咨询与建议

限定检索结果

文献类型

  • 35,316 篇 会议
  • 130 篇 期刊文献
  • 44 册 图书

馆藏范围

  • 35,490 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,593 篇 工学
    • 14,539 篇 计算机科学与技术...
    • 10,636 篇 控制科学与工程
    • 9,929 篇 软件工程
    • 5,707 篇 电气工程
    • 3,521 篇 信息与通信工程
    • 3,206 篇 机械工程
    • 2,147 篇 交通运输工程
    • 1,933 篇 电子科学与技术(可...
    • 1,582 篇 动力工程及工程热...
    • 1,537 篇 仪器科学与技术
    • 1,289 篇 生物工程
    • 1,224 篇 安全科学与工程
    • 1,061 篇 生物医学工程(可授...
    • 933 篇 石油与天然气工程
    • 788 篇 力学(可授工学、理...
    • 755 篇 光学工程
    • 673 篇 化学工程与技术
    • 659 篇 土木工程
    • 650 篇 建筑学
  • 8,000 篇 理学
    • 4,373 篇 数学
    • 1,893 篇 物理学
    • 1,578 篇 系统科学
    • 1,405 篇 生物学
    • 1,063 篇 统计学(可授理学、...
    • 666 篇 化学
  • 5,418 篇 管理学
    • 4,572 篇 管理科学与工程(可...
    • 1,558 篇 工商管理
    • 1,259 篇 图书情报与档案管...
  • 854 篇 医学
    • 777 篇 临床医学
    • 611 篇 基础医学(可授医学...
  • 714 篇 法学
  • 581 篇 经济学
  • 308 篇 农学
  • 219 篇 教育学
  • 127 篇 军事学
  • 50 篇 文学
  • 20 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 2,585 篇 control systems
  • 1,224 篇 robot sensing sy...
  • 1,048 篇 intelligent robo...
  • 892 篇 intelligent syst...
  • 845 篇 real-time system...
  • 825 篇 mobile robots
  • 621 篇 automation
  • 615 篇 robots
  • 589 篇 humans
  • 540 篇 internet of thin...
  • 520 篇 mathematical mod...
  • 512 篇 robot kinematics
  • 462 篇 cameras
  • 458 篇 trajectory
  • 450 篇 neural networks
  • 444 篇 vehicles
  • 440 篇 legged locomotio...
  • 430 篇 accuracy
  • 407 篇 intelligent sens...
  • 403 篇 safety

机构

  • 70 篇 hubei key labora...
  • 69 篇 chitkara univers...
  • 67 篇 university of ch...
  • 55 篇 ieee
  • 52 篇 lovely professio...
  • 42 篇 school of automa...
  • 39 篇 south china univ...
  • 39 篇 maharishi school...
  • 38 篇 institutes for r...
  • 37 篇 univ chinese aca...
  • 35 篇 school of automa...
  • 35 篇 school of cyber ...
  • 34 篇 qingdao academy ...
  • 34 篇 college of infor...
  • 33 篇 university of sc...
  • 33 篇 school of electr...
  • 30 篇 yeshwantrao chav...
  • 28 篇 school of cyber ...
  • 27 篇 shenyang institu...
  • 26 篇 dalian universit...

作者

  • 64 篇 wu xinyu
  • 46 篇 xiong gang
  • 43 篇 liu yang
  • 39 篇 wei li
  • 36 篇 zhang tao
  • 35 篇 christoph stille...
  • 34 篇 li li
  • 31 篇 wang lei
  • 30 篇 jian wang
  • 30 篇 xi ning
  • 27 篇 xinyu wu
  • 26 篇 wang jian
  • 25 篇 yu wang
  • 25 篇 fenghua zhu
  • 24 篇 wang jing
  • 22 篇 munsang kim
  • 22 篇 liu xin
  • 22 篇 heping chen
  • 22 篇 chen chen
  • 20 篇 liu dong

