咨询与建议

限定检索结果

文献类型

  • 6,019 篇 会议
  • 3,595 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 9,632 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,098 篇 工学
    • 3,086 篇 计算机科学与技术...
    • 2,682 篇 软件工程
    • 1,869 篇 控制科学与工程
    • 1,217 篇 电气工程
    • 1,042 篇 信息与通信工程
    • 748 篇 机械工程
    • 704 篇 电子科学与技术(可...
    • 557 篇 动力工程及工程热...
    • 475 篇 生物工程
    • 360 篇 仪器科学与技术
    • 352 篇 生物医学工程(可授...
    • 335 篇 光学工程
    • 294 篇 化学工程与技术
    • 241 篇 交通运输工程
    • 195 篇 安全科学与工程
    • 174 篇 土木工程
    • 161 篇 建筑学
    • 158 篇 力学(可授工学、理...
  • 3,431 篇 理学
    • 1,921 篇 数学
    • 895 篇 系统科学
    • 719 篇 物理学
    • 624 篇 统计学(可授理学、...
    • 544 篇 生物学
    • 257 篇 化学
  • 1,369 篇 管理学
    • 948 篇 管理科学与工程(可...
    • 444 篇 图书情报与档案管...
    • 334 篇 工商管理
  • 337 篇 医学
    • 272 篇 临床医学
    • 228 篇 基础医学(可授医学...
  • 175 篇 法学
    • 149 篇 社会学
  • 148 篇 经济学
  • 69 篇 农学
  • 52 篇 教育学
  • 16 篇 军事学
  • 12 篇 艺术学
  • 11 篇 文学
  • 1 篇 哲学

主题

  • 266 篇 control systems
  • 178 篇 feature extracti...
  • 174 篇 optimization
  • 168 篇 computational mo...
  • 142 篇 predictive model...
  • 129 篇 stability analys...
  • 127 篇 neural networks
  • 107 篇 mathematical mod...
  • 105 篇 deep learning
  • 90 篇 convergence
  • 89 篇 educational inst...
  • 87 篇 simulation
  • 87 篇 uncertainty
  • 86 篇 process control
  • 85 篇 computer science
  • 85 篇 real-time system...
  • 85 篇 trajectory
  • 85 篇 training
  • 84 篇 linear matrix in...
  • 83 篇 support vector m...

机构

  • 1,304 篇 school of contro...
  • 200 篇 school of comput...
  • 186 篇 school of contro...
  • 175 篇 school of contro...
  • 167 篇 school of comput...
  • 66 篇 control and inte...
  • 60 篇 school of contro...
  • 57 篇 north china elec...
  • 56 篇 division of deci...
  • 55 篇 state key labora...
  • 54 篇 college of contr...
  • 51 篇 department of el...
  • 46 篇 school of electr...
  • 44 篇 ieee
  • 41 篇 hubei key labora...
  • 41 篇 college of compu...
  • 40 篇 beijing institut...
  • 38 篇 school of contro...
  • 35 篇 school of inform...
  • 35 篇 school of electr...

作者

  • 87 篇 johansson karl h...
  • 44 篇 wu kehe
  • 40 篇 byung-ju yi
  • 36 篇 e. rogers
  • 36 篇 eric rogers
  • 35 篇 ai bo
  • 35 篇 fang fang
  • 34 篇 hamid soltanian-...
  • 32 篇 yong yan
  • 32 篇 junping du
  • 31 篇 krzysztof galkow...
  • 31 篇 karl h. johansso...
  • 30 篇 li yuancheng
  • 30 篇 wen tan
  • 28 篇 wei li
  • 28 篇 zhong zhangdui
  • 27 篇 li li
  • 27 篇 fu minyue
  • 26 篇 rojas cristian r...
  • 26 篇 shaomin zhang

