咨询与建议

限定检索结果

文献类型

  • 272 篇 会议
  • 155 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 284 篇 工学
    • 157 篇 计算机科学与技术...
    • 124 篇 软件工程
    • 81 篇 电气工程
    • 59 篇 控制科学与工程
    • 43 篇 信息与通信工程
    • 40 篇 动力工程及工程热...
    • 33 篇 电子科学与技术(可...
    • 26 篇 化学工程与技术
    • 25 篇 机械工程
    • 23 篇 生物工程
    • 20 篇 核科学与技术
    • 19 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 16 篇 仪器科学与技术
    • 15 篇 力学(可授工学、理...
    • 11 篇 光学工程
    • 11 篇 交通运输工程
    • 10 篇 建筑学
    • 8 篇 土木工程
    • 8 篇 生物医学工程(可授...
  • 150 篇 理学
    • 81 篇 数学
    • 51 篇 物理学
    • 24 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 18 篇 化学
    • 13 篇 系统科学
  • 66 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 19 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 12 篇 法学
    • 9 篇 社会学
  • 7 篇 经济学
  • 7 篇 医学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 12 篇 predictive model...
  • 11 篇 deep learning
  • 10 篇 feature extracti...
  • 10 篇 nuclear power pl...
  • 10 篇 accuracy
  • 10 篇 training
  • 8 篇 neural networks
  • 8 篇 machine learning
  • 7 篇 analytical model...
  • 7 篇 data models
  • 6 篇 power systems
  • 6 篇 image segmentati...
  • 6 篇 face recognition
  • 6 篇 convolution
  • 6 篇 optimization
  • 6 篇 computational mo...
  • 6 篇 semantics
  • 6 篇 topology
  • 5 篇 simulation
  • 5 篇 data mining

机构

  • 10 篇 school of inform...
  • 10 篇 school of softwa...
  • 9 篇 school of mechat...
  • 9 篇 shanghai baosigh...
  • 8 篇 school of softwa...
  • 7 篇 center of resear...
  • 7 篇 department of co...
  • 7 篇 department of so...
  • 7 篇 school of contro...
  • 7 篇 science and tech...
  • 6 篇 cnnc key laborat...
  • 6 篇 college of compu...
  • 6 篇 state key labora...
  • 6 篇 department of ma...
  • 6 篇 tallinn universi...
  • 6 篇 key laboratory i...
  • 6 篇 school of softwa...
  • 6 篇 department of el...
  • 6 篇 institute of sof...
  • 5 篇 school of comput...

作者

  • 12 篇 saad mekhilef
  • 8 篇 gu peng-fei
  • 8 篇 zhao na
  • 6 篇 liu qiuming
  • 6 篇 yuan yao
  • 6 篇 ping li
  • 6 篇 yi-ping wu
  • 6 篇 min-rui fei
  • 6 篇 jian-guo wang
  • 6 篇 belikov juri
  • 6 篇 shi-wei ma
  • 6 篇 bin sheng
  • 6 篇 zhou yang
  • 5 篇 wang jian
  • 5 篇 yinglong ma
  • 5 篇 liu jie
  • 5 篇 zhen wang
  • 5 篇 jianhui jiang
  • 5 篇 mekhilef saad
  • 5 篇 juri belikov

