咨询与建议

限定检索结果

文献类型

  • 34,657 篇 会议
  • 128 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 34,828 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,006 篇 工学
    • 14,086 篇 计算机科学与技术...
    • 10,225 篇 控制科学与工程
    • 9,739 篇 软件工程
    • 5,599 篇 电气工程
    • 3,207 篇 信息与通信工程
    • 3,161 篇 机械工程
    • 2,054 篇 交通运输工程
    • 1,873 篇 电子科学与技术(可...
    • 1,538 篇 动力工程及工程热...
    • 1,490 篇 仪器科学与技术
    • 1,285 篇 生物工程
    • 1,127 篇 安全科学与工程
    • 1,047 篇 生物医学工程(可授...
    • 768 篇 力学(可授工学、理...
    • 743 篇 光学工程
    • 699 篇 石油与天然气工程
    • 667 篇 化学工程与技术
    • 644 篇 土木工程
    • 640 篇 建筑学
  • 7,859 篇 理学
    • 4,297 篇 数学
    • 1,861 篇 物理学
    • 1,570 篇 系统科学
    • 1,400 篇 生物学
    • 1,040 篇 统计学(可授理学、...
    • 626 篇 化学
  • 5,245 篇 管理学
    • 4,423 篇 管理科学与工程(可...
    • 1,512 篇 工商管理
    • 1,174 篇 图书情报与档案管...
  • 818 篇 医学
    • 756 篇 临床医学
    • 597 篇 基础医学(可授医学...
  • 692 篇 法学
  • 566 篇 经济学
  • 294 篇 农学
  • 204 篇 教育学
  • 124 篇 军事学
  • 46 篇 文学
  • 20 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 2,580 篇 control systems
  • 1,223 篇 robot sensing sy...
  • 1,041 篇 intelligent robo...
  • 885 篇 intelligent syst...
  • 823 篇 mobile robots
  • 814 篇 real-time system...
  • 613 篇 automation
  • 613 篇 robots
  • 589 篇 humans
  • 526 篇 internet of thin...
  • 520 篇 mathematical mod...
  • 510 篇 robot kinematics
  • 462 篇 cameras
  • 458 篇 trajectory
  • 444 篇 legged locomotio...
  • 443 篇 neural networks
  • 441 篇 vehicles
  • 401 篇 safety
  • 401 篇 intelligent sens...
  • 400 篇 accuracy

机构

  • 70 篇 chitkara univers...
  • 68 篇 university of ch...
  • 61 篇 hubei key labora...
  • 57 篇 ieee
  • 42 篇 school of automa...
  • 39 篇 south china univ...
  • 38 篇 institutes for r...
  • 37 篇 univ chinese aca...
  • 36 篇 lovely professio...
  • 35 篇 school of automa...
  • 35 篇 school of cyber ...
  • 34 篇 qingdao academy ...
  • 34 篇 college of infor...
  • 32 篇 university of sc...
  • 32 篇 school of electr...
  • 31 篇 shenyang institu...
  • 28 篇 department of au...
  • 27 篇 maharishi school...
  • 26 篇 dalian universit...
  • 26 篇 faculty of infor...

作者

  • 64 篇 wu xinyu
  • 48 篇 xiong gang
  • 41 篇 liu yang
  • 40 篇 wei li
  • 36 篇 zhang tao
  • 35 篇 christoph stille...
  • 34 篇 li li
  • 30 篇 jian wang
  • 30 篇 wang lei
  • 30 篇 xi ning
  • 27 篇 xinyu wu
  • 26 篇 wang jian
  • 25 篇 yu wang
  • 25 篇 fenghua zhu
  • 24 篇 wang jing
  • 23 篇 heping chen
  • 22 篇 munsang kim
  • 21 篇 liu xin
  • 21 篇 chen chen
  • 20 篇 liu dong

