咨询与建议

限定检索结果

文献类型

  • 23,283 篇 会议
  • 303 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 23,676 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 17,748 篇 工学
    • 12,394 篇 计算机科学与技术...
    • 8,281 篇 软件工程
    • 4,613 篇 信息与通信工程
    • 4,545 篇 控制科学与工程
    • 3,000 篇 电气工程
    • 1,648 篇 机械工程
    • 1,420 篇 电子科学与技术(可...
    • 1,079 篇 生物工程
    • 984 篇 动力工程及工程热...
    • 948 篇 仪器科学与技术
    • 927 篇 生物医学工程(可授...
    • 654 篇 光学工程
    • 652 篇 交通运输工程
    • 618 篇 化学工程与技术
    • 595 篇 安全科学与工程
    • 489 篇 土木工程
    • 470 篇 力学(可授工学、理...
  • 6,277 篇 理学
    • 3,596 篇 数学
    • 1,463 篇 物理学
    • 1,159 篇 生物学
    • 956 篇 统计学(可授理学、...
    • 912 篇 系统科学
    • 561 篇 化学
  • 3,621 篇 管理学
    • 2,474 篇 管理科学与工程(可...
    • 1,260 篇 图书情报与档案管...
    • 1,193 篇 工商管理
  • 691 篇 医学
    • 609 篇 临床医学
    • 544 篇 基础医学(可授医学...
  • 602 篇 法学
    • 453 篇 社会学
  • 493 篇 经济学
    • 483 篇 应用经济学
  • 374 篇 教育学
  • 298 篇 农学
  • 87 篇 文学
  • 85 篇 军事学
  • 25 篇 艺术学
  • 3 篇 历史学
  • 1 篇 哲学

主题

  • 444 篇 control systems
  • 347 篇 computer archite...
  • 327 篇 access control
  • 276 篇 internet of thin...
  • 233 篇 computer science
  • 215 篇 wireless communi...
  • 213 篇 computational mo...
  • 198 篇 traffic control
  • 190 篇 deep learning
  • 185 篇 neural networks
  • 176 篇 quality of servi...
  • 166 篇 bandwidth
  • 164 篇 throughput
  • 159 篇 simulation
  • 159 篇 wireless sensor ...
  • 159 篇 process control
  • 137 篇 support vector m...
  • 134 篇 educational inst...
  • 130 篇 human computer i...
  • 129 篇 computer vision

机构

  • 36 篇 department of co...
  • 34 篇 chitkara univers...
  • 30 篇 school of comput...
  • 28 篇 college of compu...
  • 27 篇 national mobile ...
  • 23 篇 school of comput...
  • 21 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of contro...
  • 17 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 ieee
  • 15 篇 state key labora...
  • 14 篇 graphic era deem...
  • 14 篇 electrical and c...
  • 13 篇 school of comput...
  • 13 篇 school of comput...

作者

  • 21 篇 liu yang
  • 20 篇 yang yang
  • 19 篇 li li
  • 18 篇 wang lei
  • 17 篇 wang wei
  • 16 篇 zhang lei
  • 16 篇 wang jian
  • 16 篇 wei li
  • 15 篇 li qiang
  • 13 篇 yu wang
  • 13 篇 wang ping
  • 13 篇 wang hui
  • 12 篇 lei wang
  • 12 篇 liu jun
  • 12 篇 wang dong
  • 11 篇 li yang
  • 11 篇 liu bo
  • 11 篇 liu xin
  • 11 篇 zhang hua
  • 11 篇 liu ying

