咨询与建议

限定检索结果

文献类型

  • 6,019 篇 会议
  • 3,569 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 9,607 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,074 篇 工学
    • 3,073 篇 计算机科学与技术...
    • 2,677 篇 软件工程
    • 1,865 篇 控制科学与工程
    • 1,205 篇 电气工程
    • 1,037 篇 信息与通信工程
    • 746 篇 机械工程
    • 702 篇 电子科学与技术(可...
    • 555 篇 动力工程及工程热...
    • 475 篇 生物工程
    • 359 篇 仪器科学与技术
    • 352 篇 生物医学工程(可授...
    • 331 篇 光学工程
    • 292 篇 化学工程与技术
    • 239 篇 交通运输工程
    • 194 篇 安全科学与工程
    • 173 篇 土木工程
    • 160 篇 建筑学
    • 156 篇 力学(可授工学、理...
  • 3,420 篇 理学
    • 1,917 篇 数学
    • 895 篇 系统科学
    • 714 篇 物理学
    • 621 篇 统计学(可授理学、...
    • 543 篇 生物学
    • 254 篇 化学
  • 1,366 篇 管理学
    • 946 篇 管理科学与工程(可...
    • 443 篇 图书情报与档案管...
    • 331 篇 工商管理
  • 336 篇 医学
    • 271 篇 临床医学
    • 228 篇 基础医学(可授医学...
  • 175 篇 法学
    • 149 篇 社会学
  • 148 篇 经济学
  • 68 篇 农学
  • 52 篇 教育学
  • 16 篇 军事学
  • 12 篇 艺术学
  • 11 篇 文学
  • 1 篇 哲学

主题

  • 266 篇 control systems
  • 177 篇 feature extracti...
  • 175 篇 optimization
  • 168 篇 computational mo...
  • 142 篇 predictive model...
  • 129 篇 stability analys...
  • 127 篇 neural networks
  • 107 篇 mathematical mod...
  • 105 篇 deep learning
  • 90 篇 convergence
  • 89 篇 educational inst...
  • 88 篇 uncertainty
  • 87 篇 simulation
  • 86 篇 process control
  • 85 篇 computer science
  • 85 篇 real-time system...
  • 85 篇 trajectory
  • 84 篇 linear matrix in...
  • 83 篇 support vector m...
  • 83 篇 algorithm design...

机构

  • 1,301 篇 school of contro...
  • 200 篇 school of comput...
  • 186 篇 school of contro...
  • 176 篇 school of contro...
  • 165 篇 school of comput...
  • 66 篇 control and inte...
  • 59 篇 school of contro...
  • 57 篇 north china elec...
  • 55 篇 division of deci...
  • 55 篇 state key labora...
  • 54 篇 college of contr...
  • 51 篇 department of el...
  • 47 篇 school of electr...
  • 44 篇 ieee
  • 42 篇 college of compu...
  • 40 篇 hubei key labora...
  • 40 篇 beijing institut...
  • 38 篇 school of contro...
  • 35 篇 school of inform...
  • 35 篇 school of electr...

作者

  • 87 篇 johansson karl h...
  • 44 篇 wu kehe
  • 40 篇 byung-ju yi
  • 36 篇 e. rogers
  • 36 篇 eric rogers
  • 36 篇 fang fang
  • 35 篇 ai bo
  • 34 篇 hamid soltanian-...
  • 32 篇 yong yan
  • 32 篇 junping du
  • 31 篇 krzysztof galkow...
  • 31 篇 karl h. johansso...
  • 30 篇 li yuancheng
  • 30 篇 wen tan
  • 28 篇 wei li
  • 28 篇 zhong zhangdui
  • 27 篇 li li
  • 27 篇 fu minyue
  • 26 篇 rojas cristian r...
  • 26 篇 shaomin zhang

