咨询与建议

限定检索结果

文献类型

  • 23,236 篇 会议
  • 302 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 23,628 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 17,718 篇 工学
    • 12,381 篇 计算机科学与技术...
    • 8,277 篇 软件工程
    • 4,600 篇 信息与通信工程
    • 4,533 篇 控制科学与工程
    • 2,993 篇 电气工程
    • 1,652 篇 机械工程
    • 1,415 篇 电子科学与技术(可...
    • 1,079 篇 生物工程
    • 981 篇 动力工程及工程热...
    • 946 篇 仪器科学与技术
    • 925 篇 生物医学工程(可授...
    • 653 篇 光学工程
    • 648 篇 交通运输工程
    • 615 篇 化学工程与技术
    • 592 篇 安全科学与工程
    • 488 篇 土木工程
    • 469 篇 力学(可授工学、理...
  • 6,268 篇 理学
    • 3,588 篇 数学
    • 1,466 篇 物理学
    • 1,159 篇 生物学
    • 955 篇 统计学(可授理学、...
    • 911 篇 系统科学
    • 559 篇 化学
  • 3,610 篇 管理学
    • 2,466 篇 管理科学与工程(可...
    • 1,256 篇 图书情报与档案管...
    • 1,188 篇 工商管理
  • 687 篇 医学
    • 607 篇 临床医学
    • 540 篇 基础医学(可授医学...
  • 600 篇 法学
    • 451 篇 社会学
  • 492 篇 经济学
    • 482 篇 应用经济学
  • 374 篇 教育学
  • 298 篇 农学
  • 87 篇 文学
  • 85 篇 军事学
  • 25 篇 艺术学
  • 3 篇 历史学
  • 1 篇 哲学

主题

  • 444 篇 control systems
  • 344 篇 computer archite...
  • 327 篇 access control
  • 276 篇 internet of thin...
  • 233 篇 computer science
  • 214 篇 wireless communi...
  • 214 篇 computational mo...
  • 198 篇 traffic control
  • 190 篇 deep learning
  • 185 篇 neural networks
  • 176 篇 quality of servi...
  • 165 篇 bandwidth
  • 164 篇 throughput
  • 160 篇 simulation
  • 159 篇 wireless sensor ...
  • 159 篇 process control
  • 137 篇 support vector m...
  • 133 篇 educational inst...
  • 129 篇 human computer i...
  • 129 篇 computer vision

机构

  • 36 篇 department of co...
  • 34 篇 chitkara univers...
  • 30 篇 school of comput...
  • 28 篇 college of compu...
  • 27 篇 national mobile ...
  • 23 篇 school of comput...
  • 21 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of contro...
  • 17 篇 college of infor...
  • 16 篇 school of comput...
  • 16 篇 state key labora...
  • 15 篇 school of comput...
  • 15 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 ieee
  • 14 篇 graphic era deem...
  • 14 篇 electrical and c...
  • 13 篇 school of comput...
  • 13 篇 school of comput...

作者

  • 21 篇 liu yang
  • 20 篇 yang yang
  • 19 篇 li li
  • 18 篇 wang lei
  • 18 篇 wang wei
  • 17 篇 wei li
  • 16 篇 zhang lei
  • 16 篇 wang jian
  • 15 篇 li qiang
  • 13 篇 yu wang
  • 13 篇 wang ping
  • 13 篇 wang hui
  • 12 篇 lei wang
  • 12 篇 liu jun
  • 12 篇 wang dong
  • 11 篇 li yang
  • 11 篇 liu bo
  • 11 篇 liu xin
  • 11 篇 zhang hua
  • 11 篇 liu ying

