咨询与建议

限定检索结果

文献类型

  • 1,787 篇 会议
  • 946 篇 期刊文献

馆藏范围

  • 2,733 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,801 篇 工学
    • 713 篇 软件工程
    • 704 篇 计算机科学与技术...
    • 656 篇 控制科学与工程
    • 436 篇 机械工程
    • 275 篇 电气工程
    • 205 篇 信息与通信工程
    • 186 篇 电子科学与技术(可...
    • 178 篇 仪器科学与技术
    • 128 篇 生物工程
    • 105 篇 交通运输工程
    • 95 篇 动力工程及工程热...
    • 80 篇 化学工程与技术
    • 75 篇 力学(可授工学、理...
    • 75 篇 光学工程
    • 65 篇 材料科学与工程(可...
    • 65 篇 生物医学工程(可授...
    • 56 篇 土木工程
    • 54 篇 安全科学与工程
    • 48 篇 冶金工程
    • 43 篇 建筑学
  • 889 篇 理学
    • 450 篇 数学
    • 270 篇 系统科学
    • 236 篇 物理学
    • 129 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 62 篇 化学
  • 349 篇 管理学
    • 290 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 60 篇 工商管理
  • 55 篇 医学
    • 44 篇 临床医学
  • 40 篇 法学
  • 37 篇 经济学
  • 18 篇 农学
  • 10 篇 文学
  • 9 篇 艺术学
  • 8 篇 教育学
  • 7 篇 军事学
  • 1 篇 历史学

主题

  • 72 篇 feature extracti...
  • 72 篇 training
  • 50 篇 neural networks
  • 50 篇 stability analys...
  • 45 篇 accuracy
  • 44 篇 predictive model...
  • 43 篇 control systems
  • 42 篇 optimization
  • 40 篇 reinforcement le...
  • 40 篇 simulation
  • 39 篇 automation
  • 37 篇 deep learning
  • 36 篇 trajectory
  • 36 篇 optimal control
  • 35 篇 mathematical mod...
  • 35 篇 data models
  • 33 篇 computational mo...
  • 33 篇 multi-agent syst...
  • 30 篇 real-time system...
  • 30 篇 robustness

机构

  • 579 篇 hubei key labora...
  • 524 篇 school of automa...
  • 382 篇 engineering rese...
  • 280 篇 school of automa...
  • 170 篇 state key labora...
  • 160 篇 key laboratory o...
  • 138 篇 key laboratory o...
  • 105 篇 the state key la...
  • 87 篇 school of artifi...
  • 73 篇 state key labora...
  • 58 篇 ieee
  • 57 篇 the state key la...
  • 54 篇 school of automa...
  • 53 篇 qingdao academy ...
  • 49 篇 key laboratory o...
  • 45 篇 ministry of educ...
  • 42 篇 school of engine...
  • 41 篇 university of ch...
  • 32 篇 china university...
  • 32 篇 beijing engineer...

作者

  • 119 篇 fei-yue wang
  • 108 篇 min wu
  • 67 篇 shihua li
  • 67 篇 jinhua she
  • 59 篇 wang fei-yue
  • 59 篇 gang xiong
  • 51 篇 weihua cao
  • 48 篇 wu min
  • 44 篇 li shihua
  • 43 篇 lu xiaobo
  • 34 篇 xiaobo lu
  • 32 篇 xiong gang
  • 32 篇 chengda lu
  • 31 篇 cao weihua
  • 30 篇 xin chen
  • 30 篇 luefeng chen
  • 30 篇 qinglai wei
  • 29 篇 chuan-ke zhang
  • 29 篇 changyin sun
  • 28 篇 shumin fei

