咨询与建议

限定检索结果

文献类型

  • 462 篇 会议
  • 17 册 图书
  • 9 篇 期刊文献

馆藏范围

  • 488 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 205 篇 工学
    • 151 篇 计算机科学与技术...
    • 57 篇 电气工程
    • 52 篇 信息与通信工程
    • 51 篇 软件工程
    • 17 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 8 篇 机械工程
    • 6 篇 动力工程及工程热...
    • 5 篇 仪器科学与技术
    • 4 篇 光学工程
    • 4 篇 测绘科学与技术
    • 4 篇 生物工程
    • 3 篇 化学工程与技术
    • 2 篇 土木工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
  • 72 篇 理学
    • 53 篇 数学
    • 13 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 8 篇 系统科学
    • 6 篇 生物学
    • 2 篇 化学
    • 2 篇 地球物理学
  • 17 篇 管理学
    • 9 篇 图书情报与档案管...
    • 7 篇 管理科学与工程(可...
    • 5 篇 工商管理
  • 6 篇 医学
    • 6 篇 临床医学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学

主题

  • 109 篇 complexity theor...
  • 100 篇 computational co...
  • 33 篇 time complexity
  • 28 篇 algorithm design...
  • 25 篇 computational mo...
  • 23 篇 heuristic algori...
  • 22 篇 prediction algor...
  • 22 篇 accuracy
  • 19 篇 feature extracti...
  • 18 篇 classification a...
  • 18 篇 clustering algor...
  • 18 篇 partitioning alg...
  • 17 篇 encoding
  • 16 篇 approximation al...
  • 15 篇 optimization
  • 15 篇 signal processin...
  • 14 篇 decoding
  • 14 篇 genetic algorith...
  • 14 篇 algorithm analys...
  • 12 篇 detectors

机构

  • 4 篇 university of pi...
  • 3 篇 inria rennes
  • 2 篇 vienna universit...
  • 2 篇 school of comput...
  • 2 篇 computer network...
  • 2 篇 tu münchen garch...
  • 2 篇 computer science...
  • 2 篇 faculty of engin...
  • 2 篇 isislab - dipart...
  • 2 篇 key laboratory o...
  • 2 篇 tennessee tech u...
  • 2 篇 rwth aachen univ...
  • 2 篇 department of co...
  • 2 篇 universitat poli...
  • 2 篇 vilnius universi...
  • 2 篇 cracs/inesc-tec ...
  • 2 篇 beihang universi...
  • 2 篇 tech univ munich...
  • 2 篇 tu dortmund info...
  • 2 篇 universidad carl...

作者

  • 4 篇 dell'orletta fel...
  • 3 篇 liu yang
  • 3 篇 tingting yang
  • 3 篇 carlos a. coello...
  • 2 篇 ming li
  • 2 篇 yuhui shi
  • 2 篇 michael alexande...
  • 2 篇 holzapfel klaus
  • 2 篇 zhiyang li
  • 2 篇 roberto g. casce...
  • 2 篇 bollig beate
  • 2 篇 geyong min
  • 2 篇 zorzi michele
  • 2 篇 wanlei zhou
  • 2 篇 ali hamzeh
  • 2 篇 strada roberto
  • 2 篇 alexandru costan
  • 2 篇 luís lopes
  • 2 篇 brunato dominiqu...
  • 2 篇 emmanuel jeannot

