咨询与建议

限定检索结果

文献类型

  • 34,896 篇 会议
  • 126 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 35,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,193 篇 工学
    • 14,210 篇 计算机科学与技术...
    • 10,309 篇 控制科学与工程
    • 9,840 篇 软件工程
    • 5,635 篇 电气工程
    • 3,270 篇 信息与通信工程
    • 3,173 篇 机械工程
    • 2,075 篇 交通运输工程
    • 1,900 篇 电子科学与技术(可...
    • 1,554 篇 动力工程及工程热...
    • 1,497 篇 仪器科学与技术
    • 1,285 篇 生物工程
    • 1,143 篇 安全科学与工程
    • 1,053 篇 生物医学工程(可授...
    • 771 篇 力学(可授工学、理...
    • 751 篇 光学工程
    • 738 篇 石油与天然气工程
    • 668 篇 化学工程与技术
    • 650 篇 土木工程
    • 648 篇 建筑学
  • 7,918 篇 理学
    • 4,343 篇 数学
    • 1,874 篇 物理学
    • 1,572 篇 系统科学
    • 1,401 篇 生物学
    • 1,048 篇 统计学(可授理学、...
    • 627 篇 化学
  • 5,307 篇 管理学
    • 4,455 篇 管理科学与工程(可...
    • 1,537 篇 工商管理
    • 1,215 篇 图书情报与档案管...
  • 854 篇 医学
    • 770 篇 临床医学
    • 610 篇 基础医学(可授医学...
  • 700 篇 法学
  • 575 篇 经济学
  • 301 篇 农学
  • 208 篇 教育学
  • 127 篇 军事学
  • 46 篇 文学
  • 20 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 2,582 篇 control systems
  • 1,222 篇 robot sensing sy...
  • 1,047 篇 intelligent robo...
  • 888 篇 intelligent syst...
  • 830 篇 real-time system...
  • 823 篇 mobile robots
  • 620 篇 automation
  • 614 篇 robots
  • 589 篇 humans
  • 531 篇 internet of thin...
  • 520 篇 mathematical mod...
  • 512 篇 robot kinematics
  • 460 篇 cameras
  • 458 篇 trajectory
  • 446 篇 neural networks
  • 442 篇 legged locomotio...
  • 441 篇 vehicles
  • 411 篇 accuracy
  • 408 篇 intelligent sens...
  • 403 篇 safety

机构

  • 69 篇 hubei key labora...
  • 69 篇 chitkara univers...
  • 66 篇 university of ch...
  • 56 篇 ieee
  • 52 篇 lovely professio...
  • 42 篇 school of automa...
  • 39 篇 south china univ...
  • 39 篇 maharishi school...
  • 38 篇 institutes for r...
  • 37 篇 univ chinese aca...
  • 35 篇 school of automa...
  • 35 篇 school of cyber ...
  • 34 篇 qingdao academy ...
  • 34 篇 college of infor...
  • 32 篇 university of sc...
  • 32 篇 school of electr...
  • 30 篇 shenyang institu...
  • 27 篇 yeshwantrao chav...
  • 27 篇 department of au...
  • 26 篇 dalian universit...

作者

  • 64 篇 wu xinyu
  • 48 篇 xiong gang
  • 41 篇 liu yang
  • 40 篇 wei li
  • 36 篇 zhang tao
  • 35 篇 christoph stille...
  • 34 篇 li li
  • 30 篇 jian wang
  • 30 篇 wang lei
  • 30 篇 xi ning
  • 27 篇 xinyu wu
  • 26 篇 wang jian
  • 25 篇 yu wang
  • 25 篇 fenghua zhu
  • 24 篇 wang jing
  • 23 篇 heping chen
  • 22 篇 munsang kim
  • 22 篇 liu xin
  • 22 篇 chen chen
  • 20 篇 liu dong