语言

  • 22,758 篇 英文
  • 698 篇 中文
  • 325 篇 其他
  • 14 篇 俄文
  • 8 篇 西班牙文
  • 3 篇 法文
  • 2 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=2nd International Conference on Computer Communications Control Technology"
23629 条 记 录,以下是51-60 订阅
排序:
Research on intelligent recognition of data assets based on the MKG-JERE algorithm  2
Research on intelligent recognition of data assets based on ...
收藏 引用
2nd international conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Chen, Sen Xing, Zhaohua Xu, Longzhang Li, Zhipeng Zhou, Ying Jin, Yongjie Wu, Long Xue, Wei Chen, Junyan Wei, Fengrong Yang, Jun Ni, Siyuan Shanghai Shuoyi Technology Co. Ltd. Shanghai200000 China Shanghai Informatization Development Research Association Shanghai200000 China Co. Ltd. Shanghai200000 China Industrial and Commercial Bank of China Shanghai Branch Shanghai200000 China Information Department Shanghai Jinjiang International Group Shanghai200000 China Greenland Hotel and Tourism Group Shanghai200000 China School of Computer Science and Technology Fudan University Shanghai200000 China Eastern Branch of China Academy of Information and Communications Technology Shanghai200000 China Intelligent Technology Co. Ltd. Shanghai200000 China
The registration of data assets is a crucial measure for promoting the development of the data element market, contributing to the effective allocation of data resources. However, evaluation efforts face challenges du... 详细信息
来源: 评论
Formability control Using Forming Limit Curve and Hole Expansion Ratio in Single Point Incremental Forming  2nd
Formability Control Using Forming Limit Curve and Hole Expan...
收藏 引用
2nd international conference on Mechanical Engineering, INCOM 2024
作者: Mandal, Dayanand Singh, N.K. Department of Mechanical Engineering National Institute of Technology Patna Patna India
Formability is the ability of a given metal work piece to undergo plastic deformation without being damaged. The formability of a material is determined by its fracture strain, which is a general parameter that indica... 详细信息
来源: 评论
Security Assessment of an LBP16-Protocol-Based computer Numerical control Machine  18th
Security Assessment of an LBP16-Protocol-Based Computer Nume...
收藏 引用
18th international conference on Critical Infrastructure Protection
作者: Forihat, Yahya Taylor, Curtis Awad, Rima Asmar Ahmed, Irfan Virginia Commonwealth Univ Richmond VA 23284 USA Oak Ridge Natl Lab Oak Ridge TN USA
Subtractive manufacturing systems, specifically, computer numerical control machines, have revolutionized the manufacturing industry. computer numerical control machining is the preferred method for producing finished... 详细信息
来源: 评论
Research on the Effectiveness of Wireless Networks Cellular communications Based on Digital Technologies  2nd
Research on the Effectiveness of Wireless Networks Cellular ...
收藏 引用
2nd international conference on Information Technologies and Their Applications
作者: Ibrahimov, Bayram G. Aliyev, Almaz Rafizade, Ulvi R. Azerbaijan Tech Univ Dept Radioelect & Aerosp Syst H Javid Ave 25 AZ-1073 Baku Azerbaijan Mil Def Univ Republ Azerbaijan Baku Azerbaijan Mingechaur State Univ Dept Informat Technol Zahid Khalilov 23 AZ-4015 Mingechaur Azerbaijan Azerbaijan Technol Univ Dept Comp Engn & Telecommunicat Sh I Khatai Ave 103 AZ-2011 Ganja Azerbaijan
The advantages using the architectural concept of the Network 2030 technology focus group using the recommendations ITU-T, FG NET-2030 (FG NET-2030) for building highly efficient multiservice wireless packet-switched ... 详细信息
来源: 评论
An Extended Euclidean Algorithm Implementation over Ciphertext Space  2nd
An Extended Euclidean Algorithm Implementation over Ciphert...
收藏 引用
2nd international conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Chi, Po-Wen Lin, Yuan-Pang Wang, Ming-Hung Chuang, Yun-Hsin Department of Computer Science and Information Engineering National Taiwan Normal University Taiwan Taipei Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Taiwan Chiayi Taiwan Engineering Management Graduate Program College of Engineering National Cheng Kung University Taiwan Tainan Taiwan
Fully homomorphic encryption (FHE) is a useful cryptographic primitive. It makes a third-party manipulate data in the ciphertext space and therefore is a key technology for privacy-preserving outsourcing services. The... 详细信息
来源: 评论
A New Approach to Design Smart Surveillance System by Enhancing Doorbell Mechanism  2nd
A New Approach to Design Smart Surveillance System by Enhanc...
收藏 引用
2nd international conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Dwivedi, Shashank Tiwari, Amit Kumar Sankalp, Prem Gupta, Pradeep Shubbham Malviya, Abhishek Department of Computer Science and Engineering United Institute of Technology Uttar Pradesh Prayagraj211008 India
Smart Doorbell and Locking system is a system of interconnected IoT devices and sensors. This is an IOT device for home or office automation. Traditional doorbells serve the purpose but this smart doorbell can save pl... 详细信息
来源: 评论
Design and control of fully automated material handling and assembly system for block drawing assembly machine  2
Design and control of fully automated material handling and ...
收藏 引用
2nd international conference on Big Data, Computational Intelligence, and Applications, BDCIA 2024
作者: Song, Jianjun Xu, Ting Zhou, Hao Shanghai Technical Institute of Electronics & Information Shanghai China
The automation of block drawing assembly presents a significant opportunity to effectively reduce labor costs. Implementing a fully automated material handling and assembly system is essential for achieving this goal.... 详细信息
来源: 评论
Privacy-preserving attribute-based searchable encryption scheme in intelligent transportation system  24
Privacy-preserving attribute-based searchable encryption sch...
收藏 引用
2nd international conference on Artificial Intelligence, Systems and Network Security, AISNS 2024
作者: Niu, Shufen Nan, Xingxing Ge, Peng Zhang, Yan School of Computer Science and Engineering Northwest Normal University Gansu Lanzhou China
With the rapid advancement of the Internet of Things (IoT) and intelligence, traditional attribute based searchable encryption (ABSE) schemes has been unable to satisfy the data privacy and security requirements of In... 详细信息
来源: 评论
Team Design Patterns for Meaningful Human control in Responsible Military Artificial Intelligence  2nd
Team Design Patterns for Meaningful Human Control in Respo...
收藏 引用
2nd international conference on Bridging the Gap Between AI and Reality, AISoLA 2024
作者: van Diggelen, Jurriaan Boshuijzen-van Burken, Christine Abbass, Hussein TNO Defence Safety and Security Soesterberg Netherlands University of New South Wales Canberra Australia
A key requirement for responsible AI in the military is to ensure meaningful human control (MHC) in operational settings. However, MHC is not a binary concept;it could vary from one operational setting to another depe... 详细信息
来源: 评论
AI Fairness in Medical Imaging: controlling for Disease Severity  2nd
AI Fairness in Medical Imaging: Controlling for Disease Se...
收藏 引用
2nd international Workshop on Fairness of AI in Medical Imaging, FAIMI 2024, and 3rd international Workshop on Ethical and Philosophical Issues in Medical Imaging, EPIMI 2024, Held in Conjunction with the international conference on Medical Image Computing and computer Assisted Interventions, MICCAI 2024
作者: Mukherjee, Pritam Summers, Ronald M. National Institutes of Health Clinical Center 10 Center Dr BethesdaMD20892-1182 United States
A new criterion for assessing fairness of AI models in medical imaging is proposed. The key idea is to control for disease severity, which as a mediator, affects the presentation of disease in medical images, and henc... 详细信息
来源: 评论