语言

  • 484 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"任意字段=5th Italian Conference on Algorithms and Complexity"
488 条 记 录,以下是71-80 订阅
排序:
Fire and Smoke Detection Method in Diverse Scenarios Based on YOLOv8-FD
Fire and Smoke Detection Method in Diverse Scenarios Based o...
收藏 引用
Artificial Intelligence and Computer Engineering (ICAICE), International conference on
作者: Ziyu Wei Xiaoya Liu Yaru Qiu Yuanyuan Sun School of Data Science Qingdao University of Science and Technology Qingdao China
Targeting the challenges of insufficient accuracy, missed detections, false detections, and single scene in existing fire smoke detection, an enhanced YOLOv8 fire smoke detection method is suggested in diversified sce... 详细信息
来源: 评论
Alleviating the Naive Bayes Assumption using Filter Approaches
Alleviating the Naive Bayes Assumption using Filter Approach...
收藏 引用
International conference on Smart Systems and Inventive Technology (ICSSIT)
作者: R. Siva Subramanian P. Girija K. Sudha J. Aswini S. SivaKumar N. V. S. Nattesan Dept of CSE S.A.Engineering College Dept of CSBS R.M.D Engineering College Dept of AI & ML Saveetha Engineering College Autonomous Affiflated to Anna University
Particularly compared to other machine learning algorithms, the Naive Bayes algorithm is notable for its widespread application in a wide range of classification problems despite its seeming simplicity. However, the c... 详细信息
来源: 评论
Classification and Analysis of Distributed Denial of Service Attacks using Machine Learning Techniques
Classification and Analysis of Distributed Denial of Service...
收藏 引用
Advances in Science and Technology (ICAST), International conference on
作者: P.S. Nandhini S. Kuppuswami C. Abinaya R.B. Boomika N. Deepthi Department of CSE Kongu Engineering college Erode Department of CSE VCEW Namakkal India Department of CSE KEC Erode India
According to the recent statistics, DDoS attacks are responsible for the majority of overall network attacks. A distributed denial of service attack, sometimes known as a DDoS attack will destroy the server system res... 详细信息
来源: 评论
Detection of S700K Switch Machine Positions Based on an Improved SSD Model
Detection of S700K Switch Machine Positions Based on an Impr...
收藏 引用
Artificial Intelligence and Electromechanical Automation (AIEA), International conference on
作者: Rui Zhu Chun Li School of Railway Transportation Shanghai Institute of Technology Shanghai China
the current method of detecting the locating position and reverse position of the S700K switch machine is susceptible to human operation error. therefore, image-based object detection technology has become a solution.... 详细信息
来源: 评论
CfRNet: A Lightweight Convolutional Neural Network Classification Model for Rock Image
CfRNet: A Lightweight Convolutional Neural Network Classific...
收藏 引用
International conference on Computer Engineering and Applications (ICCEA)
作者: Liuyi Tao Xiaochuan Li Jiaqi Li Jinyi Wang College of Computer and Network Security Chengdu University of Technology Chengdu China
In the realm of geological research, the precise identification and classification of lithological formations stand as pivotal elements for comprehensive analysis and interpretation of geological structures. this is p... 详细信息
来源: 评论
Spatially Variant based on Patch Division for Digital Pill Analysis Using Prototype Model
Spatially Variant based on Patch Division for Digital Pill A...
收藏 引用
Smart Electronics and Communication (ICOSEC), International conference on
作者: R.K. Nehaa N. Bharathiraja Daniel Joseph Samuel T Deepa S. Hariprasad Biomedical Engineering department Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Avadi Tiruvallur India Department of Electronics and Communication Engineering SRM Institute of Science and Technology Kattankulathur Chennai India Polenza Tech Solutions Chennai India
the introduction of digital pills equipped with advanced multichannel sensors signifies revolutionary progress in remote healthcare monitoring. this study introduces a model of a smart pill that combines a valproate s... 详细信息
来源: 评论
Data-driven Based Technique for Joint Power Allocation and User Pairing in NOMA System  9
Data-driven Based Technique for Joint Power Allocation and U...
收藏 引用
9th International Japan-Africa conference on Electronics, Communications, and Computations, JAC-ECC 2021
作者: Mohamed, Donia Magdy, Ahmed Elghandour, Osama Nasser, Ahmed Higher Institute of Engineering and Technology 5th Settlement University Department of Electronics and Communication Egypt Suez Canal University Faculty of Engineering Department of Electronics and Communication Egypt Helwan University Faculty of Engineering Department of Electronics and Communication Egypt
As one of the proposed multiple access techniques of the fifth-generation and beyond systems, NOMA, which stands for non-orthogonal multiple access. NOMA is a power domain access technique, which ensures better spectr... 详细信息
来源: 评论
the Role of AI in Software Test Automation
The Role of AI in Software Test Automation
收藏 引用
Advanced Research in Computing (ICARC), International conference on
作者: R.M.S. Ranapana W.M. J. I. Wijayanayake Department of Industrial Management University of Kelaniya Sri Lanka
Artificial Intelligence (AI) has emerged as a transformative force in software test automation, significantly enhancing the efficiency, accuracy, and reliability of testing processes. this research will investigates t... 详细信息
来源: 评论
A Hybrid Deep-learning/Fingerprinting for Indoor Positioning Based on IEEE P802.11az
A Hybrid Deep-learning/Fingerprinting for Indoor Positioning...
收藏 引用
International conference on Communications, Signal Processing, and their Applications (ICCSPA)
作者: Nader. G. Rihan Mahmoud Abdelaziz Samy S. Soliman University of Science and Technology Zewail City of Science Technology and Innovation Giza Egypt Electronics and Electrical Communications Engineering Department Faculty of Engineering Cairo University Giza Egypt
Many different technologies were proposed in the past few years for enhancing indoor positioning: WiFi, Radio Frequency Identification (RFID), Ultra Wide Band (UWB), and Bluetooth to mention some. this study followed ... 详细信息
来源: 评论
Towards Highly-Efficient k-Nearest Neighbor Algorithm for Big Data Classification
Towards Highly-Efficient k-Nearest Neighbor Algorithm for Bi...
收藏 引用
Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS), International conference on
作者: Hassan I. Abdalla Ali A. Amer College of Technological Innovation Zayed University Abu Dhabi U.A.E Computer Science Department TAIZ University TAIZ Yemen
the k-nearest neighbors (kNN) algorithm is naturally used to search for the nearest neighbors of a test point in a feature space. A large number of works have been developed in the literature to accelerate the speed o... 详细信息
来源: 评论