咨询与建议

限定检索结果

文献类型

  • 908 篇 会议
  • 16 册 图书
  • 4 篇 期刊文献

馆藏范围

  • 928 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 571 篇 工学
    • 450 篇 计算机科学与技术...
    • 284 篇 软件工程
    • 135 篇 信息与通信工程
    • 134 篇 控制科学与工程
    • 62 篇 电气工程
    • 55 篇 交通运输工程
    • 46 篇 安全科学与工程
    • 43 篇 生物工程
    • 32 篇 网络空间安全
    • 31 篇 电子科学与技术(可...
    • 27 篇 动力工程及工程热...
    • 27 篇 石油与天然气工程
    • 24 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 20 篇 仪器科学与技术
    • 17 篇 光学工程
    • 16 篇 化学工程与技术
  • 226 篇 理学
    • 139 篇 数学
    • 51 篇 生物学
    • 30 篇 物理学
    • 28 篇 系统科学
    • 28 篇 统计学(可授理学、...
  • 160 篇 管理学
    • 115 篇 管理科学与工程(可...
    • 82 篇 工商管理
    • 78 篇 图书情报与档案管...
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 30 篇 教育学
    • 30 篇 教育学
  • 29 篇 法学
    • 25 篇 社会学
  • 20 篇 医学
    • 19 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 7 篇 农学
  • 4 篇 军事学
  • 2 篇 文学
  • 2 篇 艺术学

主题

  • 36 篇 computer science
  • 26 篇 control systems
  • 21 篇 machine learning
  • 16 篇 artificial intel...
  • 13 篇 access control
  • 13 篇 reinforcement le...
  • 13 篇 computational mo...
  • 13 篇 real-time system...
  • 13 篇 costs
  • 12 篇 traffic control
  • 12 篇 bandwidth
  • 11 篇 deep learning
  • 11 篇 computer archite...
  • 11 篇 protocols
  • 10 篇 quality of servi...
  • 9 篇 automation
  • 9 篇 neural networks
  • 9 篇 hardware
  • 8 篇 mobile ad hoc ne...
  • 8 篇 computer communi...

机构

  • 7 篇 university polit...
  • 7 篇 faculty of autom...
  • 6 篇 national institu...
  • 6 篇 university polit...
  • 6 篇 computer science...
  • 5 篇 pazhou lab
  • 5 篇 chinese acad sci...
  • 4 篇 al-balqa applied...
  • 4 篇 faculty of autom...
  • 4 篇 university polit...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 guangdong univ t...
  • 3 篇 college of compu...
  • 3 篇 college of infor...
  • 3 篇 univ chinese aca...
  • 3 篇 univ jinan sch m...
  • 3 篇 department of gr...
  • 3 篇 department of co...
  • 3 篇 university polit...

作者

  • 7 篇 li hui
  • 5 篇 florea adina mag...
  • 5 篇 fagarasan ioana
  • 4 篇 adina magda flor...
  • 4 篇 min-chul lee
  • 4 篇 ghassan samara
  • 4 篇 myungjin cho
  • 4 篇 samara ghassan
  • 4 篇 mocanu stefan
  • 4 篇 liu derong
  • 4 篇 mustata alexandr...
  • 4 篇 hyun-woo kim
  • 4 篇 teng luyao
  • 4 篇 ştefan mocanu
  • 3 篇 bogdan-costel mo...
  • 3 篇 giorgian neculoi...
  • 3 篇 mihnea alexandru...
  • 3 篇 stamatescu grigo...
  • 3 篇 ding naikan
  • 3 篇 grigore stamates...

