咨询与建议

限定检索结果

文献类型

  • 1,121 篇 会议
  • 64 册 图书
  • 12 篇 期刊文献

馆藏范围

  • 1,197 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 756 篇 工学
    • 580 篇 计算机科学与技术...
    • 502 篇 软件工程
    • 114 篇 信息与通信工程
    • 112 篇 控制科学与工程
    • 107 篇 电气工程
    • 67 篇 动力工程及工程热...
    • 67 篇 电子科学与技术(可...
    • 62 篇 生物工程
    • 58 篇 机械工程
    • 43 篇 生物医学工程(可授...
    • 36 篇 交通运输工程
    • 31 篇 化学工程与技术
    • 25 篇 光学工程
    • 25 篇 土木工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 建筑学
    • 22 篇 冶金工程
  • 410 篇 理学
    • 297 篇 数学
    • 71 篇 生物学
    • 63 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 54 篇 系统科学
    • 26 篇 化学
  • 205 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 97 篇 工商管理
    • 69 篇 图书情报与档案管...
  • 49 篇 教育学
    • 48 篇 教育学
  • 46 篇 经济学
    • 45 篇 应用经济学
  • 31 篇 医学
    • 30 篇 基础医学(可授医学...
    • 30 篇 临床医学
  • 24 篇 法学
  • 11 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 programming
  • 67 篇 linear programmi...
  • 58 篇 software enginee...
  • 35 篇 software enginee...
  • 33 篇 artificial intel...
  • 30 篇 costs
  • 27 篇 optimization
  • 27 篇 dynamic programm...
  • 23 篇 computer communi...
  • 23 篇 software
  • 23 篇 heuristic algori...
  • 19 篇 programming tech...
  • 18 篇 genetic programm...
  • 18 篇 information syst...
  • 18 篇 students
  • 17 篇 computer science
  • 17 篇 computational mo...
  • 17 篇 real-time system...
  • 17 篇 training
  • 16 篇 parallel program...

机构

  • 5 篇 school of engine...
  • 4 篇 department of co...
  • 4 篇 department of me...
  • 4 篇 school of north ...
  • 4 篇 school of comput...
  • 3 篇 school of automa...
  • 3 篇 sathyabama insti...
  • 3 篇 school of cyber ...
  • 3 篇 harbin engineeri...
  • 3 篇 shenzhen interna...
  • 3 篇 college of infor...
  • 3 篇 school of inform...
  • 3 篇 school of comput...
  • 3 篇 southeast univer...
  • 3 篇 chitkara univers...
  • 3 篇 department of el...
  • 3 篇 tsinghua univers...
  • 3 篇 college of elect...
  • 3 篇 school of comput...
  • 3 篇 college of energ...

作者

  • 6 篇 chen chen
  • 4 篇 liu bo
  • 4 篇 wang ting
  • 4 篇 zhang hao
  • 4 篇 beck j. christop...
  • 3 篇 xu yan
  • 3 篇 li bing
  • 3 篇 chen hao
  • 3 篇 han hongtao
  • 3 篇 zhang renyuan
  • 3 篇 raffaela mirando...
  • 3 篇 wu zhi
  • 3 篇 m. m. a. hashem
  • 2 篇 jiawu fan
  • 2 篇 bin wang
  • 2 篇 zhang tao
  • 2 篇 heinz stefan
  • 2 篇 liu hongbo
  • 2 篇 tianxing yan
  • 2 篇 sözer hasan

