咨询与建议

限定检索结果

文献类型

  • 27,716 篇 会议
  • 366 篇 期刊文献
  • 128 册 图书
  • 1 篇 学位论文

馆藏范围

  • 28,210 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 14,064 篇 工学
    • 8,076 篇 计算机科学与技术...
    • 6,134 篇 控制科学与工程
    • 4,496 篇 软件工程
    • 3,059 篇 电气工程
    • 2,197 篇 机械工程
    • 1,559 篇 信息与通信工程
    • 837 篇 仪器科学与技术
    • 732 篇 电子科学与技术(可...
    • 712 篇 化学工程与技术
    • 687 篇 动力工程及工程热...
    • 623 篇 材料科学与工程(可...
    • 461 篇 生物工程
    • 416 篇 冶金工程
    • 363 篇 环境科学与工程(可...
    • 356 篇 生物医学工程(可授...
    • 350 篇 力学(可授工学、理...
    • 350 篇 石油与天然气工程
    • 348 篇 安全科学与工程
    • 340 篇 交通运输工程
    • 299 篇 土木工程
  • 3,742 篇 理学
    • 1,947 篇 数学
    • 790 篇 物理学
    • 757 篇 系统科学
    • 546 篇 统计学(可授理学、...
    • 522 篇 化学
    • 518 篇 生物学
  • 3,140 篇 管理学
    • 2,706 篇 管理科学与工程(可...
    • 954 篇 工商管理
    • 565 篇 图书情报与档案管...
  • 356 篇 经济学
    • 350 篇 应用经济学
  • 313 篇 医学
  • 227 篇 法学
  • 167 篇 教育学
  • 135 篇 农学
  • 74 篇 文学
  • 27 篇 艺术学
  • 21 篇 军事学
  • 1 篇 哲学

主题

  • 5,867 篇 process control
  • 2,066 篇 control systems
  • 1,767 篇 automation
  • 1,678 篇 cloud computing
  • 1,034 篇 computational mo...
  • 742 篇 automatic contro...
  • 726 篇 mathematical mod...
  • 664 篇 monitoring
  • 619 篇 computer archite...
  • 477 篇 real-time system...
  • 457 篇 distributed comp...
  • 421 篇 protocols
  • 418 篇 hardware
  • 405 篇 production
  • 396 篇 software
  • 377 篇 concurrent compu...
  • 376 篇 optimization
  • 354 篇 computer science
  • 349 篇 predictive model...
  • 345 篇 costs

机构

  • 92 篇 state key labora...
  • 61 篇 college of infor...
  • 47 篇 shenyang institu...
  • 47 篇 tianjin key labo...
  • 43 篇 university of ch...
  • 39 篇 department of co...
  • 37 篇 school of automa...
  • 32 篇 school of comput...
  • 31 篇 school of artifi...
  • 27 篇 northeastern uni...
  • 25 篇 department of co...
  • 23 篇 key laboratory o...
  • 23 篇 shenyang institu...
  • 21 篇 school of electr...
  • 20 篇 chitkara univers...
  • 19 篇 tianjin key labo...
  • 17 篇 tsinghua univers...
  • 17 篇 faculty of infor...
  • 17 篇 school of automa...
  • 17 篇 school of comput...

作者

  • 31 篇 xiong gang
  • 23 篇 mengchu zhou
  • 22 篇 barbu marian
  • 20 篇 liu yang
  • 19 篇 valeriy vyatkin
  • 19 篇 zhen shen
  • 19 篇 leymann frank
  • 18 篇 ulrich epple
  • 18 篇 urbas leon
  • 17 篇 tao yang
  • 17 篇 fenghua zhu
  • 16 篇 zhang tao
  • 16 篇 wei li
  • 16 篇 shen zhen
  • 15 篇 min huang
  • 15 篇 li yang
  • 15 篇 fei liu
  • 15 篇 li li
  • 15 篇 mihail abrudean
  • 15 篇 chao wang

