咨询与建议

限定检索结果

文献类型

  • 89,665 篇 会议
  • 601 册 图书
  • 329 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 90,596 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 38,633 篇 工学
    • 27,745 篇 计算机科学与技术...
    • 22,732 篇 软件工程
    • 9,339 篇 信息与通信工程
    • 8,491 篇 控制科学与工程
    • 6,080 篇 电气工程
    • 4,328 篇 电子科学与技术(可...
    • 3,749 篇 生物工程
    • 3,718 篇 机械工程
    • 2,744 篇 生物医学工程(可授...
    • 2,606 篇 动力工程及工程热...
    • 2,180 篇 仪器科学与技术
    • 1,898 篇 光学工程
    • 1,871 篇 交通运输工程
    • 1,658 篇 安全科学与工程
    • 1,385 篇 化学工程与技术
    • 1,049 篇 网络空间安全
  • 19,462 篇 理学
    • 12,609 篇 数学
    • 4,025 篇 生物学
    • 3,749 篇 系统科学
    • 3,708 篇 物理学
    • 3,476 篇 统计学(可授理学、...
    • 1,390 篇 化学
  • 10,678 篇 管理学
    • 7,071 篇 管理科学与工程(可...
    • 4,292 篇 图书情报与档案管...
    • 3,435 篇 工商管理
  • 2,345 篇 医学
    • 2,048 篇 临床医学
    • 1,995 篇 基础医学(可授医学...
    • 1,266 篇 药学(可授医学、理...
  • 1,359 篇 法学
    • 1,190 篇 社会学
  • 1,202 篇 经济学
    • 1,199 篇 应用经济学
  • 826 篇 农学
  • 329 篇 教育学
  • 220 篇 文学
  • 194 篇 军事学
  • 48 篇 艺术学
  • 1 篇 哲学

主题

  • 6,056 篇 genetic algorith...
  • 5,213 篇 heuristic algori...
  • 4,668 篇 real-time system...
  • 4,514 篇 accuracy
  • 4,272 篇 algorithm design...
  • 3,878 篇 clustering algor...
  • 3,564 篇 machine learning...
  • 3,480 篇 prediction algor...
  • 3,275 篇 optimization
  • 3,089 篇 feature extracti...
  • 2,936 篇 signal processin...
  • 2,863 篇 computational mo...
  • 2,718 篇 training
  • 2,542 篇 control systems
  • 2,521 篇 predictive model...
  • 2,514 篇 classification a...
  • 2,367 篇 machine learning
  • 2,265 篇 neural networks
  • 2,229 篇 support vector m...
  • 2,135 篇 hardware

机构

  • 189 篇 chitkara univers...
  • 104 篇 school of automa...
  • 99 篇 school of electr...
  • 85 篇 lovely professio...
  • 78 篇 school of comput...
  • 74 篇 centre of resear...
  • 67 篇 school of comput...
  • 48 篇 department of co...
  • 47 篇 department of co...
  • 47 篇 national mobile ...
  • 41 篇 chitkara univers...
  • 38 篇 department of la...
  • 37 篇 school of comput...
  • 35 篇 karnataka bangal...
  • 34 篇 college of compu...
  • 33 篇 school of comput...
  • 33 篇 school of electr...
  • 32 篇 harbin engineeri...
  • 32 篇 school of inform...
  • 31 篇 department of co...

作者

  • 38 篇 jun wang
  • 36 篇 lei wang
  • 34 篇 jian wang
  • 30 篇 hisao ishibuchi
  • 29 篇 li yang
  • 27 篇 khalgui mohamed
  • 26 篇 yu wang
  • 25 篇 hui wang
  • 24 篇 li peng
  • 23 篇 wang jing
  • 22 篇 jun zhang
  • 21 篇 zhang tao
  • 20 篇 rui wang
  • 20 篇 wang lei
  • 19 篇 bin wang
  • 18 篇 zhang lei
  • 17 篇 j. relin francis...
  • 17 篇 amandeep nagpal
  • 17 篇 yang liu
  • 16 篇 xi chen

