咨询与建议

限定检索结果

文献类型

  • 14,810 篇 会议
  • 7,378 篇 期刊文献
  • 87 册 图书

馆藏范围

  • 22,275 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 13,002 篇 工学
    • 6,314 篇 计算机科学与技术...
    • 5,395 篇 软件工程
    • 4,455 篇 控制科学与工程
    • 2,399 篇 电气工程
    • 2,016 篇 信息与通信工程
    • 1,680 篇 机械工程
    • 1,548 篇 电子科学与技术(可...
    • 996 篇 动力工程及工程热...
    • 952 篇 生物工程
    • 797 篇 仪器科学与技术
    • 780 篇 生物医学工程(可授...
    • 725 篇 光学工程
    • 581 篇 化学工程与技术
    • 493 篇 交通运输工程
    • 415 篇 土木工程
    • 406 篇 安全科学与工程
    • 398 篇 力学(可授工学、理...
    • 363 篇 建筑学
    • 344 篇 材料科学与工程(可...
  • 7,420 篇 理学
    • 4,043 篇 数学
    • 2,002 篇 系统科学
    • 1,701 篇 物理学
    • 1,191 篇 统计学(可授理学、...
    • 1,094 篇 生物学
    • 524 篇 化学
  • 2,751 篇 管理学
    • 1,939 篇 管理科学与工程(可...
    • 865 篇 图书情报与档案管...
    • 733 篇 工商管理
  • 681 篇 医学
    • 566 篇 临床医学
    • 473 篇 基础医学(可授医学...
  • 335 篇 法学
  • 301 篇 经济学
  • 157 篇 农学
  • 131 篇 教育学
  • 37 篇 军事学
  • 25 篇 文学
  • 25 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 946 篇 control systems
  • 373 篇 mathematical mod...
  • 311 篇 computational mo...
  • 268 篇 neural networks
  • 268 篇 optimization
  • 256 篇 robustness
  • 235 篇 robust control
  • 231 篇 feature extracti...
  • 227 篇 computer science
  • 201 篇 stability analys...
  • 187 篇 deep learning
  • 171 篇 predictive model...
  • 168 篇 uncertainty
  • 166 篇 simulation
  • 165 篇 support vector m...
  • 154 篇 nonlinear system...
  • 153 篇 computer archite...
  • 153 篇 educational inst...
  • 145 篇 image segmentati...
  • 144 篇 training

机构

  • 1,267 篇 school of contro...
  • 200 篇 school of comput...
  • 186 篇 school of contro...
  • 182 篇 college of compu...
  • 167 篇 school of comput...
  • 105 篇 college of contr...
  • 104 篇 department of el...
  • 102 篇 school of contro...
  • 101 篇 college of compu...
  • 88 篇 department of co...
  • 80 篇 college of compu...
  • 69 篇 department of co...
  • 68 篇 institute of com...
  • 59 篇 ieee
  • 57 篇 department of co...
  • 55 篇 college of compu...
  • 50 篇 department of co...
  • 50 篇 fujian provincia...
  • 45 篇 school of electr...
  • 41 篇 hubei key labora...

作者

  • 87 篇 johansson karl h...
  • 63 篇 e. rogers
  • 57 篇 krzysztof galkow...
  • 42 篇 jiming chen
  • 39 篇 byung-ju yi
  • 35 篇 ondrej krejcar
  • 34 篇 macii enrico
  • 33 篇 galkowski krzysz...
  • 33 篇 karl h. johansso...
  • 32 篇 li li
  • 32 篇 wu kehe
  • 30 篇 li yuancheng
  • 30 篇 wei li
  • 30 篇 yang yang
  • 29 篇 bo ai
  • 28 篇 wang lei
  • 28 篇 rojas cristian r...
  • 28 篇 chen zengqiang
  • 26 篇 hou guolian
  • 26 篇 fu minyue

