咨询与建议

限定检索结果

文献类型

  • 27,706 篇 会议
  • 364 篇 期刊文献
  • 129 册 图书
  • 1 篇 学位论文

馆藏范围

  • 28,199 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 14,053 篇 工学
    • 8,071 篇 计算机科学与技术...
    • 6,138 篇 控制科学与工程
    • 4,493 篇 软件工程
    • 3,055 篇 电气工程
    • 2,191 篇 机械工程
    • 1,551 篇 信息与通信工程
    • 837 篇 仪器科学与技术
    • 729 篇 电子科学与技术(可...
    • 709 篇 化学工程与技术
    • 686 篇 动力工程及工程热...
    • 622 篇 材料科学与工程(可...
    • 459 篇 生物工程
    • 413 篇 冶金工程
    • 361 篇 环境科学与工程(可...
    • 352 篇 生物医学工程(可授...
    • 348 篇 力学(可授工学、理...
    • 348 篇 石油与天然气工程
    • 348 篇 安全科学与工程
    • 340 篇 交通运输工程
    • 298 篇 土木工程
  • 3,728 篇 理学
    • 1,939 篇 数学
    • 787 篇 物理学
    • 755 篇 系统科学
    • 546 篇 统计学(可授理学、...
    • 521 篇 化学
    • 513 篇 生物学
  • 3,134 篇 管理学
    • 2,703 篇 管理科学与工程(可...
    • 954 篇 工商管理
    • 562 篇 图书情报与档案管...
  • 356 篇 经济学
    • 350 篇 应用经济学
  • 309 篇 医学
  • 227 篇 法学
  • 167 篇 教育学
  • 135 篇 农学
  • 74 篇 文学
  • 27 篇 艺术学
  • 21 篇 军事学
  • 1 篇 哲学

主题

  • 5,866 篇 process control
  • 2,066 篇 control systems
  • 1,767 篇 automation
  • 1,677 篇 cloud computing
  • 1,034 篇 computational mo...
  • 742 篇 automatic contro...
  • 726 篇 mathematical mod...
  • 664 篇 monitoring
  • 619 篇 computer archite...
  • 477 篇 real-time system...
  • 457 篇 distributed comp...
  • 421 篇 protocols
  • 418 篇 hardware
  • 405 篇 production
  • 396 篇 software
  • 377 篇 concurrent compu...
  • 376 篇 optimization
  • 354 篇 computer science
  • 349 篇 predictive model...
  • 345 篇 costs

机构

  • 92 篇 state key labora...
  • 61 篇 college of infor...
  • 47 篇 shenyang institu...
  • 47 篇 tianjin key labo...
  • 43 篇 university of ch...
  • 39 篇 department of co...
  • 37 篇 school of automa...
  • 32 篇 school of comput...
  • 31 篇 school of artifi...
  • 28 篇 northeastern uni...
  • 25 篇 department of co...
  • 23 篇 key laboratory o...
  • 23 篇 shenyang institu...
  • 21 篇 school of electr...
  • 20 篇 chitkara univers...
  • 19 篇 tianjin key labo...
  • 17 篇 tsinghua univers...
  • 17 篇 faculty of infor...
  • 17 篇 school of automa...
  • 17 篇 school of comput...

作者

  • 31 篇 xiong gang
  • 23 篇 mengchu zhou
  • 22 篇 barbu marian
  • 20 篇 liu yang
  • 19 篇 valeriy vyatkin
  • 19 篇 zhen shen
  • 19 篇 leymann frank
  • 18 篇 ulrich epple
  • 18 篇 urbas leon
  • 17 篇 tao yang
  • 17 篇 fenghua zhu
  • 16 篇 zhang tao
  • 16 篇 wei li
  • 16 篇 shen zhen
  • 15 篇 min huang
  • 15 篇 li yang
  • 15 篇 fei liu
  • 15 篇 li li
  • 15 篇 mihail abrudean
  • 15 篇 chao wang

