跳到主要导航
跳到搜索
跳到主要内容
北京理工大学 首页
English
中文
首页
师资队伍
研究单位
科研成果
奖项
按专业知识、名称或附属进行搜索
查看 Scopus 资料
柴 森春
自动化学院
h-index
3197
引用
29
H-指数
根据储存在 Pure 的刊物以及来自 Scopus 的引用文献数量计算
1999
2024
每年的科研成果
概览
指纹图谱
合作网络
科研成果
(217)
相似学者
(20)
指纹图谱
深入其中 Senchun Chai 为活跃的研究主题。这些主题标签来自此人的成果。它们共同形成唯一的指纹。
分类
加权
按字母排序
Engineering
Trajectory Planning
100%
Optimal Control
85%
Simulation Result
84%
Wireless Sensor Network
77%
Agent System
73%
Optimisation Problem
72%
Demonstrates
64%
Computer Simulation
61%
Predictive Control Model
60%
Illustrates
54%
Predictive Control
48%
Control Scheme
46%
Sufficient Condition
46%
Optimal Control Problem
45%
Energy Engineering
43%
Probabilistic Constraint
36%
Control Strategy
36%
Deep Learning
35%
Control Algorithm
35%
Flight Trajectory
34%
Optimization Method
34%
Cooperative
32%
Ground Vehicle
32%
Spacecraft Trajectory
31%
Numerical Example
30%
Experimental Result
28%
Control Model
28%
Unmanned Aerial Vehicle
27%
Deep Neural Network
26%
Delay Time
25%
Design Problem
24%
Tasks
24%
Optimal Trajectory
24%
Multiobjective Optimization
23%
Optimization Strategy
23%
Measurement Noise
23%
Control System
23%
Non-Linear Dynamic
22%
Optimization Technique
21%
Sliding Mode Control
21%
Network Topology
20%
Communication Network
20%
Control Parameter
19%
Nonlinearity
19%
Servo System
19%
Flight Control
19%
Nodes
18%
Finite Number
18%
Solvability
18%
Laplace Operator
18%
Computer Science
Wireless Sensor Network
95%
Trajectory Planning
77%
Optimization Problem
77%
Multi Agent Systems
73%
Multiobjective
69%
Numerical Simulation
63%
Control Strategy
61%
Networked Control System
53%
Mathematical Optimization
47%
tracking control
44%
Intrusion Detection
43%
Extreme Learning Machine
40%
time-delay
39%
Optimal Trajectory
39%
Triggered Event
38%
Communication Delay
38%
Predictive Model
37%
Control Algorithm
35%
Detection Method
34%
Deep Learning
32%
mobile wireless sensor network
32%
Community Detection
32%
Complex Networks
32%
Neural Network
32%
Optimal Control Problem
29%
Detection Algorithm
29%
Optimization Technique
28%
Control Method
27%
localization algorithm
27%
Process Optimization
25%
Denial of Service Attack
24%
Privacy Preserving
24%
Event-Triggered Control
24%
Cyber Physical Systems
24%
Numerical Example
24%
Estimation Error
24%
False Data Injection Attacks
24%
Approximation (Algorithm)
24%
Experimental Result
23%
Sufficient Condition
23%
linear matrix
23%
Nonlinear Programming
23%
Image Segmentation
23%
Minority Class
22%
Intrusion Detection System
21%
Autonomous Vehicles
21%
Clustering Algorithm
21%
Convex Optimization
20%
Wireless Networks
20%
network intrusion detection
19%