咨询与建议

限定检索结果

文献类型

  • 51,480 篇 会议
  • 6,291 篇 期刊文献
  • 382 篇 学位论文
  • 172 册 图书
  • 5 篇 资讯
  • 4 篇 专利
  • 4 篇 科技报告

馆藏范围

  • 58,338 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 33,337 篇 工学
    • 16,002 篇 计算机科学与技术...
    • 9,377 篇 控制科学与工程
    • 9,201 篇 软件工程
    • 7,544 篇 电气工程
    • 4,784 篇 机械工程
    • 3,081 篇 信息与通信工程
    • 2,548 篇 化学工程与技术
    • 2,256 篇 材料科学与工程(可...
    • 2,033 篇 动力工程及工程热...
    • 1,917 篇 仪器科学与技术
    • 1,727 篇 石油与天然气工程
    • 1,471 篇 电子科学与技术(可...
    • 1,409 篇 力学(可授工学、理...
    • 1,399 篇 土木工程
    • 1,191 篇 航空宇航科学与技...
    • 1,173 篇 交通运输工程
    • 1,106 篇 安全科学与工程
    • 1,072 篇 环境科学与工程(可...
    • 1,062 篇 生物医学工程(可授...
    • 910 篇 建筑学
  • 12,772 篇 理学
    • 6,325 篇 数学
    • 3,903 篇 物理学
    • 2,955 篇 统计学(可授理学、...
    • 1,892 篇 系统科学
    • 1,833 篇 化学
    • 1,127 篇 生物学
  • 7,258 篇 管理学
    • 6,098 篇 管理科学与工程(可...
    • 2,115 篇 工商管理
    • 1,472 篇 图书情报与档案管...
  • 1,575 篇 医学
    • 1,036 篇 临床医学
  • 907 篇 经济学
  • 556 篇 法学
  • 462 篇 农学
  • 409 篇 教育学
  • 114 篇 文学
  • 104 篇 军事学
  • 41 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 4,965 篇 computational mo...
  • 4,195 篇 data models
  • 3,992 篇 process control
  • 3,215 篇 analytical model...
  • 2,417 篇 predictive model...
  • 1,989 篇 mathematical mod...
  • 1,827 篇 data mining
  • 1,740 篇 control systems
  • 1,295 篇 training
  • 1,215 篇 data analysis
  • 1,194 篇 accuracy
  • 1,150 篇 biological syste...
  • 1,060 篇 monitoring
  • 1,043 篇 algorithm design...
  • 1,040 篇 feature extracti...
  • 1,009 篇 stability analys...
  • 987 篇 task analysis
  • 888 篇 neural networks
  • 862 篇 machine learning
  • 859 篇 modeling

机构

  • 38 篇 school of automa...
  • 38 篇 college of infor...
  • 36 篇 beijing univ tec...
  • 36 篇 univ chinese aca...
  • 36 篇 faculty of infor...
  • 36 篇 northeastern uni...
  • 34 篇 china electric p...
  • 31 篇 state key labora...
  • 30 篇 beihang univ sch...
  • 28 篇 college of contr...
  • 24 篇 hubei key labora...
  • 22 篇 school of inform...
  • 21 篇 华北电力大学
  • 20 篇 halliburton unit...
  • 20 篇 northeastern uni...
  • 19 篇 ibm thomas j. wa...
  • 18 篇 tsinghua univers...
  • 17 篇 shanghai jiao to...
  • 17 篇 shanghai univ sc...
  • 17 篇 state key labora...

