咨询与建议

限定检索结果

文献类型

  • 46,128 篇 会议
  • 793 册 图书
  • 570 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 47,493 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 30,679 篇 工学
    • 21,003 篇 计算机科学与技术...
    • 16,270 篇 软件工程
    • 9,315 篇 控制科学与工程
    • 5,571 篇 信息与通信工程
    • 4,902 篇 电气工程
    • 4,581 篇 机械工程
    • 2,693 篇 生物工程
    • 2,470 篇 电子科学与技术(可...
    • 2,290 篇 生物医学工程(可授...
    • 2,170 篇 动力工程及工程热...
    • 1,964 篇 交通运输工程
    • 1,890 篇 仪器科学与技术
    • 1,611 篇 光学工程
    • 1,561 篇 化学工程与技术
    • 1,514 篇 安全科学与工程
    • 1,210 篇 土木工程
    • 1,066 篇 建筑学
    • 1,056 篇 材料科学与工程(可...
  • 12,447 篇 理学
    • 6,337 篇 数学
    • 3,336 篇 物理学
    • 2,992 篇 生物学
    • 1,815 篇 系统科学
    • 1,719 篇 统计学(可授理学、...
    • 1,311 篇 化学
  • 7,400 篇 管理学
    • 5,313 篇 管理科学与工程(可...
    • 2,404 篇 图书情报与档案管...
    • 2,358 篇 工商管理
  • 1,862 篇 医学
    • 1,667 篇 临床医学
    • 1,515 篇 基础医学(可授医学...
    • 1,001 篇 药学(可授医学、理...
  • 1,070 篇 法学
  • 901 篇 经济学
  • 797 篇 农学
  • 656 篇 教育学
  • 167 篇 军事学
  • 67 篇 艺术学
  • 57 篇 文学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 1,974 篇 control systems
  • 962 篇 computational mo...
  • 813 篇 real-time system...
  • 807 篇 artificial intel...
  • 790 篇 feature extracti...
  • 742 篇 internet of thin...
  • 719 篇 computer archite...
  • 711 篇 accuracy
  • 710 篇 neural networks
  • 633 篇 intelligent cont...
  • 598 篇 intelligent netw...
  • 594 篇 computer science
  • 586 篇 deep learning
  • 532 篇 intelligent syst...
  • 525 篇 training
  • 522 篇 monitoring
  • 512 篇 computer vision
  • 497 篇 traffic control
  • 456 篇 machine learning
  • 441 篇 predictive model...

机构

  • 73 篇 department of el...
  • 61 篇 lovely professio...
  • 57 篇 maharishi school...
  • 53 篇 school of mechat...
  • 49 篇 chitkara univers...
  • 46 篇 fujian provincia...
  • 43 篇 college of infor...
  • 40 篇 school of comput...
  • 32 篇 school of automa...
  • 32 篇 department of co...
  • 29 篇 college of compu...
  • 29 篇 jilin engineerin...
  • 28 篇 school of contro...
  • 27 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 department of el...
  • 25 篇 tula's institute...
  • 25 篇 school of comput...
  • 24 篇 ieee
  • 23 篇 school of comput...

作者

  • 37 篇 wang lei
  • 32 篇 liu yang
  • 30 篇 wang jing
  • 28 篇 wang jian
  • 27 篇 li li
  • 25 篇 zhang lei
  • 24 篇 cui ping
  • 24 篇 li xin
  • 23 篇 rakesh kumar
  • 23 篇 sharma vishnu
  • 21 篇 li yang
  • 21 篇 li rui
  • 20 篇 wang ping
  • 19 篇 yang bo
  • 19 篇 jun zhang
  • 19 篇 liu jun
  • 18 篇 pati bibudhendu
  • 18 篇 li peng
  • 18 篇 wei li
  • 17 篇 kang hee-jun