语言

  • 29,324 篇 英文
  • 5,868 篇 其他
  • 387 篇 中文
  • 3 篇 俄文
  • 2 篇 西班牙文
检索条件"任意字段=IEEE International Conference on Cyber Technology in Automation,Control,and Intelligent Systems"
35490 条 记 录,以下是881-890 订阅
排序:
Battery Monitoring System Design Based on NB-IoT  1
Battery Monitoring System Design Based on NB-IoT
收藏 引用
1st international conference on cyber-Energy systems and intelligent Energy, ICCSIE 2022
作者: Wang, Xiaoping Yi, Xianjun Ding, Han Wuhan Institute of Technology Dept. School of Electrical Information Wuhan China
Aiming at problems such as limited computing power, insufficient local data storage capacity and short data transmission distance of traditional battery monitoring systems, this paper designed a lithium battery monito... 详细信息
来源: 评论
Speech Detection and Comparison using Different Feature Extraction Method for Correct Verification  3
Speech Detection and Comparison using Different Feature Extr...
收藏 引用
3rd international conference on Communication, control, and intelligent systems, CCIS 2024
作者: Upadhyay, Shrikant Kumar, Binod Singh, Rajan Alam, Md. Irfan Kumari, Barkha Hinz, Binita Roshima Mlr Insitute of Technology Department of Electronics and Communication Engineeing Hyderabad India Jharkhand Rai University Facultyt of Cse & It Ranchi India Mlr Institute of Technology Department of Electronics and Communication Engineering Hyderabad India Jharkhand Rai University Faculty of Cse & It Ranchi India Pune India Rtc Institute of Technology Department of Computer Science and Engineering-Cyber Security Ranchi India
Mental status through physical appearance identification is not possible as it does not give complete status of any human. Using voice and considering quality extraction of talked it is quite easy to predict the menta... 详细信息
来源: 评论
OCDE: Adaptive Differential Evolution Algorithm in Distributed intelligent systems  16
OCDE: Adaptive Differential Evolution Algorithm in Distribut...
收藏 引用
16th international conference on cyber-Enabled Distributed Computing and Knowledge Discover, cyberC 2024
作者: Wang, Minghao Du, Shaoyi Xi'an Jiaotong University Institute of Artificial Intelligence and Robotics Xi'an China
In autonomous driving, the optimization theory and algorithms for distributed intelligent systems are essential for enhancing vehicle decision-making capabilities, path planning, and environmental perception. Evolutio... 详细信息
来源: 评论
FUZZY AHP and TOPSIS Approach to Evaluate the Criteria of HVAC control System
FUZZY AHP and TOPSIS Approach to Evaluate the Criteria of HV...
收藏 引用
2024 ieee international conference on Information technology, Electronics and intelligent Communication systems, ICITEICS 2024
作者: Gowda, S. Mayur Urf Hosamani, Manjunath Madar Kodipalli, Ashwini Rohini, B.R. Soma, Bhavani Gargi, N. Global Academy of Technology Dept. of Artificial Intelligence & Data Science Karnataka Bangalore India
Effective control of Heating, Ventilation, and Air Conditioning (HVAC) systems is necessary to optimize indoor comfort, energy efficiency, and environmental impact. This study presents a novel method that combines the... 详细信息
来源: 评论
Edge Multi-agent Intrusion Detection System Architecture for IoT Devices with Cloud Continuum  7
Edge Multi-agent Intrusion Detection System Architecture for...
收藏 引用
ieee 7th international conference on Industrial cyber-Physical systems (ICPS)
作者: Funchal, Gustavo Pedrosa, Tiago de la Prieta, Fernando Leitao, Paulo Inst Politecn Braganca Res Ctr Digitalizat & Intelligent Robot CeDRI Campus Santa ApolOnia P-5300253 Braganca Portugal Inst Politecn Braganca Lab Sustentabilidade & Tecnol Regioes Montanha Su Campus Santa ApolOnia P-5300253 Braganca Portugal Univ Salamanca BISI Digital Innovat Hub Edificio I D IC Espejos S-N Salamanca 37007 Spain
