咨询与建议

限定检索结果

文献类型

  • 6,204 篇 会议
  • 209 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 6,422 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 3,563 篇 工学
    • 2,657 篇 计算机科学与技术...
    • 1,844 篇 控制科学与工程
    • 1,187 篇 软件工程
    • 1,117 篇 电气工程
    • 275 篇 机械工程
    • 270 篇 信息与通信工程
    • 221 篇 交通运输工程
    • 193 篇 电子科学与技术(可...
    • 118 篇 仪器科学与技术
    • 112 篇 生物工程
    • 109 篇 安全科学与工程
    • 108 篇 生物医学工程(可授...
    • 89 篇 动力工程及工程热...
    • 83 篇 力学(可授工学、理...
    • 70 篇 航空宇航科学与技...
    • 69 篇 化学工程与技术
    • 64 篇 光学工程
    • 55 篇 建筑学
    • 51 篇 石油与天然气工程
  • 961 篇 理学
    • 624 篇 数学
    • 199 篇 物理学
    • 178 篇 系统科学
    • 139 篇 生物学
    • 138 篇 统计学(可授理学、...
    • 59 篇 化学
  • 731 篇 管理学
    • 686 篇 管理科学与工程(可...
    • 131 篇 工商管理
    • 81 篇 图书情报与档案管...
  • 95 篇 医学
    • 70 篇 基础医学(可授医学...
    • 62 篇 临床医学
  • 44 篇 法学
  • 34 篇 经济学
  • 16 篇 教育学
  • 12 篇 军事学
  • 11 篇 农学
  • 1 篇 艺术学

主题

  • 678 篇 computational mo...
  • 551 篇 control systems
  • 335 篇 computational in...
  • 288 篇 artificial intel...
  • 265 篇 mobile robots
  • 233 篇 automation
  • 231 篇 neural networks
  • 213 篇 humans
  • 211 篇 robot sensing sy...
  • 205 篇 mathematical mod...
  • 201 篇 fuzzy control
  • 173 篇 automatic contro...
  • 170 篇 process control
  • 167 篇 robots
  • 158 篇 intelligent robo...
  • 152 篇 optimization
  • 149 篇 robot control
  • 127 篇 navigation
  • 127 篇 genetic algorith...
  • 125 篇 computer archite...

机构

  • 46 篇 ieee
  • 38 篇 chinese acad sci...
  • 30 篇 state key labora...
  • 28 篇 school of artifi...
  • 27 篇 department of au...
  • 26 篇 beijing key labo...
  • 24 篇 politehn univ ti...
  • 22 篇 univ chinese aca...
  • 21 篇 computer and aut...
  • 21 篇 school of automa...
  • 19 篇 institute of aut...
  • 19 篇 department of au...
  • 18 篇 school of automa...
  • 18 篇 obuda univ docto...
  • 18 篇 department of au...
  • 18 篇 school of automa...
  • 18 篇 dept. of automat...
  • 17 篇 school of artifi...
  • 16 篇 hubei key labora...
  • 16 篇 university of ch...

作者

  • 43 篇 wang fei-yue
  • 36 篇 radu-emil precup
  • 35 篇 fei-yue wang
  • 31 篇 precup radu-emil
  • 27 篇 levente kovács
  • 23 篇 tar jozsef k.
  • 22 篇 józsef k. tar
  • 21 篇 preitl stefan
  • 21 篇 stefan preitl
  • 20 篇 kovacs levente
  • 17 篇 dongbin zhao
  • 17 篇 ioan filip
  • 15 篇 dániel andrás dr...
  • 14 篇 prostean octavia...
  • 13 篇 a. meystel
  • 13 篇 kovács levente
  • 13 篇 drexler daniel a...
  • 13 篇 gaspar peter
  • 13 篇 hirota kaoru
  • 13 篇 zhao dongbin

