咨询与建议

限定检索结果

文献类型

  • 1,067 篇 会议
  • 64 册 图书
  • 9 篇 期刊文献

馆藏范围

  • 1,140 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 707 篇 工学
    • 569 篇 计算机科学与技术...
    • 481 篇 软件工程
    • 135 篇 信息与通信工程
    • 132 篇 控制科学与工程
    • 99 篇 电气工程
    • 71 篇 生物工程
    • 64 篇 机械工程
    • 55 篇 动力工程及工程热...
    • 52 篇 电子科学与技术(可...
    • 45 篇 交通运输工程
    • 38 篇 生物医学工程(可授...
    • 31 篇 化学工程与技术
    • 25 篇 安全科学与工程
    • 23 篇 土木工程
    • 22 篇 光学工程
    • 22 篇 石油与天然气工程
  • 391 篇 理学
    • 277 篇 数学
    • 78 篇 生物学
    • 63 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 57 篇 系统科学
    • 32 篇 化学
  • 193 篇 管理学
    • 139 篇 管理科学与工程(可...
    • 80 篇 工商管理
    • 68 篇 图书情报与档案管...
  • 34 篇 经济学
    • 34 篇 应用经济学
  • 33 篇 教育学
    • 33 篇 教育学
  • 28 篇 法学
  • 26 篇 医学
    • 24 篇 基础医学(可授医学...
    • 24 篇 临床医学
    • 23 篇 药学(可授医学、理...
  • 13 篇 农学
  • 1 篇 艺术学

主题

  • 51 篇 software enginee...
  • 50 篇 programming
  • 47 篇 linear programmi...
  • 41 篇 software enginee...
  • 31 篇 dynamic programm...
  • 30 篇 artificial intel...
  • 24 篇 integer programm...
  • 23 篇 computer communi...
  • 23 篇 optimization
  • 21 篇 programming lang...
  • 19 篇 machine learning
  • 18 篇 logics and meani...
  • 18 篇 heuristic algori...
  • 17 篇 computer science
  • 16 篇 computational mo...
  • 16 篇 students
  • 16 篇 software
  • 15 篇 costs
  • 15 篇 programming tech...
  • 13 篇 object oriented ...

机构

  • 7 篇 college of energ...
  • 6 篇 school of electr...
  • 5 篇 college of elect...
  • 5 篇 school of scienc...
  • 5 篇 information engi...
  • 4 篇 school of comput...
  • 4 篇 school of vehicl...
  • 4 篇 china electric p...
  • 4 篇 school of cyber ...
  • 3 篇 school of electr...
  • 3 篇 school of electr...
  • 3 篇 school of transp...
  • 3 篇 department of co...
  • 3 篇 college of infor...
  • 3 篇 school of inform...
  • 3 篇 state key labora...
  • 3 篇 department of co...
  • 3 篇 nanjing universi...
  • 3 篇 shanghai maritim...
  • 3 篇 polytechnic inst...

作者

  • 4 篇 meikang qiu
  • 3 篇 wang hui
  • 3 篇 miller james
  • 3 篇 gong peizhu
  • 3 篇 wang junxiang
  • 3 篇 xigang yuan
  • 3 篇 batra salil
  • 3 篇 salil batra
  • 3 篇 mekruksavanich s...
  • 3 篇 jitpattanakul an...
  • 3 篇 liu jin
  • 3 篇 wu zhongdai
  • 3 篇 mengjie zhang
  • 2 篇 yin jianbing
  • 2 篇 heinz stefan
  • 2 篇 seniman
  • 2 篇 li cheng
  • 2 篇 saraswat sudhir
  • 2 篇 duo liu
  • 2 篇 cheng wang

