咨询与建议

限定检索结果

文献类型

  • 51,321 篇 会议
  • 6,268 篇 期刊文献
  • 382 篇 学位论文
  • 171 册 图书
  • 5 篇 资讯
  • 4 篇 专利
  • 4 篇 科技报告

馆藏范围

  • 58,155 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 33,222 篇 工学
    • 15,948 篇 计算机科学与技术...
    • 9,325 篇 控制科学与工程
    • 9,176 篇 软件工程
    • 7,522 篇 电气工程
    • 4,760 篇 机械工程
    • 3,068 篇 信息与通信工程
    • 2,535 篇 化学工程与技术
    • 2,249 篇 材料科学与工程(可...
    • 2,016 篇 动力工程及工程热...
    • 1,904 篇 仪器科学与技术
    • 1,715 篇 石油与天然气工程
    • 1,457 篇 电子科学与技术(可...
    • 1,404 篇 力学(可授工学、理...
    • 1,389 篇 土木工程
    • 1,178 篇 航空宇航科学与技...
    • 1,169 篇 交通运输工程
    • 1,097 篇 安全科学与工程
    • 1,063 篇 环境科学与工程(可...
    • 1,053 篇 生物医学工程(可授...
    • 906 篇 建筑学
  • 12,725 篇 理学
    • 6,300 篇 数学
    • 3,895 篇 物理学
    • 2,945 篇 统计学(可授理学、...
    • 1,892 篇 系统科学
    • 1,819 篇 化学
    • 1,125 篇 生物学
  • 7,227 篇 管理学
    • 6,080 篇 管理科学与工程(可...
    • 2,109 篇 工商管理
    • 1,459 篇 图书情报与档案管...
  • 1,564 篇 医学
    • 1,034 篇 临床医学
  • 904 篇 经济学
  • 552 篇 法学
  • 460 篇 农学
  • 409 篇 教育学
  • 114 篇 文学
  • 104 篇 军事学
  • 41 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 4,950 篇 computational mo...
  • 4,184 篇 data models
  • 3,976 篇 process control
  • 3,200 篇 analytical model...
  • 2,404 篇 predictive model...
  • 1,989 篇 mathematical mod...
  • 1,825 篇 data mining
  • 1,740 篇 control systems
  • 1,283 篇 training
  • 1,216 篇 data analysis
  • 1,182 篇 accuracy
  • 1,149 篇 biological syste...
  • 1,053 篇 monitoring
  • 1,043 篇 algorithm design...
  • 1,037 篇 feature extracti...
  • 998 篇 stability analys...
  • 987 篇 task analysis
  • 888 篇 neural networks
  • 850 篇 machine learning
  • 848 篇 modeling

机构

  • 38 篇 school of automa...
  • 38 篇 college of infor...
  • 36 篇 beijing univ tec...
  • 36 篇 univ chinese aca...
  • 36 篇 faculty of infor...
  • 36 篇 northeastern uni...
  • 34 篇 china electric p...
  • 31 篇 state key labora...
  • 30 篇 beihang univ sch...
  • 28 篇 college of contr...
  • 24 篇 hubei key labora...
  • 22 篇 school of inform...
  • 21 篇 华北电力大学
  • 20 篇 halliburton unit...
  • 20 篇 northeastern uni...
  • 19 篇 ibm thomas j. wa...
  • 18 篇 tsinghua univers...
  • 17 篇 shanghai jiao to...
  • 17 篇 shanghai univ sc...
  • 17 篇 state key labora...

作者

  • 54 篇 zhao chunhui
  • 44 篇 liu yang
  • 38 篇 li li
  • 37 篇 zhang lei
  • 37 篇 wu min
  • 32 篇 wang lei
  • 32 篇 li yang
  • 30 篇 gao furong
  • 27 篇 lei wang
  • 26 篇 xu yuan
  • 23 篇 li xin
  • 22 篇 weske mathias
  • 22 篇 jing zhang
  • 22 篇 wang jian
  • 21 篇 zhu qunxiong
  • 20 篇 jian wang
  • 20 篇 yu wang
  • 20 篇 wang jing
  • 19 篇 ming li
  • 18 篇 zhang chao

