咨询与建议

限定检索结果

文献类型

  • 15,246 篇 会议
  • 103 篇 期刊文献
  • 32 册 图书

馆藏范围

  • 15,380 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 8,994 篇 工学
    • 5,111 篇 计算机科学与技术...
    • 3,932 篇 软件工程
    • 3,778 篇 控制科学与工程
    • 2,614 篇 电气工程
    • 1,528 篇 信息与通信工程
    • 1,249 篇 机械工程
    • 1,245 篇 电子科学与技术(可...
    • 952 篇 动力工程及工程热...
    • 747 篇 生物工程
    • 703 篇 生物医学工程(可授...
    • 619 篇 仪器科学与技术
    • 536 篇 化学工程与技术
    • 499 篇 交通运输工程
    • 465 篇 光学工程
    • 365 篇 安全科学与工程
    • 346 篇 力学(可授工学、理...
    • 301 篇 材料科学与工程(可...
    • 296 篇 土木工程
  • 4,124 篇 理学
    • 2,093 篇 数学
    • 1,193 篇 物理学
    • 808 篇 生物学
    • 720 篇 系统科学
    • 520 篇 统计学(可授理学、...
    • 484 篇 化学
  • 1,711 篇 管理学
    • 1,312 篇 管理科学与工程(可...
    • 574 篇 工商管理
    • 479 篇 图书情报与档案管...
  • 496 篇 医学
    • 459 篇 临床医学
    • 410 篇 基础医学(可授医学...
    • 302 篇 药学(可授医学、理...
  • 235 篇 经济学
  • 224 篇 法学
  • 203 篇 农学
  • 101 篇 教育学
  • 51 篇 军事学
  • 36 篇 文学
  • 18 篇 艺术学

主题

  • 819 篇 control systems
  • 703 篇 automatic contro...
  • 313 篇 computer science
  • 306 篇 computational mo...
  • 276 篇 mathematical mod...
  • 254 篇 automation
  • 226 篇 real-time system...
  • 222 篇 computer archite...
  • 203 篇 neural networks
  • 194 篇 internet of thin...
  • 157 篇 monitoring
  • 152 篇 process control
  • 148 篇 switches
  • 144 篇 stability analys...
  • 143 篇 optimization
  • 143 篇 automatic voltag...
  • 139 篇 cloud computing
  • 138 篇 deep learning
  • 137 篇 application soft...
  • 129 篇 image segmentati...

机构

  • 105 篇 school of automa...
  • 85 篇 lovely professio...
  • 33 篇 school of electr...
  • 33 篇 department of el...
  • 31 篇 department of co...
  • 29 篇 department of el...
  • 29 篇 mlr institute of...
  • 26 篇 chitkara univers...
  • 24 篇 college of medic...
  • 24 篇 department of el...
  • 23 篇 department of el...
  • 21 篇 college of elect...
  • 21 篇 radiology techni...
  • 21 篇 galgotias univer...
  • 19 篇 centro de invest...
  • 19 篇 school of optica...
  • 19 篇 college of elect...
  • 19 篇 beijing aerospac...
  • 18 篇 new horizon coll...
  • 17 篇 department of au...

作者

  • 25 篇 singh bhim
  • 22 篇 g. silva-navarro
  • 20 篇 mengchu zhou
  • 19 篇 k.g. shin
  • 19 篇 wang wei
  • 17 篇 loukianov alexan...
  • 16 篇 wang jing
  • 15 篇 kang hee-jun
  • 15 篇 yang yang
  • 15 篇 m. a. reyes-barr...
  • 14 篇 silva-navarro g.
  • 14 篇 j.a. moreno-cade...
  • 14 篇 valeriy vyatkin
  • 14 篇 l. leija
  • 13 篇 alexander g. lou...
  • 13 篇 liu yang
  • 12 篇 leija l.
  • 12 篇 liu jun
  • 12 篇 manish gupta
  • 10 篇 flores-nava l.m.