语言

  • 22,782 篇 英文
  • 698 篇 中文
  • 349 篇 其他
  • 14 篇 俄文
  • 8 篇 西班牙文
  • 3 篇 法文
  • 2 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=2nd International Conference on Computer Communications Control Technology"
23677 条 记 录,以下是81-90 订阅
排序:
Recognition and control of a Chinese Pinyin Sign Language Robot via a Cognitive Robotics Approach  2nd
Recognition and Control of a Chinese Pinyin Sign Language Ro...
收藏 引用
2nd international conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Cui, Hanzhang Luo, Yang Zhang, Fan School of Robotics Xi’an Jiaotong-Liverpool University Suzhou215213 China School of Intelligent Manufacturing Ecosystem Xi’an Jiaotong-Liverpool University Suzhou215213 China
Technological advancements in AI and Robotics are facilitating the development of sign language robots, which are resolving communication barriers for people living with disabilities. The current work aims to develop ... 详细信息
来源: 评论
FIDO-Based Access control Mechanism in Named Data Networking  2nd
FIDO-Based Access Control Mechanism in Named Data Networking
收藏 引用
2nd international conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Chen, Yeong-Sheng Chien, Wei-Cheng Department of Computer Science National Taipei University of Education Taipei Taiwan
In contrast to the conventional IP-based architecture, Named Data Networking (ndN) provides a content-centric, secure, efficient, and scalable network approach, making it suitable for various applications such as cont... 详细信息
来源: 评论
Real-Time Monitoring and control Systems Using IoT in Vertical Farming  2nd
Real-Time Monitoring and Control Systems Using IoT in Vertic...
收藏 引用
2nd international conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Vijay, Richa Singh, Anupam Kumar, Raj Singh, Ramveer Khan, Rubina Liyakat Ather, Danish Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India Department of Computer Science and Engineering Graphic era hill University Dehradun India Faridabad India Department of CSE Galgotias College of Engineering and Technology Greater Noida India The Applied College. Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia Amity University in Tashkent Tashkent Uzbekistan
In the burgeoning field of vertical farming, real-time monitoring and control systems have become pivotal for optimizing growth conditions and resource utilization. This paper details the design, construction, and imp... 详细信息
来源: 评论
Adaptive Queue Dynamics (AQD): A Novel Scheduling Algorithm for Response Time Minimization in Baseband Unit (BBU) Systems  2nd
Adaptive Queue Dynamics (AQD): A Novel Scheduling Algorithm ...
收藏 引用
2nd international conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Malviya, Abhishek Pandey, Sudhakar Tiwari, Amit Kumar Department of Information Technology NIT-Raipur Chattisgarh Raipur492010 India Department of Computer Science and Engineering United Institute of Technology Uttar Pradesh Prayagraj211010 India
In the complex world of modern telecommunication networks, Baseband Unit (BBU) pools play a crucial role in optimizing data processing and minimizing response time. This paper presents the Adaptive Queue Dynamics (AQD... 详细信息
来源: 评论
2nd international conference on Bridging the Gap Between AI and Reality, AISoLA 2024
2nd International Conference on Bridging the Gap Between AI ...
收藏 引用
2nd international conference on Bridging the Gap Between AI and Reality, AISoLA 2024
The proceedings contain 28 papers. The special focus in this conference is on Bridging the Gap Between AI and Reality. The topics include: Responsible and Trusted AI: An Interdisciplinary Perspective;team Design Patte...
来源: 评论
Enabling Cursor control Through Eye Movement Using Hidden Markov Model  2nd
Enabling Cursor Control Through Eye Movement Using Hidden Ma...
收藏 引用
2nd international conference on Data Science and Network Engineering, ICDSNE 2024
作者: Tanusha, G. Havirbhavi, P. Ashwini, K. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
First and foremost, we present a novel scheme for controlling the cursor based on eye movement. Other strategies rely on physical items like touchpads or a mouse and place strict requirements on people with motor hand... 详细信息
来源: 评论
UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions  2nd
UltraCommander: Ultrasonic Side Channel Attack via Browser ...
收藏 引用
2nd international conference on Data Security and Privacy Protection, DSPP 2024
作者: Duan, Yingli Meng, Weizhi Chiu, Wei-Yang SPTAGE Lab Technical University of Denmark Kgs. Lyngby2800 Denmark School of Computing and Communications Lancaster University Lancaster United Kingdom
Ultrasound, imperceptible to the human ear, emerges as a potent carrier of information. Exploiting its covert nature, a growing number of both malicious entities and researchers delve into its potential privacy threat... 详细信息
来源: 评论
Leveraging EfficientNetB4 Model with Multi-head Attentions for Maize Leaf Disease Detection  2nd
Leveraging EfficientNetB4 Model with Multi-head Attentions ...
收藏 引用
2nd international conference on Applied Algorithms, ICAA 2025
作者: Reddiar, Nallamilli Eswar Venkata Vikranth, Pilla Veera Satya Sai Kumar, Teerdhala Siddartha, Thota Rayvanth, N. Singh, Rimjhim Padam Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Smart agriculture mainly stresses the improvements in early plant disease diagnostics, crop classification and management, and effective pest control. Maize being an important staple crop necessitates early and accura... 详细信息
来源: 评论
Feasibility Analysis Study on Constructing a Grid Intrusion Detection System Using Semi-supervised Learning Models  2nd
Feasibility Analysis Study on Constructing a Grid Intrusion ...
收藏 引用
2nd international conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Tsai, Chia-Wei Lin, Jason Yang, Chun-Wei Loo, Fu-Nie Department of Computer Science and Information Engineering National Taichung University of Science and Technology No.129 Sec.3 Sanmin Rd North District Taichung404 Taiwan Department of Computer Science and Engineering National Chung Hsing University No. 145 Xingda Rd. South District Taichung40227 Taiwan Master Program for Digital Health Innovation China Medical University No. 100 Sec. 1 Jingmao Rd. Beitun Dist. Taichung406040 Taiwan
In recent years, due to the proliferation of information and communication technology, as well as AI technology, industrial control systems, which were once in a closed network environment, have also integrated relate... 详细信息
来源: 评论
Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation  1
收藏 引用
2nd international conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Wu, Xiaokai sun, Xuan Huang, Jiaxin Shi, Ning Liang, Chen Computer School Beijing Information Science and Technology University Beijing100192 China China Southern Airlines Co. Ltd. Guangdong Guangzhou510000 China Hebei Key Laboratory of IoT Blockchain Integration Shijiazhuang China
The rapid advancement of artificial intelligence and mobile communication technologies has brought unprecedented convenience, but also significant privacy and security concerns, particularly in real-time video communi... 详细信息
来源: 评论