咨询与建议

限定检索结果

文献类型

  • 6,056 篇 会议
  • 3,564 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 9,639 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,087 篇 工学
    • 3,079 篇 计算机科学与技术...
    • 2,686 篇 软件工程
    • 1,868 篇 控制科学与工程
    • 1,204 篇 电气工程
    • 1,039 篇 信息与通信工程
    • 758 篇 机械工程
    • 709 篇 电子科学与技术(可...
    • 560 篇 动力工程及工程热...
    • 476 篇 生物工程
    • 360 篇 仪器科学与技术
    • 349 篇 生物医学工程(可授...
    • 324 篇 光学工程
    • 295 篇 化学工程与技术
    • 241 篇 交通运输工程
    • 195 篇 安全科学与工程
    • 176 篇 土木工程
    • 160 篇 建筑学
    • 158 篇 力学(可授工学、理...
  • 3,429 篇 理学
    • 1,922 篇 数学
    • 894 篇 系统科学
    • 718 篇 物理学
    • 624 篇 统计学(可授理学、...
    • 540 篇 生物学
    • 256 篇 化学
  • 1,366 篇 管理学
    • 945 篇 管理科学与工程(可...
    • 444 篇 图书情报与档案管...
    • 335 篇 工商管理
  • 333 篇 医学
    • 271 篇 临床医学
    • 222 篇 基础医学(可授医学...
  • 178 篇 法学
    • 150 篇 社会学
  • 147 篇 经济学
  • 67 篇 农学
  • 51 篇 教育学
  • 16 篇 军事学
  • 12 篇 艺术学
  • 11 篇 文学
  • 1 篇 哲学

主题

  • 266 篇 control systems
  • 180 篇 optimization
  • 173 篇 feature extracti...
  • 168 篇 computational mo...
  • 141 篇 predictive model...
  • 131 篇 stability analys...
  • 127 篇 neural networks
  • 108 篇 mathematical mod...
  • 107 篇 deep learning
  • 91 篇 convergence
  • 89 篇 simulation
  • 89 篇 educational inst...
  • 87 篇 process control
  • 87 篇 trajectory
  • 86 篇 linear matrix in...
  • 86 篇 uncertainty
  • 85 篇 computer science
  • 85 篇 real-time system...
  • 85 篇 algorithm design...
  • 84 篇 genetic algorith...

机构

  • 1,308 篇 school of contro...
  • 198 篇 school of comput...
  • 188 篇 school of contro...
  • 180 篇 school of contro...
  • 162 篇 school of comput...
  • 70 篇 control and inte...
  • 59 篇 school of contro...
  • 56 篇 state key labora...
  • 53 篇 college of contr...
  • 53 篇 north china elec...
  • 52 篇 division of deci...
  • 49 篇 department of el...
  • 47 篇 school of electr...
  • 44 篇 ieee
  • 42 篇 beijing institut...
  • 41 篇 college of compu...
  • 40 篇 hubei key labora...
  • 38 篇 school of contro...
  • 36 篇 school of inform...
  • 35 篇 school of electr...

作者

  • 88 篇 johansson karl h...
  • 44 篇 wu kehe
  • 40 篇 byung-ju yi
  • 36 篇 e. rogers
  • 35 篇 hamid soltanian-...
  • 35 篇 eric rogers
  • 35 篇 ai bo
  • 33 篇 yong yan
  • 31 篇 krzysztof galkow...
  • 31 篇 karl h. johansso...
  • 31 篇 fang fang
  • 30 篇 li yuancheng
  • 30 篇 wen tan
  • 28 篇 li li
  • 28 篇 wei li
  • 28 篇 junping du
  • 27 篇 fu minyue
  • 27 篇 zhong zhangdui
  • 26 篇 hou guolian
  • 26 篇 rojas cristian r...

