咨询与建议

限定检索结果

文献类型

  • 68,029 篇 会议
  • 412 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 68,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,315 篇 工学
    • 31,307 篇 计算机科学与技术...
    • 26,671 篇 软件工程
    • 11,862 篇 信息与通信工程
    • 9,664 篇 控制科学与工程
    • 7,420 篇 生物工程
    • 6,354 篇 电气工程
    • 4,608 篇 生物医学工程(可授...
    • 3,984 篇 电子科学与技术(可...
    • 3,660 篇 机械工程
    • 3,638 篇 光学工程
    • 3,229 篇 动力工程及工程热...
    • 3,111 篇 网络空间安全
    • 2,671 篇 安全科学与工程
    • 2,658 篇 交通运输工程
    • 2,273 篇 化学工程与技术
    • 2,079 篇 仪器科学与技术
  • 21,487 篇 理学
    • 10,253 篇 数学
    • 7,802 篇 生物学
    • 5,406 篇 物理学
    • 3,626 篇 统计学(可授理学、...
    • 2,662 篇 化学
    • 2,022 篇 系统科学
  • 12,178 篇 管理学
    • 7,029 篇 管理科学与工程(可...
    • 5,972 篇 图书情报与档案管...
    • 3,678 篇 工商管理
  • 4,423 篇 医学
    • 3,722 篇 临床医学
    • 3,620 篇 基础医学(可授医学...
    • 2,538 篇 药学(可授医学、理...
    • 2,028 篇 公共卫生与预防医...
  • 2,806 篇 法学
    • 2,252 篇 社会学
  • 1,638 篇 经济学
  • 1,370 篇 农学
  • 1,135 篇 教育学
  • 405 篇 文学
  • 148 篇 军事学
  • 12 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 1,726 篇 deep learning
  • 1,295 篇 machine learning
  • 1,021 篇 internet of thin...
  • 697 篇 support vector m...
  • 686 篇 feature extracti...
  • 675 篇 blockchain
  • 671 篇 computer vision
  • 659 篇 object detection
  • 563 篇 convolutional ne...
  • 523 篇 forecasting
  • 483 篇 training
  • 437 篇 computational mo...
  • 403 篇 artificial intel...
  • 401 篇 covid-19
  • 383 篇 reinforcement le...
  • 339 篇 long short-term ...
  • 319 篇 predictive model...
  • 309 篇 automation
  • 283 篇 big data
  • 282 篇 image segmentati...

机构

  • 506 篇 chitkara univers...
  • 242 篇 school of comput...
  • 201 篇 university of sc...
  • 183 篇 school of automa...
  • 166 篇 computer science...
  • 142 篇 maharishi school...
  • 129 篇 the islamic univ...
  • 115 篇 computer science...
  • 99 篇 karnataka bangal...
  • 94 篇 school of comput...
  • 87 篇 university of el...
  • 85 篇 huazhong univers...
  • 82 篇 department of co...
  • 80 篇 college of compu...
  • 77 篇 school of comput...
  • 77 篇 university of ch...
  • 76 篇 institute of art...
  • 76 篇 medical technica...
  • 75 篇 school of comput...
  • 74 篇 computer technol...

作者

  • 64 篇 shiva mehta
  • 58 篇 vinay kukreja
  • 54 篇 li yang
  • 48 篇 kukreja vinay
  • 45 篇 sharma vikrant
  • 44 篇 sharma neha
  • 42 篇 deepak gerard
  • 41 篇 calvo d.
  • 41 篇 wang lei
  • 40 篇 wang jing
  • 39 篇 ferrara g.
  • 39 篇 ardid m.
  • 39 篇 gagliardini s.
  • 39 篇 li peng
  • 39 篇 zhang lei
  • 39 篇 rakesh kumar
  • 36 篇 zhang tao
  • 35 篇 chen a.
  • 35 篇 benoit d.m.
  • 35 篇 eddymaoui a.

