咨询与建议

限定检索结果

文献类型

  • 18,409 篇 会议
  • 214 册 图书
  • 195 篇 期刊文献

馆藏范围

  • 18,815 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 13,444 篇 工学
    • 9,750 篇 计算机科学与技术...
    • 6,613 篇 软件工程
    • 3,604 篇 控制科学与工程
    • 2,472 篇 信息与通信工程
    • 2,309 篇 电气工程
    • 1,742 篇 光学工程
    • 1,518 篇 机械工程
    • 1,119 篇 生物工程
    • 911 篇 电子科学与技术(可...
    • 863 篇 生物医学工程(可授...
    • 786 篇 仪器科学与技术
    • 574 篇 动力工程及工程热...
    • 544 篇 交通运输工程
    • 514 篇 安全科学与工程
    • 503 篇 材料科学与工程(可...
    • 454 篇 化学工程与技术
    • 349 篇 土木工程
    • 338 篇 网络空间安全
  • 5,375 篇 理学
    • 2,371 篇 物理学
    • 2,288 篇 数学
    • 1,232 篇 生物学
    • 598 篇 统计学(可授理学、...
    • 590 篇 系统科学
    • 448 篇 化学
  • 2,430 篇 管理学
    • 1,728 篇 管理科学与工程(可...
    • 831 篇 图书情报与档案管...
    • 688 篇 工商管理
  • 1,093 篇 医学
    • 970 篇 临床医学
    • 561 篇 基础医学(可授医学...
    • 362 篇 药学(可授医学、理...
  • 363 篇 法学
  • 259 篇 经济学
  • 252 篇 农学
  • 218 篇 教育学
  • 64 篇 军事学
  • 25 篇 艺术学
  • 20 篇 文学
  • 3 篇 哲学

主题

  • 1,583 篇 computer vision
  • 370 篇 deep learning
  • 314 篇 computer archite...
  • 282 篇 cameras
  • 255 篇 object detection
  • 254 篇 computational mo...
  • 239 篇 control systems
  • 236 篇 computer science
  • 220 篇 image segmentati...
  • 213 篇 feature extracti...
  • 209 篇 internet of thin...
  • 187 篇 access control
  • 173 篇 machine vision
  • 158 篇 neural networks
  • 137 篇 artificial intel...
  • 132 篇 face recognition
  • 130 篇 real-time system...
  • 129 篇 data mining
  • 129 篇 process control
  • 128 篇 support vector m...

机构

  • 47 篇 chitkara univers...
  • 46 篇 school of comput...
  • 44 篇 school of contro...
  • 29 篇 maharishi school...
  • 24 篇 karnataka bangal...
  • 21 篇 school of comput...
  • 19 篇 maharishi school...
  • 17 篇 chitkara univers...
  • 17 篇 college of compu...
  • 15 篇 university of ch...
  • 15 篇 school of comput...
  • 14 篇 south china univ...
  • 14 篇 dept. of compute...
  • 14 篇 department of co...
  • 14 篇 chitkara univers...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 centre of interd...
  • 12 篇 school of comput...

作者

  • 19 篇 wang lei
  • 18 篇 li yang
  • 17 篇 wang wei
  • 16 篇 yang yang
  • 14 篇 liu yang
  • 13 篇 wang hui
  • 13 篇 ryszard tadeusie...
  • 13 篇 marcin korytkows...
  • 12 篇 wang ping
  • 12 篇 wang jian
  • 12 篇 sato jun
  • 12 篇 jacek m. zurada
  • 11 篇 zhang tao
  • 11 篇 sakaue fumihiko
  • 11 篇 zhang lei
  • 11 篇 huang tinglei
  • 11 篇 liu lei
  • 10 篇 lei wang
  • 10 篇 li xin
  • 10 篇 wang jing