语言

  • 1,172 篇 英文
  • 23 篇 其他
  • 3 篇 中文
检索条件"任意字段=5th International Conference on the Art, Science, and Engineering of Programming, Programming 2021"
1197 条 记 录,以下是1091-1100 订阅
排序:
A Deep CNN based Kaggle Contest Winning Model to Recognize Real-Time Facial Expression
A Deep CNN based Kaggle Contest Winning Model to Recognize R...
收藏 引用
international conference on Electrical engineering and Information & Communication Technology (ICEEICT)
作者: Aziza Sultana Samrat Kumar Dey Md. Armanur Rahman Dhaka International University Dhaka Bangladesh School of Science and Technology Bangladesh Open University Gazipur Bangladesh Faculty of Engineering and Technology Multimedia University Melaka Malaysia
In face-to-face interactions, facial expressions convey nonverbal details. Since the early 1990s, researchers have been increasingly interested in automatic facial expression recognition, which is critical in human-ma... 详细信息
来源: 评论
A design for high voltage DC power supply
A design for high voltage DC power supply
收藏 引用
international conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT)
作者: Jianye Liu Zhaowen Dong Department of Electrical Engineering Hebei University of Science and Technology Shijiazhuang China
A novel DC high voltage power supply is presented. the device takes 220V AC as input, through the AC input-rectifier-inverter boost-doubler rectifier to get DC high voltage. the device obtains about 300V DC voltage th... 详细信息
来源: 评论
Analysis of Key loggers in Cybersecurity
Analysis of Key loggers in Cybersecurity
收藏 引用
Advances in Computing, Communication Control and Networking (ICAC3N), international conference on
作者: Varsha Kumari Shubham Gupta Shrishti Kumari Avneesh Kumar School of Computer Science and Engineering (SCSE) Galgotia University at Greater Noida Gautam Buddh Nagar India
the project referred to as “Key Logger System” involves the process of recording keystrokes on a keyboard, often surreptitiously, without the knowledge of the user. this process is known as keystroke logging, also r... 详细信息
来源: 评论
Cutting bamboo down to size  10
Cutting bamboo down to size
收藏 引用
10th international conference on Fun with Algorithms, FUN 2021
作者: Bilò, Davide Gualà, Luciano Leucci, Stefano Proietti, Guido Scornavacca, Giacomo Department of Humanities and Social Sciences University of Sassari Italy Department of Enterprise Engineering University of Rome "Tor Vergata" Italy Department of Information Engineering Computer Science and Mathematics University of L'Aquila Italy Rome Italy
this paper studies the problem of programming a robotic panda gardener to keep a bamboo garden from obstructing the view of the lake by your house. the garden consists of n bamboo stalks with known daily growth rates ... 详细信息
来源: 评论
the design of a software-defined PC interface for mechatronic applications
The design of a software-defined PC interface for mechatroni...
收藏 引用
international conference on Autonomous Robots and Agents, ICARA
作者: Tony S. Cimino Dale A. Carnegie School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand
All mobile robots of reasonable complexity require a diverse range of sensors to gather data from their surroundings, and actuators for locomotion or other specialised applications. A PCs powerful processor is often u... 详细信息
来源: 评论
SCAREX: A framework for scalable, reliable, and extendable cluster computing
SCAREX: A framework for scalable, reliable, and extendable c...
收藏 引用
international conference on Computer sciences and Convergence Information Technology (ICCIT)
作者: Mino Ku Dugki Min Eunmi Choi School of School of Computer Science and Engineering Konkuk University Seoul South Korea School of Business IT Konkuk University Seoul South Korea
Cluster computing has been widely used in various fields from academics to industry because of its technical advantages. Recently, cloud computing become more attractive, as cluster computing is one of the core baseme... 详细信息
来源: 评论
A Novel Linear programming Optimization Coverage Scheme Based on Probability model
A Novel Linear Programming Optimization Coverage Scheme Base...
收藏 引用
2017 5th international conference on Mechatronics,Materials,Chemistry and Computer engineering(ICMMCCE 2017)
作者: Ya-ning Yan Jing Li ZTE Telecommunications College Xi'an Peihua University
In this paper, we present an optimized coverage algorithm based on dynamic parameter *** the definition of dynamic parameter coverage model, the expected value and tolerance of the coverage of the sensor nodes and the... 详细信息
来源: 评论
Hyaline: A Transparent Distributed Computing Framework for CUDA
Hyaline: A Transparent Distributed Computing Framework for C...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Akshat Jain Owais Kazi Raviraj Joshi Shraddha Basantwani Yogita Bang Rahul Khengare Computer Engineering PICT Pune Computer Science IIT Madras
the GPU usually handles the homogenous data parallel work, by taking advantage of its massive number of cores. In most of the applications, we use CUDA programming for utilizing the power of GPU. In data intensive hig... 详细信息
来源: 评论
the Empirical Analysis of artificial Intelligence Approaches for Enhancing the Cyber Security for Better Quality
The Empirical Analysis of Artificial Intelligence Approaches...
收藏 引用
international conference on Contemporary Computing and Informatics (IC3I)
作者: Bhupender Singh Rawat Durgaprasad Gangodkar Veera Talukdar Komal Saxena Chamandeep Kaur Suryabhan Pratap Singh COER University Roorkee Uttarakhand Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India The Assam Kaziranga University Jorhat Assam India Amity institute of Information Technology Amity University Uttar Pradesh Noida Department of CS & IT Jazan University Saudi Arabia Department of Information Technology Institute of Engineering and Technology Deen Dayal UpadhyayaGorakhpur University Gorakhpur India
In the world of information technology, cyber security is crucial. In this technological age, when information is the primary resource for every firm to preserve and produce results in accordance with requirements, se... 详细信息
来源: 评论
Machine Learning Approach for Mitigating Security threats in IoT Environment
Machine Learning Approach for Mitigating Security Threats in...
收藏 引用
international conference on Inventive Research in Computing Applications (ICIRCA)
作者: Harnit Saini Saroj Bala S.Jhansi Ida K. Suresh Kumar Shankerpally Swetha Divyabarathi P Department of CSE Ajay Kumar Garg Engineering College Ghaziabad Department of MCA Ajay Kumar Garg Engineering College Ghaziabad Department of Computer Science and Business Systems R.M.K Engineering College Kavaraipettai Department of CSE Kongu Engineering College Erode Department of Information Technology CVR College of Engineering Telangana Department of Artificial Intelligence and Data Science Bannari Amman Institute of Technology Erode
In today's world, a huge amount of data and information is transferred through wireless networks. the Internet of things (IoT) is a complex network that consists of diverse sensors, devices, and things, which ofte...
来源: 评论