The Industry 4.0 has brought significant changes in production processes and business models worldwide. Advanced technologies, e.g., Collaborative Robotics, Artificial Intelligence, Cloud Computing, and Internet of Th... 详细信息
来源: 评论
SEDSpec: Securing Emulated Devices by Enforcing Execution Specification  54
SEDSpec: Securing Emulated Devices by Enforcing Execution Sp...
收藏 引用
54th Annual ieee/IFIP international conference on Dependable systems and Networks (DSN)
作者: Chen, Yang Zhang, Shengzhi Jia, Xiaoqi Zhou, Qihang Huang, Heqing Xu, Shaowen Du, Haochao Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China Boston Univ Metropolitan Coll Boston MA 02215 USA
Device emulation is a vital aspect of virtualization, yet remains vulnerable to security threats. Prior research has focused on monitoring I/O data flow or identifying internal device anomalies but often falls short i... 详细信息
来源: 评论
Energy-Efficient Safety-Aware Scheduling of Real-Time control systems with Burst Tasks  22
Energy-Efficient Safety-Aware Scheduling of Real-Time Contro...
收藏 引用
22nd ieee international conference on Industrial Informatics, INDIN 2024
作者: Cheng, Ting Liang, Yonghui Xu, Qimin Zhu, Shanying Department of Automation Shanghai Jiao Tong University Shanghai 200240 China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai 200240 China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai 200240 China
In industrial sites, multiple real-time control systems often share computing resources. However, burst computing tasks may lead to the random dropping of control computing subtasks, resulting in control failures and ... 详细信息
来源: 评论
Multi-Level Features Fusion for Zero-Shot Object Pose Estimation  26
Multi-Level Features Fusion for Zero-Shot Object Pose Estima...
收藏 引用
26th international conference on Industrial technology, ICIT 2025
作者: Huang, Nanxin Xu, Chi School of Automation China University of Geosciences Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China
Driven by advancements in industrial production and artificial intelligence, the need for pose estimation of new ob-jects in areas like robotic manipulation and virtual reality is increasing. We introduce a zero-shot ... 详细信息
来源: 评论
Analysis and Calculation of Strength and Rigidity for Industrial Grinding Robot  12
Analysis and Calculation of Strength and Rigidity for Indust...
收藏 引用
12th international conference on cyber technology in automation, control, and intelligent systems, cyber 2022
作者: Xu, Manman Zhang, Zhitao Shao, Long Zhang, Zhen Cao, Chuqing Anhui Polytechnic University School of Mechanical Engineering Wuhu241000 China Hit Robot Technology Research Institute Co. Ltd Department of Wuhu Wuhu241000 China
The rigidity of the grinding robot will greatly affect the tool path and the actual grinding effect. In this paper, the structural model of grinding robot is preliminarily designed and statically analyzed. The maximum... 详细信息
来源: 评论
AI-Based Detection and Analysis of Phishing Domains: Leveraging Machine Learning for Enhanced cybersecurity
AI-Based Detection and Analysis of Phishing Domains: Leverag...
收藏 引用
2024 international conference on System, Computation, automation and Networking, ICSCAN 2024
作者: Dhanalakshmi, R. Vijayaraghavan, N. Kumar, Akhil Beni Prathiba, B. Sahaya School of Computer Science and Engineering Vellore Institute of Technology - Chennai Center for Cyber Physical Systems Chennai India Kcg College of Technology Department of Mathematics Chennai India Scset Bennett University Greater Noida India School of Computer Science and Engineering Vellore Institute of Technology Center for Cyber Physical Systems Chennai India
In the ever-evolving landscape of cyber security, the prevalence of phishing attacks poses a formidable threat to information security systems worldwide, compromising data integrity and eroding user trust. This paper ... 详细信息
来源: 评论