咨询与建议

限定检索结果

文献类型

  • 23,235 篇 会议
  • 302 篇 期刊文献
  • 91 册 图书

馆藏范围

  • 23,627 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 17,717 篇 工学
    • 12,380 篇 计算机科学与技术...
    • 8,276 篇 软件工程
    • 4,600 篇 信息与通信工程
    • 4,532 篇 控制科学与工程
    • 2,993 篇 电气工程
    • 1,651 篇 机械工程
    • 1,415 篇 电子科学与技术(可...
    • 1,079 篇 生物工程
    • 981 篇 动力工程及工程热...
    • 946 篇 仪器科学与技术
    • 925 篇 生物医学工程(可授...
    • 653 篇 光学工程
    • 648 篇 交通运输工程
    • 615 篇 化学工程与技术
    • 593 篇 安全科学与工程
    • 488 篇 土木工程
    • 469 篇 力学(可授工学、理...
  • 6,267 篇 理学
    • 3,587 篇 数学
    • 1,466 篇 物理学
    • 1,159 篇 生物学
    • 955 篇 统计学(可授理学、...
    • 911 篇 系统科学
    • 559 篇 化学
  • 3,611 篇 管理学
    • 2,467 篇 管理科学与工程(可...
    • 1,257 篇 图书情报与档案管...
    • 1,188 篇 工商管理
  • 687 篇 医学
    • 607 篇 临床医学
    • 540 篇 基础医学(可授医学...
  • 600 篇 法学
    • 451 篇 社会学
  • 492 篇 经济学
    • 482 篇 应用经济学
  • 374 篇 教育学
  • 298 篇 农学
  • 87 篇 文学
  • 85 篇 军事学
  • 25 篇 艺术学
  • 3 篇 历史学
  • 1 篇 哲学

主题

  • 444 篇 control systems
  • 344 篇 computer archite...
  • 327 篇 access control
  • 276 篇 internet of thin...
  • 233 篇 computer science
  • 214 篇 wireless communi...
  • 214 篇 computational mo...
  • 198 篇 traffic control
  • 189 篇 deep learning
  • 186 篇 neural networks
  • 176 篇 quality of servi...
  • 164 篇 throughput
  • 164 篇 bandwidth
  • 160 篇 simulation
  • 159 篇 wireless sensor ...
  • 159 篇 process control
  • 137 篇 support vector m...
  • 133 篇 educational inst...
  • 129 篇 human computer i...
  • 129 篇 computer vision

机构

  • 36 篇 department of co...
  • 34 篇 chitkara univers...
  • 30 篇 school of comput...
  • 28 篇 college of compu...
  • 27 篇 national mobile ...
  • 23 篇 school of comput...
  • 21 篇 school of comput...
  • 19 篇 university of ch...
  • 19 篇 school of contro...
  • 17 篇 college of infor...
  • 16 篇 school of comput...
  • 16 篇 state key labora...
  • 15 篇 school of comput...
  • 15 篇 department of co...
  • 15 篇 school of comput...
  • 15 篇 ieee
  • 14 篇 electrical and c...
  • 13 篇 school of comput...
  • 13 篇 graphic era deem...
  • 13 篇 school of comput...

作者

  • 21 篇 liu yang
  • 20 篇 yang yang
  • 19 篇 li li
  • 18 篇 wang lei
  • 18 篇 wang wei
  • 17 篇 wei li
  • 16 篇 zhang lei
  • 16 篇 wang jian
  • 15 篇 li qiang
  • 13 篇 yu wang
  • 13 篇 wang ping
  • 13 篇 wang hui
  • 12 篇 lei wang
  • 12 篇 liu jun
  • 12 篇 wang dong
  • 12 篇 zhang yan
  • 11 篇 li yang
  • 11 篇 liu bo
  • 11 篇 liu xin
  • 11 篇 zhang hua

