咨询与建议

限定检索结果

文献类型

  • 1,486 篇 会议
  • 1,009 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 2,516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,677 篇 工学
    • 988 篇 计算机科学与技术...
    • 849 篇 软件工程
    • 454 篇 控制科学与工程
    • 334 篇 信息与通信工程
    • 281 篇 电气工程
    • 243 篇 机械工程
    • 180 篇 电子科学与技术(可...
    • 162 篇 生物工程
    • 132 篇 生物医学工程(可授...
    • 107 篇 光学工程
    • 85 篇 仪器科学与技术
    • 78 篇 动力工程及工程热...
    • 76 篇 化学工程与技术
    • 69 篇 交通运输工程
    • 56 篇 航空宇航科学与技...
    • 50 篇 材料科学与工程(可...
    • 43 篇 力学(可授工学、理...
    • 42 篇 安全科学与工程
  • 910 篇 理学
    • 515 篇 数学
    • 211 篇 物理学
    • 180 篇 生物学
    • 176 篇 系统科学
    • 141 篇 统计学(可授理学、...
    • 73 篇 化学
  • 430 篇 管理学
    • 304 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 95 篇 工商管理
  • 99 篇 医学
    • 91 篇 临床医学
    • 71 篇 基础医学(可授医学...
    • 50 篇 药学(可授医学、理...
  • 39 篇 法学
  • 31 篇 经济学
  • 24 篇 农学
  • 11 篇 教育学
  • 8 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学
  • 1 篇 哲学

主题

  • 75 篇 feature extracti...
  • 73 篇 educational inst...
  • 69 篇 automation
  • 47 篇 training
  • 44 篇 accuracy
  • 41 篇 computational mo...
  • 39 篇 optimization
  • 39 篇 predictive model...
  • 38 篇 mathematical mod...
  • 37 篇 neural networks
  • 36 篇 genetic algorith...
  • 34 篇 computer science
  • 33 篇 control systems
  • 33 篇 robustness
  • 29 篇 image segmentati...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 28 篇 machine learning
  • 27 篇 object detection
  • 26 篇 support vector m...

机构

  • 74 篇 school of automa...
  • 65 篇 school of automa...
  • 59 篇 college of autom...
  • 57 篇 institute of aut...
  • 50 篇 college of elect...
  • 50 篇 college of compu...
  • 49 篇 college of autom...
  • 48 篇 college of compu...
  • 46 篇 college of autom...
  • 46 篇 department of au...
  • 35 篇 school of automa...
  • 34 篇 college of compu...
  • 33 篇 college of compu...
  • 32 篇 college of compu...
  • 30 篇 faculty of infor...
  • 28 篇 college of autom...
  • 28 篇 school of automa...
  • 27 篇 college of compu...
  • 26 篇 school of automa...
  • 26 篇 school of automa...

作者

  • 72 篇 kang jiawen
  • 70 篇 niyato dusit
  • 31 篇 du hongyang
  • 28 篇 zidong wang
  • 26 篇 xiong zehui
  • 23 篇 wen jinbo
  • 21 篇 youfeng su
  • 21 篇 yuan haitao
  • 19 篇 haitao yuan
  • 19 篇 bi jing
  • 17 篇 mengchu zhou
  • 17 篇 jing bi
  • 16 篇 zhang yang
  • 15 篇 zhou mengchu
  • 15 篇 lei zou
  • 14 篇 zhang jia
  • 13 篇 dabo xu
  • 13 篇 li xiang
  • 13 篇 jia zhang
  • 13 篇 wang fei-yue