作者

  • 54 篇 zhao chunhui
  • 44 篇 liu yang
  • 38 篇 li li
  • 37 篇 zhang lei
  • 37 篇 wu min
  • 33 篇 wang lei
  • 32 篇 li yang
  • 30 篇 gao furong
  • 27 篇 lei wang
  • 26 篇 xu yuan
  • 23 篇 li xin
  • 22 篇 weske mathias
  • 22 篇 jing zhang
  • 22 篇 wang jian
  • 21 篇 wang jing
  • 21 篇 zhu qunxiong
  • 20 篇 jian wang
  • 20 篇 yu wang
  • 19 篇 ming li
  • 18 篇 zhang chao

语言

  • 55,480 篇 英文
  • 1,510 篇 中文
  • 1,268 篇 其他
  • 34 篇 俄文
  • 18 篇 西班牙文
  • 14 篇 葡萄牙文
  • 11 篇 德文
  • 9 篇 法文
  • 5 篇 日文
  • 5 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 乌克兰文
  • 2 篇 捷克文
  • 1 篇 意大利文
  • 1 篇 波兰文
检索条件"任意字段=Conference on Data Analysis and Modeling for Process Control"
58338 条 记 录,以下是4751-4760 订阅
On Kinetic modeling of the process of Destruction of Solid Paraffin
On Kinetic Modeling of the Process of Destruction of Solid P...
收藏 引用
International conference on control Systems, Mathematical Modelling, Automation and Energy Efficiency (SUMMA)
作者: A. A. Kornilova S. I. Mustafina D. A. Kornilov E. R. Gizzatova A.G. Mustafin R. N. Galiakhmetov Institute of Mathematics Computer Science and Robotics Ufa University of Science and Technology Ufa Russia Institute of Chemistry and Protection in Emergency Situations Ufa University of Science and Technology Ufa Russia Institute of Technologies and Materials Ufa University of Science and Technology Ufa Russia
The work revealed that the destruction process occurs in three stages. Each stage is characterized by its own kinetic model. The values of the pre-exponential factor and the activation energy of the reaction rate cons... 详细信息
来源: 评论
Selective Attention: Enhancing Transformer through Principled Context control  38
Selective Attention: Enhancing Transformer through Principle...
收藏 引用
38th conference on Neural Information processing Systems, NeurIPS 2024
作者: Zhang, Xuechen Chang, Xiangyu Li, Mingchen Roy-Chowdhury, Amit Chen, Jiasi Oymak, Samet University of Michigan United States University of California Riverside United States
The attention mechanism within the transformer architecture enables the model to weigh and combine tokens based on their relevance to the query. While self-attention has enjoyed major success, it notably treats all qu...
来源: 评论
Security analysis of the Enhanced Cryptographic Algorithm Based on Discrete Logarithm Problem that Uses Multiple Handshakes for Improved Security  11
Security Analysis of the Enhanced Cryptographic Algorithm Ba...
收藏 引用
11th IEEE conference on Systems, process and control, ICSPC 2023
作者: Ordoñez, Aris J. Bicol University Computer Science & Information Technology Department Legazpi City Philippines
This research enhanced the Discrete Logarithm Problem-Based (DLP-based) Algorithm, enabling it to utilize two or more security keys in the encryption process. The enhancement enabled the Algorithm to inject multiple h... 详细信息
来源: 评论
Implementation & Application of coherent control systems: Digital Twin (high frequency open loop) with R2R (low frequency closed loop)
Implementation & Application of coherent control systems: Di...
收藏 引用
IEEE/SEMI conference and Workshop on Advanced Semiconductor Manufacturing
作者: Pratik C. Kotcher Kasturi Sarang Miller Allen Siva Dhandapani Automation Products Group Applied Global Services Va USA Metal Deposition Product Semiconductor Product Group Santa Clara Ca USA Business Development Semiconductor Product Group Santa Clara Ca USA
A Digital Twin (Applied Twin™) is a computational model that represents a physical asset such as a process chamber, evolving over time to reflect its structure, behavior, and context. This model treats the asset-twin ... 详细信息
来源: 评论
Intelligent analysis of University Apartment Management from the Perspective of Face Recognition Technology  7th
Intelligent Analysis of University Apartment Management from...
收藏 引用
7th International conference on Innovative Computing, IC 2024
作者: Wu, Haisheng Student Affairs Office Nantong Institute of Technology Jiangsu Nantong China
