咨询与建议

限定检索结果

文献类型

  • 68,022 篇 会议
  • 412 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 68,642 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,314 篇 工学
    • 31,306 篇 计算机科学与技术...
    • 26,671 篇 软件工程
    • 11,861 篇 信息与通信工程
    • 9,663 篇 控制科学与工程
    • 7,420 篇 生物工程
    • 6,354 篇 电气工程
    • 4,608 篇 生物医学工程(可授...
    • 3,984 篇 电子科学与技术(可...
    • 3,659 篇 机械工程
    • 3,638 篇 光学工程
    • 3,229 篇 动力工程及工程热...
    • 3,110 篇 网络空间安全
    • 2,671 篇 安全科学与工程
    • 2,658 篇 交通运输工程
    • 2,273 篇 化学工程与技术
    • 2,079 篇 仪器科学与技术
  • 21,487 篇 理学
    • 10,253 篇 数学
    • 7,802 篇 生物学
    • 5,406 篇 物理学
    • 3,626 篇 统计学(可授理学、...
    • 2,662 篇 化学
    • 2,022 篇 系统科学
  • 12,178 篇 管理学
    • 7,029 篇 管理科学与工程(可...
    • 5,972 篇 图书情报与档案管...
    • 3,678 篇 工商管理
  • 4,423 篇 医学
    • 3,722 篇 临床医学
    • 3,620 篇 基础医学(可授医学...
    • 2,538 篇 药学(可授医学、理...
    • 2,028 篇 公共卫生与预防医...
  • 2,806 篇 法学
    • 2,252 篇 社会学
  • 1,638 篇 经济学
  • 1,370 篇 农学
  • 1,135 篇 教育学
  • 405 篇 文学
  • 148 篇 军事学
  • 12 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 1,725 篇 deep learning
  • 1,295 篇 machine learning
  • 1,021 篇 internet of thin...
  • 697 篇 support vector m...
  • 685 篇 feature extracti...
  • 675 篇 blockchain
  • 671 篇 computer vision
  • 659 篇 object detection
  • 562 篇 convolutional ne...
  • 522 篇 forecasting
  • 483 篇 training
  • 435 篇 computational mo...
  • 403 篇 artificial intel...
  • 401 篇 covid-19
  • 383 篇 reinforcement le...
  • 339 篇 long short-term ...
  • 317 篇 predictive model...
  • 309 篇 automation
  • 283 篇 big data
  • 282 篇 image segmentati...

机构

  • 506 篇 chitkara univers...
  • 242 篇 school of comput...
  • 201 篇 university of sc...
  • 183 篇 school of automa...
  • 166 篇 computer science...
  • 142 篇 maharishi school...
  • 129 篇 the islamic univ...
  • 115 篇 computer science...
  • 99 篇 karnataka bangal...
  • 94 篇 school of comput...
  • 87 篇 university of el...
  • 85 篇 huazhong univers...
  • 82 篇 department of co...
  • 80 篇 college of compu...
  • 77 篇 school of comput...
  • 77 篇 university of ch...
  • 76 篇 institute of art...
  • 76 篇 medical technica...
  • 75 篇 school of comput...
  • 74 篇 computer technol...

作者

  • 64 篇 shiva mehta
  • 58 篇 vinay kukreja
  • 54 篇 li yang
  • 48 篇 kukreja vinay
  • 45 篇 sharma vikrant
  • 44 篇 sharma neha
  • 42 篇 deepak gerard
  • 41 篇 calvo d.
  • 41 篇 wang lei
  • 40 篇 wang jing
  • 39 篇 ferrara g.
  • 39 篇 ardid m.
  • 39 篇 gagliardini s.
  • 39 篇 li peng
  • 39 篇 zhang lei
  • 39 篇 rakesh kumar
  • 36 篇 zhang tao
  • 35 篇 chen a.
  • 35 篇 benoit d.m.
  • 35 篇 eddymaoui a.

