咨询与建议

限定检索结果

文献类型

  • 1,130 篇 会议
  • 1,023 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 2,174 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,219 篇 工学
    • 510 篇 计算机科学与技术...
    • 496 篇 控制科学与工程
    • 474 篇 软件工程
    • 211 篇 机械工程
    • 177 篇 电气工程
    • 168 篇 信息与通信工程
    • 120 篇 电子科学与技术(可...
    • 95 篇 生物工程
    • 71 篇 交通运输工程
    • 67 篇 动力工程及工程热...
    • 66 篇 生物医学工程(可授...
    • 64 篇 光学工程
    • 57 篇 仪器科学与技术
    • 49 篇 土木工程
    • 49 篇 化学工程与技术
    • 38 篇 安全科学与工程
    • 37 篇 航空宇航科学与技...
  • 772 篇 理学
    • 422 篇 数学
    • 282 篇 系统科学
    • 141 篇 统计学(可授理学、...
    • 132 篇 物理学
    • 109 篇 生物学
    • 43 篇 化学
  • 225 篇 管理学
    • 165 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 71 篇 医学
    • 60 篇 临床医学
    • 46 篇 基础医学(可授医学...
  • 29 篇 法学
    • 26 篇 社会学
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 25 篇 农学
  • 4 篇 教育学
  • 4 篇 军事学
  • 1 篇 文学

主题

  • 81 篇 control systems
  • 54 篇 linear systems
  • 51 篇 mathematical mod...
  • 50 篇 robustness
  • 43 篇 optimization
  • 43 篇 nonlinear system...
  • 39 篇 automatic contro...
  • 36 篇 computational mo...
  • 36 篇 uncertainty
  • 34 篇 robust control
  • 34 篇 neural networks
  • 33 篇 stability analys...
  • 32 篇 trajectory
  • 32 篇 optimal control
  • 31 篇 feature extracti...
  • 31 篇 vehicles
  • 28 篇 training
  • 27 篇 computer science
  • 25 篇 laboratories
  • 25 篇 vectors

机构

  • 42 篇 systems and cont...
  • 37 篇 state key labora...
  • 35 篇 hubei key labora...
  • 33 篇 beijing key labo...
  • 32 篇 department of au...
  • 24 篇 ieee
  • 24 篇 key laboratory o...
  • 24 篇 school of electr...
  • 24 篇 beijing aerospac...
  • 24 篇 school of automa...
  • 22 篇 seventh research...
  • 20 篇 school of mathem...
  • 18 篇 school of electr...
  • 17 篇 the state key la...
  • 17 篇 department of au...
  • 15 篇 school of automa...
  • 15 篇 automatic contro...
  • 14 篇 department of au...
  • 14 篇 key laboratory o...
  • 14 篇 state key labora...

作者

  • 45 篇 tóth roland
  • 42 篇 e. rogers
  • 40 篇 d.h. owens
  • 38 篇 péter gáspár
  • 33 篇 junping du
  • 33 篇 yingmin jia
  • 28 篇 johansson karl h...
  • 28 篇 fei-yue wang
  • 27 篇 balázs németh
  • 27 篇 kryjak tomasz
  • 24 篇 fashan yu
  • 21 篇 roland tóth
  • 20 篇 k. galkowski
  • 18 篇 yi xinlei
  • 17 篇 schoukens maarte...
  • 16 篇 owens d.h.
  • 16 篇 yang tao
  • 14 篇 rogers e.
  • 14 篇 gáspár péter
  • 13 篇 bing chu

