咨询与建议

限定检索结果

文献类型

  • 18,309 篇 会议
  • 212 册 图书
  • 195 篇 期刊文献

馆藏范围

  • 18,713 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 13,358 篇 工学
    • 9,707 篇 计算机科学与技术...
    • 6,578 篇 软件工程
    • 3,574 篇 控制科学与工程
    • 2,457 篇 信息与通信工程
    • 2,299 篇 电气工程
    • 1,724 篇 光学工程
    • 1,510 篇 机械工程
    • 1,119 篇 生物工程
    • 905 篇 电子科学与技术(可...
    • 859 篇 生物医学工程(可授...
    • 782 篇 仪器科学与技术
    • 571 篇 动力工程及工程热...
    • 537 篇 交通运输工程
    • 507 篇 安全科学与工程
    • 502 篇 材料科学与工程(可...
    • 454 篇 化学工程与技术
    • 342 篇 土木工程
    • 335 篇 网络空间安全
  • 5,343 篇 理学
    • 2,350 篇 物理学
    • 2,276 篇 数学
    • 1,230 篇 生物学
    • 594 篇 统计学(可授理学、...
    • 588 篇 系统科学
    • 444 篇 化学
  • 2,414 篇 管理学
    • 1,719 篇 管理科学与工程(可...
    • 822 篇 图书情报与档案管...
    • 682 篇 工商管理
  • 1,085 篇 医学
    • 962 篇 临床医学
    • 556 篇 基础医学(可授医学...
    • 362 篇 药学(可授医学、理...
  • 362 篇 法学
  • 258 篇 经济学
  • 249 篇 农学
  • 216 篇 教育学
  • 63 篇 军事学
  • 25 篇 艺术学
  • 20 篇 文学
  • 3 篇 哲学

主题

  • 1,581 篇 computer vision
  • 361 篇 deep learning
  • 314 篇 computer archite...
  • 282 篇 cameras
  • 254 篇 computational mo...
  • 251 篇 object detection
  • 239 篇 control systems
  • 236 篇 computer science
  • 217 篇 image segmentati...
  • 212 篇 feature extracti...
  • 209 篇 internet of thin...
  • 187 篇 access control
  • 172 篇 machine vision
  • 158 篇 neural networks
  • 137 篇 artificial intel...
  • 131 篇 face recognition
  • 130 篇 real-time system...
  • 129 篇 data mining
  • 129 篇 process control
  • 128 篇 support vector m...

机构

  • 47 篇 chitkara univers...
  • 46 篇 school of comput...
  • 45 篇 school of contro...
  • 29 篇 maharishi school...
  • 24 篇 karnataka bangal...
  • 21 篇 school of comput...
  • 19 篇 maharishi school...
  • 17 篇 chitkara univers...
  • 17 篇 college of compu...
  • 15 篇 school of comput...
  • 14 篇 south china univ...
  • 14 篇 dept. of compute...
  • 14 篇 department of co...
  • 14 篇 chitkara univers...
  • 14 篇 university of ch...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 12 篇 school of comput...
  • 12 篇 centre of interd...
  • 12 篇 school of comput...

作者

  • 19 篇 wang lei
  • 18 篇 li yang
  • 17 篇 wang wei
  • 16 篇 yang yang
  • 14 篇 liu yang
  • 13 篇 wang hui
  • 13 篇 ryszard tadeusie...
  • 13 篇 marcin korytkows...
  • 12 篇 wang ping
  • 12 篇 wang jian
  • 12 篇 sato jun
  • 12 篇 jacek m. zurada
  • 11 篇 zhang tao
  • 11 篇 sakaue fumihiko
  • 11 篇 zhang lei
  • 11 篇 huang tinglei
  • 11 篇 liu lei
  • 10 篇 lei wang
  • 10 篇 li xin
  • 10 篇 wang jing