语言

  • 17,968 篇 英文
  • 743 篇 其他
  • 119 篇 中文
  • 16 篇 俄文
  • 7 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
检索条件"任意字段=Proceedings of the 3rd International Conference on Control and Computer Vision"
18818 条 记 录,以下是4801-4810 订阅
排序:
NutriFACT: An Android based Mobile Application for Intake of Food Nutrition during Rare Disease
NutriFACT: An Android based Mobile Application for Intake of...
收藏 引用
Innovative Practices in Technology and Management (ICIPTM), international conference on
作者: Mohitsinh Parmar Hardik Rajgor Shailesh Khant Faculty of Computer Science and Applications CMPICA Charotar University of Science and Technology (CHARUSAT) Changa India
In current era people are suffering from many problems including common and rare diseases. The common diseases like hypertension and diabetes can be curable and controllable using proper medical guidance and diet but ... 详细信息
来源: 评论
Brain-computer Interfaces Interpret EEG Data to Determine Mental State
Brain-Computer Interfaces Interpret EEG Data to Determine Me...
收藏 引用
Advancement in Electronics & Communication Engineering (AECE), international conference on
作者: Vella Satyanarayana A. G. Mounika Mahesh K. Singh U. Rajyalakshmi Harendra K. Yadav Department of Electronics and Communication Engineering Aditya Engineering College Surampalem India Department of EEE Raj Kumar Goel Institute of Techology Ghaziabad India
A diagnostic instrument called an electroencephalogram measures the electrical activity of the brain electroencephalogram (EEG). Electrical impulses allow neurons to communicate with one another in the brain. An EEG m...
来源: 评论
Analysis of an Aero-engine Fuel control System, Rooted in Systems Thinking and control Theory
Analysis of an Aero-engine Fuel Control System, Rooted in Sy...
收藏 引用
Electrical, computer, Communications and Mechatronics Engineering (ICECCME), international conference on
作者: Johney Thomas Antonio Davis Mathews P. Samuel Saji Kumar S. HAL Management Academy Hindustan Aeronautics Limited Bangalore India Intl. Inst. for Aerospace Engg.&Mgmt. JAIN (Deemed-to-be University) Bangalore India CEMILAC DRDO Bangalore India Engine Division Hindustan Aeronautics Ltd. Bangalore India
Malfunctioning of the fuel control system in an aero gas turbine engine may cause the engine to operate beyond its intended temperature limits. This can cause damage to critical engine components like turbine blades. ...
来源: 评论
Secured Environmental Monitoring System
Secured Environmental Monitoring System
收藏 引用
international conference on Intelligent Communication and Computational Techniques (ICCT)
作者: Laasya Sree Talluru Saketh Kapuganti Yoga Bhavagna Jonnala Jetendra Joshi Computer Science Department NIIT University Neemrana Alwar Rajasthan India NIIT University
The Internet of Things (IoT) is a new standard that has transformed the traditional way of life into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy saving, smart transportation, and smart ... 详细信息
来源: 评论
Comparing Maximum Power Point Tracking Techniques for Solar Photovoltaic Systems
Comparing Maximum Power Point Tracking Techniques for Solar ...
收藏 引用
Advancement in Electronics & Communication Engineering (AECE), international conference on
作者: Gunjan Varshney EL Miloud Ar-Reyouchi Bhagya Shree Ankita Patel Department of Electrical Engineering JSS Academy of Technical Education Noida India Department of Telecommunication and Computer Science E.T.S UNED Madrid Spain
As the demand for energy rises, photovoltaic (PV) system usage is increasing globally. Since PV systems are not linear, special methods are employed to generate the most amount of power. The energy generated by PV pan...
来源: 评论
A Self-Scaling Dynamic Blockchain Model for IoT
A Self-Scaling Dynamic Blockchain Model for IoT
收藏 引用
Computing and Machine Intelligence (ICMI), international conference on
作者: Riham Elsaadany Guy Bégin Computer Science Dept. Université du Québec à Montréal (UQAM)
Due to its immutability, blockchain is a potential solution for the heterogeneous, non-secure IoT. Nevertheless, scalability, high throughput, consensus efficiency as well as decentralization and node capacity conside... 详细信息
来源: 评论
Novel Attack Vector to Abuse AWS for Cryptojacking
Novel Attack Vector to Abuse AWS for Cryptojacking
收藏 引用
Applied Artificial Intelligence and Computing (ICAAIC), international conference on
作者: Nahfid Nissar S Arjun Kvk Siddartha Shaik Muzamil Raheman Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India
This study investigates cryptojacking attacks on cloud infrastructure, focusing on hacker groups and their methods from 2017 to 2024. We analyze how attackers deploy mining software and malware in the cloud, leading t... 详细信息
来源: 评论
Research on Privacy Protection of Smart Home
Research on Privacy Protection of Smart Home
收藏 引用
Mobile Networks and Wireless Communications (ICMNWC), IEEE international conference on
作者: Wenjun Zhang Yuan Chen Xia Wei Yongrui Yan Shaanxi Branch of National Computer Network Center of China Emergency Response Technical Team/Coordination Xi'an China School of Information Engineering Xi'an Mingde Institute of Technology Xi'an China China Mobile Communications Group Shanxi Co. Ltd. Taiyuan China
With the development of the Internet of Things technology, the smart home industry is rapidly developing, and the collection and use of sensitive user data are also increasing. The issue of user privacy protection is ...
来源: 评论
AttRSeq: Attack story reconstruction via sequence mining on causal graph
AttRSeq: Attack story reconstruction via sequence mining on ...
收藏 引用
Power Electronics, computer Applications (ICPECA), IEEE international conference on
作者: Fangtao Zhang Rujie Dai Xiu Ma Chinese Academy of Sciences Institute of Information Engineering Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
With massive alerts to investigate, cyber analysts often face with alert fatigue and may miss true attack events. As cyber-attacks are becoming increasingly targeted and sophisticated, many attack story reconstruction... 详细信息
来源: 评论
Transformer Monitoring and Security System Using IoT
Transformer Monitoring and Security System Using IoT
收藏 引用
Innovative Practices in Technology and Management (ICIPTM), international conference on
作者: Sudhir Anakal Sangita Rani Kar A. Sangeetha Sritha P Dekka Satish Sajitha. L. P A. Rajendra Prasad Department of Computer Applications Sharnbasva University Karnataka India Department of Electrical & Electronics ITER Siksha ‘O’ Anusandhan Odisha India Department of Computer Science R.M.K College of Engineering & Technology Chennai India Department of Electrical & Electronics Bannari Amman Institute of Technology Chennai India Department of Computer Science Lendi Institute of Engineering & Technology Andhra Pradesh India Department of Computer Science R. M. K Engineering College Chennai India Department of Mechanical Engineering Sri Sai Ram Engineering College Chennai India
Temperature increases are a common source of problems in transformers. Temperature increases as load current increases. There are two ways to monitor the rise in load current. Use a potential transformer and a tempera... 详细信息
来源: 评论