咨询与建议

限定检索结果

文献类型

  • 34,100 篇 会议
  • 630 册 图书
  • 586 篇 期刊文献

馆藏范围

  • 35,312 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 15,603 篇 工学
    • 9,816 篇 计算机科学与技术...
    • 5,979 篇 软件工程
    • 2,967 篇 电气工程
    • 2,563 篇 控制科学与工程
    • 2,154 篇 机械工程
    • 1,777 篇 信息与通信工程
    • 1,512 篇 电子科学与技术(可...
    • 900 篇 材料科学与工程(可...
    • 776 篇 动力工程及工程热...
    • 683 篇 生物医学工程(可授...
    • 673 篇 仪器科学与技术
    • 662 篇 力学(可授工学、理...
    • 622 篇 生物工程
    • 591 篇 土木工程
    • 564 篇 化学工程与技术
    • 523 篇 建筑学
    • 506 篇 交通运输工程
    • 366 篇 安全科学与工程
    • 355 篇 航空宇航科学与技...
  • 5,995 篇 理学
    • 3,456 篇 数学
    • 1,710 篇 物理学
    • 1,011 篇 系统科学
    • 845 篇 统计学(可授理学、...
    • 772 篇 生物学
    • 610 篇 化学
  • 2,696 篇 管理学
    • 2,282 篇 管理科学与工程(可...
    • 837 篇 工商管理
    • 481 篇 图书情报与档案管...
  • 608 篇 医学
    • 469 篇 临床医学
    • 345 篇 基础医学(可授医学...
  • 333 篇 经济学
  • 333 篇 法学
  • 241 篇 教育学
  • 189 篇 农学
  • 124 篇 军事学
  • 95 篇 文学
  • 77 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 11,549 篇 computational mo...
  • 5,217 篇 computer simulat...
  • 2,232 篇 analytical model...
  • 2,122 篇 mathematical mod...
  • 1,779 篇 simulation
  • 1,753 篇 computer archite...
  • 1,510 篇 computer science
  • 1,269 篇 solid modeling
  • 1,128 篇 biological syste...
  • 1,045 篇 circuit simulati...
  • 1,009 篇 computer network...
  • 907 篇 application soft...
  • 865 篇 predictive model...
  • 851 篇 hardware
  • 713 篇 integrated circu...
  • 675 篇 modeling
  • 656 篇 testing
  • 615 篇 data models
  • 602 篇 humans
  • 575 篇 load modeling

机构

  • 62 篇 department of el...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 43 篇 school of comput...
  • 27 篇 school of comput...
  • 27 篇 department of co...
  • 26 篇 school of comput...
  • 20 篇 school of comput...
  • 18 篇 school of automa...
  • 18 篇 department of co...
  • 17 篇 department of el...
  • 17 篇 ibm thomas j. wa...
  • 17 篇 beihang univ sch...
  • 16 篇 school of electr...
  • 16 篇 college of compu...
  • 16 篇 department of el...
  • 16 篇 department of co...
  • 14 篇 college of compu...
  • 14 篇 department of el...
  • 14 篇 university of mi...

作者

  • 24 篇 bernady o. apduh...
  • 23 篇 jun wang
  • 22 篇 leifsson leifur
  • 18 篇 wei li
  • 17 篇 ryszard tadeusie...
  • 16 篇 jing zhang
  • 16 篇 li li
  • 15 篇 kang li
  • 15 篇 ming li
  • 15 篇 mengchu zhou
  • 13 篇 bin he
  • 13 篇 jian wang
  • 13 篇 marina l. gavril...
  • 13 篇 b. he
  • 13 篇 li zhang
  • 13 篇 dimitrios soudri...
  • 13 篇 marcin korytkows...
  • 12 篇 yong meng teo
  • 12 篇 lei wang
  • 12 篇 zhang lin

