is a major challenge. Due to the events of Stuxnet, replay attacks in particular have been considered by the research community. Replaying previous me... 详细信息
来源: 评论
Flexible triangular formation keeping of marine robotic vehicles using range measurements  19
Flexible triangular formation keeping of marine robotic vehi...
收藏 引用
19th IFAC World Congress on International Federation of Automatic control, IFAC 2014
作者: Rego, Francisco Soares, Jorge M. Pascoal, António Aguiar, A. Pedro Jones, Colin Laboratory of Robotics and Systems in Engineering and Science Instituto Superior Técnico University of Lisbon Lisbon Portugal Department of Electrical and Computer Engineering Faculty of Engineering University of Porto Porto Portugal Institute of Mechanical Engineering School of Engineering École Polytechnique Fédérale de Lausanne Lausanne Switzerland Distributed Intelligent Systems and Algorithms Laboratory School of Architecture Civil and Environmental Engineering École Polytechnique Fédérale de Lausanne Lausanne Switzerland National Institute of Oceanography Dona Paula Goa India
This paper addresses the problem of keeping an autonomous marine vehicle in a moving triangular formation by regulating its position with respect to two leader vehicles. The follower vehicle has no prior knowledge of ... 详细信息
来源: 评论
Applications of Brain–Machine Interface systems in Stroke Recovery and Rehabilitation
收藏 引用
Current Physical Medicine and Rehabilitation Reports 2014年 第2期2卷 93-105页
作者: Venkatakrishnan, Anusha Francisco, Gerard E. L. Contreras-Vidal, Jose Laboratory for Non-invasive Brain–Machine Interface Systems Department of Electrical and Computer Engineering University of Houston Houston TX United States Department of Physical Medicine and Rehabilitation University of Texas Health Science Center Houston TX United States NeuroRecovery Research Center TIRR Memorial Hermann Houston Houston TX United States
Stroke is a leading cause of disability, significantly impacting the quality of life (QOL) in survivors, and rehabilitation remains the mainstay of treatment in these patients. Recent engineering and technological adv... 详细信息
来源: 评论
Continuous-time intruder isolation using Unattended Ground Sensors on graphs
Continuous-time intruder isolation using Unattended Ground S...
收藏 引用
2014 American control Conference, ACC 2014
作者: Chen, Hua Kalyanam, Krishna Zhang, Wei Casbeer, David Department of Electrical and Computer Engineering Ohio State University Columbus OH 43210 United States InfoSciTex Corporation Dayton OH 45431 United States Autonomous Control Branch Air Force Research Laboratory Wright-Patterson AFB OH 45433 United States
This paper studies the continuous-time intruder isolation problem on a general road network graph under delayed information scenario. Several Unattended Ground Sensors (UGSs) are pre-installed along certain edges of t... 详细信息
来源: 评论
Networked systems with incomplete information
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Wang, Zidong Shen, Bo Dong, Hongli He, Xiao Hu, Jun Department of Computer Science Brunel University London Uxbridge Middlesex UB8 3PH United Kingdom School of Information Science and Technology Donghua University Shanghai 200051 China College of Electrical and Information Engineering Northeast Petroleum University Daqing 163318 China Research Institute of Intelligent Control and Systems Harbin Institute of Technology Harbin 150001 China Department of Automation Tsinghua University Beijing 100084 China Department of Applied Mathematics Harbin University of Science and Technology Harbin 150080 China
来源: 评论
Method to Improve the Performance of Communication-Based Train control(CBTC) systems with Transmission Delays and Packet Drops
Method to Improve the Performance of Communication-Based Tra...
收藏 引用
17th International IEEE Conference on Intelligent Transportation systems & The Asia-Pacific Council on systems engineering Conference 2014
作者: Bing Bu Fei Richard Yu Tao Tang State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Department of Systems and Computer Engineering Carleton University
Communication-based train control(CBTC)systems use wireless local area networks(WLANs)for trainground *** delays and packet drops may cause unnecessary tractions and brakes of trains,degradation of riding comfortabili... 详细信息
来源: 评论
Prediction of Atheromatic Plaque Evolution in Carotids using Features extracted from the Arterial Geometry
Prediction of Atheromatic Plaque Evolution in Carotids using...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society
作者: Paschalis A. Bizopoulos Antonis I. Sakellarios Dimitrios D. Koutsouris Jannis Kountouras Lazaros Kostretzis Stella Karagergou Lampros K. Michalis Dimitrios I. Fotiadis the Biomedical Engineering Laboratory School of Electrical and Computer Engineering National Technical University of Athens (NTUA) GR 15773 Zografou Athens Greece the Unit of Medical Technology and Intelligent Information Systems Dept. of Materials Science and Engineering University of Ioannina GR 45110 Ioannina Greece the Department of Medicine Second Medical Clinic Aristotle University of Thessaloniki Ippokration Hospital Thessaloniki Greece the First Orthopaedic Department G.Papanikolaou Hospital GR 5701 Exohi Thessaloniki Greece the Obstetricts and Gynecology Department General Hospital of Serres Ag. Ioannis GR 62100 Serres Greece the Michaelideion Cardiac Center Department of Cardiology in Medical School GR 45110 University of Ioannina Ioannina Greece
Knowing the arterial geometry might be helpful in the assessment of a plaque rupture event. We present a proof of concept study implementing a novel method which can predict the evolution in time of the atheromatic pl... 详细信息
来源: 评论
On YASS’s Non-monotonic Security Performance
收藏 引用
Circuits, systems, and Signal Processing 2014年 第11期33卷 3527-3537页
作者: Yu, Lifang Zhao, Yao Ni, Rongrong Shi, Yun Qing Institute of Information Science Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Signal and Information Processing for High-end Printing Equipments Beijing Institute of Graphic Communication Beijing102600 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
Recently, researchers have discovered unexpected bumps in the detection rate curve of yet another steganographic scheme (YASS). We refer to this abnormal phenomenon as non-monotonic security performance. This paper fi... 详细信息
来源: 评论