语言

  • 14,868 篇 英文
  • 403 篇 其他
  • 154 篇 中文
  • 3 篇 西班牙文
  • 1 篇 土耳其文
检索条件"任意字段=International Conference on Electrical Engineering Computing Science and Automatic Control"
15381 条 记 录,以下是4911-4920 订阅
排序:
Health Assessment Method for Core Components of Switching Quantity Interface Circuit Based on Active Excitation Test
Health Assessment Method for Core Components of Switching Qu...
收藏 引用
international conference on Reliability, Maintainability and Safety,ICRMS
作者: Peiyang Xu Long Jia Jian Ma Chang Chen Wei Chen Chunyun Lan Xinyu Zou Tianhao Li Science & Technology on Reliability & Environmental Engineering Laboratory School of Reliability and Systems Engineering Beihang University Beijing China School of Automation Science and Electrical Engineering Beijing Aerospace Institute of Automatic Control Beihang University Beijing China Science & Technology on Reliability & Environmental Engineering Laboratory School of Reliability and Systems Engineering Institute of Reliability Engineering Beihang University Beijing China Beijing Aerospace Institute of Automatic Control Beijing China
As power electronics technology continues to advance, the prevalence of switching quantity interface circuits has grown in diverse domains, encompassing industrial production and everyday civilian applications. An ana... 详细信息
来源: 评论
Autonomous Vehicle Health Monitoring Based on Cloud-Fog computing
Autonomous Vehicle Health Monitoring Based on Cloud-Fog Comp...
收藏 引用
Emerging Trends in electrical, control, and Telecommunication engineering (ETECTE), international conference on
作者: Nida Jabeen Runfang Hao Ashfaq Niaz Muhammad Usman Shoukat Fahim Niaz Mehran Arshad Khan College of Information and Computer Taiyuan University of Technology Taiyuan China College of Electrical and Power Engineering Taiyaun University of Technology Taiyuan China School of Automotive Engineering Wuhan University of Technology Wuhan China Department of Computer Science Islamia College Peshawar Peshawar Pakistan Department of Computer Science Government College University Faisalabad Pakistan
Almost every part of the economy relies on the transportation industry. The road transportation sector is one of the numerous types of transport sectors. As a vehicle's continual use causes damage, inefficiency, a... 详细信息
来源: 评论
Probabilistic-constrained tracking control for a class of nonlinear stochastic systems with sensor saturation: The finite-horizon  26
Probabilistic-constrained tracking control for a class of no...
收藏 引用
26th international conference on Automation and computing, ICAC 2021
作者: Wei, Bin Tian, Engang University of Shanghai for Science and Technology School of Optical Electrical and Computer Engineering Shanghai China
In this paper, the probabilistic-constrained tracking control issue is investigated for a class of time-varying nonlinear stochastic systems with sensor saturation and limited bandwidth in a unified framework in this ... 详细信息
来源: 评论
Hacking wireless network credentials by performing phishing attack using Python Scripting  5
Hacking wireless network credentials by performing phishing ...
收藏 引用
5th international conference on Intelligent computing and control Systems, ICICCS 2021
作者: Musthyala, Harish Reddy, P. Nagarjuna University of New Haven Department of Computer Science CT United States K.I.T.S. Department of Electrical and Electronics Engineering Warangal India
The availability of number of open-source hacking tools over the internet and many hacking tools in-built with the Kali Linux operating system led to easy understanding and performing hacking by individuals. Even thou... 详细信息
来源: 评论
Robust Face Recognition Using Histogram of Oriented Gradients and Auto-Associative Memory Network
Robust Face Recognition Using Histogram of Oriented Gradient...
收藏 引用
international conference on Communication and Electronics Systems (ICCES)
作者: Jay Kant Pratap Singh Yadav Zainual Abdin Jaffery Laxman Singh Electrical Engineering Department Jamia Millia Islamia (Central University) New Delhi India Computer Science & Engg.(AI&ML) Department KIET Group of Institutions Ghaziabad India
Facial recognition technology is based on a person's facial features. It is often the core of applications such as biometrics, access control, and forensics. However, due to environmental factors such as dust accu... 详细信息
来源: 评论
automatic Voltage Equalizer Based on Load-Independent Class E2 Parallel Resonant DC-DC Converter
Automatic Voltage Equalizer Based on Load-Independent Class ...
收藏 引用
international Future Energy Electronics conference (IFEEC)
作者: Shizuna Oshima Hirotaka Koizumi Dept. of Electrical Engineering Tokyo University of Science Tokyo Japan
This paper proposes a new voltage equalizer based on a load-independent class E2 parallel resonant DC-DC converter. This circuit has a characteristic of equalizing the voltages between two battery modules without any ...
来源: 评论
Distributed economy automatic generation control algorithm for multi inverter ac microgrid
Distributed economy automatic generation control algorithm f...
收藏 引用
international conference on Applications and Techniques in Cyber Intelligence, ATCI 2020
作者: Jing, Wang Chaohu University ChaohuAnhui238000 China
In the traditional droop control, the VSG algorithm and the voltage compensation link are added to make the inverter have the large inertia characteristic of the synchronous generator (SG). The output voltage of each ... 详细信息
来源: 评论
Iterative PSO Algorithm for RAP Problem with Homogeneous Component in Subsystems  6th
Iterative PSO Algorithm for RAP Problem with Homogeneous Com...
收藏 引用
6th international conference on computing, control, and Industrial engineering, CCIE 2021
作者: Bai, Yingxia Li, Dongkui Faculty of Computer Science and Information Engineering Hohhot Institute for Nationalities Inner Mongolia Hohhot010051 China Faculty of Information Science and Technology Baotou Teachers College Inner Mongolia Baotou014030 China
The problem of two-state reliability redundancy allocation (RAP) is studied. The subsystem is k-out-of-n: G system. Each subsystem is not allowed to mix components (that is, each subsystem chooses one type of componen... 详细信息
来源: 评论
ECADA: An Edge computing Assisted Delay-Aware Anomaly Detection Scheme for ICS
ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detect...
收藏 引用
international conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Chao Sang Jianhua Li Jun Wu Wu Yang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China Graduate School of Information Production and Systems Waseda University Japan College of Computer Science and Technology Harbin Engineering University China
Today, with more and more devices in the industrial control system (ICS), the risk becomes higher and brings more attack surfaces. The need for reliable anomaly detection systems is increasing. Traditional SCADA-based... 详细信息
来源: 评论
Computational Methods for Analysing Biometric Systems
Computational Methods for Analysing Biometric Systems
收藏 引用
Technological Advancements in Computational sciences (ICTACS), international conference on
作者: Fahim Multani Sheela Bijlwan Viyat Varun Upadhyay Bhawna Goyal Ayush Dogra Dawa Chyophel Lepcha Department of Computer Science Engineering IES College of Technology Bhopal Madhya Pradesh Uttaranchal School of Computing Sciences Uttaranchal Institute of Technology Uttaranchal University Dehradun India Department of Mechanical Engineering GLA University Mathura Mathura University Center for Research and Development Chandigarh University Mohali Punjab India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department Electronics and Communication Engineering Chandigarh University Mohali Punjab India
The use of biometric data, such as various anatomical and behavioural attributes in automatic identification and authentication systems for access control, surveillance, computer security, and law enforcement are incr...
来源: 评论