咨询与建议

限定检索结果

文献类型

  • 68,197 篇 会议
  • 417 篇 期刊文献
  • 209 册 图书

馆藏范围

  • 68,823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,463 篇 工学
    • 31,408 篇 计算机科学与技术...
    • 26,745 篇 软件工程
    • 11,897 篇 信息与通信工程
    • 9,703 篇 控制科学与工程
    • 7,425 篇 生物工程
    • 6,372 篇 电气工程
    • 4,617 篇 生物医学工程(可授...
    • 3,989 篇 电子科学与技术(可...
    • 3,670 篇 机械工程
    • 3,648 篇 光学工程
    • 3,233 篇 动力工程及工程热...
    • 3,129 篇 网络空间安全
    • 2,674 篇 安全科学与工程
    • 2,666 篇 交通运输工程
    • 2,282 篇 化学工程与技术
    • 2,087 篇 仪器科学与技术
  • 21,535 篇 理学
    • 10,279 篇 数学
    • 7,809 篇 生物学
    • 5,419 篇 物理学
    • 3,636 篇 统计学(可授理学、...
    • 2,667 篇 化学
    • 2,025 篇 系统科学
  • 12,208 篇 管理学
    • 7,052 篇 管理科学与工程(可...
    • 5,980 篇 图书情报与档案管...
    • 3,692 篇 工商管理
  • 4,427 篇 医学
    • 3,725 篇 临床医学
    • 3,624 篇 基础医学(可授医学...
    • 2,538 篇 药学(可授医学、理...
    • 2,032 篇 公共卫生与预防医...
  • 2,812 篇 法学
    • 2,255 篇 社会学
  • 1,641 篇 经济学
  • 1,371 篇 农学
  • 1,143 篇 教育学
  • 405 篇 文学
  • 149 篇 军事学
  • 12 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 1,732 篇 deep learning
  • 1,298 篇 machine learning
  • 1,021 篇 internet of thin...
  • 698 篇 support vector m...
  • 686 篇 feature extracti...
  • 677 篇 blockchain
  • 673 篇 computer vision
  • 659 篇 object detection
  • 567 篇 convolutional ne...
  • 524 篇 forecasting
  • 483 篇 training
  • 437 篇 computational mo...
  • 403 篇 artificial intel...
  • 401 篇 covid-19
  • 386 篇 reinforcement le...
  • 339 篇 long short-term ...
  • 325 篇 predictive model...
  • 311 篇 automation
  • 283 篇 image segmentati...
  • 282 篇 big data

机构

  • 506 篇 chitkara univers...
  • 242 篇 school of comput...
  • 201 篇 university of sc...
  • 184 篇 school of automa...
  • 166 篇 computer science...
  • 142 篇 maharishi school...
  • 129 篇 the islamic univ...
  • 115 篇 computer science...
  • 99 篇 karnataka bangal...
  • 95 篇 school of comput...
  • 89 篇 university of el...
  • 86 篇 huazhong univers...
  • 82 篇 college of compu...
  • 82 篇 department of co...
  • 82 篇 university of ch...
  • 78 篇 school of comput...
  • 78 篇 institute of art...
  • 76 篇 school of comput...
  • 76 篇 medical technica...
  • 74 篇 computer technol...

作者

  • 64 篇 shiva mehta
  • 58 篇 vinay kukreja
  • 54 篇 li yang
  • 48 篇 kukreja vinay
  • 45 篇 sharma vikrant
  • 44 篇 sharma neha
  • 42 篇 deepak gerard
  • 41 篇 calvo d.
  • 41 篇 wang lei
  • 40 篇 wang jing
  • 39 篇 ferrara g.
  • 39 篇 ardid m.
  • 39 篇 gagliardini s.
  • 39 篇 li peng
  • 39 篇 zhang lei
  • 39 篇 rakesh kumar
  • 36 篇 zhang tao
  • 35 篇 chen a.
  • 35 篇 benoit d.m.
  • 35 篇 eddymaoui a.