语言

  • 33,997 篇 英文
  • 1,072 篇 其他
  • 308 篇 中文
  • 20 篇 俄文
  • 2 篇 捷克文
  • 1 篇 法文
检索条件"任意字段=International Conference on Computer Modeling and Simulation"
35316 条 记 录,以下是3981-3990 订阅
排序:
Holistic Security Approach in Cybersecurity Services for Datacenters and Telecommunication Operators
Holistic Security Approach in Cybersecurity Services for Dat...
收藏 引用
IEEE international conference on Performance, Computing and Communications (IPCCC)
作者: Kasım Öztoprak Yusuf Kursat Tuncel Department of Computer Engineering Konya Food and Agriculture University Konya Turkey
This study examines and presents a resolution for Protocol Independent Switch Architecture (PISA) to handle data at the application layer, facilitating the precise inspection of security traffic, particularly in relat...
来源: 评论
Chinese Implicit Sentiment Analysis based on Hybrid Neural Networks  7
Chinese Implicit Sentiment Analysis based on Hybrid Neural N...
收藏 引用
2020 7th international conference on computer-Aided Design, Manufacturing, modeling and simulation, CDMMS 2020
作者: Qi, Yanfang Wang, Chao Zhu, Guoan School of Computer and Artificial Intelligence Lanzhou Institute of Technology Lanzhou Gansu730030 China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan Hubei430000 China Department of Computer Science and Technology College of Engineering Yanbian University Yanji133002 China
Implicit sentiment analysis is an important part of sentiment computing, especially sentiment analysis based on deep learning has become a research hotspot in recent years. In this paper, convolutional neural networks... 详细信息
来源: 评论
Virtual simulation of Lathe Machining Training Based on Unity3D  3
Virtual simulation of Lathe Machining Training Based on Unit...
收藏 引用
3rd international conference on computer Information Science and Application Technology (CISAT)
作者: Shen, Bin Chen, Baoqi Wang, Yanwu Wuhan Donghu Univ Wuhan 430212 Hubei Peoples R China
In this paper, through the use of SolidWorks three-dimensional software for the lathe three-dimensional modeling, the lathe three-dimensional model can more intuitively express the structure of the lathe. Through the ... 详细信息
来源: 评论
Performance Analysis of Covert Communication Based on Integrated Satellite Multiple Terrestrial Relay Networks
Performance Analysis of Covert Communication Based on Integr...
收藏 引用
international conference on computer and Communications (ICCC)
作者: Zeke Wu Haifeng Shuai Rui Liu Kefeng Guo Shibing Zhu School of Space Information Space Engineering University Beijing China
With the arrival of the sixth generation (6G) mo-bile communication technology, one of its signature features is satellite-terrestrial fusion communication. Hence, integrated satellite multiple terrestrial relay netwo... 详细信息
来源: 评论
An Energy-Efficient Multi-bit Current-based Analog Compute-In-Memory Architecture and design Methodology
An Energy-Efficient Multi-bit Current-based Analog Compute-I...
收藏 引用
international conference on VLSI Design
作者: Dinesh Kushwaha Ashish Joshi Neha Gupta Aditya Sharma Sandeep Miryala Rajiv V. Joshi S. Dasgupta Anand Bulusu Department of Electronics and Communication Engineering Indian Institute of Technology Roorkee Roorkee Uttarakhand India Intel Technology India Pvt. Ltd. Bangalore Karnataka India Brookhaven National Laboratory Upton USA Thomas J. Watson Research Center Yorktown Heights NY USA
An energy-efficient and multi-bit (4b) current-based analog compute in-memory (CIM) architecture is proposed in this paper. In current-based analog CIM schemes, multiplication and-accumulate (MAC) operation is perform... 详细信息
来源: 评论
Deep Learning-Powered Edge Analytics for IoT-based Sensor Networks
Deep Learning-Powered Edge Analytics for IoT-based Sensor Ne...
收藏 引用
Machine Learning and Autonomous Systems (ICMLAS), international conference on
作者: M. Saravana Karthikeyan Ponnusamy Subramani M. Panneer Selvam M. L. Sworna Kokila R. Vijayalakshmi P. Sundaravadivel Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Avadi Chennai India Department of Physics Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Department of Electrical and Electronics Engineering Sona College of Technology Salem India Department of Computing Technologies Faculty of Engineering and Technology School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India Department of Computer Science and Engineering Velammal College of Engineering and Technology Madurai India Department of Artificial Intelligence and Machine Learning Saveetha Engineering College Chennai India
The rapid expansion of loT-based sensor networks has necessitated the development of efficient edge analytics frameworks to process vast amounts of data in real time while minimizing computational overhead. Deep learn... 详细信息
来源: 评论
Formal Model for Control of Autonomous Navigation
Formal Model for Control of Autonomous Navigation
收藏 引用
international conference on Sciences and Techniques of Automatic Control and computer Engineering (STA)
作者: Hela Kadri Riheb Cherif Abdel Aitouche Rochdi Merzouki CRISTAL Lille University France ESME ESME Research Lab Lille France Junia Lille CRISTAL France
Formal modeling techniques can be exploited for autonomous vehicle modeling, enabling resilient navigation inside container terminals (CTs). Road vehicles will be characterized by a new intelligent vehicle technology ... 详细信息
来源: 评论
Extended Finite State Machine based Fault Tolerance in WSN
Extended Finite State Machine based Fault Tolerance in WSN
收藏 引用
international conference on Computing Methodologies and Communication (ICCMC)
作者: D. Lekha Ahsan Shariff M S. Venkata Lakshmi Anwar Basha H Department of Computer Science and Engineering RMK College of Engineering and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering Aalim Muhammed Salegh College of Engineering Chennai Tamil Nadu India Artificial Intelligence and Data Science Sri Krishna College of Engineering and Technology Coimbatore Tamil Nadu India School of Computer Science And Engineering REVA University Bengaluru Karnataka India
Wireless Sensor Network (WSN) suffers from different malware attacks. Several traditional approaches are proposed for detecting fault nodes in WSN. It is necessary to redistribute the nodes and detect the fault nodes ... 详细信息
来源: 评论
SLInKi: State Lattice based Inverse Kinematics - A Fast, Accurate, and Flexible IK Solver for Soft Continuum Robot Manipulators  17
SLInKi: State Lattice based Inverse Kinematics - A Fast, Acc...
收藏 引用
17th IEEE international conference on Automation Science and Engineering (CASE)
作者: Chiang, Shou-Shan Yang, Hao Skorina, Erik Onal, Cagdas D. Worcester Polytech Inst Robot Engn & Mech Engn Dept Worcester MA 01609 USA
Soft continuum robots offer unique properties that cannot be achieved using rigid linkage-based robotic bodies. Their dexterity and intrinsic compliance deliver the ability to navigate constrained environments and ope... 详细信息
来源: 评论
Bullet Engraving Automated Comparison Optimization Method Based on Second Moment Invariant  3
Bullet Engraving Automated Comparison Optimization Method Ba...
收藏 引用
2020 3rd international conference on modeling, simulation and Optimization Technologies and Applications, MSOTA 2020
作者: He, Chenggang Ding, Chris H. Q. Chen, Sibao Wang, Jiaxin Tan, Shicheng Key Lab of ICandSP of Moe School of Computer Science and Technology Anhui University Hefei China School Department of Computer Science and Engineering University of Texas at Arlington ArlingtonTX United States
In the research of bullet engraving comparison method at home and abroad, the traditional method is through visual observation by microscope, comparing line-Type engraving of two bullets to distinct whether the line m... 详细信息
来源: 评论