语言

  • 18,161 篇 英文
  • 448 篇 其他
  • 115 篇 中文
  • 16 篇 俄文
  • 7 篇 西班牙文
  • 2 篇 法文
  • 2 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=Proceedings of the 3rd International Conference on Control and Computer Vision"
18716 条 记 录,以下是4891-4900 订阅
排序:
Cathodic Protection Remote Monitoring via LoRaWAN Technology of Water Pipelines
Cathodic Protection Remote Monitoring via LoRaWAN Technology...
收藏 引用
Electrical, computer, Communications and Mechatronics Engineering (ICECCME), international conference on
作者: Mongkol Wongkhan Jeerapa Thitasino Pummate Chaitragul Department of Water Transmission and Distribution Control Metropolitan Waterworks Authority (MWA) Bangkok Thailand
Cathodic Protection (CP) is widely applied for protecting against corrosion of the pipeline. To ensure the pipeline is protected from corrosion, an operator needs to inspect and maintain the CP system regularly by fol...
来源: 评论
Reaction Wheel control of an 3D Printed Inverted Pendulum  23
Reaction Wheel Control of an 3D Printed Inverted Pendulum
收藏 引用
23rd international conference on control Systems and computer Science Technologies, CSCS 2021
作者: Cioaca, Radu-Andrei Flutur, Cristian University Politehnica of Bucharest Department of Automatic Control and Computers Bucharest Romania
Reaction wheels assemblies have been used as actuation methods for spacecrafts since the begining of space exploration, offering good precision for optical pointing applications. Developing efficient attitude control ... 详细信息
来源: 评论
A novel smart substation secondary circuit simulation training system
A novel smart substation secondary circuit simulation traini...
收藏 引用
Power Electronics, computer Applications (ICPECA), IEEE international conference on
作者: Xiaotao Sun Wenhui Zheng Guang Huo Yunzhen Lian State Grid Tianshui Power Supply Company Tianshui City China Beijing Kedong Power Control System Co. Ltd. Beijing China
Compared with traditional substations, the secondary circuit of smart substations is quite different in terms of transmission channel and protection function realization, which puts forward higher requirements for the... 详细信息
来源: 评论
Design and Prototyping of an Robotic Exoskeleton for Rehabilitation After Total Knee Arthroplasty
Design and Prototyping of an Robotic Exoskeleton for Rehabil...
收藏 引用
Automation, Robotics and computer Engineering (ICARCE), international conference on
作者: Raed Abdulameer Mahmood Alalwani Ali Selk Ghafari School of Science and Enginnering Sharif University of Technology International Campus Kish Island Hormozghan Iran Alfurat Al-awsat Technical University Alkufa Iraq
The most increasing trend is to utilize total knee arthroplasty (TKA) as a surgical solution to relief the effects of severe arthritis. Researchers have become interested in replacing an efficient robotic assisted met... 详细信息
来源: 评论
Computational Methods for Analysing Biometric Systems
Computational Methods for Analysing Biometric Systems
收藏 引用
Technological Advancements in Computational Sciences (ICTACS), international conference on
作者: Fahim Multani Sheela Bijlwan Viyat Varun Upadhyay Bhawna Goyal Ayush Dogra Dawa Chyophel Lepcha Department of Computer Science Engineering IES College of Technology Bhopal Madhya Pradesh Uttaranchal School of Computing Sciences Uttaranchal Institute of Technology Uttaranchal University Dehradun India Department of Mechanical Engineering GLA University Mathura Mathura University Center for Research and Development Chandigarh University Mohali Punjab India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department Electronics and Communication Engineering Chandigarh University Mohali Punjab India
The use of biometric data, such as various anatomical and behavioural attributes in automatic identification and authentication systems for access control, surveillance, computer security, and law enforcement are incr...
来源: 评论
Test and verification of electric field characteristics in seawater based on ship scaled model
Test and verification of electric field characteristics in s...
收藏 引用
Power Electronics, computer Applications (ICPECA), IEEE international conference on
作者: Yingchun Huan Zhendong Liu Min Shi Zhihao Jiang Chao Xu Shaomeng Li China Transport Telecommunications & Information Center (CTTIC) The PLA Unit 91977 Beijing China Dalian Institute of Measurement and Control Technology Dalian China The PLA Unit 91977 Beijing China
The test and verification of the electric field characteristics of the scaled model is to make a certain scale model by scaling the size and electrical parameters of the ship through the electric field similarity crit... 详细信息
来源: 评论
Research on Imaging Detection of Defects in X-ray Oil and Gas Casings Based on MIT-MTT Combined Instrument
Research on Imaging Detection of Defects in X-ray Oil and Ga...
收藏 引用
Automation, Robotics and computer Engineering (ICARCE), international conference on
作者: Xifeng Yi Yang Zhang Huaigu Tian Juanli Zhang Feng Zhang Yubao Li Sinopec Shengli Oilfield Company Petroleum Engineering Technology Research Institute Dongying PR China Xi'an Key Laboratory of Human-Machine Integration and Control Technology for Intelligent Rehabilitation Xijing University Xi'an PR China Shaanxi Huachen Petroleum Technology Co. Ltd Xi'an PR China
The paper aims to study the X-ray oil and gas casing defect imaging detection based on the MIT-MTT combination logging instrument. By reviewing and analyzing relevant domestic and international literature, the paper s... 详细信息
来源: 评论
A Multi-Objective Decision Assistance System for Selecting Security controls Based On Simulation
A Multi-Objective Decision Assistance System for Selecting S...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), international conference on
作者: Ritu Shree Komal Sandhu Department of Computer Science Engineering Vivekananda Global University Jaipur India Department of Master of Computer Application Chandigarh School of Business Jhanjeri
In this work, we present the results of our continuing investigations into simulation-based risk analysis for information security and multi-objective investment optimization for security controls. We provide a method...
来源: 评论
Segregation of Areca Nuts Using Three Band Photometry and Deep Neural Network  3rd
Segregation of Areca Nuts Using Three Band Photometry and ...
收藏 引用
3rd international conference on Soft Computing and its Engineering Applications, icSoftComp 2021
作者: Dosi, Saurav Vamsi, Bala Raut, Samarth S. Narasimha, D. Indian Institute of Technology Dharwad Karnataka Dharwad India
In the Malnadu region of Karnataka state in India, often tender Areca nuts of five to eight months old are harvested together, manually separated according to ripeness based on their colour, dehusked, sliced and boile... 详细信息
来源: 评论
Federated Learning for Protecting Privacy in Big Data Networks  3
Federated Learning for Protecting Privacy in Big Data Networ...
收藏 引用
3rd IEEE international conference on Automation and Computation, AUTOCOM 2025
作者: Pattanayak, Binod Kumar Samrat, Bhavuk Thomas, Shaji Sudha, F. V. Jaya Choudhary, Deeksha Department of Computer Science and Engineering Odisha Bhubaneswar India Chitkara University Chitkara Centre for Research and Development Himachal Pradesh Baddi174103 India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura140417 India Karnataka Bangalore India Sathyabama Institute of Science and Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
Due to the big data era, the use of cloud computing and Internet of Things devices has increased tremendously, which has resulted in the mass collection of personal data. This caused major privacy protection and safet... 详细信息
来源: 评论