语言

  • 9,152 篇 英文
  • 244 篇 其他
  • 214 篇 中文
  • 3 篇 法文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer and Control Engineering"
9607 条 记 录,以下是4761-4770 订阅
排序:
A Supplier Group Recognition Framework Based on Multi-source Data Fusion
A Supplier Group Recognition Framework Based on Multi-source...
收藏 引用
Chinese Automation Congress (CAC)
作者: Xinqiang Ma Likai Shen Baoquan Zhong Yi Huang Yong Liu Maonian Wu College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science Hangzhou Dianzi University Hangzhou China School of Artificial Intelligence Chongqing University of Arts and Sciences Chongqing China Institute of Cyber-Systems and Control Zhejiang University Hangzhou China School of Information Engineering Huzhou University Hangzhou China
In a large number of bidding cases, there exists a widespread phenomenon of supplier group hustling or lowering the price to win the bid. In order to solve this problem and curb this trend, we propose a supplier group... 详细信息
来源: 评论
Application of Trusted Computing Technology in Active Defense of Smart Substation
收藏 引用
Journal of Physics: Conference Series 2021年 第1期2108卷
作者: Liandong Chen Tao Yang Gang Li Xin Liu Ning Lu Kai Cheng Xiaopeng Xin State Grid HeBei Information and Telecommunication Branch Shijiazhuang Hebei China North China Electric Power University/School of Control and Computer Engineering Baoding Hebei China State Grid HeBei Electric Power Co. Ltd Shijiazhuang Hebei China
Nowadays, most security systems mainly use firewall, intrusion detection, virus killing and other technologies to defend against external attacks. This passive defense mode has low efficiency and high false positive r...
来源: 评论
Initial ASEAN digital security and interoperability standard proposal
收藏 引用
AIP Conference Proceedings 2023年 第1期2739卷
作者: Sangsuree Vasupongayya Gunawan Hutagalung Obrina Candra Chalee Vorakulpipat Doni Purnomo Parinda Wattanasri Eko Supriyanto Shukor Abd Razak Othman Ibrahim Anazida Zainal Sri Devi Ravana Hiep Cong Pham Tharith Sriv Daw Khin Myo Su Mora Hertanto Agus Winarno Prabaswari Raden Muhammad Taufik Yuniantoro Badrus Zaman Fatmawati Retna Apsari Yutika Amelia Effendi Norjihan Abdul Ghani Zarina Shukur Hamidah Ibrahim Nur Izura Udzir Marnel Peradilla Jude Michael Teves Nestor Michael Tiglao Cenon Alfonso Pg Emeroylariffion Abas Mueen Uddin Agustin Kusumayati Brian Sri Prahastuti Department of Computer Engineering Faculty of Engineering Prince of Songkla University Hatyai Songkhla 90110 THAILAND Directorate General of Post and Information Technology Ministry of Communication and Information Technology Jakarta INDONESIA Politeknik Siber dan Sandi Negara National Cyber & Crypto Agency (BSSN) Depok West Java INDONESIA Information Security Research Team at National Electronics and Computer Technology Center Bangkok THAILAND National Standardization Agency of Indonesia Jakarta INDONESIA Department of Disease Control Ministry of Public Health Mueang Nonthaburi Nonthaburi THAILAND School of Biomedical Engineering and Health Sciences Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA IJN-UTM Cardiovascular Engineering Center Institute of Human Centered Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Johor MALAYSIA Faculty of Computer Science & Information Technology Universiti Malaya Kuala Lumpur MALAYSIA RMIT University Vietnam Ho Chi Minh City VIETNAM Royal University of Phnom Penh Phnom Penh CAMBODIA Yangon University of Economics Yangon MYANMAR Agency for the Assessment and Application of Technology (BPPT) Jakarta INDONESIA Faculty of Science and Technology Universitas Airlangga Surabaya East Java INDONESIA Faculty of Advanced Technology and Multidiscipline Universitas Airlangga Surabaya East Java INDONESIA Centre for Cyber Security Universiti Kebangsaan Malaysia Bangi Selangor MALAYSIA Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang Selangor MALAYSIA Computer Technology Department College of Computer Studies De La Salle University Manila PHILIPPINES Software Technology Department College of Computer Studies De La Salle University Manila PHILIPPINES Electrical and Electronics Engineering Institute University of the Philippines Diliman Quezon City P
In this work, the result of the initial attempt to propose an Association of Southeast Asian Nations (ASEAN) digital security and interoperability standard to support the mobility among ASEAN countries is presented. L...
来源: 评论
An improved quantum algorithm for A-optimal projection
arXiv
收藏 引用
arXiv 2020年