语言

  • 27,646 篇 英文
  • 299 篇 中文
  • 266 篇 其他
  • 8 篇 西班牙文
  • 7 篇 俄文
  • 2 篇 德文
  • 1 篇 法文
检索条件"任意字段=International Conference on Process Automation, Control and Computing"
28211 条 记 录,以下是11-20 订阅
排序:
Mitigating Security Vulnerabilities in Cloud-Based Home automation through Advanced Edge computing: A Comprehensive Framework for Privacy Enhancement and Data Protection  14
Mitigating Security Vulnerabilities in Cloud-Based Home Auto...
收藏 引用
14th IEEE international conference on Communication Systems and Network Technologies, CSNT 2025
作者: Kumar, Biresh Kumari, Shreya Kumar, Ritesh Singh, Vineet Kumar Sharma, Binod Kumar Gupta, Kamaldeep Amity Institute of Information Technology Amity University Jharkhand Jharkhand Ranchi India Cambridge Institute of Technology Tatisilwai Jharkhand Ranchi India Dept Of IT Dr. R.M.L. Avadh University UP Ayodhya India Dept. of Computer Sci. & Engg. BIT Mesra Jharkhand Ranchi India St. Xavier’s College Jharkhand Ranchi India
With the soaring adoption of cloud-constructed home automation systems with CAGR of 8.5% from 2023 to 2030, security and privacy concerns have become critical considerations. This paper examines the security risks in ... 详细信息
来源: 评论
computing Performance Analysis of IEC 61499 Distributed automation Systems  26
Computing Performance Analysis of IEC 61499 Distributed Auto...
收藏 引用
26th international conference on Industrial Technology, ICIT 2025
作者: Lyu, Tuojian Vyatkin, Valeriy Aalto University Department of Electrical Engineering and Automation Espoo Finland Luleå Tekniska Universitet Department of Computer Science Computer and Space Engineering Sweden
This work analyzes the computing performance of distributed control systems in IEC 61499 on two hardware devices, Dell XPS workstation and Raspi 4B. Based on the test IEC 61499 application, three different system conf... 详细信息
来源: 评论
Surrogate Modeling for control of Microbial Biopolymer Production process  11
Surrogate Modeling for Control of Microbial Biopolymer Produ...
收藏 引用
11th Vienna international conference on Mathematical Modelling, MATHMOD 2025
作者: Dürr, Robert Otto, Eric Kok, Rudolph L. Duvigneau, Stefanie Kienle, Achim Bück, Andreas Magdeburg-Stendal University of Applied Sciences Magdeburg39114 Germany Otto-von-Guericke University Magdeburg39106 Germany Max-Planck-Institute for Dynamics of Complex Technical Systems Magdeburg39106 Germany Friedrich-Alexander-University Erlangen-Nuremberg Erlangen39058 Germany
In this contribution, the Dynamic Mode Decomposition with control (DMDc) is used to derive a surrogate model of a continuous PHA biopolymer production process based on a recently published complex process model. Here,... 详细信息
来源: 评论
control of the Technological process for Obtaining Propylene Glycol, Functioning in Fuzzy Information Conditions  16th
Control of the Technological Process for Obtaining Propylene...
收藏 引用
16th international conference on Application of Fuzzy Systems, Soft computing and Artificial Intelligence Tools, ICAFS 2023
作者: Melikov, E.A. Magerramova, T.M. Safarova, A.A. Azerbaijan State Oil and Industry University Baku Azerbaijan
Modern complex chemical-technological systems as automation objects are distinguished by the presence of a large number of controlled and uncontrolled parameters, high productivity, technological modes intensity and o... 详细信息
来源: 评论
Applying process Mining on Scientific Workflows: A Case Study on High Performance computing Data  22nd
Applying Process Mining on Scientific Workflows: A Case Stud...
收藏 引用
22nd international conference on Business process Management (BPM)
作者: Sadeghibogar, Zahra Berti, Alessandro Pegoraro, Marco van der Aalst, Wil M. P. Rhein Westfal TH Aachen Proc & Data Sci Aachen Germany
Computer-based scientific experiments are becoming increasingly data-intensive, necessitating the use of High-Performance computing (HPC) clusters to handle large scientific workflows. These workflows result in comple... 详细信息
来源: 评论
Enhancing trusted computing operation efficiency based on parallel file verification techniques  4
Enhancing trusted computing operation efficiency based on pa...
收藏 引用
4th international conference on Network Communication and Information Security, ICNCIS 2024
作者: Zhang, Zhilong Pan, Fengyan Hou, Haibo Li, Yuan Shanghai Jiaotong University Shanghai China Beijing Chenguang Rongxin Technology Co. Beijing China
Trusted computing technology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se... 详细信息
来源: 评论
Navigating automation: process Analysis Framework for Robotic process automation Adoption  5th
Navigating Automation: Process Analysis Framework for Roboti...
收藏 引用
5th international conference on computing, Communications, and Cyber Security, IC4S 2023
作者: Tripathi, Veena Tripathi, Neeraj Model Institute of Engineering and Technology Jammu India Shri Mata Vaishnodevi University Katra India
Robotic process automation (RPA) is an emerging approach designed to automate repetitive human tasks through the use of software-based robots. In the context of business processes, RPA involves configuring these softw... 详细信息
来源: 评论
Research on Garbled Circuits-Based Identity Authentication and Ciphertext Hidden Access control in Vehicular Networks  24
Research on Garbled Circuits-Based Identity Authentication a...
收藏 引用
9th international conference on Cloud computing and Internet of Things, CCIOT 2024
作者: Jiao, Zhilong Bai, Fenhua Zhang, Chi Zhang, Xiaohui Gong, Bei Faculty of Information Engineering and Automation Kunming University of Science and Technology China Kunming China Department of Computing Beijing University of Technology China Beijing China
Since most communications in vehicular networks rely on wireless transmissions, information broadcast by vehicles is highly susceptible to interception and eavesdropping by third parties, making it vulnerable to vario... 详细信息
来源: 评论
Research on the Model of Optimizing the Intelligent Construction process by Using Three-Dimensional Graphics Modeling
Research on the Model of Optimizing the Intelligent Construc...
收藏 引用
2025 Asia-Europe conference on Cybersecurity, Internet of Things and Soft computing, CITSC 2025
作者: Wu, Di Anhui Vocational and Technical College Hefei China
This study proposes a modeling optimization method based on three-dimensional graphics for the modeling problem of complex geometric structures in the intelligent construction process. This method uses the Marching Cu... 详细信息
来源: 评论
Knowledge-Defined Internet of Things Architecture for Cloud-Edge Collaborative Industrial Monitoring  24
Knowledge-Defined Internet of Things Architecture for Cloud-...
收藏 引用
2nd international conference on Frontiers of Intelligent Manufacturing and automation, CFIMA 2024
作者: Zhou, Hongyu Xing, Fangyuan Tong, Fei Wang, Mufeng Zhang, Yan Yang, Shuaifeng Southeast University Nanjing China China Industrial Control Systems Cyber Emergency Response Team Beijing China
The Industrial Internet of Things (IIoT) has become a crucial technology driving the transformation of manufacturing towards intelligence. Traditional industrial networks primarily focus on data collection, whereas em... 详细信息
来源: 评论