语言

  • 6,260 篇 英文
  • 100 篇 其他
  • 64 篇 中文
  • 2 篇 葡萄牙文
检索条件"任意字段=IEEE Symposium on Computational Intelligence in Control and Automation"
6422 条 记 录,以下是481-490 订阅
排序:
RIS-Aided Localization Method Based on DNN-SSA Fusion in NLOS Scenarios  5
RIS-Aided Localization Method Based on DNN-SSA Fusion in NLO...
收藏 引用
5th International Conference on Computer, Big Data and Artificial intelligence, ICCBD+AI 2024
作者: Luo, Yujia Hu, Qingsong Cheng, Yuanxun Yuan, Shuya Zhang, Yuansheng China University of Mining and Technology School of Information and Control Engineering Xuzhou China State Key Laboratory of Intelligent Optimized Manufacturing in Mining & Metallurgy Process Beijing China Beijing Key Laboratory of Process Automation in Mining & Metallurgy Beijing China
With the advent of the 6G era, precise positioning and reliable, energy-efficient data transmission have become critical for the Internet of Things. However, high-frequency signals like millimeter-wave and terahertz a... 详细信息
来源: 评论
Super Learner Ensemble for Anomaly Detection and Cyber-Risk Quantification in Industrial control Systems
收藏 引用
ieee INTERNET OF THINGS JOURNAL 2022年 第15期9卷 13279-13297页
作者: Ahmadi-Assalemi, Gabriela Al-Khateeb, Haider Epiphaniou, Gregory Aggoun, Amar Univ Wolverhampton Sch Engn Comp & Math Sci Wolverhampton WV1 1LY England Univ Warwick Int Mfg Ctr Warwick Mfg Grp Coventry CV4 7AL W Midlands England
Industrial control systems (ICSs) are integral parts of smart cities and critical to modern societies. Despite indisputable opportunities introduced by disruptor technologies, they proliferate the cybersecurity threat... 详细信息
来源: 评论
Self and Cross Motion Extracted in Drone Video to Improve Object Detection
Self and Cross Motion Extracted in Drone Video to Improve Ob...
收藏 引用
2023 ieee International Conference on Unmanned Systems, ICUS 2023
作者: Zhou, Zihao Yu, Xianguo Chen, Xiangcheng Li, Yuke School of Automation Wuhan University of Technology Wuhan China College of Intelligence Science and Technology National University of Defense Technology Changsha China School of Artificial Intelligence Anhui University Hefei China
The abundant temporal information presented in videos can effectively address the issue of significant appearance deterioration observed in drone images. Learning temporal features in videos poses a significant challe... 详细信息
来源: 评论
Application of Fuzzy Theory to Parameter Design in Wafer Stealth Laser Dicing
Application of Fuzzy Theory to Parameter Design in Wafer Ste...
收藏 引用
2024 International symposium on Intelligent Signal Processing and Communication Systems, ISPACS 2024
作者: Su, Te-Jen Chiu, Chien-Liang Su, Chun-Hsien Tian, Mau-Yi Cheng, Jui-Chuan Wang, Shih-Ming Department of Electronic Engineering National Kaohsiung University of Sciences and Technology Kaohsiung Taiwan Department of Computer Science and Information Engineering Cheng Shiu University Kaohsiung Taiwan
The application of fuzzy theory in stealth laser dicing technology for wafers aims to enhance the precision and efficiency of cutting parameters. With technological advancements and the growth of the electric vehicle ... 详细信息
来源: 评论
Research on human movements push up counter based on media-pipe artificial intelligence  6
Research on human movements push up counter based on media-p...
收藏 引用
6th Asia symposium on Image Processing, ASIP 2024
作者: Saido, Balde Lu, Guangda Qin, Zhuanpin Yin, Xianhan Dai, Jianyi Guo, Xiaoqian Tianjin University of Technology and Education Tianjin Key Laboratory of Information Sensing and Intelligent Control Hexi District No. 1310 Tianjin300222 China
This paper introduces a project that integrates pose estimation and deep learning to evaluate exercise performance and provide real-time feedback on repetition counts during workouts. Using machine learning in the fit... 详细信息
来源: 评论
Training and Analysis of Hyperparameters in Neural Networks for Computer Vision Applications: A Didactic Approach  20
Training and Analysis of Hyperparameters in Neural Networks ...
收藏 引用
20th ieee Jubilee World symposium on Applied Machine intelligence and Informatics, SAMI 2022
作者: Barreto, Saulo Cardoso Szemes, Peter Tamas Faculty of Engineering Department of Mechatronics Debrecen Hungary
Machine Learning models are known for having millions of parameters considering different applications, such as object recognition and self-driving cars. To avoid spending more time than necessary in the training stag... 详细信息
来源: 评论
Logic-based machine comprehension for chatbots  20
Logic-based machine comprehension for chatbots
收藏 引用
20th ieee Jubilee World symposium on Applied Machine intelligence and Informatics, SAMI 2022
作者: Redeca, Sergiu Groza, Adrian Technical University of Cluj-Napoca Romania
We target here the interpretation of natural language by means of Equational First Order Logic (FOL). The communicative acts of the human agent are automatically converted into a First Order Logic theory. The models o... 详细信息
来源: 评论
Non-Prehensile Whole-Arm Manipulation Grasping and Trajectory Generation in 3D  3
Non-Prehensile Whole-Arm Manipulation Grasping and Trajector...
收藏 引用
3rd International Conference on Robotics, automation and Artificial intelligence (RAAI)
作者: Hinrichs, Pascal Kowalski, Christian Pfingsthorn, Max Hein, Andreas OFFIS Inst Informat Technol Oldenburg Germany Carl von Ossietzky Univ Oldenburg Div Assistance Syst & Med Device Technol Oldenburg Germany
For manipulating large, bulky loads, whole-arm manipulation is a suitable method. It is often used in a non-prehensile way. However, non-prehensile manipulation is mostly considered only two-dimensional, for example, ... 详细信息
来源: 评论
Data Augmentation for Vulnerability Detection Based on Code Refactoring and Mixup  35
Data Augmentation for Vulnerability Detection Based on Code ...
收藏 引用
35th ieee International symposium on Software Reliability Engineering Workshops, ISSREW 2024
作者: Xing, Ying Huang, Jiaqi Wang, Guilong You, Yehao Yang, Bin Li, Xiaofeng Luo, Yixing Beijing University of Posts and Telecommunications School of Intelligent Engineering and Automation Beijing China Beijing University of Posts and Telecommunications School of Artifcial Intelligence Beijing China Yunnan Key Laboratory of Software Engineering Yunnan China China Unicom Research Institute Beijing China Beijing Institute of Control Engineering Software Development Center Beijing China
In recent years, the number of software vulnerabilities has gradually increased, posing a threat to the security of software, and identifying whether there are vulnerabilities in software is crucial for assuring its q... 详细信息
来源: 评论
Infrared video behavior recognition algorithm based on AGX Xavier environment
Infrared video behavior recognition algorithm based on AGX X...
收藏 引用
2023 CAA symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2023
作者: Liu, Mingrui Wang, Xiaogang Wei, Yang Zhou, Jiayi Song, Rui Lian, Zewei Sichuan University of Science and Engineering School of Automation and Information Engineering Yibin644000 China Artificial Intelligence Key Laboratory of Sichuan Province Yibin China
Analyzing human behavior recognition for infrared video is important since crimes are more likely to occur in nighttime environments. Therefore, this paper proposes an infrared video behavior recognition algorithm bas... 详细信息
来源: 评论