咨询与建议

限定检索结果

文献类型

  • 294,361 篇 会议
  • 838 篇 期刊文献
  • 278 册 图书

馆藏范围

  • 295,477 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 188,507 篇 工学
    • 130,356 篇 计算机科学与技术...
    • 110,106 篇 软件工程
    • 45,902 篇 信息与通信工程
    • 42,904 篇 控制科学与工程
    • 27,467 篇 电气工程
    • 21,636 篇 电子科学与技术(可...
    • 20,462 篇 生物工程
    • 19,683 篇 机械工程
    • 16,726 篇 生物医学工程(可授...
    • 13,434 篇 仪器科学与技术
    • 12,542 篇 光学工程
    • 11,829 篇 动力工程及工程热...
    • 9,270 篇 化学工程与技术
    • 9,223 篇 安全科学与工程
    • 8,886 篇 交通运输工程
    • 7,629 篇 网络空间安全
  • 88,382 篇 理学
    • 47,275 篇 数学
    • 22,408 篇 物理学
    • 21,781 篇 生物学
    • 14,648 篇 统计学(可授理学、...
    • 11,942 篇 系统科学
    • 9,657 篇 化学
  • 50,387 篇 管理学
    • 33,549 篇 管理科学与工程(可...
    • 20,142 篇 图书情报与档案管...
    • 14,984 篇 工商管理
  • 14,545 篇 医学
    • 11,830 篇 临床医学
    • 11,266 篇 基础医学(可授医学...
    • 7,407 篇 药学(可授医学、理...
    • 6,217 篇 公共卫生与预防医...
  • 8,266 篇 法学
    • 6,762 篇 社会学
  • 6,125 篇 经济学
  • 4,993 篇 农学
  • 4,410 篇 教育学
  • 2,460 篇 文学
  • 830 篇 军事学
  • 651 篇 艺术学
  • 27 篇 哲学
  • 24 篇 历史学

主题

  • 12,413 篇 computer science
  • 6,801 篇 feature extracti...
  • 6,595 篇 computational mo...
  • 5,650 篇 training
  • 5,216 篇 accuracy
  • 5,082 篇 automation
  • 4,478 篇 computer archite...
  • 4,277 篇 deep learning
  • 4,243 篇 data mining
  • 3,837 篇 machine learning
  • 3,690 篇 control systems
  • 3,638 篇 neural networks
  • 3,539 篇 support vector m...
  • 3,501 篇 predictive model...
  • 3,440 篇 convolutional ne...
  • 3,320 篇 robustness
  • 3,186 篇 conferences
  • 3,145 篇 optimization
  • 3,145 篇 testing
  • 3,136 篇 data models

机构

  • 1,037 篇 chitkara univers...
  • 956 篇 school of automa...
  • 619 篇 school of comput...
  • 530 篇 school of comput...
  • 497 篇 school of comput...
  • 419 篇 school of automa...
  • 413 篇 school of comput...
  • 336 篇 department of co...
  • 316 篇 school of comput...
  • 302 篇 college of compu...
  • 288 篇 school of comput...
  • 287 篇 maharishi school...
  • 284 篇 school of comput...
  • 281 篇 department of co...
  • 264 篇 college of infor...
  • 256 篇 school of comput...
  • 255 篇 lovely professio...
  • 252 篇 institute of inf...
  • 248 篇 department of co...
  • 245 篇 university of ch...

作者

  • 209 篇 kukreja vinay
  • 186 篇 china
  • 176 篇 wang wei
  • 136 篇 li wei
  • 129 篇 liu yang
  • 125 篇 lei wang
  • 123 篇 yang yang
  • 121 篇 yang liu
  • 109 篇 zhang tao
  • 108 篇 wei wang
  • 103 篇 wei zhang
  • 102 篇 zhang wei
  • 95 篇 sharma neha
  • 87 篇 chauhan rahul
  • 84 篇 li li
  • 81 篇 wei li
  • 80 篇 rui wang
  • 79 篇 liu wei
  • 68 篇 li yang
  • 68 篇 wang xin