语言

  • 33,901 篇 英文
  • 629 篇 其他
  • 356 篇 中文
  • 3 篇 俄文
  • 2 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems"
34828 条 记 录,以下是21-30 订阅
排序:
An Adaptive Golden Jackal Optimization Algorithm for Mobile Robotic Path Planning
An Adaptive Golden Jackal Optimization Algorithm for Mobile ...
收藏 引用
2024 international conference on Mechatronics and intelligent control, ICMIC 2024
作者: Chen, Siwen Zheng, Xiujuan Shanghai United Imaging Healthcare Co. Ltd. Shanghai China Engineering Research Center for Metallurgical Automation and Measurement Technology of Ministry of Education Wuhan University of Science and Technology Wuhan China Institute of Robotics and Intelligent Systems Wuhan University of Science and Technology Wuhan China
Given the shortcomings of the traditional Golden Jackal Optimization (GJO) algorithm, including limited accuracy and slow convergence speed in solving mobile robot path planning problems, an improved adaptive Golden J... 详细信息
来源: 评论
A Real-World Dataset "IDSIoT2024" for Machine Learning/Deep Learning based cyber Attack Detection System for IoT Architecture  3
A Real-World Dataset "IDSIoT2024" for Machine Learning/Deep ...
收藏 引用
3rd international conference on intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Koppula, Manasa Leo Joseph, L.M.I. Dept. of ECE SR University Warangal India
The Internet of Things (IoT) is an emerging technology evaluating its inception in all domains like industries, home automation, healthcare, agriculture, etc. The major challenge in IoT is securing the IoT devices and... 详细信息
来源: 评论
Secure Remote State Estimation Against False Data Injection Attacks Based on Improved Kalman Filtering Algorithm  24
Secure Remote State Estimation Against False Data Injection ...
收藏 引用
2nd international conference on Frontiers of intelligent Manufacturing and automation, CFIMA 2024
作者: Zhuang, Xu Wang, Zhichuang He, Wei School of Intelligence Science and Technology University of Science and Technology Beijing Beijing China
Due to the development of wireless networks, many secure remote state estimation algorithms have been studied by researchers. This paper proposed an improved Kalman filter method to deal with the secure remote state e... 详细信息
来源: 评论
A Power-voltage coordinated control strategy of inverters in low-voltage distribution networks
A Power-voltage coordinated control strategy of inverters in...
收藏 引用
2024 international conference on Mechatronics and intelligent control, ICMIC 2024
作者: Wei, Yinzhong Mei, Jianchun Zhou, Yalong Su, Jiabin Yan, Anxin Zhou, Zhen China Energy Engineering Group Jiangsu Power Design Institute Co. Ltd. Nanjing211102 China Jiangsu Keneng Electric Power Engineering Consulting Co. Ltd. Nanjing210000 China School of Automation Nanjing University of Science and Technology Nanjing210094 China
Considering the problem concerning voltage beyond limit caused by the photovoltaic generators in low-voltage distribution network system, a power-voltage coordinated manage method about inverters is offered to deal wi... 详细信息
来源: 评论
Research on Mechanical automation control based on Bidirectional Long Short-Term Memory  1
Research on Mechanical Automation Control based on Bidirecti...
收藏 引用
1st international conference on intelligent systems and Computational Networks, ICISCN 2025
作者: Song, Xiaolu Zaozhuang Vocational College of Science & Technology College of Mechanical and Electrical Engineering China
The rapid advancement of industrial automation has led to increased reliance on intelligent control systems for optimizing mechanical processes. Traditional automation methods often struggle with dynamic environmental... 详细信息
来源: 评论
Knowledge-Defined Internet of Things Architecture for Cloud-Edge Collaborative Industrial Monitoring  24
Knowledge-Defined Internet of Things Architecture for Cloud-...
收藏 引用
2nd international conference on Frontiers of intelligent Manufacturing and automation, CFIMA 2024
作者: Zhou, Hongyu Xing, Fangyuan Tong, Fei Wang, Mufeng Zhang, Yan Yang, Shuaifeng Southeast University Nanjing China China Industrial Control Systems Cyber Emergency Response Team Beijing China
The Industrial Internet of Things (IIoT) has become a crucial technology driving the transformation of manufacturing towards intelligence. Traditional industrial networks primarily focus on data collection, whereas em... 详细信息
来源: 评论
intelligent control algorithms for industrial automation systems
Intelligent control algorithms for industrial automation sys...
收藏 引用
2025 ieee international Students' conference on Electrical, Electronics and Computer Science, SCEECS 2025
作者: Sarathkumar, D. Anil, A.R. Sivadasan, J. Jayakumar, T. Manivel, Murugesan Anandhakumar, C. Engineering Kongu Engineering College Department of Electrical and Electronics Tamil Nadu 638 060 India Sree Buddha College of Engineering Pattoor Department of Computer Science &engineering Kerala Alappuzha India Psr Engineering College Department of Electronics and Communication Engineering Tamil Nadu Sivakasi626140 India Nandha Engineering College Department of Electrical and Electronics Engineering Tamil Nadu 638052 India Karpagam Institute of Technology Department of Electrical and Electronics Engineering Tamilnadu Coimbatore641021 India Sri Ramakrishna Institute of Technology Department of Electrical and Electronic Engineering Tamil Nadu Coimbatore641010 India
Industrial automation has become a cornerstone of modern manufacturing, enhancing efficiency, reliability, and scalability. The integration of intelligent control algorithms, such as fuzzy logic, neural networks, gene... 详细信息
来源: 评论
Deep Learning to Effectively Detect and Eliminate Real-Time Network Intrusions  3
Deep Learning to Effectively Detect and Eliminate Real-Time ...
收藏 引用
3rd international conference on intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Harikesh, S. Sujatha, G. Department of Networking and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Chennai India
Network traffic has been growing exponentially for the past several years. As a result, it has become more and more difficult to detect cyber intrusions - especially in unbalanced environments, where the attacks are u... 详细信息
来源: 评论
DTS: Dynamic Traffic Scrubbing Against Link Flooding Attacks with Programmable Data Plane
DTS: Dynamic Traffic Scrubbing Against Link Flooding Attacks...
收藏 引用
2024 international conference on Mechatronics and intelligent control, ICMIC 2024
作者: Zhao, Zheng Liu, Fang Meng, Zhaoran Zhao, Qi Xie, Xin Dalian Maritime University Dalian China Northeastern University Shenyang China Hunan University of Information Technology Changsha China Hunan Province Higher Education Key Laboratory of Intelligent Sensing and Computing Changsha China
Link flood attacks (LFA) represent a significant cybersecurity threat due to their ability to cause extensive network disruptions. Traditional traffic scrubbing methods, relying on static rules, often struggle to coun... 详细信息
来源: 评论
cyberbullying Prediction using K-Means Clustering with Learning Methodologies for Emotion Detection in Tweets  3
Cyberbullying Prediction using K-Means Clustering with Learn...
收藏 引用
3rd international conference on intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Privietha, P. Sasirekha, R. Melwin Akash, L. Punitha, K. Marshal Felix, A. Ramyabharathi, R. Department of CSE Sathyabama Institute of Science and Technology Chennai India
The rise of social media has led to an increase in real-time data that can reveal potential cyber threats. This research explores the use of emotion detection in tweets to predict cyber attacks, employing K-Means Clus... 详细信息
来源: 评论