语言

  • 55,676 篇 英文
  • 1,501 篇 中文
  • 897 篇 其他
  • 34 篇 俄文
  • 18 篇 西班牙文
  • 14 篇 德文
  • 14 篇 葡萄牙文
  • 12 篇 法文
  • 5 篇 日文
  • 5 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 乌克兰文
  • 2 篇 捷克文
  • 1 篇 意大利文
  • 1 篇 波兰文
检索条件"任意字段=Conference on Data Analysis and Modeling for Process Control"
58155 条 记 录,以下是4721-4730 订阅
排序:
Deep Learning Model for Identification and Classification of Web based Toxic Comments
Deep Learning Model for Identification and Classification of...
收藏 引用
2023 International conference in Advances in Power, Signal, and Information Technology, APSIT 2023
作者: Shukla, Anubhav Arora, Deepak Amity School of Engineering and Technology Lucknow Amity University Department of Computer Science & Engineering Uttar Pradesh India
Everyday, many individuals face online trolling and receive hate on different social media platforms like Twitter, Instagram to name a few. Often these comments involving racial abuse, hate based on religion, caste ar... 详细信息
来源: 评论
analysis of infrasound measurement of liquid levels during drilling: a numerical study  3
Analysis of infrasound measurement of liquid levels during d...
收藏 引用
3rd International conference on Advanced Manufacturing Technology and Manufacturing Systems, ICAMTMS 2024
作者: Wu, Xinyuan Li, Ning Zhang, Hongxu Yang, Mingjun Xu, Jiaoyun Guo, Keyou Sun, Liang Mechanical Engineering College SiChuan University of Science & Engineering Yibin644005 China CNPC Bohai Drilling Engineering Company Limited Tianjin300280 China
While drilling, in order to realize the early monitoring of overflow,it is necessary to measure the liquid level depth in the wellbore in real time. At present, echo ranging is the most commonly used liquid level moni... 详细信息
来源: 评论
Visual data Models in Scientific Search for Interpretation of Multiparametric Signals  5th
Visual Data Models in Scientific Search for Interpretation o...
收藏 引用
5th International conference on Creativity in Intelligent Technologies and data Science, CIT and DS 2023
作者: Zakharova, Alena Shklyar, Aleksey Vekhter, Evgeniya V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences Moscow Russia Tomsk Polytechnic University Tomsk Russia
Modern visualization methods are used to convey information about an object or process and as a tool for search and decision-making process. data and signals, in analog and digital form, are only valuable if they are ... 详细信息
来源: 评论
On Kinetic modeling of the process of Destruction of Solid Paraffin
On Kinetic Modeling of the Process of Destruction of Solid P...
收藏 引用
International conference on control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)
作者: A. A. Kornilova S. I. Mustafina D. A. Kornilov E. R. Gizzatova A.G. Mustafin R. N. Galiakhmetov Institute of Mathematics Computer Science and Robotics Ufa University of Science and Technology Ufa Russia Institute of Chemistry and Protection in Emergency Situations Ufa University of Science and Technology Ufa Russia Institute of Technologies and Materials Ufa University of Science and Technology Ufa Russia
The work revealed that the destruction process occurs in three stages. Each stage is characterized by its own kinetic model. The values of the pre-exponential factor and the activation energy of the reaction rate cons... 详细信息
来源: 评论
Security analysis of the Enhanced Cryptographic Algorithm Based on Discrete Logarithm Problem that Uses Multiple Handshakes for Improved Security  11
Security Analysis of the Enhanced Cryptographic Algorithm Ba...
收藏 引用
11th IEEE conference on Systems, process and control, ICSPC 2023
作者: Ordoñez, Aris J. Bicol University Computer Science & Information Technology Department Legazpi City Philippines
This research enhanced the Discrete Logarithm Problem-Based (DLP-based) Algorithm, enabling it to utilize two or more security keys in the encryption process. The enhancement enabled the Algorithm to inject multiple h... 详细信息
来源: 评论
Machine-learning-based network sparsification modeling for IoTs security analysis  5
Machine-learning-based network sparsification modeling for I...
收藏 引用
2023 5th International conference on Information Science, Electrical, and Automation Engineering, ISEAE 2023
作者: Ling, Mingcheng Qi, Weimin Chang, Di Zhang, Xia Zhang, Chi Engineering Training Center Jianghan University Hubei Wuhan China School of Artificial Intelligence Jianghan University Hubei Wuhan China Department of Science and Innovation U.S. Xpress Inc. AtlantaGA United States
As the security issues of Internet of Things (IoTs) are rapidly evolving, machine learning techniques are increasingly adopted for detecting and preventing cyber threats. Recent machine learning based approaches (e.g.... 详细信息
来源: 评论
Reducing NPT Using a Novel Approach to Real-Time Drilling data analysis
Reducing NPT Using a Novel Approach to Real-Time Drilling Da...
收藏 引用
2023 SPE Annual Technical conference and Exhibition, ATCE 2023
作者: Wang, Junzhe Sajeev, Shyam Kareepadath Ozbayoglu, Evren Baldino, Silvio Liu, Yaxin Jing, Haorong University of Tulsa TulsaOK United States BP HoustonTX United States
Early detection and characterization of anomalous events during drilling operations are critical to avoid costly downtime and prevent hazardous events, such as a stuck pipe or a well control event. A key aspect of rea... 详细信息
来源: 评论
Selective Attention: Enhancing Transformer through Principled Context control  38
Selective Attention: Enhancing Transformer through Principle...
收藏 引用
38th conference on Neural Information processing Systems, NeurIPS 2024
作者: Zhang, Xuechen Chang, Xiangyu Li, Mingchen Roy-Chowdhury, Amit Chen, Jiasi Oymak, Samet University of Michigan United States University of California Riverside United States
The attention mechanism within the transformer architecture enables the model to weigh and combine tokens based on their relevance to the query. While self-attention has enjoyed major success, it notably treats all qu...
来源: 评论
Intelligent analysis of University Apartment Management from the Perspective of Face Recognition Technology  7th
Intelligent Analysis of University Apartment Management from...
收藏 引用
7th International conference on Innovative Computing, IC 2024
作者: Wu, Haisheng Student Affairs Office Nantong Institute of Technology Jiangsu Nantong China
The use of face recognition technology can greatly improve the effectiveness of the management of college students’ apartments in view of the current situation that there are many security risks in school apartments,... 详细信息
来源: 评论
Implementation & Application of coherent control systems: Digital Twin (high frequency open loop) with R2R (low frequency closed loop)
Implementation & Application of coherent control systems: Di...
收藏 引用
IEEE/SEMI conference and Workshop on Advanced Semiconductor Manufacturing
作者: Pratik C. Kotcher Kasturi Sarang Miller Allen Siva Dhandapani Automation Products Group Applied Global Services Va USA Metal Deposition Product Semiconductor Product Group Santa Clara Ca USA Business Development Semiconductor Product Group Santa Clara Ca USA
A Digital Twin (Applied Twin™) is a computational model that represents a physical asset such as a process chamber, evolving over time to reflect its structure, behavior, and context. This model treats the asset-twin ... 详细信息
来源: 评论