语言

  • 2,061 篇 英文
  • 99 篇 其他
  • 13 篇 中文
检索条件"机构=Laboratory of Computer Science and Automatic Control for Systems"
2174 条 记 录,以下是51-60 订阅
排序:
Reinforcement Learning-Based Output Stabilization control for Nonlinear systems With Generalized Disturbances  25
Reinforcement Learning-Based Output Stabilization Control fo...
收藏 引用
25th IEEE International Conference on Industrial Technology, ICIT 2024
作者: Tang, Zezhi Rossiter, J Anthony Dong, Yi Panoutsos, George University Of Sheffield Department Of Automatic Control And Systems Engineering SheffieldS13JD United Kingdom University Of Southampton Department Of Electronics And Computer Science Southampton United Kingdom
This paper proposes a new disturbance observer (DO)-based reinforcement learning (RL) control approach for nonlinear systems with unmatched (generalized) disturbances. While a nonlinear disturbance observer (NDO) is u... 详细信息
来源: 评论
A FIWARE based Input-Output Supervisor control Implementation  29
A FIWARE based Input-Output Supervisor Control Implementatio...
收藏 引用
29th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2024
作者: Menexis, Antonios N. Fragkoulis, Dimitrios G. Koumboulis, Fotis N. Skarpetis, Michael G. School of Science National & Kapodistrian University of Athens Robotics Automatic Control and Cyber-Physical Systems Laboratory Department of Digital Industry Technologies Euripus Campus Euboea 34400 Greece
In this paper, a FIWARE based control implementation framework for supervisory control of inputoutput models, in Discrete Event System (DES) form, will be introduced, through the case study of an industrial product tr... 详细信息
来源: 评论
Semi-asynchronous personalized federated learning for short-term photovoltaic power forecasting
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1221-1229页
作者: Weishan Zhang Xiao Chen Ke He Leiming Chen Liang Xu Xiao Wang Su Yang College of Computer Science and Technology China University of Petroleum(East China)China Sichuan Energy Internet Research Institute Tsinghua UniversityChina School of Computer and Communication Engineering Beijing University of Science and TechnologyChina State Key Laboratory of Management and Control for Complex Systems Institute of AutomationChinese Academy of SciencesBeijingChina School of Computer Science Fudan UniversityChina
Accurate forecasting for photovoltaic power generation is one of the key enablers for the integration of solar photovoltaic systems into power *** deep-learning-based methods can perform well if there are sufficient t... 详细信息
来源: 评论
How transformations of representation for input data can affect the properties of induced decision reducts and rules  27
How transformations of representation for input data can aff...
收藏 引用
27th International Conference on Knowledge Based and Intelligent Information and Engineering Sytems, KES 2023
作者: Stanczyk, Urszula Department of Graphics Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
Decision reducts and rules belong to forms used for the representation of knowledge learnt from input data while using a rough set approach in the exploration stage. As with any patterns that capture properties of dat... 详细信息
来源: 评论
Should supervised discretisation always be trusted unreservedly? On combining characteristics of supervised and unsupervised discretisation algorithms in two-step processing  27
Should supervised discretisation always be trusted unreserve...
收藏 引用
27th International Conference on Knowledge Based and Intelligent Information and Engineering Sytems, KES 2023
作者: Stanczyk, Urszula Baron, Grzegorz Department of Graphics Computer Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
The paper presents a description of the research methodology dedicated to a two-step discretisation process applied to the input numeric data, with combining the characteristics of selected supervised and unsupervised... 详细信息
来源: 评论
Weighting Attributes Based on the Greedy Algorithm Properties  28th
Weighting Attributes Based on the Greedy Algorithm Propertie...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and Engineering systems, KES 2024
作者: Zielosko, Beata Stanczyk, Urszula Jablonski, Kamil University of Silesia in Katowice Institute of Computer Science Bedzinska 39 Sosnowiec41-200 Poland Department of Computer Graphics Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A Gliwice44-100 Poland
Estimation of importance for considered features is an important issue for any knowledge exploration process and it can be executed by a variety of approaches. In the research reported in this study, the primary aim w... 详细信息
来源: 评论
A simulation research method for data injection attacks on DC microgrids
A simulation research method for data injection attacks on D...
收藏 引用
2024 China Automation Congress, CAC 2024
作者: Hou, Yunhui Liu, Mengxiang Shen, Na National Key Laboratory of Transient Physics Nanjing University of Science and Technology Nanjing China Department of Automatic Control and Systems Engineering University of Sheffield Western Bank Sheffield United Kingdom
By using Typhoon HIL simulator, a simulation research method of data injection attack against secondary control DC microgrid is established, which reveals the important influence of the attack function on the effectiv... 详细信息
来源: 评论
Estimating the AGV load and a battery lifetime based on the current measurement and random forest application
Estimating the AGV load and a battery lifetime based on the ...
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Hanzel, Krzysztof Grzechca, Damian Ziebinski, Adam Chruszczyk, Lukas Janus, Artur Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Telecommunications and Teleinformatics Gliwice Poland Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Electronics Electrical Engineering and Microelectronics Gliwice Poland Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Distributed Systems and Informatics Devices Gliwice Poland Silesian University of Technology Student of Electrical EngineeringFaculty of Electrical Engineering Gliwice Poland
The paper describes the energy consumption from the battery based on the current measurements for various cases, i.e., speed (PWL adjustment) and loads. The main purpose of the research is to have additional and relia... 详细信息
来源: 评论
The Informativity Approach: To Data-Driven Analysis and control
收藏 引用
IEEE control systems 2023年 第6期43卷 32-66页
作者: Van Waarde, Henk J. Eising, Jaap Camlibel, M. Kanat Trentelman, Harry L. Bernoulli Institute for Mathematics Computer Science and Artificial Intelligence University of Groningen 9747 AG Netherlands Automatic Control Laboratory ETH Zürich Zürich8092 Switzerland University of Groningen Groningen9700 AB Netherlands
Roughly speaking, systems and control theory deals with the problem of making a concrete physical system behave according to certain desired specifications. To achieve this desired behavior, the system can be intercon... 详细信息
来源: 评论
Generating Adversarial Patterns in Facial Recognition with Visual Camouflage
收藏 引用
Journal of Shanghai Jiaotong University (science) 2024年 1-12页
作者: Bao, Qirui Mei, Haiyang Wei, Huilin Lü, Zheng Wang, Yuxin Yang, Xin Key Laboratory of Social Computing and Cognitive Intelligence of Ministry of Education School of Control Science and EngineeringSchool of Computer Science and Technology Dalian University of Technology Liaoning Dalian116024 China Systems Engineering Institute Academy of Military Sciences Beijing100141 China
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ... 详细信息
来源: 评论