语言

  • 2,525 篇 英文
  • 145 篇 其他
  • 65 篇 中文
检索条件"机构=Key Laboratory of Measurement and Control of complex Systems of Engineering"
2733 条 记 录,以下是471-480 订阅
排序:
Semantic Segmentation of Historical Landslide Based on Improved U-Net  42
Semantic Segmentation of Historical Landslide Based on Impro...
收藏 引用
42nd Chinese control Conference, CCC 2023
作者: Qu, Hanqi Lu, Chengda Pan, Yutong Zeng, Yuxuan Wu, Min School of Automation China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Engineering Research Center of Intelligent Technology for Geo- Exploration Ministry of Education Wuhan430074 China
Landslide disasters are extremely destructive. Accurate identification of landslides plays an important role in disaster assessment, loss control and post-disaster reconstruction. This paper proposes a semantic segmen... 详细信息
来源: 评论
A Novel Hybrid Model for Online Prediction of Rate of Penetration (ROP) in Drilling Process
A Novel Hybrid Model for Online Prediction of Rate of Penetr...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Wang, Yao Gan, Chao Cao, Weihua School of Automation China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Ministry of Education Engineering Research Center of Intelligent Technology for Geo-Exploration Wuhan430074 China
In this paper, a novel hybrid model is proposed for online prediction of rate of penetration (ROP) in drilling process, which including two parts (online data pre-processing and online hybrid modeling). In the first p... 详细信息
来源: 评论
Anomaly Detection and Alarm Limit Design for In-Hole Bit Bounce Based on Interval Augmented Mahalanobis Distance  4th
Anomaly Detection and Alarm Limit Design for In-Hole Bit B...
收藏 引用
Proceedings of the 4th International Conference on Neural Computing for Advanced Applications, NCAA 2023
作者: Hu, Bin Hu, Wenkai Zhang, Peng Cao, Weihua School of Automation China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan430074 China
Timely and accurate anomaly detection is of great importance for the safe operation of the drilling process. To detect bit bounce during the drilling process, this paper proposes a method based on interval augmentatio... 详细信息
来源: 评论
A Semi-Supervised Root Cause Identification Method for Alarm Floods via Graph-Based Manifold Regularization  43
A Semi-Supervised Root Cause Identification Method for Alarm...
收藏 引用
43rd Chinese control Conference, CCC 2024
作者: Chen, Ning Hu, Wenkai Liu, Zhe Wang, Fei China University of Geosciences School of Automation Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Ministry of Education Engineering Research Center of Intelligent Technology for Geo-Exploration Wuhan430074 China Petrochemical Company Limited Wuhan430082 China
An alarm flood is a situation where the alarm rate is too high and exceeds the operator's management ability. The occurrence and propagation of an alarm flood cause difficulties for the operators to respond to cri... 详细信息
来源: 评论
An Autoencoder with a Memory Module for Video Anomaly Detection  36
An Autoencoder with a Memory Module for Video Anomaly Detect...
收藏 引用
36th Youth Academic Annual Conference of Chinese Association of Automation, YAC 2021
作者: Tang, Wei Feng, Yunjian Li, Jun Southeast University Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Nanjing210096 China Southeast University Shenzhen Research Institute Shenzhen518057 China
With the rise of deep convolutional neural networks (CNNs), considerable attention has been paid to video anomaly detection (VAD). Autoencoders are a popular type of framework for VAD, and many existing VAD methods ar... 详细信息
来源: 评论
A Pipeline Leak Detection Method Based on MGD-KLD and On-Delay Timer  42
A Pipeline Leak Detection Method Based on MGD-KLD and On-Del...
收藏 引用
42nd Chinese control Conference, CCC 2023
作者: He, Jiaqi Yuan, Yan Hu, Wenkai Cao, Weihua School of Automation China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Engineering Research Center of Intelligent Technology for Geo Exploration Ministry of Education Wuhan430074 China
Leaks in natural gas pipelines can cause very serious safety accidents, and timely detection and remedial action can greatly reduce the losses. In recent years, pipeline leak detection has received extensive studies. ... 详细信息
来源: 评论
Stability Analysis of Discrete Networked systems with Network Induced Delay and Malicious Packet Dropout Based on a Matrix Transformation Method  42
Stability Analysis of Discrete Networked Systems with Networ...
收藏 引用
42nd Chinese control Conference, CCC 2023
作者: Zhou, Meng-Ying Chen, Wen-Hu Zhang, Chuan-Ke Hou, Ya-Xin Xie, Ke-You School of Automation China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan430074 China
This paper is concerned with the stability of discrete-time networked control systems with network induced delay and malicious packet dropout. Firstly, network induced delay and malicious packet dropout are analyzed, ... 详细信息
来源: 评论
An Informer Based Alarm Early Prediction Method over Consecutive Alarm Monitoring Periods  22
An Informer Based Alarm Early Prediction Method over Consecu...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Jiang, Wenbin Hu, Wenkai Liu, Zhe Wang, Fei School of Automation China University of Geosciences Wuhan430074 China Petrochemical Company Limited Wuhan430082 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan430074 China
Alarm systems serve as the first layer of protection for modern process industries to monitor industrial processes and ensure operational safety. However, the presence of alarm floods is common in alarm systems and ma... 详细信息
来源: 评论
Imbalance control with stratified voltage of modularized CC-to-CV converter for auto and seamless module switching  11
Imbalance control with stratified voltage of modularized CC-...
收藏 引用
11th International Conference on Power Electronics - ECCE Asia, ICPE 2023-ECCE Asia
作者: Cai, Jie Fang, Zhijian Xia, Yuangeng Song, Xiaoxian School of Automation China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Ministry of Education Engineering Research Center of Intelligent Technology for Geo-Exploration Wuhan430074 China
Constant current (CC) based power distribution is widely used in the submarine power supply grid for its robustness against cable impedance and short circuit faults. An input-series-output-parallel (ISOP) modularized ... 详细信息
来源: 评论
Dynamic Event-Triggered Synchronization control for complex Dynamical Networks  42
Dynamic Event-Triggered Synchronization Control for Complex ...
收藏 引用
42nd Chinese control Conference, CCC 2023
作者: Yang, Fuxiang Wan, Xiongbo School of Automation China University of Geosciences Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan430074 China
This paper explores the finite-time synchronization of a class of discrete-time nonlinear singularly perturbed complex networks using a dynamic event-triggered mechanism (DETM). The DETM is designed to optimize packet... 详细信息
来源: 评论