作者: Pan, Shi-Jie Wan, Lin-Chun Liu, Hai-Ling Wang, Qing-Le Qin, Su-Juan Wen, Qiao-Yan Gao, Fei State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China State Key Laboratory of Cryptology P.O. Box 5159 Beijing100878 China Center for Quantum Computing Peng Cheng Laboratory Shenzhen518055 China School of Control and Computer Engineering North China Electric Power University Beijing102206 China
Dimensionality reduction (DR) algorithms, which reduce the dimensionality of a given data set while preserving the information of original data set as well as possible, play an important role in machine learning and d... 详细信息
来源: 评论
A Flight control System for Parafoils Based on Improved PID control Approach  36
A Flight Control System for Parafoils Based on Improved PID ...
收藏 引用
第36届中国控制会议
作者: Hao Sun Qinglin Sun Jin Tao Shuzhen Luo Zhengqiang Chen School of Computer and Control Engineering Nankai University
The PID control technique which is improved by linear extended state observer(LESO) is applied to the design of the flight control system for parafoils with Global Position System(GPS). Firstly, in this paper, the non... 详细信息
来源: 评论
Verification code recognition based on active and deep learning
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Dongliang Wang, Bailing Du, XiaoJiang Zhu, Xiaoyan Guan, Zhitao Yu, Xiaoyan Liu, Jingyu School of Computer Science and Technology Shandong University Weihai China School of Computer Science and Technology Harbin Institute of Technology Weihai China Department of Computer and Information Sciences Temple University PhiladelphiaPA United States Computer information center Xidian University Xi'an China School of Control and Computer Engineering North China Electric Power University Beijing China Dept. of Computer Science and Technology Capital Normal University Beijing China Computer information center Intermediate People's Court Weihai China
A verification code is an automated test method used to distinguish between humans and computers. Humans can easily identify verification codes, whereas machines cannot. With the development of convolutional neural ne... 详细信息
来源: 评论
Correlation-based dynamics and systemic risk measures in the cryptocurrency market  16
Correlation-based dynamics and systemic risk measures in the...
收藏 引用
16th IEEE International Conference on Intelligence and Security Informatics, ISI 2018
作者: Liang, Jiaqi Li, Linjing Zeng, Daniel Zhao, Yunwei State Key Laboratory of Management and Control for Complex Systems Chinese Academy of Sciences Institute of Automation Beijing China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China CNCERT/CC Beijing China
Cryptocurrency is a rapid developing financial technology innovation which has attracted a large number of people around the world. The high-speed evolution, radical price fluctuations of cryptocurrency, and the incon... 详细信息
来源: 评论
Attention-based multi-hop reasoning for knowledge graph  16
Attention-based multi-hop reasoning for knowledge graph
收藏 引用
16th IEEE International Conference on Intelligence and Security Informatics, ISI 2018
作者: Wang, Zikang Li, Linjing Zeng, Daniel Dajun Chen, Yue State Key Laboratory of Management and Control for Complex Systems Chinese Academy of Sciences Institute of Automation Beijing China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China CNCERT/CC Beijing China
Knowledge graph plays an important role in detection, prediction, early warning, and other security related applications. A fundamental task in applying knowledge graph is the so-called multi-hop reasoning, which focu... 详细信息
来源: 评论
Underwater Sensor Network Clock Synchronization Algorithm Based on Markov Chain Group Consistency
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2019年 30卷 27-39页
作者: Wei, Lian-Suo Su, Yang Li, Hua Wu, Di School of Computer and Control Engineering Qiqihar University Qiqihar161006 China School of Computing Science and Technology Harbin Engineering University Harbin150001 China
Most of the existing UWSNs clock synchronization algorithms use nodes to exchange data frequently, but neglect the synchronization information received by neighbor nodes within the scope of node-based communication, s... 详细信息
来源: 评论
Remote Sensing Image Classification Method Based on Preferential Adaptive Interval-Value Fuzzy C-Means
Remote Sensing Image Classification Method Based on Preferen...
收藏 引用
International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)
作者: Guozheng Feng Jindong Xu Baode Fan Tianyu Zhao Meng Zhu Xiao Sun Jin Zhou Shiyuan Han School of Computer and Control Engineering Yantai University Yantai China
The heterogeneity of objects within the class and the ambiguity of objects between the classes in remote sensing images cause the uncertainty in ground objects classification. Fuzzy set theory could express the fuzzin... 详细信息
来源: 评论