咨询与建议

限定检索结果

文献类型

  • 2,256 篇 会议
  • 481 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 2,760 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,614 篇 工学
    • 1,097 篇 计算机科学与技术...
    • 919 篇 软件工程
    • 423 篇 控制科学与工程
    • 361 篇 信息与通信工程
    • 204 篇 电气工程
    • 159 篇 机械工程
    • 147 篇 电子科学与技术(可...
    • 136 篇 生物工程
    • 115 篇 动力工程及工程热...
    • 99 篇 生物医学工程(可授...
    • 78 篇 建筑学
    • 77 篇 安全科学与工程
    • 76 篇 仪器科学与技术
    • 74 篇 光学工程
    • 74 篇 交通运输工程
    • 63 篇 化学工程与技术
    • 61 篇 土木工程
  • 823 篇 理学
    • 454 篇 数学
    • 214 篇 物理学
    • 146 篇 统计学(可授理学、...
    • 140 篇 生物学
    • 140 篇 系统科学
    • 58 篇 化学
  • 447 篇 管理学
    • 319 篇 管理科学与工程(可...
    • 181 篇 工商管理
    • 156 篇 图书情报与档案管...
  • 116 篇 医学
    • 91 篇 临床医学
    • 75 篇 基础医学(可授医学...
  • 84 篇 法学
    • 73 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 56 篇 农学
  • 43 篇 教育学
  • 8 篇 军事学
  • 7 篇 文学

主题

  • 73 篇 accuracy
  • 64 篇 computational mo...
  • 63 篇 real-time system...
  • 55 篇 predictive model...
  • 51 篇 feature extracti...
  • 49 篇 training
  • 48 篇 machine learning
  • 46 篇 data mining
  • 46 篇 data models
  • 45 篇 deep learning
  • 44 篇 optimization
  • 37 篇 internet of thin...
  • 37 篇 technological in...
  • 36 篇 neural networks
  • 36 篇 monitoring
  • 35 篇 control systems
  • 33 篇 artificial intel...
  • 33 篇 testing
  • 32 篇 support vector m...
  • 31 篇 analytical model...

机构

  • 20 篇 lovely professio...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 16 篇 dept. of control...
  • 14 篇 dept. of compute...
  • 12 篇 graphic era deem...
  • 12 篇 dept. of compute...
  • 11 篇 graphic era hill...
  • 10 篇 dept. of control...
  • 9 篇 dept. of electro...
  • 9 篇 dept. of informa...
  • 8 篇 dept. of systems...
  • 8 篇 dept. of compute...
  • 8 篇 kalinga universi...
  • 8 篇 dept. of automat...
  • 8 篇 dept. of control...
  • 8 篇 dept. of softwar...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of softwar...
  • 8 篇 sapienza univers...

作者

  • 14 篇 lo hoi-kwong
  • 14 篇 yang chao-tung
  • 13 篇 reiner lisa
  • 13 篇 deepak upadhyay
  • 13 篇 chang chih-hung
  • 12 篇 upadhyay deepak
  • 12 篇 li kuan-ching
  • 12 篇 bavarian behzad
  • 10 篇 mridul gupta
  • 10 篇 lu chih-wei
  • 10 篇 chu william c.
  • 10 篇 enrico macii
  • 10 篇 he jianping
  • 10 篇 olaf stursberg
  • 9 篇 l. astolfi
  • 9 篇 upadhyay abhay
  • 9 篇 andrea acquaviva
  • 9 篇 abhay upadhyay
  • 9 篇 edoardo patti
  • 9 篇 krejcar ondrej