语言

  • 67,126 篇 英文
  • 1,499 篇 其他
  • 393 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2023 International Conference on Computer Science and Automation Technology, CSAT 2023"
68649 条 记 录,以下是4721-4730 订阅
排序:
Research on Filter Testing Based on Microwave Power Devices  5
Research on Filter Testing Based on Microwave Power Devices
收藏 引用
5th IEEE international conference on Power, Intelligent Computing and Systems, ICPICS 2023
作者: Wu, Han Yao, Ding Zeng, Ziyue Jiang, Yong Yuan, Yuan Test Center Jiangsu Automation Research Institute Lianyungang China
With the advancement of science and technology and the arrival of the information age, microwave technology has made rapid progress. As an important branch of radio electronics, microwave technology has been widely ap... 详细信息
来源: 评论
Workspace Modeling and Trajectory Mapping for Robotic Execution using Artificial Neural Networks  2
Workspace Modeling and Trajectory Mapping for Robotic Execut...
收藏 引用
2nd international conference on automation, Computing and Renewable Systems, ICACRS 2023
作者: Jha, Abhishek Poorani Ayswariya, P.S. Bhattacharjee, Neelanjan Department of Mechanical Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai India Department of Computer Science and Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai India Department of Mechanical Engineering University of Alberta Edmonton Canada
Demonstrating a task at trajectory level is one of the key concepts in robot programming by demonstration approaches. The suitability of the demonstrated trajectory for robot execution is a challenging problem to answ... 详细信息
来源: 评论
Using Sysbench, Analyze the Performance of Various Guest Virtual Machines on A Virtual Box Hypervisor  2
Using Sysbench, Analyze the Performance of Various Guest Vir...
收藏 引用
2nd international conference for Innovation in technology, INOCON 2023
作者: Pokharana, Anchal Gupta, Rishit Chandigarh University Department of Computer Science Engineering India
Virtual Machines are classified as computers program also called image, which acts as a whole computer. It is real time emulation of an OS which work on a host machine and has access to some portion of its resources b... 详细信息
来源: 评论
AR-based Remote Maintenance System Design for Buses
AR-based Remote Maintenance System Design for Buses
收藏 引用
2023 international conference on computer, Internet of Things and Smart City, CIOTSC 2023
作者: Sun, Xiaoqi Zhang, Weizhong Zhao, Junli Zhang, Hongfeng Qingdao University School of Computer Science and Technology Qingdao China Qingdao Dianzhiyun Intelligent Technology Co Ltd Technology Department Qingdao China
The Bus is an essential way of transportation in China, and the operation and maintenance of the bus is an important task to ensure regular operation. To improve the efficiency of bus operation and maintenance as well... 详细信息
来源: 评论
Distribution Network Theoretical Line Loss Analysis Based on BP Neural Network Algorithm  3
Distribution Network Theoretical Line Loss Analysis Based on...
收藏 引用
3rd international conference on Consumer Electronics and computer Engineering, ICCECE 2023
作者: Ye, Xin Lv, Zhiming Jiangxi University of Science and Technology School of Information Engineering Ganzhou Jiangxi China State Grid Ganzhou Company GanZhou JiangXi China Jiangxi Ganzhou Institute of Technology Department of Information Engineering Jiangxi Ganzhou China
In order to use accurate and easy-To-use line loss calculation method to calculate the theoretical line loss of distribution network, this paper proposes the use of BP neural network algorithm. Aiming at the disadvant... 详细信息
来源: 评论
Design of Semiconductor Laser Temperature Control System Based on Fuzzy Neural Network PID Control  5
Design of Semiconductor Laser Temperature Control System Bas...
收藏 引用
5th international conference on Intelligent Control, Measurement and Signal Processing, ICMSP 2023
作者: Yang, Jiameng Zhang, Wancheng Yang, Zhixuan Zhang, Cong Ju, Jiatong Wei, Ming Zhang, Yuhao Nie, Weiping School of Mechanical & Electrical Engineering School of Computer Science and Engineering Wuhan Institute of Technology China School of Electrical and Information Engineering School of Mechanical & Electrical Engineering Wuhan Institute of Technology China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan Fiberhome Technical Services Co.Ltd China School of Mechanical & Electrical Engineering Wuhan Institute of Technology Suzhou Sunde Laser Technology Co. LTD China
The paper describes a fuzzy-neural hybrid system to meet the rigorous requirement of the temperature control system of semiconductor laser. Fuzzy controller and neural network controller are used to optimize PID param... 详细信息
来源: 评论
Security and Privacy Aware Blockchain Technique for 6G Driven Vehicular Communication Network  5
Security and Privacy Aware Blockchain Technique for 6G Drive...
收藏 引用
5th IEEE international conference on Advances in Electronics, computers and Communications, ICAECC 2023
作者: Kohli, Priya Sharma, Sachin Graphic Era Hill University Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India
When making an viable intelligent connected vehicular communication environment, the security of the vehicle and the security of the driver's honest to goodness personality are of the most extreme significance. Bl... 详细信息
来源: 评论
Increase The SQLi Attack Success Rate using SqlMap with the use of Tamper Selection Scripts  1
Increase The SQLi Attack Success Rate using SqlMap with the ...
收藏 引用
1st international conference on technology, Engineering, and Computing Applications, ICTECA 2023
作者: Sodik, Seff Mantoro, Teddy Ayu, Media Anugerah Asian, Jelita Nusa Putra University School of Computer Science Sukabumi Indonesia Sampoerna University Department of Computer Science Jakarta Indonesia
SQLi attacks rank 3 in OWASP and MITRE and still become a vulnerability and weakness in many software. SQLi attack is a technique that is relatively common and widely used toward online services in penetration testing... 详细信息
来源: 评论
Vulnerability Analysis of Passwords Based on Real Data  6
Vulnerability Analysis of Passwords Based on Real Data
收藏 引用
6th international conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Yu, Wei Ni, Lulin Shi, Yu Liu, Cheng Ji, Qingbing No.30 Institute of Cetc National key laboratory of security communication Sichuan Chengdu610041 China School of Computer Science and Engineering University of Electronic Science and Technology of China No.30 Institute of Cetc National Key Laboratory of Security Communication Sichuan Chengdu610041 China
A password represents the initial line of security for the majority of information systems, and plays a pivotal role in the protection of personal information and the security of digital assets. Based on a substantial... 详细信息
来源: 评论
How F0 Contours Reflect Speech Nuclear Events  12
How F0 Contours Reflect Speech Nuclear Events
收藏 引用
12th international conference on Speech technology and Human-computer Dialogue, SpeD 2023
作者: Jitcǎ, Doina Institute of Computer Science Romanian Academy-Iassy Branch Iassy Romania
The paper proposes a cognitive model of information structure in order to deduce the structure and the nuclear element hierarchy of intonational contours. We formulate the hypothesis that speech information items are ... 详细信息
来源: 评论