咨询与建议

限定检索结果

文献类型

  • 303 篇 会议
  • 98 篇 期刊文献

馆藏范围

  • 401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 309 篇 工学
    • 135 篇 控制科学与工程
    • 128 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 72 篇 机械工程
    • 54 篇 信息与通信工程
    • 44 篇 电气工程
    • 35 篇 动力工程及工程热...
    • 30 篇 仪器科学与技术
    • 30 篇 电子科学与技术(可...
    • 21 篇 化学工程与技术
    • 19 篇 材料科学与工程(可...
    • 18 篇 光学工程
    • 17 篇 力学(可授工学、理...
    • 16 篇 冶金工程
    • 16 篇 交通运输工程
    • 15 篇 生物工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 建筑学
    • 8 篇 土木工程
    • 8 篇 航空宇航科学与技...
  • 171 篇 理学
    • 107 篇 数学
    • 53 篇 系统科学
    • 34 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 19 篇 化学
    • 15 篇 生物学
  • 64 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 13 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 7 篇 经济学
  • 6 篇 医学
  • 5 篇 法学
  • 3 篇 农学
  • 1 篇 文学

主题

  • 11 篇 convergence
  • 11 篇 mathematical mod...
  • 9 篇 sliding mode con...
  • 8 篇 observers
  • 8 篇 optimization
  • 8 篇 backstepping
  • 7 篇 model predictive...
  • 7 篇 wireless sensor ...
  • 7 篇 fuzzy control
  • 6 篇 interference
  • 6 篇 nonlinear system...
  • 6 篇 continuous casti...
  • 5 篇 closed loop syst...
  • 5 篇 servomotors
  • 5 篇 algorithm design...
  • 5 篇 feature extracti...
  • 5 篇 uncertainty
  • 5 篇 accuracy
  • 4 篇 learning systems
  • 4 篇 signal to noise ...

机构

  • 55 篇 key lab of indus...
  • 40 篇 key lab of indus...
  • 20 篇 state key lab. o...
  • 13 篇 dalian universit...
  • 12 篇 key lab. of indu...
  • 12 篇 yanshan universi...
  • 10 篇 national enginee...
  • 10 篇 state key lab. o...
  • 9 篇 school of electr...
  • 9 篇 school of contro...
  • 5 篇 department of el...
  • 5 篇 school of mechan...
  • 5 篇 school of contro...
  • 5 篇 the state key la...
  • 5 篇 key lab of indus...
  • 5 篇 key lab. of indu...
  • 4 篇 college of elect...
  • 4 篇 northeastern uni...
  • 4 篇 research center ...
  • 4 篇 department of el...

作者

  • 20 篇 fang yiming
  • 19 篇 yiming fang
  • 13 篇 jiming chen
  • 13 篇 jianxiong li
  • 12 篇 chen jiming
  • 11 篇 li jianxiong
  • 10 篇 liu le
  • 8 篇 yi-ming fang
  • 7 篇 sun youxian
  • 7 篇 peng cheng
  • 6 篇 liu zhixin
  • 6 篇 xinbin li
  • 6 篇 li xinbin
  • 6 篇 wen shuhuan
  • 6 篇 su hongye
  • 6 篇 shuhuan wen
  • 6 篇 chu jian
  • 6 篇 le liu
  • 5 篇 yin zhenyu
  • 5 篇 liu fucai

