咨询与建议

限定检索结果

文献类型

  • 1,119 篇 会议
  • 1,022 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,156 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,244 篇 工学
    • 552 篇 计算机科学与技术...
    • 527 篇 控制科学与工程
    • 471 篇 软件工程
    • 180 篇 电气工程
    • 167 篇 信息与通信工程
    • 157 篇 机械工程
    • 143 篇 电子科学与技术(可...
    • 96 篇 生物工程
    • 76 篇 交通运输工程
    • 69 篇 生物医学工程(可授...
    • 67 篇 动力工程及工程热...
    • 64 篇 仪器科学与技术
    • 57 篇 光学工程
    • 50 篇 化学工程与技术
    • 49 篇 土木工程
    • 40 篇 安全科学与工程
    • 32 篇 航空宇航科学与技...
  • 819 篇 理学
    • 433 篇 数学
    • 294 篇 系统科学
    • 151 篇 统计学(可授理学、...
    • 136 篇 物理学
    • 115 篇 生物学
    • 44 篇 化学
  • 256 篇 管理学
    • 200 篇 管理科学与工程(可...
    • 78 篇 工商管理
    • 71 篇 图书情报与档案管...
  • 72 篇 医学
    • 65 篇 临床医学
    • 52 篇 基础医学(可授医学...
  • 34 篇 法学
    • 30 篇 社会学
  • 31 篇 经济学
    • 31 篇 应用经济学
  • 10 篇 教育学
  • 10 篇 农学
  • 4 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 91 篇 control systems
  • 41 篇 optimization
  • 37 篇 robustness
  • 34 篇 mathematical mod...
  • 33 篇 robust control
  • 32 篇 nonlinear system...
  • 32 篇 vehicles
  • 31 篇 neural networks
  • 31 篇 state estimation
  • 28 篇 uncertainty
  • 27 篇 computational mo...
  • 27 篇 trajectory
  • 26 篇 automatic contro...
  • 26 篇 fault detection
  • 25 篇 stability analys...
  • 25 篇 machine learning
  • 25 篇 controllers
  • 24 篇 linear systems
  • 24 篇 adaptive control
  • 23 篇 automation

机构

  • 33 篇 beijing key labo...
  • 29 篇 division of deci...
  • 26 篇 department of co...
  • 25 篇 computer enginee...
  • 24 篇 ieee
  • 24 篇 school of electr...
  • 23 篇 school of automa...
  • 22 篇 seventh research...
  • 21 篇 division of deci...
  • 21 篇 department of co...
  • 20 篇 delft center for...
  • 20 篇 hubei key labora...
  • 19 篇 department of co...
  • 18 篇 delft center for...
  • 17 篇 division of deci...
  • 17 篇 faculty of artif...
  • 16 篇 department of co...
  • 15 篇 state key labora...
  • 14 篇 department of co...
  • 13 篇 systems and cont...

作者

  • 68 篇 johansson karl h...
  • 33 篇 péter gáspár
  • 33 篇 junping du
  • 33 篇 yingmin jia
  • 27 篇 tóth roland
  • 27 篇 abdelhameed ibra...
  • 25 篇 el-sayed m.el-ke...
  • 24 篇 balázs németh
  • 24 篇 dimarogonas dimo...
  • 24 篇 fashan yu
  • 22 篇 kryjak tomasz
  • 21 篇 karl h. johansso...
  • 21 篇 gáspár péter
  • 19 篇 fei-yue wang
  • 19 篇 rikos apostolos ...
  • 18 篇 abdelaziz a.abde...
  • 17 篇 yi xinlei
  • 16 篇 witold pedrycz
  • 16 篇 doaa sami khafag...
  • 16 篇 johansson karl h...

