咨询与建议

限定检索结果

文献类型

  • 23,280 篇 会议
  • 303 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 23,673 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 17,744 篇 工学
    • 12,391 篇 计算机科学与技术...
    • 8,278 篇 软件工程
    • 4,610 篇 信息与通信工程
    • 4,544 篇 控制科学与工程
    • 2,999 篇 电气工程
    • 1,648 篇 机械工程
    • 1,418 篇 电子科学与技术(可...
    • 1,079 篇 生物工程
    • 984 篇 动力工程及工程热...
    • 948 篇 仪器科学与技术
    • 927 篇 生物医学工程(可授...
    • 654 篇 光学工程
    • 650 篇 交通运输工程
    • 617 篇 化学工程与技术
    • 594 篇 安全科学与工程
    • 490 篇 土木工程
    • 470 篇 力学(可授工学、理...
  • 6,275 篇 理学
    • 3,594 篇 数学
    • 1,463 篇 物理学
    • 1,159 篇 生物学
    • 956 篇 统计学(可授理学、...
    • 912 篇 系统科学
    • 561 篇 化学
  • 3,621 篇 管理学
    • 2,474 篇 管理科学与工程(可...
    • 1,260 篇 图书情报与档案管...
    • 1,192 篇 工商管理
  • 691 篇 医学
    • 609 篇 临床医学
    • 544 篇 基础医学(可授医学...
  • 603 篇 法学
    • 453 篇 社会学
  • 492 篇 经济学
    • 482 篇 应用经济学
  • 374 篇 教育学
  • 298 篇 农学
  • 87 篇 文学
  • 85 篇 军事学
  • 25 篇 艺术学
  • 3 篇 历史学
  • 1 篇 哲学

主题

  • 444 篇 control systems
  • 347 篇 computer archite...
  • 327 篇 access control
  • 276 篇 internet of thin...
  • 233 篇 computer science
  • 215 篇 wireless communi...
  • 213 篇 computational mo...
  • 198 篇 traffic control
  • 190 篇 deep learning
  • 185 篇 neural networks
  • 176 篇 quality of servi...
  • 166 篇 bandwidth
  • 164 篇 throughput
  • 159 篇 simulation
  • 159 篇 wireless sensor ...
  • 159 篇 process control
  • 137 篇 support vector m...
  • 134 篇 educational inst...
  • 130 篇 human computer i...
  • 129 篇 computer vision

机构

  • 36 篇 department of co...
  • 34 篇 chitkara univers...
  • 30 篇 school of comput...
  • 28 篇 college of compu...
  • 27 篇 national mobile ...
  • 23 篇 school of comput...
  • 21 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of contro...
  • 17 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 ieee
  • 15 篇 state key labora...
  • 14 篇 graphic era deem...
  • 14 篇 electrical and c...
  • 13 篇 school of comput...
  • 13 篇 school of comput...

作者

  • 21 篇 liu yang
  • 20 篇 yang yang
  • 19 篇 li li
  • 18 篇 wang lei
  • 17 篇 wang wei
  • 16 篇 zhang lei
  • 16 篇 wei li
  • 15 篇 wang jian
  • 15 篇 li qiang
  • 13 篇 yu wang
  • 13 篇 wang ping
  • 13 篇 wang hui
  • 12 篇 lei wang
  • 12 篇 liu jun
  • 12 篇 wang dong
  • 11 篇 li yang
  • 11 篇 liu bo
  • 11 篇 liu xin
  • 11 篇 zhang hua
  • 11 篇 liu ying

