咨询与建议

限定检索结果

文献类型

  • 5,906 篇 会议
  • 96 册 图书
  • 49 篇 期刊文献

馆藏范围

  • 6,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,551 篇 工学
    • 3,442 篇 计算机科学与技术...
    • 1,955 篇 软件工程
    • 1,915 篇 控制科学与工程
    • 665 篇 信息与通信工程
    • 645 篇 电气工程
    • 526 篇 机械工程
    • 391 篇 生物工程
    • 302 篇 生物医学工程(可授...
    • 283 篇 光学工程
    • 245 篇 仪器科学与技术
    • 215 篇 电子科学与技术(可...
    • 154 篇 力学(可授工学、理...
    • 150 篇 材料科学与工程(可...
    • 147 篇 化学工程与技术
    • 146 篇 建筑学
    • 139 篇 土木工程
    • 133 篇 交通运输工程
    • 132 篇 安全科学与工程
    • 130 篇 动力工程及工程热...
  • 1,535 篇 理学
    • 704 篇 数学
    • 495 篇 物理学
    • 428 篇 生物学
    • 199 篇 统计学(可授理学、...
    • 162 篇 化学
    • 155 篇 系统科学
  • 872 篇 管理学
    • 659 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 297 篇 图书情报与档案管...
  • 259 篇 医学
    • 236 篇 临床医学
    • 201 篇 基础医学(可授医学...
  • 135 篇 法学
  • 125 篇 经济学
  • 114 篇 教育学
  • 56 篇 农学
  • 33 篇 军事学
  • 7 篇 文学
  • 4 篇 艺术学

主题

  • 345 篇 artificial intel...
  • 163 篇 accuracy
  • 141 篇 deep learning
  • 126 篇 robots
  • 116 篇 machine learning
  • 103 篇 internet of thin...
  • 92 篇 mobile robots
  • 91 篇 real-time system...
  • 88 篇 robot sensing sy...
  • 87 篇 feature extracti...
  • 79 篇 training
  • 73 篇 technological in...
  • 72 篇 computational mo...
  • 70 篇 optimization
  • 69 篇 object detection
  • 66 篇 motion planning
  • 62 篇 data models
  • 59 篇 three-dimensiona...
  • 59 篇 convolutional ne...
  • 57 篇 reinforcement le...

机构

  • 40 篇 chitkara univers...
  • 29 篇 school of comput...
  • 23 篇 uttaranchal inst...
  • 22 篇 maharishi school...
  • 22 篇 harbin inst tech...
  • 18 篇 college of intel...
  • 17 篇 centre of interd...
  • 15 篇 univ chinese aca...
  • 15 篇 xi an jiao tong ...
  • 14 篇 school of comput...
  • 14 篇 school of electr...
  • 13 篇 uttaranchal univ...
  • 12 篇 school of inform...
  • 11 篇 sr university sc...
  • 10 篇 university of sc...
  • 10 篇 shandong institu...
  • 10 篇 school of comput...
  • 10 篇 university of ch...
  • 10 篇 school of comput...
  • 10 篇 harbin institute...

作者

  • 22 篇 myung hyun
  • 19 篇 kim jong-hwan
  • 17 篇 lima jose
  • 14 篇 zhang xu
  • 14 篇 zheng nanning
  • 11 篇 majeed anwar p. ...
  • 11 篇 ju zhaojie
  • 11 篇 zhang xianmin
  • 10 篇 pereira ana i.
  • 10 篇 baltes jacky
  • 10 篇 wang nianfeng
  • 9 篇 wu xinyu
  • 9 篇 matson eric t.
  • 9 篇 wang wei
  • 9 篇 wang xin
  • 9 篇 guan yisheng
  • 9 篇 liu hong
  • 9 篇 zhang yang
  • 8 篇 wang lei
  • 8 篇 zhao jie

