咨询与建议

限定检索结果

文献类型

  • 1,366 篇 会议
  • 938 篇 期刊文献
  • 11 册 图书

馆藏范围

  • 2,315 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,392 篇 工学
    • 713 篇 计算机科学与技术...
    • 612 篇 软件工程
    • 436 篇 控制科学与工程
    • 226 篇 电气工程
    • 212 篇 信息与通信工程
    • 187 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 110 篇 光学工程
    • 110 篇 生物工程
    • 94 篇 生物医学工程(可授...
    • 85 篇 仪器科学与技术
    • 84 篇 交通运输工程
    • 74 篇 化学工程与技术
    • 72 篇 动力工程及工程热...
    • 52 篇 力学(可授工学、理...
    • 47 篇 安全科学与工程
    • 45 篇 材料科学与工程(可...
    • 43 篇 土木工程
    • 43 篇 航空宇航科学与技...
  • 797 篇 理学
    • 395 篇 数学
    • 254 篇 物理学
    • 159 篇 系统科学
    • 128 篇 统计学(可授理学、...
    • 126 篇 生物学
    • 68 篇 化学
  • 299 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 82 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 95 篇 医学
    • 78 篇 临床医学
    • 58 篇 基础医学(可授医学...
  • 29 篇 法学
  • 26 篇 经济学
  • 22 篇 教育学
  • 19 篇 农学
  • 5 篇 军事学
  • 4 篇 文学
  • 3 篇 艺术学
  • 1 篇 哲学

主题

  • 62 篇 control systems
  • 55 篇 computational mo...
  • 45 篇 mathematical mod...
  • 43 篇 robustness
  • 42 篇 feature extracti...
  • 37 篇 neural networks
  • 36 篇 accuracy
  • 34 篇 training
  • 33 篇 optimization
  • 27 篇 mobile robots
  • 26 篇 predictive model...
  • 26 篇 machine learning
  • 26 篇 uncertainty
  • 26 篇 data models
  • 25 篇 heuristic algori...
  • 24 篇 reinforcement le...
  • 24 篇 algorithm design...
  • 24 篇 automatic contro...
  • 23 篇 trajectory
  • 23 篇 adaptive control

机构

  • 52 篇 school of comput...
  • 36 篇 school of contro...
  • 29 篇 school of contro...
  • 29 篇 college of artif...
  • 27 篇 school of artifi...
  • 20 篇 institute for pl...
  • 20 篇 cloud computing ...
  • 20 篇 beijing engineer...
  • 19 篇 department of co...
  • 19 篇 university of so...
  • 19 篇 college of elect...
  • 19 篇 institute of com...
  • 18 篇 department of as...
  • 18 篇 college of contr...
  • 18 篇 department of co...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 department of ph...

作者

  • 50 篇 gang xiong
  • 28 篇 xiong gang
  • 25 篇 zhen shen
  • 23 篇 stjepan bogdan
  • 20 篇 el-sayed m.el-ke...
  • 20 篇 xiwang dong
  • 19 篇 shukai duan
  • 19 篇 lidan wang
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 xisong dong
  • 18 篇 zhang ren
  • 18 篇 wei xing zheng
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon

