咨询与建议

限定检索结果

文献类型

  • 4,249 篇 会议
  • 2,890 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 7,180 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,165 篇 工学
    • 1,924 篇 计算机科学与技术...
    • 1,624 篇 软件工程
    • 1,493 篇 控制科学与工程
    • 697 篇 电气工程
    • 586 篇 信息与通信工程
    • 538 篇 机械工程
    • 513 篇 电子科学与技术(可...
    • 316 篇 生物工程
    • 265 篇 动力工程及工程热...
    • 262 篇 生物医学工程(可授...
    • 250 篇 光学工程
    • 230 篇 仪器科学与技术
    • 209 篇 化学工程与技术
    • 184 篇 交通运输工程
    • 153 篇 土木工程
    • 152 篇 安全科学与工程
    • 131 篇 力学(可授工学、理...
    • 127 篇 建筑学
    • 123 篇 材料科学与工程(可...
  • 2,587 篇 理学
    • 1,361 篇 数学
    • 718 篇 系统科学
    • 580 篇 物理学
    • 399 篇 统计学(可授理学、...
    • 390 篇 生物学
    • 190 篇 化学
  • 881 篇 管理学
    • 633 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 238 篇 工商管理
  • 273 篇 医学
    • 219 篇 临床医学
    • 184 篇 基础医学(可授医学...
  • 111 篇 法学
  • 96 篇 经济学
  • 46 篇 农学
  • 33 篇 教育学
  • 14 篇 军事学
  • 9 篇 文学
  • 8 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 312 篇 control systems
  • 137 篇 computational mo...
  • 135 篇 optimization
  • 126 篇 feature extracti...
  • 126 篇 mathematical mod...
  • 123 篇 stability analys...
  • 90 篇 robust control
  • 89 篇 optimal control
  • 87 篇 uncertainty
  • 85 篇 trajectory
  • 85 篇 nonlinear system...
  • 84 篇 neural networks
  • 81 篇 automatic contro...
  • 79 篇 linear systems
  • 78 篇 predictive model...
  • 77 篇 computer science
  • 75 篇 robots
  • 75 篇 process control
  • 75 篇 linear matrix in...
  • 72 篇 convergence

机构

  • 211 篇 school of contro...
  • 126 篇 school of comput...
  • 68 篇 institute of com...
  • 65 篇 beijing institut...
  • 64 篇 division of deci...
  • 60 篇 department of co...
  • 48 篇 department of el...
  • 39 篇 ieee
  • 37 篇 college of compu...
  • 35 篇 school of electr...
  • 32 篇 college of compu...
  • 31 篇 state key labora...
  • 27 篇 university of ch...
  • 26 篇 school of comput...
  • 26 篇 institute of com...
  • 26 篇 institute of aut...
  • 25 篇 institute of con...
  • 24 篇 the state key la...
  • 24 篇 school of contro...
  • 23 篇 space control an...

作者

  • 102 篇 johansson karl h...
  • 86 篇 eric rogers
  • 58 篇 krzysztof galkow...
  • 36 篇 wojciech paszke
  • 35 篇 karl h. johansso...
  • 33 篇 galkowski krzysz...
  • 33 篇 e. rogers
  • 32 篇 johansson karl h...
  • 31 篇 tóth roland
  • 28 篇 rojas cristian r...
  • 25 篇 el-sayed m.el-ke...
  • 23 篇 fei-yue wang
  • 22 篇 huijun gao
  • 22 篇 mengchu zhou
  • 21 篇 henrik sandberg
  • 21 篇 d.h. owens
  • 21 篇 dimarogonas dimo...
  • 18 篇 abdelaziz a.abde...
  • 18 篇 j. bokor
  • 18 篇 krzysztof gałkow...