语言

  • 1,116 篇 英文
  • 21 篇 其他
  • 5 篇 中文
检索条件"任意字段=7th International Conference on the Art, Science, and Engineering of Programming, Programming 2023"
1140 条 记 录,以下是921-930 订阅
排序:
Linear marks similarity matching algorithm based on laser detection signals
Linear marks similarity matching algorithm based on laser de...
收藏 引用
international conference on Modelling, Identification and Control (ICMIC)
作者: Nan Pan Jingshu Yang Zeguang Yi Yi Liu Faculty of Mechanical & Electrical Engineering Kunming University of Science and Technology Kunming Yunnan Province China Kunming SNLab Tech Co. Ltd. Xishan District Kunming Yunnan Province China
It's usually not easy to compare linear toolmarks quickly and quantitatively with the current image processing and three-dimensional scanning methods. In order to deal with these kinds of problems, a similarity ma... 详细信息
来源: 评论
A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID System  7th
A Hybrid Localization Algorithm Based on Carrier Phase Rangi...
收藏 引用
7th international conference on artificial Intelligence and Security, ICAIS 2021
作者: Tian, Zengshan Liu, Xixi Liu, Kaikai Xie, Liangbo School of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China
In this paper, we present a solution to locate the targets with tags in an ultrahigh-frequency (UHF) radio frequency identification (RFID) system, which achieves centimeter level localization accuracy. Many prior work... 详细信息
来源: 评论
Extending GENET for non-binary CSP's
Extending GENET for non-binary CSP's
收藏 引用
international conference on Tools for artificial Intelligence (ICTAI)
作者: J.H.M. Lee H.F. Leung H.W. Won Department of Computer Science and Engineering Chinese University of Hong Kong New Territories Hong Kong China
GENET has been shown to be efficient and effective on certain hard or large constraint satisfaction problems. Although GENET has been enhanced to handle also the atmost and illegal constraints in addition to binary co... 详细信息
来源: 评论
A knowledge-based approach to requirements analysis
A knowledge-based approach to requirements analysis
收藏 引用
international conference on Tools for artificial Intelligence (ICTAI)
作者: A. Liu J.J.P. Tsai Department of Electrical Engineering National Chung Cheng University Taiwan Department of Electrical Engineering and Computer Science University of Illinois Chicago Chicago IL USA
In software engineering, requirements analysis is a knowledge intensive task: and it requires an expert to understand what the clients need. We introduce a method which contains different AI techniques to perform this... 详细信息
来源: 评论
Switching Harmonic Attenuation of Grid-Tied Converters Using LLCL Filters and MPC-SVPWM
Switching Harmonic Attenuation of Grid-Tied Converters Using...
收藏 引用
China international Electrical and Energy conference (CIEEC)
作者: Muhamamd Waqas Qaisar Jingyang Fang Wenrui Li School of Control Science and Engineering Shandong University Jinan China
this paper introduces an enhancement in grid-tied converter technology by incorporating a Model Predictive Control (MPC)-based space vector pulse width modulation (SVPWM) along with an advanced $LLCL$ filter. this a... 详细信息
来源: 评论
Linear and Non-Linear Filter-based Counter-Forensics Against Image Splicing Detection  7th
Linear and Non-Linear Filter-based Counter-Forensics Against...
收藏 引用
7th international conference on Computer Vision and Image Processing, CVIP 2022
作者: Das, Debjit Bhunia, Banalata Naskar, Ruchira Chakraborty, Rajat Subhra Department of Information Technology Indian Institute of Engineering Science and Technology West Bengal Shibpur Howrah711103 India Vellore Institute of Technology Tamil Nadu Vellore India Department of Computer Science and Engineering Indian Institute of Technology Kharagpur West Bengal Kharagpur721302 India
Digital images are widely used as primary sources of evidence in today’s world, spanning security, forensics, and legal domains. However, image tampering poses a shallow technical skill barrier with the wide availabi... 详细信息
来源: 评论
Distributed Optimisation under a Weight-unbalanced Digraph
Distributed Optimisation under a Weight-unbalanced Digraph
收藏 引用
international conference on Autonomous Robots and Agents, ICARA
作者: Prateek Priyaranjan Pradhan Arijit Sen Mangal Kothari Ketan Rajawat Department of Aerospace Engineering Indian Institute of Technology Kanpur India Department of Electrical Engineering and Computer Science Indian Institute of Science Education and Research Bhopal India Department of Electrical Engineering Indian Institute of Technology Kanpur India
Distributed optimisation (DO) problems in application to networked multi-agent system (MAS) have been an intriguing topic for research among different research communities. Despite the substantial number of works in t... 详细信息
来源: 评论
A robust Carrier Frequency and Timing Offset Estimation in Inter-UAV OFDM Communication Links
A robust Carrier Frequency and Timing Offset Estimation in I...
收藏 引用
international Multi-Topic ICT conference (IMTIC)
作者: Farzana Kulsoom Iraj Fatima Hassan Nazeer Chaudhry Aneeqa Gul Adeel Akram Telecommunication Engineering Dpt. University of Engineering and Technology Taxila Pakistan Computer Science Dpt. Barani Institute of Technology Rawalpindi Pakistan
the UAV-mounted base station has been integrated into 5G and beyond to provide communication in an emergency when conventional systems fail due to some reason. Moreover, it is also used in coverage enhancement and for...
来源: 评论
T3SFNet: A Tuned Topological Temporal-Spatial Fusion Network for Motor Imagery with Rehabilitation Exoskeleton  7th
T3SFNet: A Tuned Topological Temporal-Spatial Fusion Network...
收藏 引用
7th international conference on Cognitive Systems and Information Processing, ICCSIP 2022
作者: Shi, Kecheng Mu, Fengjun Zou, Chaobin Qin, Yizhe Peng, Zhinan Huang, Rui Cheng, Hong Center for Robotics School of Automation Engineering University of Electronic Science and Technology of China Chengdu China School of Mechanical and Electrical Engineering University of Electronic Science and Technology of China Chengdu China
In recent years, motor imagery-based brain computer interfaces (MI-BCI) combined with exoskeleton robot has proved to be a promising method for spinal cord injury (SCI) rehabilitation training. the core of BCI is to a... 详细信息
来源: 评论
A Multi-Strategy Adversarial Attack Method for Deep Learning Based Malware Detectors
A Multi-Strategy Adversarial Attack Method for Deep Learning...
收藏 引用
Cryptography, Security and Privacy (CSP), IEEE international conference on
作者: Wang Yang Fan Yin School of Cyber Science and Engineering Southeast University Nanjing China
Deep learning allows building high-accuracy malware detectors without complicated feature engineering. However, research shows that the deep learning model is vulnerable and can be deceived if attackers add perturbati...
来源: 评论