语言

  • 284,668 篇 英文
  • 7,849 篇 其他
  • 3,003 篇 中文
  • 39 篇 西班牙文
  • 31 篇 土耳其文
  • 9 篇 法文
  • 9 篇 葡萄牙文
  • 3 篇 俄文
  • 1 篇 德文
检索条件"任意字段=IEEE International Conference on Computer Science and Automation Engineering"
295477 条 记 录,以下是4861-4870 订阅
排序:
Robotic Grasp Detection for Medical Test Tubes Based on Convolutional Neural Network  2
Robotic Grasp Detection for Medical Test Tubes Based on Conv...
收藏 引用
2nd international conference on automation, Robotics and computer engineering, ICARCE 2023
作者: Yin, Songtao Li, Maojun Jiang, Yiming Chen, Bo Zhang, Hui Zhao, Jiahao College of Electrical and Information Engineering Changsha University of Science and Technology Changsha China College of Electrical and Information Engineering Hunan University Changsha China School of Robotics Hunan University Changsha China
Visual-based robot grasping detection is a significant challenge in the field of robotics. With the widespread application of convolutional neural networks, significant progress has been made in this field in recent y... 详细信息
来源: 评论
FPGA-Implemented Reconfigurable Logic Locking Using N-Stage Delays for Obfuscation
FPGA-Implemented Reconfigurable Logic Locking Using N-Stage ...
收藏 引用
2025 ieee international Students' conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Srivastava, Saurabh Nakhate, Sangeeta Maulana Azad National Institute of Technology Dept. of Ece Bhopal India
System security is becoming an increasingly essential feature of modern computing systems, particularly programmable hardware such as Field Programmable Gate arrays (FPGA), employed in various applications such as aut... 详细信息
来源: 评论
DigiPramaan: Blockchain Based Certificate Management System  8
DigiPramaan: Blockchain Based Certificate Management System
收藏 引用
8th ieee international conference on Computing, Communication, Control and automation, ICCUBEA 2024
作者: Swami, Prathamesh Vhatkar, Kapil Ambekar, Yash Singh, Kartikey Kaware, Yashovardhan Dr. D. Y. Patil Institute of Technology Dept. of Computer Engineering Pune India
With more people taking online courses and earning certifications, there are great new opportunities to improve skills. But, this digital trend has also led to a problem with fake certificates. To address this problem... 详细信息
来源: 评论
A LCL-type DAB converter with hybrid modulation strategy  10
A LCL-type DAB converter with hybrid modulation strategy
收藏 引用
10th ieee international Power Electronics and Motion Control conference, IPEMC 2024 ECCE Asia
作者: Wang, Rui Li, Xiaodong Liu, Shi-Yuan Hu, Song Chen, Hao Macau University of Science and Technology Faculty of Innovation Engineering China Changshu Institute of Technology School of Electrical Engineering and Automation Changshu China China University of Mining and Technology School of Electrical Engineering Xuzhou China
This paper presents the operation, analysis, design, and experimental results of a dual-transformer LCL-type dual active bridge converter with a hybrid modulation strategy. The proposed modulation strategy can effecti... 详细信息
来源: 评论
Finite-Time Control for Stochastic Systems with Input and Measurement Powers of Unknown Time-Varying Function Forms  7
Finite-Time Control for Stochastic Systems with Input and Me...
收藏 引用
7th international conference on Robotics, Control and automation engineering, RCAE 2024
作者: Yang, Yadong Shen, Qikun Yangzhou University College of Information Engineering Yangzhou China
This article addresses the finite-time tracking control of stochastic systems with time-varying input and measurement powers. Compared to the existing results with known input powers, the input powers of the system st... 详细信息
来源: 评论
Priority Based Cyber Incident Handling: Work in Progress  11
Priority Based Cyber Incident Handling: Work in Progress
收藏 引用
11th international conference on Electrical engineering, computer science and Informatics, EECSI 2024
作者: Mulyati Stiawan, Deris Widhiarso, Wijang Budiarto, Rahmat Multi Data Palembang University & Faculty of Engineering Universitas Sriwijaya Department of Information System Palembang Indonesia Sriwijaya University Faculty of Computer Science Palembang Indonesia Multi Data Palembang University Department of Informatics Palembang Indonesia College of Computer Science & IT Albaha University Saudi Arabia
Effective and efficient cyber incident handling is crucial for maintaining the security of information systems and organizational data. This research aims to develop a priority-based cyber incident handling method by ... 详细信息
来源: 评论
An Efficient Ultra-Wideband Cross-Polarization Converter Based on Electromagnetic Metasurfaces  4
An Efficient Ultra-Wideband Cross-Polarization Converter Bas...
收藏 引用
4th international conference on Electronic Information engineering and computer science, EIECS 2024
作者: Ren, Xiaole Liu, Yunqing Ji, Zhonghang Song, Yida College of Electronic Information Engineering Changchun University of Science and Technology Changchun China
This paper investigates an ultra-wideband polarization converter based on an electromagnetic metasurface and delves into its polarization conversion mechanism. By leveraging the unique design flexibility of electromag... 详细信息
来源: 评论
Dual-Layered Approach for Malicious Domain Detection  9
Dual-Layered Approach for Malicious Domain Detection
收藏 引用
9th international conference on computer science and engineering, UBMK 2024
作者: Doǧan, Nadide Bilge Beydemir, Alp Bariş Bahtiyar, Serif Doǧan, Umutcan Istanbul Technical University Department of Computer Engineering Istanbul Turkey
The Domain Name System (DNS) plays a critical role in network security, yet faces numerous attacks, particularly from malicious domains. In this research, we propose a novel method to reduce the attacks by combining a... 详细信息
来源: 评论
Complementing Vehicle Trajectories Using Two Camera Viewpoints
Complementing Vehicle Trajectories Using Two Camera Viewpoin...
收藏 引用
2024 ieee international conference on Consumer Electronics, ICCE 2024
作者: Nakano, Katsuaki Nakazawa, Minoru Zuzak, Michael Kanazawa Institute of Technology Department of Computer Engineering Kanazawa Japan Rochester Institute of Technology Department of Computer Engineering Rochester United States
Traffic volume surveying is a crucial activity to get traffic statistics for road management and traffic congestion control. In recent years, the target environment of traffic volume surveying has become more complex,... 详细信息
来源: 评论
A Mathematical Model for the Selection of Software Requirements Elicitation Techniques  14
A Mathematical Model for the Selection of Software Requireme...
收藏 引用
14th international conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Saxena, Virat Raj Yadav, Rajeev Parveen, Azra Sadiq, Mohd. Mangalayatan University Department of Computer Science and Engineering Uttar Pradesh Aligarh202001 India Indraprastha Institute of Information Sciences Private Limited Indraprastha Research Laboratory New Delhi110025 India Upfet Jamia Millia Islamia A Central University Software Engineering Laboratory Computer Engineering Section New Delhi110025 India
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based... 详细信息
来源: 评论