语言

  • 27,643 篇 英文
  • 300 篇 中文
  • 258 篇 其他
  • 8 篇 西班牙文
  • 7 篇 俄文
  • 2 篇 德文
  • 1 篇 法文
检索条件"任意字段=International Conference on Process Automation, Control and Computing"
28200 条 记 录,以下是61-70 订阅
排序:
Peer-Assessed (Evaluated) Automated Grading System: A Comprehensive Exploration with Emphasis on Batch processing Data Visualization and Rigorous Peer Evaluation  24
Peer-Assessed (Evaluated) Automated Grading System: A Compre...
收藏 引用
2024 international conference on Artificial Intelligence and Teacher Education, ICAITE 2024
作者: Liow, Hui Jia Karin Yau, Peter ChunYu Tang, LaiMeng Seow, CheeKiat Cao, Qi School of Computing Science University of Glasgow Glasgow United Kingdom
Grading process is a critical yet intricate task for educators. This research addresses the inefficiencies and complexities inherent in the current manual grading approach, focusing on the challenges faced by educator... 详细信息
来源: 评论
control-Flow Reconstruction Attacks on Business process Models  28th
Control-Flow Reconstruction Attacks on Business Process Mod...
收藏 引用
28th international conference on Enterprise Design, Operations, and computing, EDOC 2024
作者: Kirchmann, Henrik Fahrenkrog-Petersen, Stephan A. Mannhardt, Felix Weidlich, Matthias Humboldt-Universität zu Berlin Berlin Germany Weizenbaum Institute for the Networked Society Berlin Germany Eindhoven University of Technology Eindhoven Netherlands
process models may be automatically generated from event logs that contain as-is data of a business process. While such models generalize over the control-flow of specific, recorded process executions, they ... 详细信息
来源: 评论
Enhancing Cross-Domain Access Efficiency in Zero-Trust Scenarios Oriented to the Access process
Enhancing Cross-Domain Access Efficiency in Zero-Trust Scena...
收藏 引用
2025 international conference on Electrical automation and Artificial Intelligence, ICEAAI 2025
作者: Li, Xian Zhang, Shijun Zeng, Jing Li, Shuo Yang, Ruxia State Grid Jibei Information & Telecommunication Company State Grid Beijing China State Grid Laboratory of Power cyber Security Protection and Monitoring Technology China Electric Power Research Institute Nanjing China
During cross-domain access, both communication ends need zero-trust evaluation by the trust assessment node and policy matching for permission. Nodes handling these may face concurrent computing and policy search task... 详细信息
来源: 评论
A Green and Secure Model for Fog computing in Mobile Cloud Environments Using Containerization  3
A Green and Secure Model for Fog Computing in Mobile Cloud E...
收藏 引用
3rd IEEE international conference on automation and Computation, AUTOCOM 2025
作者: Patra, Bichitrananda Seth, Kanika Mithun Kumar, S. Acharjya, Kalyan Ankayarkanni, B. Kundra, Danish Department of Computer Applications Odisha Bhubaneswar India Chitkara University Chitkara Centre for Research and Development Himachal Pradesh Baddi174103 India Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura140417 India
Internet of Things devices, and mobile computing, there is a growing demand for effective data processing where computation meets network traffic. Here, the fog computing concept has emerged to cater to this demand th... 详细信息
来源: 评论
Automating Vulnerability Scanning and Patching Along with OWASP and CVE Databases on Docker Container Images  3rd
Automating Vulnerability Scanning and Patching Along with OW...
收藏 引用
3rd international conference on Advances in computing Research, ACR 2025
作者: Ohaeche, Joseph U. Wang, Xinli School of Computing Grand Valley State University Michigan United States
The evolution of container technology has seen significant progress, starting from the introduction of the Unix U7 container concept in 1979 to the popularization of the Docker container concept in 2013. In recent yea... 详细信息
来源: 评论
Automated Hydrogen Peroxide Flow control for Optimized Paper Bleaching in Paper Industry
Automated Hydrogen Peroxide Flow Control for Optimized Paper...
收藏 引用
Advanced computing Technologies (ICoACT), international conference on
作者: K. Prabhu S. Vijayachitra Sachin A Subasri J Kavin E Department of Electronics and Instrumentation Engineering Kongu Engineering College Erode Tamil Nadu
The amount and control of chemical additives, including hydrogen peroxide, determine the effectiveness and ecological implications of bleaching techniques for paper. Conventional application processes of hydrogen pero... 详细信息
来源: 评论
processing method of unstructured power material data based on edge computing framework
Processing method of unstructured power material data based ...
收藏 引用
2024 international conference on Physics, Photonics, and Optical Engineering, ICPPOE 2024
作者: Zhang, Qizhe Zhao, Ruyi Zhao, Chuanqi Zhao, Yue China Electric Power Research Institute Beijing100089 China State Grid Shandong Electric Power Research Institute Ji’nan250003 China
With the development of power system, the processing of unstructured power material data has become increasingly important, especially in the context of diverse data types and expanding scale. Unstructured data accoun... 详细信息
来源: 评论
Investigating Topology Optimization Techniques for Enhancing Network Performance in Cloud computing Environments  3
Investigating Topology Optimization Techniques for Enhancing...
收藏 引用
3rd IEEE international conference on automation and Computation, AUTOCOM 2025
作者: Nandy, Manish Dubey, Ahilya Kalinga University Department of Cs & It Raipur India
In this paper, a literature review of network optimization of cloud services and the improvement achieved in terms of performance is presented. The measures that are used in this regard were latency, throughput, utili... 详细信息
来源: 评论
Assessment and Management of Security Risks in Accounting Information Systems from a Lifecycle Perspective
Assessment and Management of Security Risks in Accounting In...
收藏 引用
2024 international conference on Mechatronics and Intelligent control, ICMIC 2024
作者: Gong, Lijiahui Business School Wuhan Huaxia Institute of Technology Wuhan430223 China
As the carrier of information assets, the importance of accounting information systems is increasing with the development of informatization. Meanwhile, information systems are facing more security threats. How to eff... 详细信息
来源: 评论
Use neural Networks to Recognize Students' Handwritten Letters and Incorrect Symbols
Use neural Networks to Recognize Students' Handwritten Lette...
收藏 引用
2024 international conference on Mechatronics and Intelligent control, ICMIC 2024
作者: Zhu, Jia Jun Yang, Zichuan Hong, Binjie Song, Jiacheng Wang, Jiwei Chen, Tianhao Yang, Shuilan Lan, Zixun Ma, Fei Department of Information and Computing Science Xi'an Jiaotong-Liverpool University Suzhou China School of Engineering Suzhou Centennial College Suzhou China Department of Applied Mathematics Xi'an Jiaotong-Liverpool University Suzhou China GROW Inc. Suzhou China EasyStack Inc. Nanjing China TAL Education Group Beijing China
Correcting students' multiple-choice answers is a repetitive and mechanical task that can be considered an image multi-classification task. Assuming possible options are 'abcd' and the correct option is on... 详细信息
来源: 评论