咨询与建议

限定检索结果

文献类型

  • 1,108 篇 会议
  • 825 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,942 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,112 篇 工学
    • 494 篇 控制科学与工程
    • 481 篇 计算机科学与技术...
    • 410 篇 软件工程
    • 204 篇 机械工程
    • 153 篇 电气工程
    • 133 篇 信息与通信工程
    • 92 篇 交通运输工程
    • 90 篇 电子科学与技术(可...
    • 80 篇 生物工程
    • 66 篇 生物医学工程(可授...
    • 59 篇 光学工程
    • 58 篇 动力工程及工程热...
    • 55 篇 仪器科学与技术
    • 51 篇 化学工程与技术
    • 47 篇 土木工程
    • 40 篇 力学(可授工学、理...
    • 36 篇 航空宇航科学与技...
    • 35 篇 建筑学
    • 35 篇 安全科学与工程
  • 633 篇 理学
    • 360 篇 数学
    • 192 篇 系统科学
    • 127 篇 物理学
    • 90 篇 统计学(可授理学、...
    • 88 篇 生物学
    • 40 篇 化学
  • 226 篇 管理学
    • 172 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 36 篇 医学
    • 34 篇 临床医学
  • 32 篇 法学
    • 29 篇 社会学
  • 14 篇 农学
  • 13 篇 经济学
  • 13 篇 军事学
  • 11 篇 教育学
  • 3 篇 艺术学
  • 1 篇 文学

主题

  • 96 篇 control systems
  • 57 篇 automation
  • 57 篇 automatic contro...
  • 53 篇 mathematical mod...
  • 45 篇 robustness
  • 44 篇 trajectory
  • 40 篇 fault detection
  • 39 篇 process control
  • 39 篇 vehicles
  • 37 篇 robust control
  • 36 篇 actuators
  • 33 篇 computational mo...
  • 33 篇 uncertainty
  • 31 篇 feature extracti...
  • 30 篇 optimization
  • 27 篇 fault diagnosis
  • 25 篇 neural networks
  • 24 篇 mobile robots
  • 24 篇 linear systems
  • 23 篇 switches

机构

  • 59 篇 state key labora...
  • 40 篇 school of comput...
  • 38 篇 institute of aut...
  • 33 篇 systems and cont...
  • 28 篇 school of automa...
  • 27 篇 institute of aut...
  • 27 篇 school of contro...
  • 26 篇 systems and cont...
  • 26 篇 ieee
  • 26 篇 the state key la...
  • 22 篇 systems and cont...
  • 21 篇 hubei key labora...
  • 21 篇 university of ch...
  • 20 篇 school of automa...
  • 20 篇 state key labora...
  • 19 篇 computer and aut...
  • 18 篇 the state key la...
  • 18 篇 department of au...
  • 16 篇 qingdao academy ...
  • 16 篇 school of artifi...

作者

  • 95 篇 jan lunze
  • 56 篇 j. bokor
  • 44 篇 lunze jan
  • 36 篇 fei-yue wang
  • 36 篇 bokor józsef
  • 35 篇 gáspár péter
  • 30 篇 l. keviczky
  • 29 篇 johansson karl h...
  • 27 篇 lunze j.
  • 25 篇 bokor j.
  • 22 篇 jozsef bokor
  • 22 篇 katalin m. hango...
  • 22 篇 j. lunze
  • 20 篇 józsef bokor
  • 20 篇 németh balázs
  • 18 篇 péter gáspár
  • 18 篇 hangos katalin m...
  • 18 篇 peter gaspar
  • 17 篇 k.m. hangos
  • 17 篇 yi xinlei

