咨询与建议

限定检索结果

文献类型

  • 68,035 篇 会议
  • 418 篇 期刊文献
  • 205 册 图书

馆藏范围

  • 68,658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,345 篇 工学
    • 31,346 篇 计算机科学与技术...
    • 26,655 篇 软件工程
    • 11,916 篇 信息与通信工程
    • 9,712 篇 控制科学与工程
    • 7,420 篇 生物工程
    • 6,370 篇 电气工程
    • 4,603 篇 生物医学工程(可授...
    • 3,990 篇 电子科学与技术(可...
    • 3,706 篇 机械工程
    • 3,631 篇 光学工程
    • 3,232 篇 动力工程及工程热...
    • 3,159 篇 网络空间安全
    • 2,671 篇 安全科学与工程
    • 2,657 篇 交通运输工程
    • 2,277 篇 化学工程与技术
    • 2,077 篇 仪器科学与技术
  • 21,486 篇 理学
    • 10,260 篇 数学
    • 7,801 篇 生物学
    • 5,408 篇 物理学
    • 3,621 篇 统计学(可授理学、...
    • 2,661 篇 化学
    • 2,021 篇 系统科学
  • 12,162 篇 管理学
    • 7,022 篇 管理科学与工程(可...
    • 5,963 篇 图书情报与档案管...
    • 3,672 篇 工商管理
  • 4,417 篇 医学
    • 3,716 篇 临床医学
    • 3,614 篇 基础医学(可授医学...
    • 2,538 篇 药学(可授医学、理...
    • 2,022 篇 公共卫生与预防医...
  • 2,804 篇 法学
    • 2,250 篇 社会学
  • 1,635 篇 经济学
  • 1,369 篇 农学
  • 1,136 篇 教育学
  • 405 篇 文学
  • 148 篇 军事学
  • 12 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 1,726 篇 deep learning
  • 1,308 篇 machine learning
  • 1,021 篇 internet of thin...
  • 696 篇 support vector m...
  • 686 篇 feature extracti...
  • 675 篇 blockchain
  • 674 篇 computer vision
  • 659 篇 object detection
  • 555 篇 convolutional ne...
  • 522 篇 forecasting
  • 483 篇 training
  • 435 篇 computational mo...
  • 405 篇 artificial intel...
  • 399 篇 covid-19
  • 383 篇 reinforcement le...
  • 337 篇 long short-term ...
  • 317 篇 predictive model...
  • 308 篇 automation
  • 280 篇 big data
  • 279 篇 convolution

机构

  • 506 篇 chitkara univers...
  • 242 篇 school of comput...
  • 201 篇 university of sc...
  • 183 篇 school of automa...
  • 165 篇 computer science...
  • 142 篇 maharishi school...
  • 129 篇 the islamic univ...
  • 115 篇 computer science...
  • 99 篇 karnataka bangal...
  • 92 篇 school of comput...
  • 87 篇 university of el...
  • 86 篇 huazhong univers...
  • 82 篇 department of co...
  • 80 篇 college of compu...
  • 77 篇 school of comput...
  • 77 篇 university of ch...
  • 76 篇 institute of art...
  • 75 篇 school of comput...
  • 75 篇 medical technica...
  • 74 篇 computer technol...

作者

  • 64 篇 shiva mehta
  • 58 篇 vinay kukreja
  • 54 篇 li yang
  • 48 篇 kukreja vinay
  • 45 篇 sharma vikrant
  • 44 篇 sharma neha
  • 42 篇 wang lei
  • 42 篇 deepak gerard
  • 40 篇 calvo d.
  • 40 篇 wang jing
  • 39 篇 li peng
  • 39 篇 zhang lei
  • 39 篇 rakesh kumar
  • 38 篇 ferrara g.
  • 38 篇 ardid m.
  • 38 篇 gagliardini s.
  • 36 篇 zhang tao
  • 35 篇 vishal jain
  • 34 篇 chen a.
  • 34 篇 benoit d.m.