语言

  • 6,803 篇 英文
  • 264 篇 其他
  • 103 篇 中文
  • 6 篇 日文
  • 4 篇 朝鲜文
  • 3 篇 德文
  • 2 篇 俄文
  • 1 篇 法文
检索条件"机构=Institute of Control and Computer Engineering"
7180 条 记 录,以下是601-610 订阅
排序:
Magnetoelastic coupling driven magnon gap in a honeycomb antiferromagnet
收藏 引用
Physical Review B 2024年 第10期110卷 104419页
作者: Jeongheon Choe Andrey Baydin Gaihua Ye Bowen Ma Cynthia Nnokwe Martin Rodriguez-Vega David Lujan Swati Chaudhary Fuyang Tay Jiaming He Hiroyuki Nojiri Jianshi Zhou Gregory A. Fiete Junichiro Kono Rui He Xiaoqin Li Department of Physics Center of Complex Quantum Systems Center for Dynamics and Control of Materials Department of Electrical and Computer Engineering Smalley–Curl Institute Department of Physics Applied Physics Graduate Program Smalley–Curl Institute Department of Mechanical Engineering Institute for Materials Research Department of Physics and Astronomy Department of Materials Science and NanoEngineering
Cobalt titanate, CoTiO3, is a honeycomb antiferromagnet recently confirmed experimentally to host Dirac magnons, topological spin-orbit excitons, and chiral phonons. Here, we investigate a magnon gap at the zone cente... 详细信息
来源: 评论
An Efficient Impersonation Attack Detection Method in Fog Computing
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 267-281页
作者: Jialin Wan Muhammad Waqas Shanshan Tu Syed Mudassir Hussain Ahsan Shah Sadaqat Ur Rehman Muhammad Hanif Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering Ghulam Ishaq Khan Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Electronics Engineering FICTBalochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Computer Science Namal InstituteMianwali42200Pakistan
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s *** the fog layer is located between cloud and end-users,it can provide more convenience and timely services to **... 详细信息
来源: 评论
Performance Creativity Enhancement Method Based on Emotional Analysis and Concentration
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第3期8卷 1019-1048页
作者: Liu, Chang Zhang, Longfei Huang, Tianyu Wu, Yufeng Zhang, Fuquan Lin, Qi Department of Computer Science and Technology Beijing Institute of Technology 100081 China Beijing Key Laboratory of Digital Performance and Simulation Technology 100081 China College of Computer and Control Engineering Minjiang University Fuzhou350108 China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu610021 China Informatics King’s College London LondonWC2R 2LS United Kingdom
Intelligent performance creativity is a new research direction of the intersection of technology and art. At present, the cutting-edge technologies such as computer simulation, emotional computing and machine learning... 详细信息
来源: 评论
Research on Grayscale Images Flame Detections Based on Colorazion Algorithm and YOLOv8
Research on Grayscale Images Flame Detections Based on Color...
收藏 引用
IEEE International Workshop on Imaging Systems and Techniques (IST)
作者: Peng Liu Zhenfu Sun Biao Zhou Hongyu Wang Haozhen Qu Institute of Energy and Electrical Engineering Changchun University of Science and Technology Changchun China School of Control and Computer Engineering North China Electric Power University Beijing China
Flame detection algorithms are crucial for real-time fire monitoring using surveillance cameras. Current flame detection algorithms perform excellently on color cameras; however, many night vision cameras can only cap... 详细信息
来源: 评论
Parallel Byzantine fault tolerance method for blockchain
Parallel Byzantine fault tolerance method for blockchain
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Dubey, Kumar Pradyot Gnanaprakasam, C.N. Khan, Ihtiram Raza Sadik, Md Shibli Al-Farhani, Liwa H. Ray, Samrat Department of Computer and Information Science Jagadguru Ram Bhadracharya Divyanga University UP Chitrakoot India Department of Electronics and Instrumentation Engineering St. Joseph’s College of Engineering Tamilnadu Chennai India Computer Science Department Jamia Hamdard Delhi India University of Portsmouth Portsmouth United Kingdom System Analysis Control and Information Processing Dep Academy of Engineering RUDN University Moscow Russia The Institute of Industrial Management Economics and Trade Peter The Great Saint Petersburg Polytechnic University Russia