语言

  • 22,749 篇 英文
  • 694 篇 中文
  • 333 篇 其他
  • 14 篇 俄文
  • 8 篇 西班牙文
  • 3 篇 法文
  • 2 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=2nd International Conference on Computer Communications Control Technology"
23628 条 记 录,以下是81-90 订阅
排序:
A Novel Approach for Detecting and Analyzing Cyber-Attacks in Cyber-Physical Systems  2nd
A Novel Approach for Detecting and Analyzing Cyber-Attacks i...
收藏 引用
2nd international conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Zheng, Zhi-Ren Cheng, Bo-Chao Department of Communications Engineering National Chung Cheng University Chiayi Taiwan
With the rapid development of industry, we are currently experiencing the fourth industrial revolution. Many products, equipment, and sensors are connected to the internet. Although this gives us greater access to dat... 详细信息
来源: 评论
Proceedings - 2020 2nd international conference on Advances in computer technology, Information Science and communications, CTISC 2020
Proceedings - 2020 2nd International Conference on Advances ...
收藏 引用
2nd international conference on Advances in computer technology, Information Science and communications, CTISC 2020
The proceedings contain 27 papers. The topics discussed include: real-time template matching based on local stable pixels;web masquerade based on the MAC addresses: how to change the web contents without changing the ...
来源: 评论
Leveraging EfficientNetB4 Model with Multi-head Attentions for Maize Leaf Disease Detection
Leveraging EfficientNetB4 Model with Multi-head Attentions ...
收藏 引用
2nd international conference on Applied Algorithms, ICAA 2025
作者: Reddiar, Nallamilli Eswar Venkata Vikranth, Pilla Veera Satya Sai Kumar, Teerdhala Siddartha, Thota Rayvanth, N. Singh, Rimjhim Padam Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Smart agriculture mainly stresses the improvements in early plant disease diagnostics, crop classification and management, and effective pest control. Maize being an important staple crop necessitates early and accura... 详细信息
来源: 评论
Live Audio Recognition and Text Conversion System
Live Audio Recognition and Text Conversion System
收藏 引用
Computational Intelligence, Communication technology and Networking (CICTN), international conference on
作者: Pratyaksha Sharma Sumita Gupta Boddu Asmitha Bhavya Khushi Sharma Saru Dhir Sapna Gambhir Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University UP Department of Information Technology Amity School of Engineering & Technology Amity University UP Dept. of Computer Science College of Engineering and Computing George Mason University USA
With the advancement of technologies, different methods are currently being used for converting spoken language into text. These systems offer a hands-free alternative to traditional input methods, especially for indi... 详细信息
来源: 评论
Detection and Identification of Power Quality Disturbance Signals in New Power System Based on Quantum Classic Hybrid Convolutional Neural Networks  2nd
Detection and Identification of Power Quality Disturbance ...
收藏 引用
2nd international conference on Data Security and Privacy Protection, DSPP 2024
作者: Li, Yue Li, Xinhao Jia, Haopeng Liu, Anjiang Wang, Qingle Hao, Shuqing Liu, Hao Electric Power Research Institute of Guizhou Power Grid Co. Ltd. Guiyang550002 China School of Control and Computer Engineering North China Electric Power University Beijing102206 China School of Electrical and Electronic Engineering North China Electric Power University Beijing102206 China
With the rapid development of modern power systems, power quality disturbances are a growing concern, impacting system reliability. Effective detection and identification of PQDs in new distribution systems with high ... 详细信息
来源: 评论
Adaptive Fuzzy Logic Framework for Threat Detection in Distributed Honeypot Systems Leveraging Blockchain technology
Adaptive Fuzzy Logic Framework for Threat Detection in Distr...
收藏 引用
Computational Intelligence, Communication technology and Networking (CICTN), international conference on
作者: Aparna Tiwari Dinesh Kumar Department of Computer Science and Engineering GZSCCET Maharaja Ranjit Singh Punjab Technical University Bathinda India
In the continuous expanding domain of cybersecurity, the rise of more cyber threats is also increasing. Therefore, it demands the development of more efficient defense strategies. In past, honeypots are used as lucrat... 详细信息
来源: 评论
Designing the Intelligent control System of Mechanical Assembly Production Machines and Crane-Manipulator  16th
Designing the Intelligent Control System of Mechanical Assem...
收藏 引用
16th international conference on Application of Fuzzy Systems, Soft Computing and Artificial Intelligence Tools, ICAFS 2023
作者: Mammadov, Javanshir Amiraslanov, Bahruz Jafarova, Shalala Ibrahimova, Ellada Sumgait State University Sumgait5008 Azerbaijan Azerbaijan State Oil Industrial University Baku Azerbaijan
Based on the technological analysis of the production modules of the mechanical assembly area selected as the object of research, a circular assembly structure was proposed, which ensures the execution of operations w... 详细信息
来源: 评论
Evolution and Future Trends in Wireless Communication: From 2G to 6G Technologies
Evolution and Future Trends in Wireless Communication: From ...
收藏 引用
Computational Intelligence, Communication technology and Networking (CICTN), international conference on
作者: Deepanshu Goel Deepanshu Jaiwal Dhruv Taruna Chopra School of Computer Applications Manav Rachna International Institute of Research & Studies Faridabad India
The journey from 2G to emerging 6G is impressive, mirroring the long evolutionary path of wireless communication technology. We address critical transitions in cellular networks in light of architectural transformatio... 详细信息
来源: 评论
Efficient Identity-Based Dynamic Cloud Storage Data Integrity Auditing with Incremental Updates for Handheld Mobile Devices  2nd
Efficient Identity-Based Dynamic Cloud Storage Data Integrit...
收藏 引用
2nd international conference on Data Security and Privacy Protection, DSPP 2024
作者: Huang, Yichi Zhang, Futai Yang, Wenjie Yang, Shaojun Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fuzhou350117 China
With rapid advancements in handheld mobile devices (HMDs), striking a balance between storage and data security is crucial. Cloud storage has attracted great attention of users for its convenience and availa... 详细信息
来源: 评论
Cryptanaylsis to Ciphertext-Policy Attribute-Based Encryption of Liu et al. and Amirthavalli et al.  2nd
Cryptanaylsis to Ciphertext-Policy Attribute-Based Encrypti...
收藏 引用
2nd international conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Tseng, Yi-Fan Chen, Wen-Yi Chen, You-Qian Huang, Jheng-Jia Department of Computer Science National Chengchi University Taipei Taiwan
Attribute-based encryption is a fine-grained access control mechanism designed for one-to-many scenarios, making it particularly well-suited for contemporary data sharing within cloud environments. To mitigate computa... 详细信息
来源: 评论