The use of face recognition technology can greatly improve the effectiveness of the management of college students’ apartments in view of the current situation that there are many security risks in school apartments,... 详细信息
来源: 评论
Wind-Solar-BESS Dynamic modeling Applications In Hybrid Plants: An analysis of Electromechanical Stability Support In The Casa Nova System Case  15
Wind-Solar-BESS Dynamic Modeling Applications In Hybrid Plan...
收藏 引用
15th IEEE International conference on Industry Applications, INDUSCON 2023
作者: Filho, Danilo Pinchemel Cardoso Medrado, Ricardo Cerqueira Miranda, Rodrigo Lemos Filho, Dalton França Guedes de Carvalho Filho, Márcio de Melo Filho, José Bione Salvador Brazil Recife Brazil
The propagation of converter-interfaced generation (CIG) is drawing attention, due to the issues elicited by their large-scale application, and also their potential to advance more complex operational modes. In such c... 详细信息
来源: 评论
Reducing NPT Using a Novel Approach to Real-Time Drilling data analysis
Reducing NPT Using a Novel Approach to Real-Time Drilling Da...
收藏 引用
2023 SPE Annual Technical conference and Exhibition, ATCE 2023
作者: Wang, Junzhe Sajeev, Shyam Kareepadath Ozbayoglu, Evren Baldino, Silvio Liu, Yaxin Jing, Haorong University of Tulsa TulsaOK United States BP HoustonTX United States
Early detection and characterization of anomalous events during drilling operations are critical to avoid costly downtime and prevent hazardous events, such as a stuck pipe or a well control event. A key aspect of rea... 详细信息
来源: 评论
modeling A THREE-STAGE NETWORK data ENVELOPMENT analysis MODEL - A CASE OF EFFICIENCY analysis FOR EXCHANGE TRADED FUNDS
收藏 引用
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND control 2021年 第5期17卷 1653-1666页
作者: Kao, Chen-Yu Phung, Manh-Trung Cheng, Cheng-Ping Chung, Wen-Hung Natl Yunlin Univ Sci & Technol Dept Finance 123 Univ RdSect 3 Touliu 64002 Yunlin Taiwan Chaoyang Univ Technol Dept Insurance 168 Jifeng East Rd Taichung 413310 Taiwan Vietnam Maritime Univ Fac Financial Management 484 Lach Tray St Hai Phong City Vietnam
In order to explore the efficiency of Taiwan's Exchange Traded Funds, we apply a three-stage network data envelopment analysis model to assessing overall and stage-level performance. These empirical results reveal... 详细信息
来源: 评论
Detecting Complex Anomalous Behaviors in Business processes: A Multi-perspective Conformance Checking Approach
Detecting Complex Anomalous Behaviors in Business Processes:...
收藏 引用
4th International conference on process Mining (ICPM)
作者: Mehr, Azadeh Sadat Mozafari de Carvalho, Renata M. van Dongen, Boudewijn Eindhoven Univ Technol Dept Math & Comp Sci Eindhoven Netherlands
In recent years, organizations are putting an increasing emphasis on anomaly detection. Anomalies in business processes can be an indicator of system faults, inefficiencies, or even fraudulent activities. In this pape... 详细信息
来源: 评论
Distributed data-driven engine framework facing CPS brain-inspired intelligent transportation  23
Distributed data-driven engine framework facing CPS brain-in...
收藏 引用
23rd IEEE International conference on High Performance Computing and Communications, 7th IEEE International conference on data Science and Systems, 19th IEEE International conference on Smart City and 7th IEEE International conference on Dependability in Sensor, Cloud and Big data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Yang, Zhengzhuang Xu, Mingyue Zhao, Kaidi Yang, Chao Zhi, Huiyu Zhang, Xihou Chen, Zhuoran Qiu, Song Han, Dingding School of Information Science and Technology Fudan University Shanghai China School of Communication and Electronic Engineering East China Normal University Shanghai China
Single data source, isolated data islands and low information utilization in intelligent transportation lead to the poor inversion of the cyber space to the physical space including Incomplete data integration, high i... 详细信息
来源: 评论