语言

  • 1,865 篇 英文
  • 50 篇 其他
  • 23 篇 中文
  • 4 篇 俄文
检索条件"机构=Institute for Automation and Computer Control"
1942 条 记 录,以下是741-750 订阅
排序:
Research and Optimization of Conflict Search Algorithm for Multi-Agent Path Planning Based on Incremental Heuristic
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2024卷
作者: Yang Li Jun Wang Hualiang Zhang School of Computer Science Shenyang University of Chemical Technology Shenyang 110142 China Key Laboratory of Networked Control Systems Chinese Academy of Sciences Shenyang 110016 China. Shenyang Institute of Automation Chinese Academy of Sciences Shenyang 110016 China. Institutes for Robotics and Intelligent Manufacturing Chinese Academy of Sciences Shenyang 110169 China.
Conflict Based Search(CBS) is used for multi-agent Pathfinding (MAPF) to enable each Agent to reach the target node. The CBS algorithm uses the heuristic algorithm A* search to calculate the MAPF solution, and the pat...
来源: 评论
Convolutional ordinal regression forest for image ordinal estimation
arXiv
收藏 引用
arXiv 2020年
作者: Zhu, Haiping Shan, Hongming Zhang, Yuheng Che, Lingfu Xu, Xiaoyang Zhang, Junping Shi, Jianbo Wang, Fei-Yue The Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai200433 China The Institute of Science and Technology for Brain-inspired Intelligence MOE Frontiers Center for Brain Science Fudan University Shanghai200433 China The Shanghai Center for Brain Science and Brain-inspired Technology Shanghai201210 China The GRASP Laboratory University of Pennsylvania PhiladelphiaPA United States The State Key Laboratory for Management and Control of Complex Systems Institute of Automation Chinese Academy of Sciences Beijing100190 China The Institute of Systems Engineering Macau University of Science and Technology 999078 China The University of Chinese Academy of Sciences Beijing100049 China
Image ordinal estimation is to predict the ordinal label of a given image, which can be categorized as an ordinal regression problem. Recent methods formulate an ordinal regression problem as a series of binary classi... 详细信息
来源: 评论
A method to get analytical redundancy relations for fault diagnosis
收藏 引用
IFAC-PapersOnLine 2017年 第1期50卷 1006-1012页
作者: Lunze J. Ruhr-University Bochum Institute of Automation and Computer Control Bochum D-44780 Germany
The paper proposes a way to derive analytical redundancy relations for diagnosable systems. The starting point is an over-determined set of constraints, which is obtained by a structural analysis of the system under c... 详细信息
来源: 评论
Secure analysis of dynamic networks under pinning attacks against synchronization
arXiv
收藏 引用
arXiv 2019年
作者: Li, Yuzhe Shi, Dawei Chen, Tongwen State Key Laboratory of Synthetical Automation for Process Industries Northeastern University Shenyang110004 State Key Laboratory of Intelligent Control and Decision of Complex Systems School of Automation Beijing Institute of Technology Beijing100081 China Department of Electrical and Computer Engineering University of Alberta EdmontonABT6G 1H9 Canada
In this paper, we first consider a pinning node selection and control gain co-design problem for complex networks. A necessary and sufficient condition for the synchronization of the pinning controlled networks at a h... 详细信息
来源: 评论
A New Anti-Spam Model Based on E-mail Address Concealment Technique
收藏 引用
Wuhan University Journal of Natural Sciences 2018年 第1期23卷 79-83页
作者: ZHANG Yuqiang HE Jingsha XU Jing Beijing Institute of Aerospace Control Devices Beijing100039 China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China School of Software Engineering Beijing University ofTechnology Beijing 100124 China Department of Automation Tsinghua University Beijing100084 China
To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a pi... 详细信息
来源: 评论
Road Detection for autonomous truck in mine environment
Road Detection for autonomous truck in mine environment
收藏 引用
International Conference on Intelligent Transportation
作者: Jianlin Tang Xiaowei Lu Yunfeng Ai Bin Tian Long Chen Jiangsu XCMG Construction Machinery Research Institute LTD Xuzhou China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing China State Key Laboratory of Management and Control for Complex Systems Institute of Automation Beijing China School of Data and Computer Science Sun Yat-Sen University Guangzhou China
Road boundary line detection provides information of safe driving range and ensures the safety of the vehicles, which is an important part in the sensing system. Due to the mine roads are complicated and the road boun... 详细信息
来源: 评论
A New Approach for Face Anti-Spoofing Using Handcrafted and Deep Network Features
A New Approach for Face Anti-Spoofing Using Handcrafted and ...
收藏 引用
IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI
作者: Polash Kumar Das Bin Hu Chang Liu Kaixin Cui Prabhat Ranjan Gang Xiong School of Electronic and Information Engineering South China University of Technology Guangzhou China The State Key Laboratory for Management and Control of Complex Systems Institute of Automation Chinese Academy of Science Beijing China College of Computer Science Sichuan University Chengdu China Beijing Engineering Research Center of Intelligent Systems and Technology Institute of Automation Chinese Academy of Sciences Beijing China The Cloud Computing Center Chinese Academy of Science Dongguan China
In biometrics, face recognition methods are achieving momentum with recent progress in the computer vision(CV). Face recognition is widely used in the identification of an individual's identity. Unfortunately, in ... 详细信息
来源: 评论
Network Resilience
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Xueming Li, Daqing Ma, Manqing Szymanski, Boleslaw K. Eugene Stanley, H. Gao, Jianxi Key Laboratory of Image Information Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China School of Reliability and Systems Engineering Beihang University Beijing100191 China College of Safety Science and Engineering Civil Aviation University of China Tianjin 300300 China Department of Computer Science Rensselaer Polytechnic Institute TroyNY12180 United States Network Science and Technology Center Rensselaer Polytechnic Institute TroyNY12180 United States Center for Polymer Studies Department of Physics Boston University BostonMA02215 United States
Many systems on our planet shift abruptly and irreversibly from the desired state to an undesired state when forced across a "tipping point". Some examples are mass extinctions within ecosystems, cascading f... 详细信息
来源: 评论
The research of the smart office availability model considering patches on the router firewall software  9
The research of the smart office availability model consider...
收藏 引用
9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT 2018
作者: Kharchenko, Vyacheslav Kolisnyk, Maryna Piskachova, Iryna Department of Computer Systems and Networks National Aerospace University 'KhAI' 17 Chkalova Str. Kharkiv61000 Ukraine Automation and Control in Technical Systems Department National Technical University 'Kharkiv Politechnical Institute' 2 Kirpichova Str. Kharkiv61002 Ukraine Department of Computer Science and Control System Ukrainian State University of Railway Transport 7 Feierbakh Square Kharkiv61050 Ukraine
The emergence of the Internet of things (IoT), web of things, when heterogeneous devices need to have access to the Internet, leads to the need to solve serious problems to ensure the reliable and security operation o... 详细信息
来源: 评论
Scheduling for Re-entrant Hybrid Flowshop Based on Wolf Pack Algorithm
Scheduling for Re-entrant Hybrid Flowshop Based on Wolf Pack...
收藏 引用
2018 International Conference on Advanced Materials, Intelligent Manufacturing and automation, AMIMA 2018
作者: Han, Zhonghua Tian, Xutian Ma, Xiaofu Lin, Shuo Faculty of Information and Control Engineering Shenyang Jianzhu University Liaoning110168 China Digital Factory Department Shenyang Institute of Automation CAS Shenyang110016 China Information and Control Engineering Faculty Shenyang Jianzhu University Liaoning110168 China Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24060 United States
In order to solve the scheduling problems of Re-entrant Hybrid Flowshop (RHFS), this paper investigates the mathematical programming model of RHFS, and proposes the wolf pack based algorithm (WPA) as a global optimiza... 详细信息
来源: 评论