Enterprise-focused blockchain applications that offer safe, anonymous, and immutable transactions are growing as blockchain technology matures. Traditional blockchain architecture has low performance and scalability, ... 详细信息
来源: 评论
Supervised reinforcement learning based trajectory tracking control for autonomous vehicles ⁎
收藏 引用
IFAC-PapersOnLine 2024年 第10期58卷 140-145页
作者: András Mihály Van Tan Vu Trong Tu Do Péter Gáspár Systems and Control Laboratory Institute for Computer Science and Control (SZTAKI) Hungarian Research Network Kende u. 13-17 H-1111 Budapest Hungary Department of Automotive Mechanical Engineering Faculty of Mechanical Engineering University of Transport and Communications Hanoi Vietnam Mechanical and Power Engineering Faculty Electric Power University Hanoi Vietnam
Recent developments in autonomous vehicle technologies and applications gain a lot of interest by the public, as the popularity of both driver assistance and automated driving systems increase. One of the most promisi... 详细信息
来源: 评论
scIAC: clustering scATAC-seq data based on Student's t-distribution similarity imputation and denoising autoencoder
scIAC: clustering scATAC-seq data based on Student's t-distr...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Lan, Wei Ye, Jin Sun, Xun Zhu, Xiaoshu Chen, Qingfeng Pan, Yi Guangxi University School of Computer Electronic and Information Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning China School of Computer Electronic and Information Guangxi University Nanning China Yulin Normal University School of Computer Science and Engineering Yulin China School of Computer Science and Control Engineering Shenzhen Institute of Advanced Technology Shenzhen China
Assay of single cell transposase-accessible chromatin with high-throughput sequencing (scATAC-seq) have enabled massively profiling of the chromatin accessibility landscape at the single-cell level. The essential step... 详细信息
来源: 评论
Advancing Medical Innovation through Blockchain-Secured Federated Learning for Smart Health
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Khan, Salabat Khan, Mansoor Khan, Muhammad Asghar Wang, Lu Wu, Kaishun Qilu Institute of Technology School of Computer and Information Engineering Jinan China Qilu Institute of Technology School of Intelligent Manufacturing and Control Engineering Jinan China Prince Mohammad Bin Fahd University Department of Electrical Engineering P.O. Box 1664 Al-Khobar31952 Saudi Arabia Shenzhen University College of Computer Science and Software Engineering Shenzhen China Thrust Guangzhou China
The rapid digitization of healthcare systems has led to a vast accumulation of electronic medical records (EMRs), offering an invaluable source of patient data that can significantly advance medical research and impro... 详细信息
来源: 评论
Robust Parameter Estimation with Orthogonal Regression Using Interval Constraint Satisfaction Technique
Robust Parameter Estimation with Orthogonal Regression Using...
收藏 引用
Intelligent and Fuzzy Systems - Intelligence and Sustainable Future Proceedings of the INFUS 2023 Conference
作者: Raval, Sejal K. Raval, Kamlesh N. Makwana, Dipesh P. Kotak, Paresh Instrument and Control Department Government Polytechnic Ahmedabad India Computer Engineering Department R.C.Technical Institute Ahmedabad India I.C. Department L.D. College of Engineering Ahmedabad India S. and S. Gandhi College Surat India
Parameter estimation is a first and foremost task to design a proper mathematical model. Outliers in a data can often lead to improper parameter estimation. In present work a novel technique using interval constraint ... 详细信息
来源: 评论
Secure Recursive State Estimation of Networked Systems Against Eavesdropping: A Partial-Encryption-Decryption Method
收藏 引用
IEEE Transactions on Automatic control 2024年 第6期70卷 3681-3694页
作者: Zou, Lei Wang, Zidong Shen, Bo Dong, Hongli Donghua University College of Information Science and Technology Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of Education Shanghai201620 China Brunel University London Department of Computer Science UxbridgeUB8 3PH United Kingdom Northeast Petroleum University Artificial Intelligence Energy Research Institute Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Daqing163318 China
This paper addresses the problem of secure recursive state estimation for a networked linear system, which may be vulnerable to interception of transmitted measurement data by eavesdroppers. To effectively protect inf... 详细信息
来源: 评论