语言

  • 2,606 篇 英文
  • 123 篇 其他
  • 26 篇 中文
  • 3 篇 朝鲜文
  • 2 篇 日文
检索条件"机构=Dept. of Computer Control and Management Engineering"
2760 条 记 录,以下是711-720 订阅
排序:
On the Connection Between Magnetic-Field Odometry Aided Inertial Navigation and Magnetic-Field SLAM
On the Connection Between Magnetic-Field Odometry Aided Iner...
收藏 引用
IEEE Symposium on Position Location and Navigation (PLANS)
作者: Isaac Skog Manon Kok Gustaf Hendeby Chuan Huang Thomas Edridge School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden Delft Center for Systems and Control Delft University of Technology Delft The Netherlands Dept. of Electrical Engineering Linköping University Linköping Sweden
Magnetic-field simultaneous localization and mapping (SLAM) using consumer-grade inertial and magnetometer sensors offers a scalable, cost-effective solution for indoor localization. However, the rapid error accumulat... 详细信息
来源: 评论
Visualizing the Path of a Photo Taker from Image Metadata
Visualizing the Path of a Photo Taker from Image Metadata
收藏 引用
2023 4th International Informatics and Software engineering Conference (IISEC)
作者: Rasty Shakhawan Majid Cihan Varol Asaf Varol Ahad Nasab Department of Software Engineering Firat University Erbil Iraq Computer Science Department Sam Houston State University Huntsville TX USA Dept. of Engineering Management and Technology College of Engineering and Computer Science Chattanooga TN USA
One of the most challenging investigations in forensic analysis is the work conducted on smartphones. Specifically using smartphone data to provide evidence for a case is becoming a norm nowadays. Many Android device ...
来源: 评论
Evaluation of Deep Training and Adapting Algorithms in Medical with De-Noising EEG  3
Evaluation of Deep Training and Adapting Algorithms in Medic...
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Abdulwahid, Ali Hadi Karetla, Girija Rani Ganesh, K.V.B. Kumar, A Suresh Radha, K. Shivakumar, K. Southern Technical University Engineering Technical College Control and Automation Engineering Department Basra Iraq Western Sydney University School of Computer Data and Mathematical Sciences Australia Koneru Lakshmaiah Education Foundation KL Business School Guntur Andhra Pradesh India Graphic Era Deemed to Be University Department of CSE India St. Martin's Engineering College Dept. of IT Secunderabad Telangana India SR University School of Computer Science and Artificial Intelligence Warangal Telangana India
An electroencephalogram that was captured with electrodes placed can easily get contaminated with a variety of artifacts. Here is a comparative of various electroencephalogram (EEG) de-noising techniques. Three altern... 详细信息
来源: 评论
MDI-QKD with resource-efficient polarization compensation
MDI-QKD with resource-efficient polarization compensation
收藏 引用
2023 Optical Fiber Communications Conference and Exhibition, OFC 2023
作者: Bedroya, Olinka Li, Chenyang Wang, Wenyuan Hu, Jianyong Lo, Hoi-Kwong Qian, Li University of Toronto Centre for Quantum Information and Quantum Control Dept. of Physics TorontoONM5S 3G4 Canada University of Toronto Centre for Quantum Information and Quantum Control Dept. of Electrical & Computer Engineering TorontoONM5S 3G4 Canada University of Hong Kong Department of Physics Pokfulam Hong Kong 100 College St TorontoON1M5G 1L5 Canada
We implemented MDI-QKD with a novel polarization compensation scheme using discarded bits without reducing the key-sharing cycle or demanding additional resources. Polarization drift was maintained below 0.13 rad over... 详细信息
来源: 评论
Learning Goal-based Movement via Motivational-based Models in Cognitive Mobile Robots
arXiv
收藏 引用
arXiv 2023年
作者: Berto, Letícia Costa, Paula Simões, Alexandre Gudwin, Ricardo Colombini, Esther Laboratory of Robotics and Cognitive Systems Institute of Computing University of Campinas Brazil Dept. of Computer Engineering and Industrial Automation School of Electrical and Computer Engineering University of Campinas Brazil Dept. of Control and Automation Engineering Institute of Science and Technology São Paulo State University Sorocaba Brazil University of Campinas Brazil
Humans have needs motivating their behavior according to intensity and context. However, we also create preferences associated with each action’s perceived pleasure, which is susceptible to changes over time. This ma... 详细信息
来源: 评论
Advanced Machine Learning Techniques for Optimizing Renewable Energy Systems in Healthcare Facilities
Advanced Machine Learning Techniques for Optimizing Renewabl...
收藏 引用
Technological Advancements in Computational Sciences (ICTACS), International Conference on
作者: S. Pradeep Kalpana P G. Sreeram Amarja Adgaonkar Devika Rani Roy Arpit Namdev Dept. of CSE Malla Reddy Engineering College for Women (UGC Autonomous) Secunderabad Telangana India Dept. of Computer Science CHRIST University Bangalore Karnataka India Dept. of CSE Vignana Bharathi Institute of Technology Hyderabad Telangana India K.C. College of Engineering & Management Studies & Research Thane India Dept. of IT University Institute of Technology RGPV Bhopal MP India
Optimizing renewable energy systems in healthcare facilities via use of modern ML algorithms to improve energy efficiency along with sustainability is goal of this research. Integrating machine learning provides a pot... 详细信息
来源: 评论
Preserving Topology of Network Systems: Metric, Analysis, and Optimal Design
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yushan Wang, Zitong He, Jianping Chen, Cailian Guan, Xinping Dept. of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai China
Preserving the topology from being inferred by external adversaries has become a paramount security issue for network systems (NSs), and adding random noises to the nodal states provides a promising way. Nevertheless,... 详细信息
来源: 评论
CPT Manager: An Open Environment for Constrained Path-Based Testing  18
CPT Manager: An Open Environment for Constrained Path-Based ...
收藏 引用
18th IEEE International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2025
作者: Klima, Matej Bures, Miroslav Holotik, Daniel Herczeg, Maximilian Miltner, Marek Zanocco, Chad FEE Czech Technical University in Prague Dept. of Computer Science Prague Czech Republic Stanford University Civil and Environmental Engineering StanfordCA United States The Czech Technical University in Prague FEE Dept. of Economics Management and Humanities Prague Czech Republic
Path-based Testing is a common technique to test System Under Test (SUT) processes. Generally, a directed graph that models a system's workflow is input to the test path generation process, as well as the selected... 详细信息
来源: 评论
Feedforward control in the Presence of Input Nonlinearities: With Application to a Wirebonder
收藏 引用
IFAC-PapersOnLine 2023年 第2期56卷 1895-1900页
作者: Maurice Poot Jilles van Hulst Kai Wa Yan Dragan Kostić Jim Portegies Tom Oomen CST Dept. of Mechanical Engineering Eindhoven University of Technology Eindhoven The Netherlands Center of Competency ASMPT Beuningen The Netherlands CASA Dept. of Mathematics and Computer Science Eindhoven University of Technology Eindhoven The Netherlands Delft Center for Systems and Control Delft University of Technology Delft The Netherlands
The increasing demands on throughput and accuracy of semiconductor manufacturing equipment necessitates accurate feedforward motion control that includes compensation of input nonlinearities. The aim of this paper is ... 详细信息
来源: 评论
Optimal Linear Attack in Cyber-Physical Systems with Periodic Detection
Optimal Linear Attack in Cyber-Physical Systems with Periodi...
收藏 引用
IEEE Conference on Decision and control
作者: Jia Qi Chongrong Fang Jianping He Dept. of Automation Key Laboratory of System Control and Information Processing Shanghai Jiao Tong University Ministry of Education of China and Shanghai Engineering Research Center of Intelligent Control and Management Shanghai China
Security issues are of significant importance for cyber-physical systems (CPS), where the attack design is a major concern. Most related studies on attack design implicitly consider that the control period and detecti...
来源: 评论