语言

  • 406 篇 英文
  • 22 篇 其他
  • 6 篇 中文
检索条件"机构=Power Engineering Software and Technology"
434 条 记 录,以下是111-120 订阅
排序:
Application of Fuzzy Evaluation Method Based on D-S Evidence Theory
Application of Fuzzy Evaluation Method Based on D-S Evidence...
收藏 引用
2021 International Conference on Advanced Electrical Equipment and Reliable Operation, AEERO 2021
作者: Rong, Zhihai Chen, Jianhua Chen, Shihe Yan, Jiangyan Shenzhen Institute of Information Technology School of Software Engineering Shenzhen China China Resources Power Technology Research Institute Co. Ltd Smart Power Generation Research Center Shenzhen China Shenzhen Polytechnic School of Mechanical and Electrical Engineering Shenzhen China
Main transformer of thermal power plant is the key electrical equipment. And it is important to evaluate the state of transformer. However, with a large number of features, it is difficult to properly fuse evaluation ... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems Science & engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Identification Algorithm Framework and Structural model on Input Pattern of Metamorphic Relations  9
Identification Algorithm Framework and Structural model on I...
收藏 引用
9th International Conference on Dependable Systems and Their Applications, DSA 2022
作者: Yan, Shiyu Yang, Xiaohua Lu, Zhongjian Li, Meng Gong, Helin Liu, Jie Computer School University of South China Hunan Hengyang China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China Cnnc Key Laboratory on High Trusted Computing Hunan Hengyang China Nuclear Power Institute of China Science and Technology on Reactor System Design Technology Laboratory Chengdu China
Metamorphic Relation (MR) plays a crucial role in Metamorphic Testing (MT), which can be regarded as the implication relation from the input pattern to the output pattern. Based on MR's properties, the identificat... 详细信息
来源: 评论
Attack against UAV Infrared Object Detection Based on Gradient Descent Method
Attack against UAV Infrared Object Detection Based on Gradie...
收藏 引用
International Conference on Information Systems and Computer Aided Education (ICISCAE)
作者: Mingkang Xu Keyu Chen Haoli Xu Xing Yang Jun Lu Bin Qu Haoqi Gao Zhiyang Hu Mengjiang Wu Jun Chen State Key Laboratory of Pulsed Power Laser College of Electronic Engineering National University of Defense Technology Hefei China National University of Defense Technology Hefei China College of Computer Science and Software Enginering Hohai University Nanjing China
At present, infrared intelligent detection technology has been widely used in various fields. Due to the development of its technology, how to interfere with important targets such as intelligent recognition of vehicl... 详细信息
来源: 评论
A Selection Method of Effective Metamorphic Relations  13
A Selection Method of Effective Metamorphic Relations
收藏 引用
13th International Conference on Reliability, Maintainability, and Safety, ICRMS 2022
作者: Zhang, Jie Hong, Jie Huang, Dafei Li, Meng Yan, Shiyu Gong, Helin School of Computing University of South China Hunan Hengyang China Engineering and Technology Research Center of Software Evaluation and Testing for Intellectual Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hunan Hengyang China Nuclear Power Institute of China Science and Technology on Reactor System Design Technology Laboratory Chengdu China
Metamorphic testing can effectively alleviate the test oracle problem. However, the program under test needs to be executed one more time;it is particularly significant to select the metamorphic relation with the high... 详细信息
来源: 评论
Reverse erasure guided spatio-temporal autoencoder with compact feature representation for video anomaly detection
收藏 引用
Science China(Information Sciences) 2022年 第9期65卷 286-288页
作者: Yuanhong ZHONG Xia CHEN Jinyang JIANG Fan REN School of Microelectronics and Communication Engineering Chongqing University State Grid Chongqing Electric Power Research Institute Changan Software Technology Company Changan Automobile Corp.
Video anomaly detection aims to learn normal patterns and identify the samples deviating from normal patterns as anomalies. In early research, methods based on handcrafted low-level features have been widely studied. ...
来源: 评论
An RUL prediction approach for lithium-ion batteries based on FIG and SVM with multi-kernel  7
An RUL prediction approach for lithium-ion batteries based o...
收藏 引用
7th Asia Conference on power and Electrical engineering, ACPEE 2022
作者: Li, Yuxing Song, Lei Yi, Rongqing Su, Junyi Gao, Xuefeng Du, Jingcai Economic and Technological Research Institute of State Grid Jilin Electric Power Co. Ltd Charging and Switching Research Center Changchun China State Grid Jilin Electric Power Co. Ltd Marketing Department Changchun China Hefei University of Technology School of Software Engineering Hefei China Beijing Jiaotong University School of Electrical Engineering Beijing China
Lithium ion battery is a common energy storage component in life. Accurately predicting the remaining service life (rul) is significant. This article establishes a data-driven RUL prediction method. The original cycle... 详细信息
来源: 评论
EBFT: Efficient BFT Consensus through Shortcut Replies
EBFT: Efficient BFT Consensus through Shortcut Replies
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Qingsheng Lei Yongjun Xia Qitao Guo Rui Hao Xiaohai Dai Weiqi Dai State Grid Hubei Electric Power Company Limited Economic & Technology Research Institute Hubei Central China Technology Development of Electric Power Company Limited Software Institute Nanjing University School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology
As the core building block of blockchain technology, Byzantine Fault Tolerance (BFT) consensus has gathered renewed attention during the past decade. A large number of BFT consensus protocols have been proposed since ...
来源: 评论
Evolutionary Discrete Optimization Inspired by Zero-Sum Game Theory
Evolutionary Discrete Optimization Inspired by Zero-Sum Game...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Ruiran Yu Haoliang Wen Yuhan Xu School of Software Engineering South China University of Technology Guangzhou PR China School of Electric Power Engineering South China University of Technology Guangzhou PR China
In a zero-sum game, the two players compete against each other, and the gain of one player means the loss of the other. Generative adversarial networks (GANs) are models of this kind of thinking. Evolutionary algorith... 详细信息
来源: 评论
Generating Frequency-limited Adversarial Examples to Attack Multi-focus Image Fusion Models  19
Generating Frequency-limited Adversarial Examples to Attack ...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Jin, Xin Jiang, Qian Liu, Peng Gao, Xueshuai Wang, Puming Lee, Shin-Jye Yunnan University Engineering Research Center of Cyberspace Kunming China Yunnan University School of Software Kunming China Guangxi Power Grid Co. Ltd. Nanning China National Chiao Tung University Institute of Technology Management Hsinchu Taiwan
Multi-focus image fusion techniques aim to generate all-in-focus clear images by fusing a set of images with different focused areas. Recently various deep learning based methods have been proposed for image fusion, b... 详细信息
来源: 评论