语言

  • 46,164 篇 英文
  • 971 篇 其他
  • 459 篇 中文
  • 4 篇 法文
  • 1 篇 西班牙文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Advances in Intelligent Control and Computer Engineering"
47494 条 记 录,以下是121-130 订阅
排序:
A Review on the Use of Smart Agriculture Systems to Protect Crops  3
A Review on the Use of Smart Agriculture Systems to Protect ...
收藏 引用
3rd international conference on Electronics and Renewable Systems, ICEARS 2025
作者: Kumar, Gulshan Gourshettiwar, Palash Suman, Saurabh Kumar, Shravan Kumar, Dhiraj Raushan, Rahul Faculty of Engineering and Technology Department of Computer Science and Design Maharashtra Wardha India Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Maharashtra Wardha India
Smart agriculture systems leverage the possibilities offered by cutting-edge technologies such as IoT, AI, and remote sensing to revolutionize conventional farming by enhancing resource utilization, production, and cr... 详细信息
来源: 评论
Energy Efficient and SecurityAware Task off Loading for Multi-Tier Edge Cloud Computing Systems  1
Energy Efficient and SecurityAware Task off Loading for Mult...
收藏 引用
1st international conference on intelligent Systems and Computational Networks, ICISCN 2025
作者: Divya, S. Saranya, S. Mahendra Engineering College Department of Computer Science and Engineering Namakkal India
The massive progression of the multi-tier edge cloud computing systems integration has created the possibility of data orchestration and resource control in edge and cloud layers. However, there are many shortcomings,... 详细信息
来源: 评论
A privacy protection strategy based on homomorphic encryption and neural networks  24
A privacy protection strategy based on homomorphic encryptio...
收藏 引用
8th international conference on Electronic Information Technology and computer engineering, EITCE 2024
作者: Liu, Lingli Du, Xiongxiong Ma, Mingcheng Wang, Dong Henan International Joint Laboratory of Intelligent Network Theory and Key Technology Henan University Henan Kaifeng China
In recent years, incidents of data abuse and privacy leakage remind people that improper use of big data technology can bring disastrous consequences. To realize the true value of data, data sharing is needed. This pa... 详细信息
来源: 评论
Decentralized Federated Learning with Auto-switchable Local Optimizers  13
Decentralized Federated Learning with Auto-switchable Local ...
收藏 引用
13th international conference on intelligent control and Information Processing, ICICIP 2025
作者: Li, Ting Chang, Zhongyi Pan, Zhiyao Yang, Shaofu Xu, Wenying Chen, Zhongying School of Computer Science and Engineering Southeast University Nanjing211189 China
In this paper, we propose a novel decentralized learning algorithm over networks, termed as DLAGD, which combines the consensus mechanism with an auto-switchable local optimizer. Specifically, each node updates its lo... 详细信息
来源: 评论
Fire Suppression Robot with Image Processing for Warehouse Safety  1
Fire Suppression Robot with Image Processing for Warehouse S...
收藏 引用
1st international conference on advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Base, James Allen V. Dorosan, Jairus F. Ocampo, Kyle Joshua P. Puma, Aeron Joshua M. Mercado, Mark Angelo T. Niega, Juliet O. Nationial University Philippines Department of Computer Engineering Laguna Calamba City Philippines
Warehouses are highly vulnerable to fire hazards due to the presence of combustible materials, high-energy equipment, and operational complexities. In response, the proponents propose a solution to the pressing issue ... 详细信息
来源: 评论
advances in Type II Diabetes Prediction: A Comprehensive Review of Machine Learning Techniques
Advances in Type II Diabetes Prediction: A Comprehensive Rev...
收藏 引用
2025 international conference on intelligent control, Computing and Communications, IC3 2025
作者: Kushwah, Virendra Singh Krishnan, Sivaneasan Bala Upreti, Kamal Kumar, Manoj Kshirsagar, Pravin R. Singh, Vinai K. Singapore Institute of Technology Singapore School of Sciences Christ University Department of Computer Science DelhiNCR Ghaziabad India Gurukula Kangri University Department of Mathematics and Statistics Haridwar India J D College of Engineering & Management Department of Electronics & Telecommunication Engineering Nagpur India Gl Bajaj Group of Institutions Department of Computer Science & Engineering Mathura India
Type II diabetes mellitus, on the other hand has been regarded as one of the growing concerns globally and thus clearly raises the need for making accurate forecasts of diabetes. The risk for Type II diabetes can be p... 详细信息
来源: 评论
Optimization of the online collaboration platform: an event queue management algorithm based on debounce and throttle techniques  4
Optimization of the online collaboration platform: an event ...
收藏 引用
4th international conference on computer Vision, Application, and Algorithm, CVAA 2024
作者: Xue, Tianbao Lan, Quanxiang School of Mathematics and Computer Science Panzhihua University Sichuan Panzhihua China
Against the backdrop of accelerating digital transformation, online collaboration platforms have become indispensable tools for remote work and learning. However, with the increase in the number of users, the problem ... 详细信息
来源: 评论
Adaptive Video Bitrate Allocation for Remotely Operated Vehicles (ROV)  8th
Adaptive Video Bitrate Allocation for Remotely Operated Vehi...
收藏 引用
8th international conference on intelligent Transport Systems, INTSYS 2024
作者: Afi, Eman Sarah Triqui, Ons Sayahi, Sofiane Besbes, Hichem Tlili, Fethi Mediterranean Institute of Technology South Mediterranean University Tunis Tunisia Higher School of Communication of Tunis University of Carthage Ariana Tunisia Innovation Department ACTIA Engineering Services Ariana Tunisia COSIM Lab Higher School of Communication of Tunis University of Carthage Ariana Tunisia GRESCOM Lab Higher School of Communication of Tunis University of Carthage Ariana Tunisia
Establishing a stable and efficient connection between operators and remotely operated vehicles (ROVs) is essential for successful missions in challenging environments. Real-time video transmission is particularly cri... 详细信息
来源: 评论
Research and Optimization of SM9 Based on a Modular Design
Research and Optimization of SM9 Based on a Modular Design
收藏 引用
2024 international conference on Mechatronics and intelligent control, ICMIC 2024
作者: Wei, Bin Zhao, Qifu Shao, Cuiping Li, Huiyun Gao, Shunxian State Grid Key Laboratory of Power Industrial Chip Reliability Technology Beijing Smart-Chip Microelectronics Technology Co. Ltd. Beijing100192 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Guangdong Shenzhen518055 China
Since its introduction by the National Cryptography Administration in 2016, the SM9 algorithm has encountered various opportunities and challenges. This study introduces a refined bottom-up modular framework, resultin... 详细信息
来源: 评论
Adaptive Differentially Private Robust Federated Learning Against Backdoor Attacks  1
Adaptive Differentially Private Robust Federated Learning Ag...
收藏 引用
1st international conference on intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Yao, Ruixiang Wen, Hong Hou, Wenjing Ma, Wendi Sun, Fan Zhao, Ziang School of Aeronautics and Astronautics University of Elec.Science and Tech. of China Chengdu611731 China Aircraft Swarm Intelligent Sensing and Cooperative Control Key Lab. of Sichuan Province UESTC 611731 China Intelligent IoT Communication Technology Engineering Research Center of Sichuan Province UESTC 611731 China
In federated learning systems, malicious attackers can manipulate training datasets by injecting backdoor triggers to achieve data poisoning. Addressing this vulnerability, this paper proposes a new defense method, th... 详细信息
来源: 评论