语言

  • 22,783 篇 英文
  • 698 篇 中文
  • 345 篇 其他
  • 14 篇 俄文
  • 8 篇 西班牙文
  • 3 篇 法文
  • 2 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=2nd International Conference on Computer Communications Control Technology"
23674 条 记 录,以下是4871-4880 订阅
排序:
7th Workshop on the Security of Industrial control Systems and of Cyber-Physical Systems, CyberICPS 2021
7th Workshop on the Security of Industrial Control Systems a...
收藏 引用
7th Workshop on the Security of Industrial control Systems and of Cyber-Physical Systems, CyberICPS 2021, 5th international Workshop on Security and Privacy Requirements Engineering, SECPRE 2021, 4th international Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2021, 3rd Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2021, 2nd Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2021 and 1st international Workshop on Cyber Defence Technologies and Secure communications at the Network Edge, CDT and SECOMANE 2021 held in conjunction with 26th European Symposium on Research in computer Security, ESORICS 2021
The proceedings contain 32 papers. The special focus in this conference is on Security of Industrial control Systems and of Cyber-Physical Systems. The topics include: Privacy and Informational Self-determination Thro...
来源: 评论
An Efficient Energy Efficiency Power Allocation Algorithm for Space-Terrestrial Satellite NOMA Networks  2nd
An Efficient Energy Efficiency Power Allocation Algorithm fo...
收藏 引用
2nd EAI international conference on Artificial Intelligence for communications and Networks, AICON 2020
作者: Wu, Yanan Wang, Lina School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China Shunde Graduate School University of Science and Technology Beijing Foshan China
Due to the shortage of spectrum resources, Non-orthogonal multiple access (NOMA) has been considered as a forward-looking technology to enhance the performance for space-terrestrial satellite networks. In this paper, ... 详细信息
来源: 评论
An Alternative Curriculum Learning Approach with Macro Actions for Deep Reinforcement Learning  3
An Alternative Curriculum Learning Approach with Macro Actio...
收藏 引用
3rd international conference on Electronics, communications and Information technology, CECIT 2022
作者: Song, Jiakai Ji, Jianmin University of Science and Technology of China School of Computer Science and Technology Hefei China
It is challenging to train deep reinforcement learning (DRL) agents for tasks with sparse rewards, especially for those that require combining discrete actions with flexible control, e.g., the scoring task for robots ... 详细信息
来源: 评论
Simulation of Formation control for AUVs with Reinforcement Learning Toolbox  2
Simulation of Formation Control for AUVs with Reinforcement ...
收藏 引用
2021 2nd international conference on Machine Learning and computer Application, ICMLCA 2021
作者: Guo, Xiaomin Li, Xiaowen Wang, Bing Gao, Hongwei Li, Yan School of Automation and Electrical Engineering Shenyang Ligong University Shenyang Institute of Automation Chinese Academy of Sciences Institutes for Robotics and Intelligent Manufacturing Chinese Academy of Sciences Shenyang China College of Information Liaoning University Shenyang Institute of Automation Chinese Academy of Sciences Institutes for Robotics and Intelligent Manufacturing Chinese Academy of Sciences Shenyang China Shenyang Institute of Automation Chinese Academy of Sciences Institutes for Robotics and Intelligent Manufacturing Chinese Academy of Sciences Shenyang China School of Automation and Electrical Engineering Shenyang Ligong University Shenyang China
Autonomous Underwater Vehicle (AUV) plays an important role in plenty of fields. It is a challenging task to design a high-performance formation controller for AUVs. In this paper, a formation control policy of dual u... 详细信息
来源: 评论
Realization of Intelligent Monitoring System Based on Raspberry Pi
Realization of Intelligent Monitoring System Based on Raspbe...
收藏 引用
Electrical, Automation and computer Engineering (ICEACE), international conference on
作者: Haidong Zou Huizhou Jiao Chunshun Fu China Satellite Maritime Tracking and Control Department Jiangyin China
A remote intelligent monitoring system based on Raspberry Pi has been developed for the monitoring of air conditioner operation status in server rooms. The system takes Raspberry Pi and CMOS sensor as the hardware pla... 详细信息
来源: 评论
Queue Orchestration Using an In-Memory Broker
Queue Orchestration Using an In-Memory Broker
收藏 引用
Mobile Networks and Wireless communications (ICMNWC), IEEE international conference on
作者: Shreyas Ganesh Rohan George R Tejas Nihaarika Badri K Vinodha Computer Science and Engineering PES University Bangalore India
Existing solutions for a task queue have overheads that slow down the task queueing process. The system proposed is built with the help of Redis as the message broker. The Redis Zset data structure reduces the time ta... 详细信息
来源: 评论
Cross-Layer Design and Security of Network Applications
Cross-Layer Design and Security of Network Applications
收藏 引用
Artificial Intelligence and Machine Learning Applications Theme: Healthcare and Internet of Things (AIMLA), international conference on
作者: Pawan Bhambu Preetham K Arvind Kumar Pandey Department of Computer Science and Engineering Vivekananda Global University Jaipur India Department of Management School of Mangement - UG JAIN (Deemed to be University) Bangalore Karnataka India Department of Computer Science & IT ARKA JAIN University Jamshedpur Jharkhand India
Cross-layer design and security for network applications have been a major concern for network providers and their clients alike. Cross-layer design provides for interoperability between different layers of the networ... 详细信息
来源: 评论
Substantiation System Using Facial Recognition and Principal Component Analysis  2nd
Substantiation System Using Facial Recognition and Principal...
收藏 引用
2nd international conference on Computing, Communication, and Learning, CoCoLe 2023
作者: R.Naik, Ramesh patel, Sanjay Gautam, Sunil Pachlor, Rohit bodkhe, Umesh Department of Computer Science and Engineering Institute of Technology Nirma University S-G Highway Chandlodia Gujarat Ahmedabad382481 India MIT-ADT University Pune India
In today’s networked society, the need to guarantee the security of data or physical assets is both increasingly important and more difficult to do. We periodically hear about criminal activity like credit card fraud... 详细信息
来源: 评论
Software Requirements Prioritization Using Fuzzy Based TOPSIS Methods  2nd
Software Requirements Prioritization Using Fuzzy Based TOPSI...
收藏 引用
2nd international conference on Business Data Analytics, ICBDA 2023
作者: Saxena, Virat Raj Kumar, Babloo Goel, Navnish Sharma, Yogesh Kumar CSE-AI&M Department Raj Kumar Goel Institute of Technology Ghaziabad India Department of Computer Science and Engineering Dewan V S Institute of Engineering and Technology Meerut India Department of CSE IIMT Engineering College Meerut India
The success and quality of a project are directly impacted by the software development process’ crucial step of prioritising software requirements. The fuzzy Analytic Hierarchy Process (AHP) and fuzzy Technique for O... 详细信息
来源: 评论
Exploring Generic and Immersive Frameworks for Human-computer Interactions  24th
Exploring Generic and Immersive Frameworks for Human-Compute...
收藏 引用
24th international conference on Human-computer Interaction, HCII 2022
作者: Fang, Yu-Min National United University Miao-Li36003 Taiwan
The research and teaching curriculum for describing the relationship between humans and machines is still based on the human-machine system diagram, which was proposed by Sanders and McCormick in 1982. However, with t... 详细信息
来源: 评论