语言

  • 67,100 篇 英文
  • 1,534 篇 其他
  • 386 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=2023 International Conference on Computer Science and Automation Technology, CSAT 2023"
68658 条 记 录,以下是4891-4900 订阅
排序:
Proxy-based Super Twisting Control Algorithm for Aerial Manipulators  13
Proxy-based Super Twisting Control Algorithm for Aerial Mani...
收藏 引用
13th IEEE international conference on CYBER technology in automation, Control, and Intelligent Systems, CYBER 2023
作者: Hua, Zhengyu Xu, Bowen Xing, Li Quan, Fengyu Xiong, Xiaogang Chen, Haoyao School of Mechanical Engineering and Automation Harbin Institute of Technology Shenzhen China
Aerial manipulators are composed of an aerial multi-rotor that is equipped with a 6-DOF servo robot arm. To achieve precise position and attitude control during the arm's motion, it is critical for the system to h... 详细信息
来源: 评论
Ship Intrusion Detection technology Based on Bayesian Optimization Algorithm and XGBoost  3
Ship Intrusion Detection Technology Based on Bayesian Optimi...
收藏 引用
3rd international conference on Electrical Engineering and Control science, IC2ECS 2023
作者: Zhou, Aobo Zhu, Qi Zhang, Jundong Meng, Ke School of Marine Engineering Dalian Maritime University Liaoning Dalian China
Cybersecurity is a prerequisite for maritime safety. This study focuses on intelligent ship integrated automation system, analyzing the principles and shortcomings of these system. We propose a machine learning-based ... 详细信息
来源: 评论
AI-Driven Farming: CNN-Based Rice Leaf Disease Identification and Classification
AI-Driven Farming: CNN-Based Rice Leaf Disease Identificatio...
收藏 引用
2023 international conference on Advanced Mechatronics, Intelligent Manufacture and Industrial automation, ICAMIMIA 2023
作者: Alianto, Tegar Erik Fauzi Abdulloh, Ferian Aminuddin, Afrig Rahardi, Majid Universitas Amikom Yogyakarta Faculty of Computer Science Sleman Indonesia
This research investigates the performance of three distinct neural network models, including the Convolutional Neural Network (CNN) architecture, InceptionV3, and Xception, for classifying rice plant diseases. Evalua... 详细信息
来源: 评论
Employee Recruitment Analysis Using the MOORA Method
Employee Recruitment Analysis Using the MOORA Method
收藏 引用
2023 international conference on Informatics Engineering, science and technology, INCITEST 2023
作者: Mardiani, G.T. Susanto, R. Harihayati, T. Universitas Komputer Indonesia Informatics Engineering Engineering and Computer Science Bandung Indonesia
A company definitely needs employees to help in its business processes. These employees are generated from the recruitment process. Errors in the recruitment process will have an impact on the company's productivi... 详细信息
来源: 评论
Study on a NiTiHfTa shape memory alloy with high-pressure torsion and subsequent annealing  9
Study on a NiTiHfTa shape memory alloy with high-pressure to...
收藏 引用
9th international conference on Mechanical Engineering, Materials, and automation technology, MMEAT 2023
作者: Zhang, Jintao Hu, Peng Wang, Shibo Zhang, Yu Huang, Yi Ding, Hua School of Materials Science and Engineering Northeastern University Shenyang110819 China Key Laboratory of Light Structural Materials of Liaoning Province Northeastern University Shenyang110819 China Department of Design and Engineering Faculty of Science and Technology Bournemouth University Dorset PooleBH12 5BB United Kingdom Materials Research Group Department of Mechanical Engineering University of Southampton SouthamptonSO17 1BJ United Kingdom
An alloy with the composition of 49.6Ni-35.4Ti-9Hf-6Ta (at%) was processed by high-pressure torsion (HPT) and post-HPT annealing treatment. The microhardness of HPT-processed samples increased obviously, and amorphous... 详细信息
来源: 评论
Transformation of Network Flow Data into Images for Intrusion Detection Using Convolutional Neural Networks