语言

  • 2,224 篇 英文
  • 69 篇 其他
  • 23 篇 中文
检索条件"机构=Control and Computing Engineering"
2315 条 记 录,以下是281-290 订阅
排序:
A Smarter Pavlovian Dog with Optically Modulated Associative Learning in an Organic Ferroelectric Neuromem
收藏 引用
Research 2021年 第1期2021卷 1148-1157页
作者: Mengjiao Pei Changjin Wan Qiong Chang Jianhang Guo Sai Jiang Bowen Zhang Xinran Wang Yi Shi Yun Li National Laboratory of Solid-State Microstructures School of Electronic Science and EngineeringCollaborative Innovation Center of Advanced MicrostructuresNanjing UniversityNanjing 210093China School of Computing Tokyo Institute of TechnologyTokyo 152-8550Japan School of Microelectronics and Control Engineering Changzhou UniversityChangzhou 213164China
Associative learning is a critical learning principle uniting discrete ideas and percepts to improve individuals’***,enabling high tunability of the association processes as in biological counterparts and thus integr... 详细信息
来源: 评论
LF-PGVIO: A Visual-Inertial-Odometry Framework for Large Field-of-View Cameras using Points and Geodesic Segments
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-13页
作者: Wang, Ze Yang, Kailun Shi, Hao Zhang, Yufan Xu, Zhijie Gao, Fei Wang, Kaiwei State Key Laboratory of Extreme Photonics and Instrumentation School of Robotics and the National Engineering Research Center of Robot Visual Perception and Control Technology Hunan University Changsha China School of Computing and Engineering University of Huddersfield Huddersfield U.K State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou China
In this paper, we propose LF-PGVIO, a Visual-Inertial-Odometry (VIO) framework for large Field-of-View (FoV) cameras with a negative plane using points and geodesic segments. The purpose of our research is to unleash ... 详细信息
来源: 评论
Hierarchical Multiview Top-k Pooling with Deep-Q-Networks
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2985-2996页
作者: Li, Zhi-Peng Su, Hai-Long Wu, Yong- Zhang, Qin-Hu Yuan, Chang-An Gribova, Valeriya Filaretov, Vladimir Fedorovich Huang, De-Shuang Eastern Institute of Technology Zhejiang Ningbo315201 China University of Science and Technology of China School of Life Sciences Anhui Hefei230026 China Tongji University Institute of Machine Learning and Systems Biology School of Electronics and Information Engineering Shanghai201804 China Guangxi Academy of Sciences Institute of Big Data and Intelligent Computing Research Center Nanning530007 China Far Eastern Branch of the Russian Academy of Sciences Institute of Automation and Control Processes Vladivostok690041 Russia
Graph neural networks (GNNs) are extensions of deep neural networks to graph-structured data. It has already attracted widespread attention for various tasks such as node classification and link prediction. Existing r... 详细信息
来源: 评论
IRS-Aided Mobile Edge computing for Mine IoT Networks using Deep Reinforcement Learning
IRS-Aided Mobile Edge Computing for Mine IoT Networks using ...
收藏 引用
2023 IEEE/CIC International Conference on Communications in China, ICCC 2023
作者: Zhang, Peng Min, Minghui Xiao, Jiayang Li, Shiyin Zhang, Hongliang China University of Mining and Technology School of Information and Control Engineering Xuzhou221116 China Xuzhou First People's Hospital Xuzhou221116 China Ministry of Education School of CyberScience and Engineering Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China Peking University School of Electronics Beijing100871 China
Recent years have witnessed a growing interest in implementing mobile edge computing (MEC) into mine Internet of Things (IoT) networks to enable real-time monitoring and safety management. However, the spatial blockag... 详细信息
来源: 评论
Performance Analysis of Quaternion vs Euler-based Approaches in Reduced INS/GNSS Fusion Techniques
Performance Analysis of Quaternion vs Euler-based Approaches...
收藏 引用
2023 International Telecommunications Conference, ITC-Egypt 2023
作者: Tarek, Maher Zahran, Shady Radi, Ahmed Nafea, Sherif F Oda, Eyad S. Hafez, Alaa El-Din Sayed Technical Researches and Development Center Control and Navigation Departement Cairo Egypt Arab Academy for Science Technology and Maritime Transport College of Computing and Information Technology Cairo Egypt Technical Researches Center Cairo Egypt Suez Canal University Electrical Engineering Department Cairo Egypt Alexandria University Electrical Engineering Affiliate Instructor Cairo Egypt
Unmanned vehicle navigation using various combination of sensors in different fields, civilian or military, has always known to be a challenging and nontrivial task. Bayesian filter algorithms are usually being used f... 详细信息
来源: 评论
Optimizing Human Activity Recognition Using Stacked CNN with Ensemble Learning
收藏 引用
Procedia Computer Science 2025年 258卷 1598-1607页
作者: Divya Yadav Deepika Rani Om Parakash Verma Department of Mathematics and Computing Dr B R Ambedkar National Institute of Technology Jalandhar Jalandhar Punjab India Department of Instrumentation and Control Engineering Dr B R Ambedkar National Institute of Technology Jalandhar Jalandhar Punjab India
In recent times, Human Activity Recognition (HAR) plays a crucial role in numerous artificial intelligence applications, including surveillance, healthcare, and security. However, the primary challenges in accurately ... 详细信息
来源: 评论
Learning to Learn Transferable Generative Attack for Person Re-Identification
收藏 引用
IEEE Transactions on Image Processing 2025年 PP卷 PP页
作者: Bian, Yuan Liu, Min Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning-based person re-identification (reid) models are widely employed in surveillance systems and inevitably inherit the vulnerability of deep networks to adversarial attacks. Existing attacks merely consider... 详细信息
来源: 评论
Modality Unified Attack for Omni-Modality Person Re-Identification
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年
作者: Bian, Yuan Liu, Min Yi, Yunqi Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning based person re-identification (re-id) models have been widely employed in surveillance systems. Recent studies have demonstrated that black-box single-modality and cross-modality re-id models are vulner... 详细信息
来源: 评论
A practical PID variable stiffness control and its enhancement for compliant force-tracking interactions with unknown environments
收藏 引用
Science China(Technological Sciences) 2023年 第10期66卷 2882-2896页
作者: ZHANG Xin ZHOU Hao LIU JinGuo JU ZhaoJie LENG YuQuan YANG ChenGuang State Key Laboratory of Robotics Shenyang Institute of AutomationChinese Academy of SciencesShenyang 110016China Institutes for Robotics and Intelligent Manufacturing Chinese Academy of SciencesShenyang 110169China University of Chinese Academy of Sciences Beijing 100049China School of Computing University of PortsmouthPortsmouth PO13HEUK Shenzhen Key Laboratory of Biomimetic Robotics and Intelligent Systems Department of Mechanical and Energy EngineeringSouthern University of Science and TechnologyShenzhen 518055China Key Laboratory of Autonomous Systems and Networked Control College of Automation Science and EngineeringSouth China University of TechnologyGuangzhou 510640China
Compliant interaction control is a key technology for robots performing contact-rich manipulation *** design of the compliant controller needs to consider the robot hardware because complex control algorithms may not ... 详细信息
来源: 评论
A Heuristic Informative-Path-Planning Algorithm to Map Unknown Areas and A Benchmark Solution
A Heuristic Informative-Path-Planning Algorithm to Map Unkno...
收藏 引用
control Technology and Applications (CCTA),
作者: Mobolaji O. Orisatoki Mahdi Amouzadi Arash M. Dizqah Smart Vehicle Control Laboratory (SVeCLab) School of Engineering and Informatics University of Sussex Brighton UK School of Computing and Mathematical Sciences University of Greenwich Greenwich London UK
Informative path planning algorithms are of paramount importance in applications like disaster management to efficiently gather information through a priori unknown environments. This is, however, a complex problem th... 详细信息
来源: 评论