语言

  • 2,035 篇 英文
  • 106 篇 其他
  • 12 篇 中文
  • 2 篇 俄文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Department of Computer Systems and Control Technology"
2156 条 记 录,以下是181-190 订阅
排序:
Two-Stage Representation Refinement Based on Convex Combination for 3-D Human Poses Estimation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6500-6508页
作者: Chen, Luefeng Cao, Wei Zheng, Biao Wu, Min Pedrycz, Witold Hirota, Kaoru China University of Geosciences School of Automation Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Ministry of Education Engineering Research Center of Intelligent Technology for Geo-Exploration Wuhan430074 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Macau University of Science and Technology Institute of Systems Engineering Taipa999078 China Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Tokyo Institute of Technology Yokohama226-8502 Japan
In the human pose estimation task, on the one hand, 3-D pose always has difficulty in dividing different 2-D poses if the view is limited;on the other hand, it is hard to reduce the lifting ambiguity because of the la... 详细信息
来源: 评论
STARS Assisted Semi-Grant-Free NOMA Communications
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 4904-4919页
作者: Xie, Jin Yue, Xinwei Zhao, Jingjing Zou, Yixuan Liu, Yuanwei Liu, Rongke Ding, Zhiguo Key Laboratory of Information and Communication Systems China Beijing Information Science and Technology University Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing100101 China Beihang University School of Electronic and Information Engineering Beijing100191 China Queen Mary University of London School of Electronic Engineering and Computer Science LondonE1 4NS United Kingdom The University of Hong Kong Department of Electrical and Electronic Engineering Hong Kong Hong Kong Kyung Hee University Department of Electronic Engineering Gyeonggi-do Yongin-si17104 Korea Republic of Khalifa University Department of Computer and Information Engineering Abu Dhabi United Arab Emirates
This paper investigates the performance of simultaneously transmitting and reflecting surface (STARS) assisted semi-grant-free non-orthogonal multiple access network with randomly distributed users. By deploying STARS... 详细信息
来源: 评论
An Advanced Rivest Cipher 4 Algorithm to Transfer Fast and Secure Data Using Li-Fi technology
An Advanced Rivest Cipher 4 Algorithm to Transfer Fast and S...
收藏 引用
IEEE International Conference on System Engineering and technology
作者: Mohammed Majid Msallam Refik Samet Computer Engineering Department Ankara University Ankara Turkey Control and Systems Engineering Department University of Technology Baghdad Iraq
The Light-Fidelity (Li-Fi) is a wireless communication technology that is light-based and can complete wireless fidelity (Wi-Fi) technologies for many applications. Li-Fi technology which uses light spectrum is a tech...
来源: 评论
Stress Matrix-Based Formation control of Multi-Agent systems with Discrete-Time Communication  12
Stress Matrix-Based Formation Control of Multi-Agent Systems...
收藏 引用
2024 12th International Conference on systems and control, ICSC 2024
作者: Onuoha, Okechi Ubochi, Brendan Chijioke Kurawa, Suleiman Tang, Zezhi Wu, Changshun Dong, Yi University of Hertfordshire United Kingdom Federal University of Technology The Department of Electrical and Electronic Engineering Akure Nigeria University of Manchester The Department of Electrical Engineering United Kingdom University of Sheffield The Department of Automatic Control and Systems Engineering United Kingdom University Grenoble Alpes Grenoble38000 France The School of Electronics & Computer Science University of Southampton United Kingdom
This study addresses the affine formation maneuver control of cooperative multi-agent systems (MAS) having periodic inter-agent communication for both static and dynamic leader cases. Here, we focus on the leader-foll... 详细信息
来源: 评论
Detection of DDoS Attacks with Gaussian Mixture Model  9
Detection of DDoS Attacks with Gaussian Mixture Model
收藏 引用
9th Scholar's Yearly Symposium of technology, Engineering and Mathematics, SYSTEM 2023
作者: Cecchetto, Alessandro Conte, Giuseppa Napoli, Christian Department of Computer Control and Management Engineering Sapienza University of Rome Via Ariosto 25 Roma00185 Italy Institute for Systems Analysis and Computer Science Italian National Research Council Via dei Taurini 19 Roma00185 Italy Department of Computational Intelligence Czestochowa University of Technology Czestochowa42-201 Poland
A Distributed Denial of Service (DDoS) is an attack which aim is to stop or tamper with an online service incapacitating a server with a flood of packages or requests, using internet or intranet. The main aim of the D... 详细信息
来源: 评论