语言

  • 2,363 篇 英文
  • 89 篇 其他
  • 63 篇 中文
检索条件"机构=College of Computer Technology and Automation"
2516 条 记 录,以下是41-50 订阅
排序:
Natural Language Processing for Subjective Exam Grading in Programming Explanations in Thai Language
Natural Language Processing for Subjective Exam Grading in P...
收藏 引用
International Electrical Engineering Congress (iEECON)
作者: Waris Rattanimit Thanyarat Nomponkrang Electrical Technology and Automation System Faculty of Engineering and Technology Siam Technology College Bangkok Thailand Department of Computer Education King Mongkut’s University of Technology North Bangkok Bangkok Thailand
In the digital era, learning programming has become an essential skill, and assessing students' understanding in this area plays a crucial role in enhancing educational quality. However, evaluating subjective prog... 详细信息
来源: 评论
GILV: An integrated GNSS/IMU positioning method enhanced by lane line and template matching VO  2
GILV: An integrated GNSS/IMU positioning method enhanced by ...
收藏 引用
2nd International Conference on Frontiers of Applied Optics and computer Engineering, AOCE 2025
作者: Wang, Rongchen Zeng, Qingxi Huang, Yuhua Ji, Xufang Shi, Yanwei Yuan, Liying College of Automation Engineering Nanjing University of Aeronautics and Astronautics Nanjing211106 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China Xuzhou Power Supply Branch of State Grid Jiangsu Electric Power Co. Ltd. Xuzhou221000 China
Ensuring precise and flexible positioning is a fundamental prerequisite for autonomous mobility of unmanned ground vehicles. In the context of Global Navigation Satellite System (GNSS) signals facing suppression, the ... 详细信息
来源: 评论
A Reinforcement Learning-Based Image Mapping-Topology Optimization for Antenna Design
收藏 引用
IEEE Antennas and Wireless Propagation Letters 2025年
作者: Dou, Jiangling Gong, Hao Chen, Haokang Chen, Yujie Shen, Tao Song, Jian Kunming University of Science and Technology Faculty of Information Engineering and Automation Yunnan Key Laboratory of Computer Technologies Application Kunming650500 China Kunming University of Science and Technology Faculty of Information Engineering and Automation Kunming Yunnan650500 China College of Mechanical and Electrical Engineering Yunnan Electromechanical Vocational and Technical College China
A Reinforcement Learning (RL)-based Image Mapping Topology (IMT) optimization approach is proposed. To enable RL to optimize antenna topology and increase the efficiency of the optimization process. Two crucial compon... 详细信息
来源: 评论
Linear-Nonlinear Feature Reconstruction Network for Emotion Recognition from Brain Functional Connectivity
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Fu, Baole Yu, Xiangkun Liu, Yinhua Qingdao University Institute for Future School of Automation Qingdao266071 China Qingdao University College of Computer Science & Technology Qingdao266071 China Qingdao University Institute for Future School of Automation Shandong Provincial Key Laboratory of Industrial Control Technology Qingdao266071 China
Electroencephalogram (EEG) records both static performance and dynamic changes in brain electrical activity, with linear and nonlinear features capable of modelling these static and dynamic aspects. However, tradition... 详细信息
来源: 评论
Linear Convergent Distributed Nash Equilibrium Seeking With Compression
收藏 引用
IEEE Transactions on Automatic Control 2025年 第5期70卷 3316-3323页
作者: Chen, Xiaomeng Wu, Yuchi Yi, Xinlei Huang, Minyi Shi, Ling Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Shanghai University School of Mechatronic Engineering and Automation Shanghai200444 China College of Electronics and Information Engineering Tongji University Department of Control Science and Engineering Shanghai201804 China Massachusetts Institute of Technology Lab for Information & Decision Systems CambridgeMA02139 United States Carleton University School of Mathematics and Statistics OttawaONK1S 5B6 Canada
Information compression techniques are majorly employed to reduce communication cost over peer-to-peer links. In this article, we investigate distributed Nash equilibrium (NE) seeking problems in a class of noncoopera... 详细信息
来源: 评论
fMRI2GES: Co-speech Gesture Reconstruction from fMRI Signal with Dual Brain Decoding Alignment
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Zhu, Chunzheng Shao, Jialin Lin, Jianxin Wang, Yijun Wang, Jing Tang, Jinhui Li, Kenli Hunan University College of Information Science and Engineering Changsha China Tsinghua University Department of Automation Beijing100084 China Nanjing University of Science and Technology School of Computer Science and Technology Nanjing210094 China
Understanding how the brain responds to external stimuli and decoding this process has been a significant challenge in neuroscience. While previous studies typically concentrated on brain-to-image and brain-to-languag... 详细信息
来源: 评论
Syn-Aug: An Effective and General Synchronous Data Augmentation Framework for 3D Object Detection
收藏 引用
CAAI Transactions on Intelligence technology 2025年
作者: Liu, Huaijin Du, Jixiang Zhang, Yong Zhang, Hongbo Zeng, Jiandian School of Artificial Intelligence Guangzhou Maritime University China and College of Mechanical Engineering and Automation Huaqiao University Xiamen China College of Computer Science and Technology Huaqiao University Xiamen China College of Mechanical Engineering and Automation Huaqiao University Xiamen China Institute of Artificial Intelligence and Future Networks Beijing Normal University Zhuhai China
Data augmentation plays an important role in boosting the performance of 3D models, while very few studies handle the 3D point cloud data with this technique. Global augmentation and cut-paste are commonly used augmen... 详细信息
来源: 评论
Multi-Fault Diagnosis, Quantitative Analysis and Warning Strategy for Lithium-ion Battery System: When LSTM Meets the Fuzzy Logic Theory
收藏 引用
IEEE Transactions on Transportation Electrification 2025年 第3期11卷 8224-8235页
作者: Chen, Hui Tian, Engang Wang, Licheng Zheng, Yuejiu University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Shanghai University of Electric Power College of Automation Engineering Shanghai200090 China University of Shanghai for Science and Technology College of Mechanical Engineering Shanghai200093 China
This paper is concerned with the multi-level secure warning problem for lithium-ion battery systems subject to multi-fault scenarios. First, the long short-term memory (LSTM) network is employed to design a series of ... 详细信息
来源: 评论
A study of advanced mathematical modeling and adaptive control strategies for trajectory tracking in the Mitsubishi RV-2AJ 5-DOF Robotic Arm
收藏 引用
Discover Robotics 2025年 第1期1卷 1-38页
作者: Ben Hazem, Zied Guler, Nivine Altaif, Ali Husain Automation and Sustainability Research Centre (ASRC) Department of Mechatronics Engineering College of Engineering (COE) University of Technology Bahrain Salmabad Kingdom of Bahrain Department of Computer Science University of Central Asia Naryn Kyrgyzstan
This study is focused on the advanced mathematical modeling and control strategies for a Mitsubishi RV-2AJ 5-DOF Robotic Arm, with an emphasis on achieving precision in trajectory tracking. Robotic trajectory tracking...
来源: 评论
Quantifying the Upper Limit of Backflash Attack in Quantum Key Distribution
arXiv
收藏 引用
arXiv 2025年
作者: Su, Jialei Liu, Junxuan Chen, Zihao Zhong, Mingyang Peng, Qingquan Ding, Jiangfang Wang, Yijun Huang, Anqi Guo, Ying School of Automation Central South University Changsha410083 China College of Computer Science and Technology National University of Defense Technology Changsha410073 China School of Computer Beijing University of Posts and Telecommunications Beijing100876 China
Quantum Key Distribution (QKD) theoretically provides information-theoretic security based on physical laws. However, imperfections in practice lead to the possibility of quantum hacking on the QKD implementation, esp... 详细信息
来源: 评论