语言

  • 67,119 篇 英文
  • 1,499 篇 其他
  • 393 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2023 International Conference on Computer Science and Automation Technology, CSAT 2023"
68642 条 记 录,以下是4711-4720 订阅
排序:
Simulating Virtual Environment and Experience for Training, Exergaming, and Edutainment in eXtended Reality (XR): A Survey
Simulating Virtual Environment and Experience for Training, ...
收藏 引用
2023 international conference on computer Applications technology, CCAT 2023
作者: Li, Wanwan University of Tulsa Department of Computer Science TulsaOK United States
In recent years, eXtended Reality (XR) technologies, including Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR), have emerged as transformative technologies in various domains and have revolutioniz... 详细信息
来源: 评论
Improving Φ-OTDR Event Classification Performance with a Semi-Supervised Model  28
Improving Φ-OTDR Event Classification Performance with a Se...
收藏 引用
28th international conference on Optical Fiber Sensors, OFS 2023
作者: Li, Yujiao Yu, Kuanglu Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing Jiaotong University Beijing100044 China
We design a semi-supervised model based on XM-ACAB for Φ-OTDR event classification. The accuracy for six types of events can reach up to 91.0% with a total of only 12 labeled samples in the experiment. © Optica ... 详细信息
来源: 评论
Autonomous Power Supply System for Human Movement in Wearable Devices  3
Autonomous Power Supply System for Human Movement in Wearabl...
收藏 引用
3rd international conference on Electrical Engineering and Control science, IC2ECS 2023
作者: Sun, Xiujuan Hu, Fanzhi Wang, Yafei Zhao, Rui Pan, Tianyi Wang, Chuanjiang College of Electrical Engineering and Automation Shandong University of Science and Technology Shandong Qingdao266590 China Information Center Shandong Lilou Coal Company Limited Shandong Heze274700 China College of Foreign Languages Shandong University of Science and Technology Shandong Qingdao266590 China
The wearable devices use piezoelectric power generation technology to collect the energy generated by human motion. Using the new piezoelectric material PVDF (polyvinylidene fluoride), the piezoelectric oscillator is ... 详细信息
来源: 评论
Observer-Based Sensorless Admittance Control from Demonstrations with Dynamical Systems for Robot-Environment Interaction
Observer-Based Sensorless Admittance Control from Demonstrat...
收藏 引用
2023 IEEE international conference on Unmanned Systems, ICUS 2023
作者: Guo, Yuting Peng, Guangzhu Li, Jiehao Yang, Chenguang School of Automation Nanjing University of Information Science and Technology Nanjing China School of Engineering South China Agricultural University Guangzhou China School of Automation Science and Engineering South China University of Technology Guangzhou China
Compliant motion adaptation is essential in the task of robot interacting with the environment. This paper presents a motion planning framework that generates and tracks a trajectory to achieve the compliant behavior ... 详细信息
来源: 评论
Vulnerability Analysis of Passwords Based on Real Data  6
Vulnerability Analysis of Passwords Based on Real Data
收藏 引用
6th international conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Yu, Wei Ni, Lulin Shi, Yu Liu, Cheng Ji, Qingbing No.30 Institute of Cetc National key laboratory of security communication Sichuan Chengdu610041 China School of Computer Science and Engineering University of Electronic Science and Technology of China No.30 Institute of Cetc National Key Laboratory of Security Communication Sichuan Chengdu610041 China
A password represents the initial line of security for the majority of information systems, and plays a pivotal role in the protection of personal information and the security of digital assets. Based on a substantial... 详细信息
来源: 评论
Access the Prospect of automation in Inventory Management of Construction Projects
Access the Prospect of Automation in Inventory Management of...
收藏 引用
international conference on Civil Engineering Innovative Development in Engineering Advances, ICC-IDEA 2023
作者: Pavan Kumar, B. Arokiaprakash, A. Department of Civil Engineering Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur 603203 India
In construction industry, materials play the major role more than half of the project money is spent on the materials and managing the materials is very much needed for faster completion of project. The use of the aut... 详细信息
来源: 评论
Workspace Modeling and Trajectory Mapping for Robotic Execution using Artificial Neural Networks  2
Workspace Modeling and Trajectory Mapping for Robotic Execut...
收藏 引用
2nd international conference on automation, Computing and Renewable Systems, ICACRS 2023
作者: Jha, Abhishek Poorani Ayswariya, P.S. Bhattacharjee, Neelanjan Department of Mechanical Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai India Department of Computer Science and Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai India Department of Mechanical Engineering University of Alberta Edmonton Canada
Demonstrating a task at trajectory level is one of the key concepts in robot programming by demonstration approaches. The suitability of the demonstrated trajectory for robot execution is a challenging problem to answ... 详细信息
来源: 评论
Integration of PLC and Robotic Operating System for Enhanced automation Efficiency'  2
Integration of PLC and Robotic Operating System for Enhanced...
收藏 引用
2nd IEEE international conference on Futuristic Technologies, INCOFT 2023
作者: Saxena, Aditi Ali, Aqeel Abdulsada, Zainab. R. School of Technology Department of Mechatronics Woxsen University Komkole Hyderabad502345 India Medical Technical College Al-Farahidi University Iraq National University of Science and Technology Dhi Qar Iraq
The mix of Robotic Operating System (ROS) and Programmable Logic Controllers (PLCs) has showed promise in improving automation effectiveness in a range of industrial uses. In order to achieve seamless coordination and... 详细信息
来源: 评论
Brain Tumor Detection using CNN
Brain Tumor Detection using CNN
收藏 引用
2023 international conference on System, Computation, automation and Networking, ICSCAN 2023
作者: Brindha, R. Poornima P, U. Pongiannan R, K. Franklin, J. Subramanian, Malavika Angayarkanni, V. Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur India Srm Institute of Science and Technology Department of Electrical and Electronics Engineering Kattankulathur India
The second most common cause of cancer today is a tumour. To detect tumours like brain tumour, the medical field needs a quick, automated, effective, and reliable technique. A crucial part of treatment is detection. D... 详细信息
来源: 评论
Increase The SQLi Attack Success Rate using SqlMap with the use of Tamper Selection Scripts  1
Increase The SQLi Attack Success Rate using SqlMap with the ...
收藏 引用
1st international conference on technology, Engineering, and Computing Applications, ICTECA 2023
作者: Sodik, Seff Mantoro, Teddy Ayu, Media Anugerah Asian, Jelita Nusa Putra University School of Computer Science Sukabumi Indonesia Sampoerna University Department of Computer Science Jakarta Indonesia
SQLi attacks rank 3 in OWASP and MITRE and still become a vulnerability and weakness in many software. SQLi attack is a technique that is relatively common and widely used toward online services in penetration testing... 详细信息
来源: 评论