语言

  • 9,169 篇 英文
  • 251 篇 其他
  • 214 篇 中文
  • 3 篇 法文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=School of Control and Computer Engineering"
9632 条 记 录,以下是511-520 订阅
排序:
Distributed generalized Nash equilibrium seeking:event-triggered coding-decoding-based secure communication
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 271-284页
作者: Shaofu YANG Wenying XU Wangli HE Jinde CAO School of Computer Science and Engineering Southeast University School of Mathematics Southeast University Key Laboratory of Advanced Control and Optimization for Chemical Processes East China University of Science and Technology
In this paper, we consider the distributed generalized Nash equilibrium(GNE) seeking problem in strongly monotone games. The transmission among players is implemented through a digital communication network with limit... 详细信息
来源: 评论
Dynamic Moving Target Defense Strategy Based on Adaptive Port Hopping in SDN
Dynamic Moving Target Defense Strategy Based on Adaptive Por...
收藏 引用
2023 International Conference on computer Network Security and Software engineering, CNSSE 2023
作者: Dang, Fangfang Wu, Kehe Li, Shuai Liu, Han Song, Yifan Zhang, Xiaoliang The State Grid Henan Information & Communication Company China School of Control and Computer Engineering North China Electric Power University Beijing102206 China
Distributed Denial of Service (DDoS) is a huge hazard to software-defined networks (SDN). Active defense technology is one of the effective measures to ensure the security of SDN. Active defense can increase the diffi... 详细信息
来源: 评论
PCB Defect Detection Method Based on Improved RetinaNet  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Xu, Yusheng Cao, Xinrong Hu, Rong Keikhosrokiani, Pantea Li, Zuoyong College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China School of Computer Sciences Universiti Sains Malaysia Penang11800 Malaysia
In the electronic industry product quality control, PCB defect detection is a crucial part, which has the characteristics of small defect size and high similarity. The existing defect detection methods are still not g... 详细信息
来源: 评论
Boarding Pass Positioning with Jointly Multi-channel Segmentation and Perspective Transformation Correction  4th
Boarding Pass Positioning with Jointly Multi-channel Segmen...
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Wu, Jiahui Li, Zuoyong Keikhosrokiani, Pantea Cai, Yuanzheng College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China School of Computer Sciences Universiti Sains Malaysia Penang Minden11800 Malaysia
To solve the problem of boarding pass positioning with image tilt and sticking, we proposed a jointly boarding pass positioning and correction algorithm using multi-channel color components. First, a local threshold s... 详细信息
来源: 评论
Fed-Autoformer: A Federated Learning-Based Battery Anomaly Detection Approach for Electric Vehicle Charging with Privacy Preservation  30th
Fed-Autoformer: A Federated Learning-Based Battery Anomaly D...
收藏 引用
30th International Conference on Computational and Experimental engineering and Sciences, ICCES 2024
作者: Yan, Xuhan Yang, Shunbo Guo, Yiguo Fu, Yimu Wu, Sixing Li, Jianbin School of Control and Computer Engineering North China Electric Power University Beijing China Economic Technology Research Institute State Grid Shandong Electric Power Company Shandong Jinan City China
The battery management system ensures the safe operation of electric vehicles (EVs) by detecting abnormalities in the battery energy storage system. However, the extensive and widely dispersed data in EV battery data,... 详细信息
来源: 评论
Short Circuit and Connection Fault Diagnosis for Lithium-ion Battery Pack Based on Differential Voltage Changes and Independent Component Analysis  4
Short Circuit and Connection Fault Diagnosis for Lithium-ion...
收藏 引用
4th International Conference on Energy, Power and Electrical engineering, EPEE 2024
作者: Zhang, Luan Liu, Hanxiao Li, Yang Li, Liwei Shandong University School of Control Science and Engineering Jinan China Qingdao Power Supply Company Shandong Electric Power Company State Grid Qingdao China Shandong University School of Computer Science and Technology Qingdao China
In order to avoid thermal runaway as well as ensure safe and stable operation of battery system, it is vital to perform rapid and accurate diagnosis for early faults with similar characteristics. In this paper, a shor... 详细信息
来源: 评论
Class Incremental Learning Method for Hyperspectral Images Based on Real Data Playback Mechanism and Classification Network Optimization  15th
Class Incremental Learning Method for Hyperspectral Images B...
收藏 引用
15th International Conference on Genetic and Evolutionary Computing, ICGEC 2023
作者: Liu, Xiaodong Wang, Siqi Liu, Huanyu Li, Junbao Department of Automatic Test and Control School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China School of Computer Science and Technology Information Countermeasure Technique Institute Harbin Institute of Technology Harbin150080 China
In recent years, the hyperspectral image (HSI) classification has attracted great attention in the field of earth observation. With the expansion of application scenarios and the continuous improvement of application ... 详细信息
来源: 评论
Accelerating Data Transfer in Dataflow Architectures Through a Look-Ahead Acknowledgment Mechanism
收藏 引用
Journal of computer Science & Technology 2022年 第4期37卷 942-959页
作者: Yu-Jing Feng De-Jian Li Xu Tan Xiao-Chun Ye Dong-Rui Fan Wen-Ming Li Da Wang Hao Zhang Zhi-Min Tang State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China Beijing Smartchip Microelectronics Technology Company Limited Beijing 100000China School of Computer and Control Engineering University of Chinese Academy of SciencesBeijing 100190China
The dataflow architecture,which is characterized by a lack of a redundant unified control logic,has been shown to have an advantage over the control-flow architecture as it improves the computational performance and p... 详细信息
来源: 评论
Enabling Borderless Office Security: A Comprehensive Zero-Trust Digital Grid Architecture for Flexible Resource Access and Data Protection  9
Enabling Borderless Office Security: A Comprehensive Zero-Tr...
收藏 引用
9th Annual International Conference on Network and Information Systems for computers, ICNISC 2023
作者: Liu, Fuyang Luo, Zhen Wang, Zhe Yin, Lu Zhang, Yunhou Ren, Jiyuan Peng, Yuhuai Dispatching and Control Center Northeast Branch State Grid Corporation of China Shenyang China School of Computer Science and Engineering Northeastern University Shenyang China
The traditional trust-based security architecture is hard to ensure data security in borderless office. To address this problem, a zero-trust digital grid security architecture for borderless office is proposed. The a... 详细信息
来源: 评论
A Trust Inference Method Employing Combinatorial Strategies
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Xiao, Ruili Tong, Xiangrong Lin, Yaguang School of Computer and Control Engineering Yantai University Yantai264005 China
Most trust inference algorithms based on Q -learning and learning automata often suffer from the problem of insufficient storage space, as well as some algorithms using the shortest trust path do not fully utilize the... 详细信息
来源: 评论