语言

  • 21,392 篇 英文
  • 476 篇 其他
  • 389 篇 中文
  • 18 篇 日文
  • 7 篇 朝鲜文
  • 4 篇 德文
  • 3 篇 法文
检索条件"机构=Control and Computer Engineering"
22275 条 记 录,以下是131-140 订阅
排序:
control Interval Reconstruction of Floating Wind Turbine Based on Response Characteristics  22
Control Interval Reconstruction of Floating Wind Turbine Bas...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Zhou, Jingfeng Song, Ziqiu Fang, Fang School of Control and Computer Engineering North China Electric Power University Beijing China
The oscillatory movement, aerodynamic damping effect, gyroscopic effect, and other phenomena in floating wind turbines result in distinct response characteristics of output and load under varying wind-wave coupling sc... 详细信息
来源: 评论
Resilient control Strategies for Multi-Area Interconnected Power Systems: Combating External FDI Attacks with UIO and Adaptive control  2
Resilient Control Strategies for Multi-Area Interconnected P...
收藏 引用
2nd International Conference on Cyber-Energy Systems and Intelligent Energy, ICCSIE 2024
作者: Zheng, Zhou School of Control and Computer Engineering North China Electric Power University Beijing China
This work proposes a robust control technique to mitigate false data injection (FDI) attacks on multi-region interconnected power systems. The strategy is based on unknown input observer (UIO) and adaptive control. In... 详细信息
来源: 评论
Graph Dual Adversarial Network for Hyperspectral Image Classification
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第4期4卷 922-932页
作者: Cheng, Yuhu Chen, Yang Kong, Yi Philip Chen, C.L. Wang, Xuesong China University of Mining and Technology Engineering Research Center of Intelligent Control for Underground Space Ministry of EducationSchool of Information and Control Engineering Xuzhou221116 China South China University of Technology School of Computer Science and Engineering Guangzhou510006 China
An end-to-end unsupervised domain adaptation method for hyperspectral image (HSI) classification based on a graph dual adversarial network is proposed in this article. First, in order to extract the domain-invariant f... 详细信息
来源: 评论
MedSyn: Medical Image Synthesis of Brain Magnetic Resonance Images Based on Hybrid Information Aggregation  8
MedSyn: Medical Image Synthesis of Brain Magnetic Resonance ...
收藏 引用
8th International Conference on Communication, Image and Signal Processing, CCISP 2023
作者: Jiang, Minbo Song, Zhiwei Zhu, Chuanzhen Wang, Yi School of Computer and Control Engineering Yantai University Yantai China
Magnetic resonance imaging (MRI) is widely used in clinical scenarios. However, acquisition of certain image modalities may be in limitation due to multiple considerations such as time duration and labor costs. Hence,... 详细信息
来源: 评论
Towards Autonomous computer Networks in Support of Critical Systems  36
Towards Autonomous Computer Networks in Support of Critical ...
收藏 引用
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023
作者: Sacco, Alessio Marchetto, Guido Politecnico di Torino Department of Control and Computer Engineering Italy
A recent trend dictating evolution of management and orchestration of computer networks is constituted by the softwarization and virtualization of them, which have drastically simplified the deployment and real-time r... 详细信息
来源: 评论
EFFNet: Semantic Segmentation Network for Enhanced Feature Fusion in Traffic Scenes  3
EFFNet: Semantic Segmentation Network for Enhanced Feature F...
收藏 引用
3rd International Conference on computer Graphics, Image, and Virtualization, ICCGIV 2023
作者: Zhang, Shiwei Liu, Qicheng College of Computer and control engineering Yantai University Yantai China
Semantic segmentation of high-resolution traffic scene images is a challenging task due to complex backgrounds, diverse object shapes, similar appearances of multiple objects, and multi-scale characteristics of the sa... 详细信息
来源: 评论
Design of temperature and humidity control device for substation terminal cabinet  6
Design of temperature and humidity control device for substa...
收藏 引用
6th IEEE International Conference on Automation, Electronics and Electrical engineering, AUTEEE 2023
作者: Yumu, Chen Jingjing, Su Zihan, Zhang Chengpu, Song Xin, Chen Jiancheng, Sheng Minjiang University College of Computer and Control Engineering Fuzhou China
Based on the substation outdoor box cabinet in the operation process, which is prone to condensation and overheating, this paper designs a temperature and humidity control device for outdoor box cabinet of substation ... 详细信息
来源: 评论
Neural Reactivity to Haptics: Virtual Tasks Versus Physical Tasks
收藏 引用
IEEE Sensors Journal 2024年 第7期24卷 11817-11828页
作者: Liu, Yi-Hung Vaitheeshwari, R. Yeh, Shih-Ching Wu, Eric Hsiao-Kuang Institute of Electrical and Control Engineering National Yang Ming Chiao Tung University Hsinchu300093 Taiwan National Central University Department of Computer Science and Information Engineering Taoyuan320 Taiwan
This study investigates the effectiveness of haptic feedback in hand rehabilitation exercises, within both virtual reality (VR) and real-world settings, to enhance upper limb functionality in post-stroke recovery. We ... 详细信息
来源: 评论
Near-Source Attack for Isolated Networks with Covert Channel Transmission  10
Near-Source Attack for Isolated Networks with Covert Channel...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Ruan, Zhiqiang Yang, Yuchen Chen, Lejia Minjiang University College of Computer and Control Engineering Fuzhou China
This paper investigates a new attack method called "near-source attack". It leverages the broadcast frames of the 802.11 protocol to establish a hidden tunnel and bypass physical isolation networks or air-ga... 详细信息
来源: 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论