语言

  • 5,833 篇 英文
  • 202 篇 其他
  • 23 篇 中文
  • 1 篇 西班牙文
检索条件"任意字段=3rd International Conference on Robot Intelligence Technology and Applications"
6051 条 记 录,以下是4961-4970 订阅
排序:
The security management model for small organization in intelligence all-things environment
The security management model for small organization in inte...
收藏 引用
3rd international conference on Information technology Convergence and Services, ITCS 2011 and 2011 FTRA international conference on Intelligent robotics, Automations, Telecommunication Facilities, and applications, IRoA 2011
作者: Chang, Hangbae Kang, Jonggu Na, Youngsub Department of Business Administration Daejin University 1007 Hogukro Pocheon-Si Gyeonggi-Do Korea Republic of
Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct information security system causing huge consumption of budget, yet many of them are not affordable to orga... 详细信息
来源: 评论
Research on the controlling technique of DFBLD in the spectrum absorption optical fiber gas detecting system
Research on the controlling technique of DFBLD in the spectr...
收藏 引用
3rd international conference on Information Computing and applications, ICICA 2012
作者: Wang, Shutao Zhang, Pengwei Shao, Xiaoqing Key Laboratory of Measurement Technology and Instrumentation of Hebei Province Yanshan University Qinhuangdao 066004 China
Spectrum absorption optical fiber gas sensor has characteristics such as high measuring resolution, high precision and good gas differential ability when it is applied on gas measurement. As ideal illuminant and key c... 详细信息
来源: 评论
Generation of tunable focal holes by tight focusing of phase modulated azimuthally polarized double ring shaped beam
Generation of tunable focal holes by tight focusing of phase...
收藏 引用
2012 3rd IEEE international conference on Computational intelligence and Computing Research, ICCIC 2012
作者: Suresh, P. Ram Karthik Kumar, K. Willam Charles, J. Rajesh, K.B. Pillai, T.V.S. Dept. of ECE National College of Engineering Tirunelveli-627151 India Dept. of ECE Tamilnadu College of Engineering Coimbatore India Department of Physics Chikkanna Government Arts College Tirupur India Department of Physics University College of Engineering Nagercoil India Dept. of Technology Anna University Regional Centre Coimbatore India
We investigated the focusing properties of a double ring shaped azimuthally polarized beam using a high NA lens and a dedicated binary phase filter. The definition of azimuthally polarized double ring beam is stated, ... 详细信息
来源: 评论
Duration modeling for emotional speech
Duration modeling for emotional speech
收藏 引用
3rd international conference on Information Computing and applications, ICICA 2012
作者: Lai, Wen-Hsing Wang, Siou-Lin Dept. of Computer and Communication Engineering National Kaohsiung First University of Science and Technology No.2 Jhuoyue Rd. 81164 Kaohsiung Taiwan
Human interaction involves exchanging not only explicit content, but also implicit information about the affective state of the interlocutor. In recent years, researchers attempt to endow the computers or robots with ... 详细信息
来源: 评论
Optimization of lifting points of large-span steel structure based on evolutionary programming
Optimization of lifting points of large-span steel structure...
收藏 引用
3rd international conference on Information Computing and applications, ICICA 2012
作者: Wang, Xin Lei, Xu Cao, Xuyang Zhou, Yang Gao, Shunde School of Mechanical Engineering Dalian University of Technology 116024 Dalian China
To design the lifting points of large-span steel structure when the various compatibility equations are undefined in the lifting process, the programs based on improved evolutionary programming are developed by MATLAB... 详细信息
来源: 评论
Modeling smart home using the paradigm of nets within nets
Modeling smart home using the paradigm of nets within nets
收藏 引用
15th international conference on Artificial intelligence: Methodology, Systems, and applications, AIMSA 2012
作者: Kissoum, Yacine Maamri, Ramdane Sahnoun, Zaidi Faculty of Sciences Computer Science Department Skikda University Skikda Algeria Lire Laboratory Mentouri University Constantine Algeria
Smart home is a sub branch of ambient intelligence technology. It was initially used to control environmental systems such as lighting and heating;but recently the use of smart technology has been strengthened and exp... 详细信息
来源: 评论
Path planning for crawler crane using RRT*
Path planning for crawler crane using RRT*
收藏 引用
3rd international conference on Information Computing and applications, ICICA 2012
作者: Lin, Yuanshan Wu, Di Wang, Xin Wang, Xiukun Gao, Shunde School of Computer Science Dalian University of Technology Dalian Liaoning China School of Mechanical Engineering Dalian University of Technology Dalian Liaoning China
Lift path planning is a key subtask in preparing lift plan. Many researchers have concerned the topic of automated path planning for crane lifts. Previous studies provided some exact approaches or optimization methods... 详细信息
来源: 评论
Reliable NoC mapping based on scatter search
Reliable NoC mapping based on scatter search
收藏 引用
3rd international conference on Information Computing and applications, ICICA 2012
作者: Le, Qianqi Yang, Guowu Hung, William N. N. Guo, Wensheng University of Electronic Science and Technology Chengdu Sichuan China Chengdu University of Technology Chengdu Sichuan China Synopsys Inc. Mountain View CA United States
Network-on-Chip (NoC) is a promising interconnection solution for systems on chip. Mapping Intellectual Property (IP) cores onto NoC architecture is an important phase of NoC design. It affects heavily the NoC perform... 详细信息
来源: 评论
Model transformation method for compensation events and tasks from business process model to flowchart
Model transformation method for compensation events and task...
收藏 引用
3rd international conference on Information Computing and applications, ICICA 2012
作者: Deng, Jian Chen, Bo Zeng, Jiazhi School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
To satisfy the requirement of developing software rapidly for business processes with compensation, a special kind of computation independent model with compensation named well-structured associated business process m... 详细信息
来源: 评论
A vulnerability attack graph generation method based on scripts
A vulnerability attack graph generation method based on scri...
收藏 引用
3rd international conference on Information Computing and applications, ICICA 2012
作者: Han, Bo Wang, Qing Yu, Fajiang Zhang, Xianda International School of Software Wuhan University China School of Computer Wuhan University China School of Geodesy and Geomatics Wuhan University China
The vulnerability attack graph is an important method for prevention of network attacks. However, the huge amount of vulnerability has caused great difficulties for attack graph generation. By using the general search... 详细信息
来源: 评论