语言

  • 373 篇 英文
  • 18 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Industrial Computer Control Engineering"
401 条 记 录,以下是161-170 订阅
排序:
The absence of periodic solutions for pendulum-like systems
The absence of periodic solutions for pendulum-like systems
收藏 引用
作者: Li, Xinbin Jing, Haiyan Key Lab. of Industrial Computer Control Engineering of Hebei Province Yanshan University Qinhuangdao 066004 China
The pendulum-like system is a special nonlinear system with multiple equilibria. Its periodic solutions are different from the universal nonlinear system's. The frequency-domain criteria for the nonexistence of th... 详细信息
来源: 评论
An Improved Included Angle Dividing Method for Multimodel control of Hammerstein Systems
An Improved Included Angle Dividing Method for Multimodel Co...
收藏 引用
第23届过程控制会议
作者: Jingjing Du Chunyue Song Xinliang Zhang State Key Lab. of Industrial Control Technology Institute of Industrial Process Control Zhejiang U State Key Lab. of Industrial Control Technology Institute of Industrial Process Control Zhejiang U School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000
An improved included angle dividing method is proposed for Hammerstein systems. In this dividing method, nonlinearity of the system is taken into account to distribute gridding points, so distribution is more reasonab... 详细信息
来源: 评论
Prediction error method for identification of LPV models
Prediction error method for identification of LPV models
收藏 引用
作者: Zhao, Yu Huang, Biao Su, Hongye Chu, Jian State Key Lab. of Industrial Control Technology Institute of Cyber Systems and Control Zhejiang University Hangzhou China University of Alberta Department of Chemical and Material Engineering Edmonton AB T6G-2G6 Canada
This paper is concerned with identification of linear parameter varying (LPV) systems in an input-output setting with Box-Jenkins (BJ) model structure. Classical linear time invariant prediction error method (PEM) is ... 详细信息
来源: 评论
Multi-step prediction error approach for MPC performance monitoring
Multi-step prediction error approach for MPC performance mon...
收藏 引用
作者: Zhao, Yu Chu, Jian Su, Hongye Huang, Biao State Key Lab. of Industrial Control Technology Institute of Cyber Systems and Control Zhejiang University Hangzhou China Department of Chemical and Materials Engineering University of Alberta Edmonton AB T6G 2G6 Canada
Performance monitoring of model predictive control systems (MPC) has received a great interest from both academia and industry. In recent years some novel approaches for multivariate control performance monitoring hav... 详细信息
来源: 评论
Energy-efficient barrier coverage in bistatic radar sensor networks
Energy-efficient barrier coverage in bistatic radar sensor n...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ruiqi Wang Shibo He Jiming Chen Zhiguo Shi Fen Hou State Key Lab. of Industrial Control Technology Zhejiang University China Department of Electrical and Computer Engineering University of Macau Macau
By taking advantage of active radio waves, radar sensors can provide high-accuracy target detection over traditional passive sensors. In this paper, we study barrier coverage in bistatic radar sensor networks (BRSNs),... 详细信息
来源: 评论
A security testing approach for WSN protocols based on object-oriented attack model
A security testing approach for WSN protocols based on objec...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Qi, Yue Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relatio... 详细信息
来源: 评论
An automated black-box testing approach for WSN security protocols
An automated black-box testing approach for WSN security pro...
收藏 引用
2011 7th International Conference on Computational Intelligence and Security, CIS 2011
作者: Ji, Shirui Pei, Qingqi Zeng, Yong Yang, Chao Bu, Shu-Po State Key Laboratory of Integrated Service Networks Xidian University Xi'an China Key Lab. of Computer Networks and Information Security of Ministry of Education China Department of Electronic Engineering Suzhou Institute of Industrial Technology Suzhou 215104 China
Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security pro... 详细信息
来源: 评论
lab.l-based DV-Hop localization againstwormhole attacks in wireless sensor networks
Label-based DV-Hop localization againstwormhole attacks in w...
收藏 引用
作者: Wu, Junfeng Chen, Honglong Lou, Wei Wang, Zhibo Wang, Zhi State Key Lab. of Industrial Control Technology Zhejiang University China Dept. of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Dept. of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Hong Kong
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization m... 详细信息
来源: 评论
Model based reinforcement learning for robot grasping trajectory generation  4
Model based reinforcement learning for robot grasping trajec...
收藏 引用
4th IEEE International Conference on Advanced Robotics and Mechatronics, ICARM 2019
作者: Xue, Hongxiang Wen, Shuhuan Yang, Chao Liu, Huaping Key Lab of Industrial Computer Control Engineering of Hebei Province Yanshan University Qinhuangdao066004 China Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and System Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing100084 China
Trajectory generation is a fundamental problem for successful robotic grasping. However, most of the existing work dealt with this problem using supervised learning with a prescribed model. It prevents the developed g... 详细信息
来源: 评论
Hierarchical Energy Management Strategy of Hybrid Electric Truck Fleet under Connected Environment  43
Hierarchical Energy Management Strategy of Hybrid Electric T...
收藏 引用
43rd Chinese control Conference, CCC 2024
作者: Lu, Qizhe Tang, Wenbin Pang, Zitong Zhang, Yahui Jiao, Xiaohong Yanshan University School of Electrical Engineering Qinhuangdao066004 China Yanshan University Key Lab of Industrial Computer Control Engineering of Hebei Province Hebei Province Qinhuangdao066004 China Yanshan University School of Mechanical Engineering Qinhuangdao066004 China
Considering the slow-moving and energy-consuming issues that tend to occur when truck fleets drive, this paper proposes a hierarchical energy management strategy (EMS) for the hybrid electrical truck (HET) fleet, incl... 详细信息
来源: 评论