咨询与建议

限定检索结果

文献类型

  • 6,019 篇 会议
  • 3,595 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 9,632 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,098 篇 工学
    • 3,086 篇 计算机科学与技术...
    • 2,682 篇 软件工程
    • 1,869 篇 控制科学与工程
    • 1,217 篇 电气工程
    • 1,042 篇 信息与通信工程
    • 748 篇 机械工程
    • 704 篇 电子科学与技术(可...
    • 557 篇 动力工程及工程热...
    • 475 篇 生物工程
    • 360 篇 仪器科学与技术
    • 352 篇 生物医学工程(可授...
    • 335 篇 光学工程
    • 294 篇 化学工程与技术
    • 241 篇 交通运输工程
    • 195 篇 安全科学与工程
    • 174 篇 土木工程
    • 161 篇 建筑学
    • 158 篇 力学(可授工学、理...
  • 3,431 篇 理学
    • 1,921 篇 数学
    • 895 篇 系统科学
    • 719 篇 物理学
    • 624 篇 统计学(可授理学、...
    • 544 篇 生物学
    • 257 篇 化学
  • 1,369 篇 管理学
    • 948 篇 管理科学与工程(可...
    • 444 篇 图书情报与档案管...
    • 334 篇 工商管理
  • 337 篇 医学
    • 272 篇 临床医学
    • 228 篇 基础医学(可授医学...
  • 175 篇 法学
    • 149 篇 社会学
  • 148 篇 经济学
  • 69 篇 农学
  • 52 篇 教育学
  • 16 篇 军事学
  • 12 篇 艺术学
  • 11 篇 文学
  • 1 篇 哲学

主题

  • 266 篇 control systems
  • 178 篇 feature extracti...
  • 174 篇 optimization
  • 168 篇 computational mo...
  • 142 篇 predictive model...
  • 129 篇 stability analys...
  • 127 篇 neural networks
  • 107 篇 mathematical mod...
  • 105 篇 deep learning
  • 90 篇 convergence
  • 89 篇 educational inst...
  • 87 篇 simulation
  • 87 篇 uncertainty
  • 86 篇 process control
  • 85 篇 computer science
  • 85 篇 real-time system...
  • 85 篇 trajectory
  • 85 篇 training
  • 84 篇 linear matrix in...
  • 83 篇 support vector m...

机构

  • 1,304 篇 school of contro...
  • 200 篇 school of comput...
  • 186 篇 school of contro...
  • 175 篇 school of contro...
  • 167 篇 school of comput...
  • 66 篇 control and inte...
  • 60 篇 school of contro...
  • 57 篇 north china elec...
  • 56 篇 division of deci...
  • 55 篇 state key labora...
  • 54 篇 college of contr...
  • 51 篇 department of el...
  • 46 篇 school of electr...
  • 44 篇 ieee
  • 41 篇 hubei key labora...
  • 41 篇 college of compu...
  • 40 篇 beijing institut...
  • 38 篇 school of contro...
  • 35 篇 school of inform...
  • 35 篇 school of electr...

作者

  • 87 篇 johansson karl h...
  • 44 篇 wu kehe
  • 40 篇 byung-ju yi
  • 36 篇 e. rogers
  • 36 篇 eric rogers
  • 35 篇 ai bo
  • 35 篇 fang fang
  • 34 篇 hamid soltanian-...
  • 32 篇 yong yan
  • 32 篇 junping du
  • 31 篇 krzysztof galkow...
  • 31 篇 karl h. johansso...
  • 30 篇 li yuancheng
  • 30 篇 wen tan
  • 28 篇 wei li
  • 28 篇 zhong zhangdui
  • 27 篇 li li
  • 27 篇 fu minyue
  • 26 篇 rojas cristian r...
  • 26 篇 shaomin zhang