语言

  • 81,706 篇 英文
  • 8,453 篇 其他
  • 574 篇 中文
  • 7 篇 俄文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 土耳其文
  • 1 篇 乌克兰文
检索条件"任意字段=International Conference on Engineering of Reconfigurable Systems and Algorithms"
90597 条 记 录,以下是351-360 订阅
排序:
Unsupervised Vehicle Re-Identification with Clustering and Appearance Style Exploration  24
Unsupervised Vehicle Re-Identification with Clustering and A...
收藏 引用
3rd international conference on algorithms, Data Mining, and Information Technology, ADMIT 2024
作者: Taleb, Hamdan Zhu, Xiaobo Wang, Chao College of Electronic and Information Engineering Tongji University Shanghai China School of Informatics and Engineering Suzhou University Jiangsu Suzhou China
Vehicle re-identification (Re-ID) has emerged as a critical challenge in the fields of computer vision and intelligent transportation systems, driven by the need to accurately identify vehicles across multiple camera ... 详细信息
来源: 评论
Recognition of Human Anomalies Using Convolution Neural Network
Recognition of Human Anomalies Using Convolution Neural Netw...
收藏 引用
2024 international conference on Advances in Data engineering and Intelligent Computing systems, ADICS 2024
作者: Parella, Teja Ponnam, Balakrishna Santhiya, P. Praveen, A. Sujihelen, L. Sathyabama Institute Of Science And Technology Dept. Of Computer Science And Engineering Tamilnadu Chennai600119 India
By instantly identifying suspicious occurrences, people, and things, smart CCTV systems greatly improve monitoring capacities. In this research, we investigate how to enhance CCTV video stream anomaly detection using ... 详细信息
来源: 评论
A ROS-2 based Path Planning and Maze Solving of Autonomous Robots
A ROS-2 based Path Planning and Maze Solving of Autonomous R...
收藏 引用
2024 international conference on Advances in Computing, Communication, Electrical, and Smart systems, iCACCESS 2024
作者: Nuhel, Ahsan Kabir Hossain, Sazzad Hassan, Md.Tonim Haider, Iftekhar Saha, Ankur Taha, Adnan Sabith Ony, Asma-UI Husna Electrical and Electronics Engineering Bangladesh University of Hertfordshire Computer Networks and Systems Security United Kingdom Electrical and Electronics Engineering Bangladesh Computer Science and Engineering Bangladesh University of Information Technology and Sciences Computer Science and Engineering Bangladesh
The goal of this study is to build a self-driving robot that can effectively navigate mazes by utilizing sophisticated computer vision algorithms with ROS2. Fusion 360 is used to create the robot model, and ROS2 launc... 详细信息
来源: 评论
Iterative computing algorithms implemented in FPGA using ALTERA_CORDIC library as an example  28th
Iterative computing algorithms implemented in FPGA using ALT...
收藏 引用
28th international conference on Knowledge Based and Intelligent information and engineering systems, KES 2024
作者: Poczekajlo, Pawel Koszalin University of Technology ul Sniadeckich 2 Koszalin75-453 Poland
The article discusses the general issues of implementing pipelined and iterative algorithms. These are typical solutions for engineering algorithms implemented in hardware like reprogrammable systems. The authors focu... 详细信息
来源: 评论
The Optimal Preventive Maintenance Strategy for Balanced systems Considering Energy-Saving  7
The Optimal Preventive Maintenance Strategy for Balanced Sys...
收藏 引用
7th international conference on Advanced algorithms and Control engineering, ICAACE 2024
作者: Lin, Mengmeng Meng, Yinghao Xu, Zihao Yin, Zhen Wenzhou University Department Of Industrial Engineering Zhejiang Wenzhou China
Reliability research of the balanced system has become a key factor in the safe completion of important tasks for complex systems. In recent years, due to the proposal of carbon peak and carbon neutrality targets, the... 详细信息
来源: 评论
Deep Learning: An In-Depth Study of algorithms and Application Areas
Deep Learning: An In-Depth Study of Algorithms and Applicati...
收藏 引用
2024 international conference on Communication, Computer Sciences and engineering, IC3SE 2024
作者: Agnihotri, Nishant Hole, Komal Lovely Professional University Department Of Computer Science And Engineering Punjab India
Deep learning, an innovative paradigm within artificial intelligence, brings about significant transformations across diverse sectors, ranging from healthcare to autonomous systems. This work explores the latest devel... 详细信息
来源: 评论
Improving Alerting in the Monitoring System Using Machine Learning algorithms  17
Improving Alerting in the Monitoring System Using Machine Le...
收藏 引用
17th IEEE international conference on Advanced Trends in Radioelectronics, Telecommunications and Computer engineering, TCSET 2024
作者: Klymash, Mykhailo Zablotskyi, Serhii Pohranychnyi, Vasyl Institute of Telecommunications Radioelectronics and Electronic Engineering Lviv Polytechnic National University Lviv Ukraine
The paper discusses the methods for building monitoring systems. It analyses standard methods for detecting and responding with alert systems based on given values of time series metrics. A method for improving the al... 详细信息
来源: 评论
Optimization of Data Encryption algorithms in Information Construction
Optimization of Data Encryption Algorithms in Information Co...
收藏 引用
2024 international conference on Distributed systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Zhu, Shuai You, Yi Zhou, Bo Chen, Chuanting Yi, Xueqin Hankou University Network Information Center Wuhan China Hankou University School of Computer Science and Technology Wuhan China Wuhan University of Engineering Science Library and Information Center Wuhan China Hankou University School of Music Wuhan China Hankou University Board Office Wuhan China
Data encryption algorithms play a crucial role in information construction, effectively protecting data security. The problems in traditional research include a lack of targeting, a balance between efficiency and safe... 详细信息
来源: 评论
Optimizing Fraud Detection with XGBoost and CatBoost for Social Media Profiles and Payment systems  3
Optimizing Fraud Detection with XGBoost and CatBoost for Soc...
收藏 引用
3rd international conference on Electronics and Renewable systems, ICEARS 2025
作者: Asha, V. Nithya, B. Prasad, Arpana Kumari, Monika Hujaifa, Mirza Sharma, Akash New Horizon College of Engineering Department of Mca Bengaluru India
This study assesses advanced machine learning algorithms, namely XGboost and Gradient Boosting Machine (GBM), for fraud detection in social media profiles and payment systems. It focuses on two very different types of... 详细信息
来源: 评论
Deep Learning Based Optimization of UAV Orbital Paths  6
Deep Learning Based Optimization of UAV Orbital Paths
收藏 引用
6th IEEE international conference on Power, Intelligent Computing and systems, ICPICS 2024
作者: Li, Zhanghan Chen, Yuandian School of Automation Guangdong University of Technology Guangzhou510006 China School of Physics and Optoelectronic Engineering Guangdong University of Technology Guangzhou510006 China
UAV path planning is an important part of UAV technology, and genetic algorithms and ant colony algorithms are used for it in UAV path planning tasks. When facing some unknown environments, the performance of classica... 详细信息
来源: 评论