Transformation of Network Flow Data into Images for Intrusio...
收藏 引用
2023 international Russian automation conference, RusAutoCon 2023
作者: Golubev, Sergey Novikova, Evgenia St. Petersburg Federal Research Center of Russian Academy of Sciences Laboratory of Computer Security Problems St. Petersburg Russia
One of the most challenging problems in intrusion detection is the development of techniques that are able to detect novel and unseen attacks. Currently, the researchers are investigating applicability of the deep lea... 详细信息
来源: 评论
An approach to interval-valued possibility intuitionistic fuzzy soft sets for treating drug addict patients based on decision making  2
An approach to interval-valued possibility intuitionistic fu...
收藏 引用
2nd international conference on Advancements in Electrical, Electronics, Communication, Computing and automation, ICAECA 2023
作者: Aruna, Devi.S. Jayanthi, D. Research Scholar Avinashilingam Institute of Home Science and Higher Education for Women Kumaraguru College of Technology Tamil Nadu Coimbatore India Avinashilingam Institute of Home Science and Higher Education for Women Tamil Nadu Coimbatore India
A decision maker has to choose a optimized solution among the many possible solutions available under a uncertain circumstance. To find one such optimal solution in a uncertain circumstance is not a easy task for anyo... 详细信息
来源: 评论
Applied Research on Attribute-Based Encryption Scheme with Two-level Encryption  3
Applied Research on Attribute-Based Encryption Scheme with T...
收藏 引用
2023 IEEE 3rd international conference on Data science and computer Application, ICDSCA 2023
作者: Ma, Zhuangjun Zhou, Shuaiyu Yu, Bohua Harbin Institute of Technology School of Marine Science and Technology Weihai China Yunnan University School of Software Kunming China Anhui University School of Internet Hefei China
This study addresses the issue of sensitive data protection in cloud computing environments and proposes a solution that combines Attribute-Based Encryption with the Rivest-Shamir-Adleman encryption algorithm to safeg... 详细信息
来源: 评论
The Role of ERNIE Model in Analyzing Hotel Reviews using Chinese Sentiment Analysis
The Role of ERNIE Model in Analyzing Hotel Reviews using Chi...
收藏 引用
2023 international conference on computer Communication and Informatics, ICCCI 2023
作者: Jie, Lee Hao Ayyasamy, Ramesh Kumar Sangodiah, Anbuselvan Jalil, Norazira Binti A Krishnan, Kesavan Chinnasamy, P. University Tunku Abdul RahmanKampar Faculty of Information and Communication Technology Malaysia Faculty of Computing and Engineering Quest International University Ipoh Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Kuala Lumpur Malaysia MLR Institute of Technology Department of Computer Science and Engineering Hyderabad India
This research aims to find the best deep learning model to do Chinese sentimental analysis. BERT's model may work well in the English language but not work in the Chinese language. English is easier to encode in e... 详细信息
来源: 评论
Artificial Intelligence Techniques for Early Prediction of Neonatal Jaundice  4
Artificial Intelligence Techniques for Early Prediction of N...
收藏 引用
4th international conference on Computation, automation and Knowledge Management, ICCAKM 2023
作者: Remya, K. Ramya, R. Sadim, Mohd Kalpana, B. Amirthayogam, G. Hindustan Institute of Technology and Science India Psna College of Engineering and Technology India Ies Institute of Technology and Management Ies University Bhopal India Prince Shri Venkateshwara Padmavathy Engineering College S&h Chennai India Department of Information Technology Kelambakkam India
The potential of artificial intelligence (AI) methods for the early detection of neonatal jaundice is examined in this study, a common condition affecting newborns. Through comprehensive research, we discover that AI ... 详细信息
来源: 评论