语言

  • 9,169 篇 英文
  • 251 篇 其他
  • 214 篇 中文
  • 3 篇 法文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer and Control Engineering"
9632 条 记 录,以下是4721-4730 订阅
排序:
PID2018 Benchmark Challenge: Model-based Feedforward Compensator with A Conditional Integrator
收藏 引用
IFAC-PapersOnLine 2018年 第4期51卷 888-893页
作者: Yuan, Jie Ates, Abdullah Dehghan, Sina Zhao, Yang Fei, Shumin Chen, YangQuan School of Automation Southeast University Nanjing210096 China Engineering Faculty Computer Engineering Department Inonu University Malatya44280 Turkey Mechatronics Embedded Systems and Automation Lab University of California MercedCA95340 United States School of Science and Engineering Shandong University Jinan250061 China Key Laboratory of Measurement and Control of CSE Ministry of Education School of Automation Southeast University Nanjing210096 China
Since proportional-integral-derivative (PID) controllers absolutely dominate the control engineering, numbers of different control structures and theories have been developed to enhance the efficiency of PID controlle... 详细信息
来源: 评论
Multi-objective optimization of wind turbine via controllers coordination and sensitivity analysis  8
Multi-objective optimization of wind turbine via controllers...
收藏 引用
8th Renewable Power Generation Conference, RPG 2019
作者: Chen, Zhenyu Lin, Zhongwei Wang, Chuanxi Han, Xiangyu Li, Gengda Hu, Feng Si, Zongming State Key Laboratory of Alternate Electrical Power System With Renewable Energy Sources School of Control and Computer Engineering North China Electric Power University Beijing102206 China Guodian New Energy Technology Research Institute Co. Ltd Beijing102209 China New Energy Co. Ltd Jinan250099 China
In this paper, a sensitivity-analysis-based wind turbine optimization strategy is introduced to improve the power output stability while reducing the shaft and tower loads. Both generator torque and blade pitch are co... 详细信息
来源: 评论
Nonlinear Modeling of the Subcritical Boiler-turbine System with Stochastic Differential Equations∗
Nonlinear Modeling of the Subcritical Boiler-turbine System ...
收藏 引用
2019 IEEE International Conference on Power Data Science, ICPDS 2019
作者: Du, Ming Xia, Jie Qian, Yonggui Li, Xiaobin Cai, Guoyuan Liu, Rui School of Control and Computer Engineering North China Electric Power University Beijing China Huaihu Coal and Electricity Co. Ltd. Tianji Power Plant Huainan Anhui Province232000 China China Railway Beijing Bureau Group Co. Ltd. Beijing West Power Section Official Beijing China
With the large-scale renewable energy integrated into power system, the optimization of coordinated control system (CCS) is increasingly crucial. The dynamics of subcritical boiler-turbine system have been studied thr... 详细信息
来源: 评论
Evaluating Local Geometric Feature Representations for 3D Rigid Data Matching
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Jiaqi Quan, Siwen Wang, Peng Zhang, Yanning National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science Northwestern Poly-technical University Xi’an710129 China School of Electronic and Control Engineering Chang’An University Xi’an710064 China
—Local geometric descriptors remain an essential component for 3D rigid data matching and fusion. The devise of a rotational invariant local geometric descriptor usually consists of two steps: local reference frame (... 详细信息
来源: 评论
Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm
收藏 引用
Journal of Quantum Computing 2019年 第1期1卷 1-8页
作者: Yajie Sun Yanqing Yuan Qi Wang Sai Ji Lihua Wang Shaoen Wu Jie Chen Qin Zhang Jiangsu engineering Centre of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information and Control Nanjing University of Information Science and TechnologyNanjing210044China Department of Computer Science Ball State UniversityMuncieUSA
A method is proposed based on the transmissibility function and the OnlineSequence Extreme Learning Machine (OS-ELM) algorithm, which is applied to theimpact damage of composite materials. First of all, the transmissi... 详细信息
来源: 评论
When energy trading meets blockchain in electrical power system: The state of the art
arXiv