语言

  • 33,948 篇 英文
  • 819 篇 其他
  • 357 篇 中文
  • 3 篇 俄文
  • 2 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems"
35065 条 记 录,以下是101-110 订阅
排序:
Fuzzy Logic based Scheduling Optimization and Risk control in Power systems  1
Fuzzy Logic based Scheduling Optimization and Risk Control i...
收藏 引用
1st international conference on intelligent systems and Computational Networks, ICISCN 2025
作者: Qiu, Xuejing He, Xin State Grid Information & Communication Branch of Hubei Electric Power Co. Ltd Wuhan China Wuhan Diameter Technology Co. Ltd Wuhan China
The expansion of power system scale and the development of new energy further increase the complexity and uncertainty of power system. This also brings new challenges to the traditional power system dispatching optimi... 详细信息
来源: 评论
Vehicle Pseudonym Change Mechanism Based on Dynamic Game
Vehicle Pseudonym Change Mechanism Based on Dynamic Game
收藏 引用
2024 international conference on Mechatronics and intelligent control, ICMIC 2024
作者: Zhao, Zheng Wang, Junren Mao, Qian Zhao, Qi Xie, Xin Dalian Maritime University Dalian China Liaoning University Shenyang China Northeastern University Shenyang China Hunan University of Information Technology Changsha China Hunan Province Higher Education Key Laboratory of Intelligent Sensing and Computing Changsha China
intelligent Transportation systems (ITS), particularly vehicular ad-hoc networks, play a crucial role in improving road safety and traffic efficiency. However, transmitting vehicle location and identity data poses sig... 详细信息
来源: 评论
Voice-Driven Prescription and Inventory Management System for Hospitals  3
Voice-Driven Prescription and Inventory Management System fo...
收藏 引用
3rd international conference on intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Dharun Kumar, S. Ilavarasan, S. Jessica, R. Karthick Raja, C. Abinesh Raj, S. Srinivasan, L. Dr. NGP Institute of Technology Tamil Nadu Coimbatore India
With operational efficiency and patient safety at its core, there is an important need in this changing healthcare arena. This article reviews the advances and challenges regarding voice-activated systems for prescrip... 详细信息
来源: 评论
Mitigating Injection and Phishing Attacks through Input Validation and Phishing Detection Techniques  24
Mitigating Injection and Phishing Attacks through Input Vali...
收藏 引用
6th international conference on Information technology and Computer Communications, ITCC 2024
作者: Blancaflor, Eric B. Lara, Charlene Grazielle E. Mancilla, Danielle Franchesca L. Caberto, Drizzle Joy V. Magno, Frances Denielle C. School of Information Technology Mapua University Manila Philippines
This case study addresses security attacks associated with SQL Injection, Cross-Site Scripting (XSS), and Email Phishing attacks on online platforms. The study focuses on a small beverage commercial web portal and fak... 详细信息
来源: 评论
Model Checking for Security Assurance in cyber-Physical systems  5
Model Checking for Security Assurance in Cyber-Physical Syst...
收藏 引用
5th international conference on Emerging systems and intelligent Computing, ESIC 2025
作者: Gopinathan, Mythili Easwaran, Nathipriya Raja, Pooja Poonkuzhali, Ramadoss K.S. Rangasamy College of Technology Tiruchengode India
The attacks BW-DDoS represent known onslaughts of packets forwarded by large numbers of participating websites that interfere with a valid stream of traffic through congested networks. While such attacks often rely on... 详细信息
来源: 评论
Detection and Cancellation of Multiplicative FDI Attack on Bilateral Encrypted control System in Variable Periodic Motion
Detection and Cancellation of Multiplicative FDI Attack on B...
收藏 引用
2025 ieee/SICE international Symposium on System Integration, SII 2025
作者: Kosha, Katsumasa Miyazaki, Tetsuro Teranishi, Kaoru Kogiso, Kiminao Kawashima, Kenji The University of Tokyo Department of Information Physics and Computing 7-3-1 Hongo Bunkyo-ku Tokyo113-8656 Japan The University of Texas at Austin Oden Institute for Computational Engineering and Sciences AustinTX United States Japan Society for the Promotion of Science Tokyo Japan The University of Electro-Communications Department of Mechanical and Intelligent Systems Engineering 1-5-1 ChofugaokaChofu-shi Tokyo182-8585 Japan
Teleoperation of remote assist robots has recently advanced owing to the development of communication technology. However, anonymous malicious attacks may intercept or falsify the network control system. Therefore, it... 详细信息
来源: 评论
Addressing cybersecurity Challenges in 6G Networks Through AI-Driven Adaptive Defense Mechanisms and Quantum-Resilient Protocols
Addressing Cybersecurity Challenges in 6G Networks Through A...
收藏 引用
2025 international conference on Computing for Sustainability and intelligent Future, COMP-SIF 2025
作者: Sankalp, M.R. Lokapal, G. Mohan, B.A. Basavaraj, G.N. Bms Institute of Technology & Management Department of Information Science Bengaluru India
The upcoming 6G networks will offer unmatched connectivity features along with virtually no latency delays while allowing fast transmissions that lead to breakthrough technologies including autonomous vehicles and sma... 详细信息
来源: 评论
Design of Cryptographic Application Scheme for Industrial control System  24
Design of Cryptographic Application Scheme for Industrial Co...
收藏 引用
2nd international conference on Artificial Intelligence, systems and Network Security, AISNS 2024
作者: Peng, Hui Chen, Yan Liu, Fangfei Hou, Weiguo Cheng, Debin Wang, Huanhuan Key Laboratory of General Quality Technology and Application for Intelligent Manufacturing Equipment China Electronic Product Reliability and Environmental Testing Research Institute Guangdong Guangzhou China The Fifth Electronic Research Institute of MIIT Guangdong Guangzhou China Electronic Product Reliability and Environmental Testing Research Institute Guangdong Guangzhou China
Aiming at the current situation and threats of industrial domain security, this paper focuses on the application gaps of cryptography in this domain, deeply analyzes its encryption requirements, and conducts applicati... 详细信息
来源: 评论
Analysis of the Smoothness of Baggage Handling Based on the Current Status of Baggage Handling System Operations
Analysis of the Smoothness of Baggage Handling Based on the ...
收藏 引用
2024 international conference on Mechatronics and intelligent control, ICMIC 2024
作者: Zhou, Peng Zhang, Guodong Xiang, Gao Zhang, Xiangke Huang, Tianyu The Civil Aviation Logistics Technology Co. Ltd. Chengdu China The Second Research Institute of Civil Aviation Administration of China Chengdu China Chongqing Airport Information and Communication Network Co. Ltd. Chongqing China
The airport baggage handling system ranks the highest in the percentage of airport complaints every year, and the smoothness of its transportation affects the operation of the airport and the travel of passengers to a... 详细信息
来源: 评论
Algorithm Implementation of Digital Protection System for Traditional Cultural Industry Based on Grey Clustering
Algorithm Implementation of Digital Protection System for Tr...
收藏 引用
2024 international conference on Mechatronics and intelligent control, ICMIC 2024
作者: Chen, Hongxia Hou, Lanbao School of Literature and Media Jingchu University of Technology Jingmen448000 China School of Mathematics and Physics Jingchu University of Technology Jingmen448000 China
The protection mode of digitalization effectively transforms various national traditional cultures into digital products, providing a way of thinking for the protection of national traditional cultures. This mode stil... 详细信息
来源: 评论