语言

  • 916 篇 英文
  • 10 篇 其他
  • 4 篇 中文
检索条件"任意字段=24th International Conference on Control Systems and Computer Science, CSCS 2023"
928 条 记 录,以下是561-570 订阅
排序:
Application of Compensation Method for Layout Parasitic Elements control in Precision DACs
Application of Compensation Method for Layout Parasitic Elem...
收藏 引用
Annual Siberian Russian Workshop on Electron Devices and Materials (EDM)
作者: Dmitry B. Koloskov Valeriy P. Dragunov Alexander V. Gluhov Dept. of Semiconductor Devices and Microelectronics Novosibirsk State Technical University Novosibirsk Russia Dept. of Computer Aided Design Siberian State University of Telecommunications and Information Science Novosibirsk Russia
the paper deals with the problem of counteracting parasitic layout elements in precise analog circuits, in particular, precision voltage references and high-bit DACs and ADCs. We described the two main methods of coun...
来源: 评论
Numerical Simulation of Grating Input/Output Elements into Optical Waveguides Based on Si3N4/SiO2 thin Films
Numerical Simulation of Grating Input/Output Elements into O...
收藏 引用
Annual Siberian Russian Workshop on Electron Devices and Materials (EDM)
作者: Evgenij S. Barbin Ivan V. Kulinich Aleksej N. Koleda Ayan Myrzakhmetov Anton Perin Laboratory of Radiophotonics The Tomsk State University of Control Systems and Radioelectronics Tomsk Russia Laboratory of Intelligent Computer Systems Institute of Optics and Atmosphere Siberian Branch of the Russian Academy of Sciences Tomsk Russia Laboratory of Photonic Integrated Circuits The Tomsk State University of Control Systems and Radioelectronics Tomsk Russia
this paper presents the results of modeling a grating element for input/output of optical radiation into Si 3 N 4 /SiO 2 waveguide structures in the wavelength range from 1.5 to $1.6\ \mu \mathrm{m}$ . the results o...
来源: 评论
Overview of the HECKTOR Challenge at MICCAI 2021: Automatic Head and Neck Tumor Segmentation and Outcome Prediction in PET/CT Images  1
收藏 引用
2nd 3D Head and Neck Tumor Segmentation in PET/CT Challenge, HECKTOR 2021, held in conjunction with 24th international conference on Medical Image Computing and computer-Assisted Intervention, MICCAI 2021
作者: Andrearczyk, Vincent Oreiller, Valentin Boughdad, Sarah Rest, Catherine Cheze Le Elhalawani, Hesham Jreige, Mario Prior, John O. Vallières, Martin Visvikis, Dimitris Hatt, Mathieu Depeursinge, Adrien Institute of Information Systems School of Management HES-SO Valais-Wallis University of Applied Sciences and Arts Western Switzerland Sierre Switzerland Lausanne Switzerland Poitiers France Department of Radiation Oncology Cleveland Clinic Foundation ClevelandOH United States Department of Computer Science University of Sherbrooke SherbrookeQC Canada LaTIM INSERM UMR 1101 Univ Brest Brest France
this paper presents an overview of the second edition of the HEad and neCK TumOR (HECKTOR) challenge, organized as a satellite event of the 24th international conference on Medical Image Computing and computer Assiste... 详细信息
来源: 评论
Comparation of Rotational Deep Learning based Methods
Comparation of Rotational Deep Learning based Methods
收藏 引用
international Carpathian control conference (ICCC)
作者: Sándor Tihamér Brassai András Németh Attila Hammas István Dávid Sagyebó Department of Electrical Engineerin Sapientia Hungarian University of Transylvania Corunca Romania Department of Electronic Warfare National University of Public Service Budapest Hungary Intelligent Control Systems Sapientia Hungarian University of Transylvania Corunca Romania National University of Public Service Budapest Hungary
Unmanned Aerial Vehicles (UAV) imagery-based object detection has become more and more widespread, especially in fields like agriculture, city planning, construction oversight or even military reconnaissance. this res...
来源: 评论
Deep Learning for Violence Detection in Surveillance: the Role of Transfer Learning and Pre-Trained Models
Deep Learning for Violence Detection in Surveillance: The Ro...
收藏 引用
Information Technology (ACIT)
作者: Anum Ilyas Surayya Obaid Narmeen Zakaria Bawany Department of Computer Science and Software Engineering Center for Computing Research Jinah University for Women Karachi Pakistan
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes q...
来源: 评论
Optimizing Connection Weights in Neural Networks Using Ali Baba and the Forty thieves Algorithm
Optimizing Connection Weights in Neural Networks Using Ali B...
收藏 引用
Information Technology (ACIT)
作者: Heba Al-Hiary Malik Braik Mohammed Azmi Al-Betar Department of Computer Information Systems Al-Balqa Applied University Al-salt Jordan Department of Computer Science Al-Balqa Applied University Al-salt Jordan Department of Information Technology Artificial Intelligence Research Center (AIRC) Ajman University Ajman UAE Al-Balqa Applied University Irbid Jordan
Learning neural networks (NNs) is one of the most challenging problems in machine learning and has lately drawn the attention of many academics. the nonlinear structure of NNs and the unknown optimal set of key govern...
来源: 评论
Research on Fault Diagnosis Method Based on Structural Causal Model in Tennessee Eastman Process  7th
Research on Fault Diagnosis Method Based on Structural Causa...
收藏 引用
7th international conference on Computing, control and Industrial Engineering, CCIE 2023
作者: Pu, Haoyuan Liu, Jie Chen, Zhi Yang, Xiaohua Ren, Changan Xu, Zhuoran Jian, Yifan School of Computer Science University of South China Hengyang China Science and Technology on Reactor System Design Technology Laboratory Nuclear Power Institute of China Chengdu China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hengyang China School of Nuclear Science and Technology University of South China Hengyang China
In the practical application of fault diagnosis in large-scale chemical systems, due to the danger of faults, the machine learning diagnosis methods used in current research often face the problem of scarcity of fault... 详细信息
来源: 评论
Resonators in Modal Filter as a Resorse for Improving its Characteristics
Resonators in Modal Filter as a Resorse for Improving its Ch...
收藏 引用
Annual Siberian Russian Workshop on Electron Devices and Materials (EDM)
作者: Ilya A. Ivantsov Yuri V. Kalashnikov Yevgeniy S. Zhechev Scientific Research Laboratory of Basic Research on Electromagnetic Compatibility Tomsk State University of Control Systems and Radioelectronics Tomsk Russia
this paper presents a novel approach to suppressing ultra-wideband (UWB) interference using a strong-coupled modal filter. Specifically, T-resonators are proposed as a means of improving the interference-suppression c...
来源: 评论
Brain Tumor Segmentation of MRI Images Based on K-Means and White Shark Optimizer
Brain Tumor Segmentation of MRI Images Based on K-Means and ...
收藏 引用
Information Technology (ACIT)
作者: Malik Braik Heba Al-Hiary Mohammed Azmi Al-Betar Department of Computer Science Al-Balqa Applied University Al-salt Jordan Department of Computer Information Systems Al-Balqa Applied University Al-salt Jordan Department of Information Technology Artificial Intelligence Research Center (AIRC) Ajman University Ajman UAE Al-Balqa Applied University Irbid Jordan
Due to the intricacy of the process involved in segmenting and extracting the tumor regions in magnetic resonance imaging (MRI), it is quite difficult to successfully detect the diseases. Due to its critical significa...
来源: 评论
24th international conference on Information and Communications Security, ICICS 2022
24th International Conference on Information and Communicati...
收藏 引用
24th international conference on Information and Communications Security, ICICS 2022
the proceedings contain 34 papers. the special focus in this conference is on Information and Communications Security. the topics include: Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster C...
来源: 评论