收藏 引用
arXiv 2019年
作者: Wang, Naiyu Zhou, Xiao Lu, Xin Guan, Zhitao Wu, Longfei Du, Xiaojiang Guizani, Mohsen School of Control and Computer Engineering North China Electric Power University Beijing China Department of Mathematics and Computer Science Fayetteville State University FayettevilleNC United States Department of Computer and Information Science Temple University PhiladelphiaPA United States Electrical and Computer Engineering Department University of Idaho MoscowID United States
With the rapid growth of renewable energy resources, the energy trading began to shift from centralized to distributed manner. Blockchain, as a distributed public ledger technology, has been widely adopted to design n... 详细信息
来源: 评论
Nonzero-Dynamics Stealthy Attack and Its Impacts Analysis in DC Microgrids
Nonzero-Dynamics Stealthy Attack and Its Impacts Analysis in...
收藏 引用
American control Conference
作者: Mengxiang Liu Chengcheng Zhao Ruilong Deng Peng Cheng Wenhai Wang Jiming Chen State Key Lab. of Industrial Control Technology Zhejiang University Hangzhou 310027 P. R. China School of Computer Science and Engineering Nanyang Tec
In this paper, we explore the potential stealthy attacks in the DC microgrid (DCmG) equipped with unknown input observer (UIO) based detectors, which are widely adopted for the detection and identification of cyber-at... 详细信息
来源: 评论
On the Confidentiality of Linear Anomaly Detector States
On the Confidentiality of Linear Anomaly Detector States
收藏 引用
American control Conference
作者: David Umsonst Ehsan Nekouei Andre Teixeira Henrik Sandberg Division of Decision and Control Systems School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm 10044 Sweden Signals and Systems Group at Uppsala University Sweden
A malicious attacker with access to the sensor channel in a feedback control system can severely affect the physical system under control, while simultaneously being hard to detect. A properly designed anomaly detecto... 详细信息
来源: 评论
Doping-driven electronic and lattice dynamics in the phase-change material vanadium dioxide
收藏 引用
Physical Review B 2020年 第11期102卷 115148-115148页
作者: Kannatassen Appavoo Joyeeta Nag Bin Wang Weidong Luo Gerd Duscher E. Andrew Payzant Matthew Y. Sfeir Sokrates T. Pantelides Richard F. Haglund, Jr. Department of Physics University of Alabama at Birmingham Birmingham Alabama 35294 USA Department of Physics and Astronomy Vanderbilt University Nashville Tennessee 37235 USA School of Chemical Biological and Materials Engineering University of Oklahoma Norman Oklahoma 73019 USA Center for Nanophase Materials Sciences Oak Ridge National Laboratory Oak Ridge Tennessee 37831 USA Key Laboratory of Artificial Structures and Quantum Control School of Physics and Astronomy Shanghai Jiao Tong University Shanghai 200240 China Department of Materials Science and Engineering University of Tennessee Knoxville Tennessee 37996 USA Center for Functional Nanomaterials Brookhaven National Laboratory Upton New York 11973 USA Department of Electrical Engineering and Computer Science Vanderbilt University Nashville Tennessee 37235 USA
Doping is generally understood as a strategy for including additional positive or negative charge carriers in a semiconductor, thereby tuning the Fermi level and changing its electronic properties in the equilibrium l... 详细信息
来源: 评论
Software Defect-Prone Classification using Machine Learning: A Virtual Classification Study between LibSVM & LibLinear
Software Defect-Prone Classification using Machine Learning:...
收藏 引用
International Conference on Mathematics, Actuarial Science, computer Science and Statistics (MACS)
作者: Salahuddin Shaikh Liu Changan Maaz Rasheed Malik Muhammad Asghar Khan School of Control & Computer Engineering North China Electric Power University Beijing China Guilin University of Electronic Technology Guilin China Institute of Business Management Karachi Pakistan
The field of machine learning has been developing quickly, delivering an assortment of learning algorithms for various software applications. A definitive estimation of those algorithms is, all things considered, made... 详细信息
来源: 评论