语言

  • 8,718 篇 英文
  • 712 篇 其他
  • 226 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School Computer and Control Engineering"
9639 条 记 录,以下是71-80 订阅
排序:
Remote sensing image encryption algorithm based on novel hyperchaos and an elliptic curve cryptosystem
收藏 引用
Chinese Physics B 2024年 第5期33卷 292-304页
作者: 田婧希 金松昌 张晓强 杨绍武 史殿习 School of Computer Science National University of Defense TechnologyChangsha 410003China Intelligent Game and Decision Laboratory (IGDL) Beijing 100091China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China
Remote sensing images carry crucial ground information,often involving the spatial distribution and spatiotemporal changes of surface *** safeguard this sensitive data,image encryption technology is *** this paper,a n... 详细信息
来源: 评论
Crowd E-Home—A Crowd-Based Collaborative Decoration Platform
收藏 引用
International Journal of Crowd Science 2022年 第3期6卷 135-141页
作者: Ge, Rui Sun, Hongbo School of Computer and Control Engineering Yantai University Yantai264005 China
With the rapid development of Chinese urbanization and industrialization level, the Chinese real estate transaction area continues to grow, and the country's decoration industry is expanding. Due to the rapid expa... 详细信息
来源: 评论
COVID-19 Spread Simulation in a Crowd Intelligence Network
收藏 引用
International Journal of Crowd Science 2022年 第3期6卷 117-127页
作者: Shan, Linzhi Sun, Hongbo School of Computer and Control Engineering Yantai University Yantai264005 China
In this paper, the Crowd Intelligence Network Model is applied to the simulation of epidemic spread. This model combines the multi-layer coupling network model and the two-stage feedback member model to study the epid... 详细信息
来源: 评论
A Personality Detection Method Based on Semantic and Psycholinguistic of Social Texts  7
A Personality Detection Method Based on Semantic and Psychol...
收藏 引用
7th International Conference on computer Information Science and Application Technology, CISAT 2024
作者: Wang, Chundong Yang, Yuhan Lin, Hao Han, Lu Tianjin University of Technology School of Computer Science and Engineering National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
At the intersection of personality psychology, computer science, and linguistics, more and more researchers are paying attention to personality detection based on content analysis of texts on social media. However, ex... 详细信息
来源: 评论
A Crowd Equivalence-Based Massive Member Model Generation Method for Crowd Science Simulations
收藏 引用
International Journal of Crowd Science 2022年 第1期6卷 23-33页
作者: Xing, Aoqiang Sun, Hongbo School of Computer and Control Engineering Yantai University Yantai264005 China
Crowd phenomena are widespread in human society, but they cannot be observed easily in the real world, and research on them cannot follow traditional ways. Simulation is one of the most effective means to support stud... 详细信息
来源: 评论
An identification method of dangerous driving behavior in rush hour based on apriori algorithm
Advances in Transportation Studies
收藏 引用
Advances in Transportation Studies 2022年 第SPECIAL ISSUE期4卷 113-122页
作者: Li, D.H. Sun, J.L. Wu, P. Tao, W. Chen, A. School of Computer and Control Engineering Qiqihar University Qiqihar161000 China
Aiming at the problem of large error and long time of traditional dangerous driving behavior recognition, this paper designs a dangerous driving behavior recognition method based on Apriori algorithm in rush hour. Fir... 详细信息
来源: 评论
control Interval Reconstruction of Floating Wind Turbine Based on Response Characteristics  22
Control Interval Reconstruction of Floating Wind Turbine Bas...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Zhou, Jingfeng Song, Ziqiu Fang, Fang School of Control and Computer Engineering North China Electric Power University Beijing China
The oscillatory movement, aerodynamic damping effect, gyroscopic effect, and other phenomena in floating wind turbines result in distinct response characteristics of output and load under varying wind-wave coupling sc... 详细信息
来源: 评论
Fault Warning of Wind Turbine Based on Optimal Hybrid Neural Network Prediction Model  5
Fault Warning of Wind Turbine Based on Optimal Hybrid Neural...
收藏 引用
5th International Conference on Advances in Electrical engineering and computer Applications, AEECA 2024
作者: Lv, Ruomeng North China Electric Power University School of Control and Computer Engineering Baoding China
Aiming at the problems of abnormal points and noise points existing in the original high-dimensional data of wind turbine system, and considering the strict requirements of fault warning on the accuracy of prediction ... 详细信息
来源: 评论
Electricity theft detection model based on the CEEMDAN-CNN-ViT  2
Electricity theft detection model based on the CEEMDAN-CNN-V...
收藏 引用
2024 2nd International Conference on Power, Grid and Energy Storage, PGES 2024
作者: Yang, Hang Yang, Runkai Li, Xiang Zhou, Wenyuan School of Control and Computer Engineering North China Electric Power University Beijing China
Most of the traditional power theft detection methods construct the model directly on the basis of the original power sequences, and do not simultaneously consider the long-period dependencies in the long-time sequenc... 详细信息
来源: 评论
FUSE: a federated learning and U-shape split learning-based electricity theft detection framework
收藏 引用
Science China(Information Sciences) 2024年 第4期67卷 339-340页
作者: Xuan LI Naiyu WANG Liehuang ZHU Shuai YUAN Zhitao GUAN School of Control and Computer Engineering North China Electric Power University School of Cyberspace Science and Technology Beijing Institute of Technology Department of Finance Operationsand Information Systems(FOIS)Brock University
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable ... 详细信息
来源: 评论