咨询与建议

限定检索结果

文献类型

  • 18,409 篇 会议
  • 217 册 图书
  • 188 篇 期刊文献

馆藏范围

  • 18,811 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 13,438 篇 工学
    • 9,747 篇 计算机科学与技术...
    • 6,612 篇 软件工程
    • 3,603 篇 控制科学与工程
    • 2,471 篇 信息与通信工程
    • 2,304 篇 电气工程
    • 1,741 篇 光学工程
    • 1,517 篇 机械工程
    • 1,118 篇 生物工程
    • 909 篇 电子科学与技术(可...
    • 864 篇 生物医学工程(可授...
    • 785 篇 仪器科学与技术
    • 574 篇 动力工程及工程热...
    • 543 篇 交通运输工程
    • 513 篇 安全科学与工程
    • 499 篇 材料科学与工程(可...
    • 454 篇 化学工程与技术
    • 349 篇 土木工程
    • 335 篇 网络空间安全
  • 5,368 篇 理学
    • 2,366 篇 物理学
    • 2,288 篇 数学
    • 1,231 篇 生物学
    • 598 篇 统计学(可授理学、...
    • 589 篇 系统科学
    • 449 篇 化学
  • 2,423 篇 管理学
    • 1,722 篇 管理科学与工程(可...
    • 830 篇 图书情报与档案管...
    • 687 篇 工商管理
  • 1,096 篇 医学
    • 972 篇 临床医学
    • 561 篇 基础医学(可授医学...
    • 362 篇 药学(可授医学、理...
  • 364 篇 法学
  • 259 篇 经济学
  • 253 篇 农学
  • 218 篇 教育学
  • 64 篇 军事学
  • 25 篇 艺术学
  • 20 篇 文学
  • 3 篇 哲学

主题

  • 1,582 篇 computer vision
  • 370 篇 deep learning
  • 314 篇 computer archite...
  • 282 篇 cameras
  • 255 篇 object detection
  • 253 篇 computational mo...
  • 237 篇 control systems
  • 236 篇 computer science
  • 220 篇 image segmentati...
  • 211 篇 feature extracti...
  • 209 篇 internet of thin...
  • 187 篇 access control
  • 173 篇 machine vision
  • 158 篇 neural networks
  • 137 篇 artificial intel...
  • 133 篇 face recognition
  • 130 篇 process control
  • 130 篇 real-time system...
  • 129 篇 data mining
  • 128 篇 support vector m...

机构

  • 47 篇 chitkara univers...
  • 46 篇 school of comput...
  • 43 篇 school of contro...
  • 29 篇 maharishi school...
  • 24 篇 karnataka bangal...
  • 21 篇 school of comput...
  • 19 篇 maharishi school...
  • 17 篇 chitkara univers...
  • 17 篇 college of compu...
  • 15 篇 university of ch...
  • 15 篇 school of comput...
  • 14 篇 south china univ...
  • 14 篇 dept. of compute...
  • 14 篇 department of co...
  • 14 篇 chitkara univers...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 centre of interd...
  • 12 篇 school of comput...

作者

  • 19 篇 wang lei
  • 18 篇 li yang
  • 17 篇 wang wei
  • 16 篇 yang yang
  • 14 篇 liu yang
  • 13 篇 wang hui
  • 13 篇 ryszard tadeusie...
  • 13 篇 marcin korytkows...
  • 12 篇 wang ping
  • 12 篇 wang jian
  • 12 篇 sato jun
  • 12 篇 jacek m. zurada
  • 11 篇 zhang tao
  • 11 篇 sakaue fumihiko
  • 11 篇 zhang lei
  • 11 篇 huang tinglei
  • 11 篇 liu lei
  • 10 篇 lei wang
  • 10 篇 li xin
  • 10 篇 wang jing