State-Space Piece-Wise Affine System Identification with Online Deterministic Annealing
State-Space Piece-Wise Affine System Identification with Onl...
收藏 引用
European control Conference (ECC)
作者: Christos N. Mavridis Aris Kanellopoulos John S. Baras Karl Henrik Johansson Division of Decision and Control Systems School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Department of Electrical and Computer Engineering and the Institute for Systems Research University of Maryland College Park USA
We propose an online identification scheme for discrete-time piece-wise affine state-space models based on a system of adaptive algorithms running in two timescales. A stochastic approximation algorithm implements an ... 详细信息
来源: 评论
Intelligent Verbal Interaction Methods with Non-Player Characters in Metaverse Applications  5
Intelligent Verbal Interaction Methods with Non-Player Chara...
收藏 引用
5th IEEE International Conference on Advanced Information and Communication Technologies, AICT 2023
作者: Pariy, Vladislav Lipianina-Honcharenko, Khrystyna Brukhanskyi, Ruslan Sachenko, Anatoliy Tkachyk, Fedir Lendiuk, Dmytro West Ukrainian National University Department for Information Computer Systems and Control Ternopil Ukraine West Ukrainian National University Department of Business Analytics and Innovative Engineering Ternopil Ukraine Research Institute for Intelligent Computer Systems West Ukrainian National University Ternopil Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland West Ukrainian National University Department of Taxes and Fiscal Policy Ternopil Ukraine
This article is devoted to the development of Intelligent Verbal Interaction Methods with Non-Player Characters in Metaverse Applications. The creation of a character model using MetaHuman Creator and the implementati... 详细信息
来源: 评论
Toward parallel intelligence: An interdisciplinary solution for complex systems
收藏 引用
The Innovation 2023年 第6期4卷 152-164页
作者: Yong Zhao Zhengqiu Zhu Bin Chen Sihang Qiu Jincai Huang Xin Lu Weiyi Yang Chuan Ai Kuihua Huang Cheng He Yucheng Jin Zhong Liu Fei-Yue Wang College of Systems Engineering National University of Defense TechnologyChangsha 410073China Hunan Institute of Advanced Technology Changsha 410073China Shanghai Institute of Infectious Disease and Biosecurity Shanghai 200032China Institute of Epidemiology Helmholtz Zentrum Minchen-German Research Center for Environmental Health(GmbH)NeuherbergGermany Department of Computer Science Hong Kong Baptist UniversityHong KongChina State Key Laboratory for Management and Control of Complex Systems Institute of AutomationChinese Academy of SciencesBeijing 100190China
The growing complexity of real-world systems necessitates interdisciplinary solutions to confront myriad challenges in modeling,analysis,management,and *** meet these demands,the parallel systems method rooted in the ... 详细信息
来源: 评论
Metaheuristic Optimization Through Deep Learning Classification of COVID-19 in Chest X-Ray Images
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 4193-4210页
作者: Nagwan Abdel Samee El-Sayed M.El-Kenawy Ghada Atteia Mona M.Jamjoom Abdelhameed Ibrahim Abdelaziz A.Abdelhamid Noha E.El-Attar Tarek Gaber Adam Slowik Mahmoud Y.Shams Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh 11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura 35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura 35712Egypt Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh 11671Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Faculty of Computers and Artificial Intelligence Benha UniversityEgypt School of Science Engineeringand EnvironmentUniversity of SalfordUK Faculty of Computers and Informatics Suez Canal UniversityIsmailia41522Egypt Koszalin University of Technology Poland Faculty of Artificial Intelligence Kafrelsheikh UniversityKafrelsheikh33511Egypt
As corona virus disease(COVID-19)is still an ongoing global outbreak,countries around the world continue to take precautions and measures to control the spread of the *** of the excessive number of infected patients a... 详细信息
来源: 评论
Two-Player Incomplete Games of Resilient Multiagent systems
收藏 引用
IFAC-PapersOnLine 2023年 第2期56卷 258-263页
作者: Yurid E. Nugraha Tomohisa Hayakawa Hideaki Ishii Ahmet Cetinkaya Quanyan Zhu Department of Electrical Engineering Institut Teknologi Sepuluh Nopember Surabaya 60111 Indonesia Department of Systems and Control Engineering Tokyo Institute of Technology Tokyo 152-8552 Japan Department of Computer Science Tokyo Insitute of Technology Yokohama 226-8502 Japan Department of Functional Control Systems Shibaura Institute of Technology Tokyo 135-8548 Japan Department of Electrical and Computer Engineering New York University Brooklyn NY 11201 USA
Evolution of agents’ dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this pap...
来源: 评论