语言

  • 66,238 篇 英文
  • 2,561 篇 其他
  • 588 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2023 International Conference on Computer Science and Automation Technology, CSAT 2023"
68823 条 记 录,以下是1091-1100 订阅
排序:
A Scheme of Secure Location Privacy Sharing in Mobile Crowd Sensing Application Scenario  6
A Scheme of Secure Location Privacy Sharing in Mobile Crowd ...
收藏 引用
6th IEEE Information technology, Networking, Electronic and automation Control conference, ITNEC 2023
作者: Su, Yankang Wang, Zhu Yu, Zhi-Wen Xi'An Gaoxin No.1 High School Member of 2022's Ying Cai Ji Hua Project Sponsored by China Association for Science and Technology Xi'an China Northwestern Polytechnical University School of Computer Science Xi'an China
In this paper, aiming at the problem of secure sharing of location information within a group in a Mobile Crowd Sensing (MCS) application scenario, a scheme of secure sharing of location privacy information among grou... 详细信息
来源: 评论
Continuous-Time Model-Free Adaptive Control for Nonlinear Plants  6
Continuous-Time Model-Free Adaptive Control for Nonlinear Pl...
收藏 引用
6th international conference on Robotics, Control and automation Engineering, RCAE 2023
作者: Yu, Hao Li, Wangjiang School of Automation Beijing Institute of Technology Beijing China
This paper studies continuous-Time model-free adaptive control (MFAC) framework for solving set-point tracking problems of second-order nonlinear time-invariant plants. First, the dynamical linearization process for c... 详细信息
来源: 评论
An Improved Printing Defect Detection Method Based on YOLOv5s  5
An Improved Printing Defect Detection Method Based on YOLOv5...
收藏 引用
5th international conference on Communications, Information System and computer Engineering, CISCE 2023
作者: Liu, Jie Liu, Zhenyong Li, Zhicong Ru, Jiarong Huang, Chengqiang Lin, Xianxin Cai, Zelong Chen, Minsheng School of Mechatronic Engineering and Automation Foshan University Guangdong China
In inkjet printing, various printing defects such as missing prints and stains can occur due to uncertain factors such as industrial production environment and equipment. To ensure print quality and improve detection ... 详细信息
来源: 评论
Improved PEGASIS Routing Protocol for Wireless Sensor Networks  7
Improved PEGASIS Routing Protocol for Wireless Sensor Networ...
收藏 引用
7th IEEE Advanced Information technology, Electronic and automation Control conference, IAEAC 2024
作者: Chen, Ni Wen, Rong Ma, Shuying Wang, Ping Chengdu Technological University School of Network and Communication Engineering Chengdu China University of Electronic Science and Technology of China National Key Laboratory of Science and Technology on Communications Chengdu China
PEGASIS protocol is the classic chain routing protocol, its network is formed into a chain by greedy algorithm, the cluster head is generated by random selection, which is easy to lead to uneven energy consumption of ... 详细信息
来源: 评论
Enhancing Cloud Services: Streamlining Performance Metrics and Cloudlet Scheduling  2
Enhancing Cloud Services: Streamlining Performance Metrics a...
收藏 引用
2nd international conference on automation, Computing and Renewable Systems, ICACRS 2023
作者: Gritto, D. Vasughi, T.S. Department of Computer Science SRM Arts and Science College Tamilnadu Chengalpet603 203 India Department of Computer Applications and Technology SRM Arts and Science College Tamilnadu Chengalpet603 203 India
Enhancing cloud service is the primary goal of cloud stakeholders. It is a comprehensive goal that can be achieved through optimizing performance metrics, effective resource utilization, and prioritizing user satisfac... 详细信息
来源: 评论
Design of WPT-HW Protocol Frequency Switching Reliable Simultaneous Interpreting System Based on LCC-S Network  5
Design of WPT-HW Protocol Frequency Switching Reliable Simul...
收藏 引用
2023 5th international conference on Artificial Intelligence and computer Applications, ICAICA 2023
作者: Gong, Wenlan Wang, Yan Xiao, Jing Chen, Shaonan Wu, Xiaorui Mo, Yuhong Electric Power Research Institute of Guangxi Power Grid Co. Ltd. Southern Power Grid Corporation Wireless Power Transmission Joint Laboratory Nanning China College of Automation Chongqing University Chongqing China
The synchronous transmission of wireless power and signal is one of the research hotspots in wireless power transfer (WPT) technology. This article analyzes the resonant frequency design method of LCC-S compensation n... 详细信息
来源: 评论
Some Thoughts on the Classification Standard of Intelligent Autonomous Level of Measurement and Control System  9
Some Thoughts on the Classification Standard of Intelligent ...
收藏 引用
9th international conference on Big Data and Information Analytics, BigDIA 2023
作者: Yuan, Guangfu Yang, Liu Han, Haoran Li, Yong Shao, Cong Zhan, Siyu Gansu Photoelectric Measurement Technology Research Laboratory Gansu735018 China University of Electronic Science and Technology of China Laboratory of Intelligent Collaborative Computing Chengdu China Trusted Cloud Computing and Big Data Key Laboratory of Sichuan Province Chengdu611731 China
Intelligence is an important trend in the development of measurement and control systems. However, there is still a lack of unified understanding of the intelligent autonomous classification of the measurement and con... 详细信息
来源: 评论
Generating Imperceptible Adversarial Patch Based on Vulnerable Targeted Attack
Generating Imperceptible Adversarial Patch Based on Vulnerab...
收藏 引用
2023 IEEE international conference on Image Processing and computer Applications, ICIPCA 2023
作者: He, Cong Zhao, Manqi Li, Yaqi Jiang, Wangqin School of Automation and Electronic Information Xiangtan University Xiangtan China
The vulnerability and sensitivity of deep neural networks to adversarial examples have attracted researchers' attention towards the security application of deep model. Current methods mainly focus on the aggressiv... 详细信息
来源: 评论
Truncated Predictor Feedback Control for Linear Systems with Multiple Distributed Input Delays  13
Truncated Predictor Feedback Control for Linear Systems with...
收藏 引用
13th IEEE international conference on CYBER technology in automation, Control, and Intelligent Systems, CYBER 2023
作者: Wang, Guangjie Liu, Qingsong School of Information Science and Engineering Wuhan University of Science and Technology Wuhan430081 China
This paper aims to deal with the delay compensation problem for linear systems in the presence of three distributed input delays. A fresh state variable is instituted so as to design the state-based feedback controlle... 详细信息
来源: 评论
Study of the Car Speed Control System Using the Variable Structure Principle  13
Study of the Car Speed Control System Using the Variable Str...
收藏 引用
13th international conference on Advanced computer Information Technologies, ACIT 2023
作者: Nakonechnyi, Markian Ivakhiv, Orest Hirniak, Yuriy Nakonechnyi, Yuriy Viter, Oleksandr Lviv Polytecnic National University Computer Technology Automation and Metrology Institute L'viv Ukraine
The development of modern technologies gives rise to new complex scientific and practical tasks, among which the development and implementation of the latest automatic control systems as a component of technological p... 详细信息
来源: 评论