语言

  • 16,844 篇 英文
  • 1,863 篇 其他
  • 133 篇 中文
  • 16 篇 俄文
  • 7 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=Proceedings of the 3rd International Conference on Control and Computer Vision"
18814 条 记 录,以下是1041-1050 订阅
排序:
Dynamic Checkpointing: Fault Tolerance in High-Performance Computing  3
Dynamic Checkpointing: Fault Tolerance in High-Performance C...
收藏 引用
3rd international conference on Communication, control, and Intelligent Systems, CCIS 2024
作者: Bhowmik, Biswajit Verma, Tushar Dineshbhai, Navdeep Dadhania Reddy, Manideep Raya Vsrs Girish, K.K. National Institute of Technology Karnataka Maharshi Sushrut Cas Lab Brics Laboratory Dept. of Computer Science and Engineering Mangalore India National Institute of Technology Karnataka Maharshi Kanad Qc Lab Brics Laboratory Dept. of Computer Science and Engineering Mangalore India National Institute of Technology Karnataka Ishwarchandra Vidyasagar Ait Lab Brics Laboratory Dept. of Computer Science and Engineering Mangalore India
Parallel computing has become a cornerstone of modern computational systems, enabling the rapid processing of complex tasks by utilizing multiple processors simultaneously. However, the efficiency and reliability of t... 详细信息
来源: 评论
Blockchain based Enhanced Healthcare Framework for Secure Interoperability  3
Blockchain based Enhanced Healthcare Framework for Secure In...
收藏 引用
3rd international conference on Power, control and Computing Technologies, ICPC2T 2024
作者: Kumar, Satish Kumar, J. Sathish Motilal Nehru National Insttitute of Technology Allahabad Computer Science and Engineering Departemnt Prayagraj India
Medical history of patients is sensitive and crucial for the treatment. During epidemics like COVID-19, secure data exchange between hospitals is very important. However, shareability of data with security in existing... 详细信息
来源: 评论
Image moment-based planar object pose estimation  3
Image moment-based planar object pose estimation
收藏 引用
3rd international conference on Consumer Electronics and computer Engineering, ICCECE 2023
作者: Jin, Fen Luo, Xiao School of Mechanical Engineering Beijing Institute of Technology Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China
To address the error problem caused by the coupling of in-plane object pose estimation, this paper proposes an image moment-based planar object pose estimation, which simplifies the computational process by adding a v... 详细信息
来源: 评论
Grid-Forming PV System for Frequency Ancillary Services Provision  3
Grid-Forming PV System for Frequency Ancillary Services Prov...
收藏 引用
3rd international conference on Energy Transition in the Mediterranean Area, SyNERGY MED 2024
作者: Barac, Bojana Capuder, Tomislav Panteli, Mathaios University of Zagreb Faculty of Electrical Engineering and Computing Department of Energy and Power Systems Croatia University of Cyprus Department of Electrical and Computer Engineering Cyprus
With the increasing penetration of photovoltaic (PV) systems posing challenges to power system stability, this paper investigates the effectiveness of grid-forming controlled PV systems in providing frequency ancillar... 详细信息
来源: 评论
A TCP Throughput Model for IEEE 802.11 Linear Multi-hop Networks  3
A TCP Throughput Model for IEEE 802.11 Linear Multi-hop Netw...
收藏 引用
3rd international conference on Electronic Information Engineering and computer Communication, EIECC 2023
作者: Liu, Jianzhao Zhang, Junxiong Ge, Xiaohu School of Electronic Information and Communication Huazhong University of Science and Technology Wuhan China
Nowadays, IEEE 802.11 has become the most widely used standard for the wireless local area network (WLAN), and transport control protocol (TCP) is a dominant communication protocol in networks. Besides, the linear mul... 详细信息
来源: 评论
Multi-population particle swarm optimization concerning the worst information  3
Multi-population particle swarm optimization concerning the ...
收藏 引用
3rd international conference on computer vision and Pattern Analysis, ICCPA 2023
作者: Li, Haiyan Chen, Yanbo Sun, Jiulin Li, Mi Department of Automation Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing International Collaboration Base on Brain Informatics and Wisdom Services Beijing100124 China Engineering Research Center of Intelligent Perception and Autonomous Control Ministry of Education Beijing100124 China Engineering Research Center of Digital Community Ministry of Education Beijing100124 China
Currently, the majority of multi-population algorithms ignore the worst particles and instead learn from the gbest or lbest. Hence, it is simple for these strategies to result in inadequate population variety, which c... 详细信息
来源: 评论
Machine Learning Classifiers for Predicting the Risk of Cardiovascular Disease in Healthcare 4.0  3
Machine Learning Classifiers for Predicting the Risk of Card...
收藏 引用
3rd international conference on Communication, control, and Intelligent Systems, CCIS 2024
作者: Kumari, Palak Kumar, Ashish Chatterjee, Kakali Master of Computer Applications Patna Women's College Patna India National Institute of Technology Patna Dept. of Computer Science and Engineering Patna India
Cardiovascular disease (CVD) generic phrase used to describe heart or blood vessel illness. Conditions that impact the body's, brain's, or heart's blood flow. Reduced blood flow can result from factors suc... 详细信息
来源: 评论
Stealthy False Data Injection Cyberattack Targeting under Load Tap Changing Transformers in Smart Power Grid Causing Abnormal Voltage Profile  3
Stealthy False Data Injection Cyberattack Targeting under Lo...
收藏 引用
3rd international conference on Power, control and Computing Technologies, ICPC2T 2024
作者: Naderi, Ehsan Asrari, Arash College of Engineering and Computer Science Arkansas State University Department of Electrical Engineering JonesboroAR United States Purdue University Northwest Department of Electrical and Computer Engineering HammondIN United States
In the process of protecting power systems against different types of cyberattacks, the primary step is to precisely model such frameworks from attacker's perspective. This paper investigates a false data injectio... 详细信息
来源: 评论
control Strategy of Wind Turbines for Their Withdrawl of Frequency Regulation  3
Control Strategy of Wind Turbines for Their Withdrawl of Fre...
收藏 引用
3rd international conference on Energy, Power and Electrical Technology, ICEPET 2024
作者: Gao, Haishu Zhang, Feng Wu, Guanghao Cornelusse, Bertrand Shandong University School of Electrical Engineering Jinan China University of Liege Department of Electrical Engineering and Computer Science Liège Belgium
The simultaneous withdrawal of multiple WTGs after wind farm participation in frequency regulation will cause a large power plunge, which in turn will cause a serious secondary frequency drop in the system. Moreover, ... 详细信息
来源: 评论
Water Quality Monitoring and control in Urban Areas in Real-Time via IoT and Mobile Applications  3
Water Quality Monitoring and Control in Urban Areas in Real-...
收藏 引用
3rd international conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Mohanasundaram, R. Sagar, Raghav Kumar Khandelwal, Animan Upadhyay, Diwas Poddar, Harshit Rajagopal, Sivakumar Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Electronics Engineering Vellore India
The presence of impurities in water resulting from the expansion of industrial activities and the disregard of regulations aimed at protecting the environment presents considerable threats to the well-being of the gen... 详细信息
来源: 评论