咨询与建议

限定检索结果

文献类型

  • 104 篇 学位论文
  • 7 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 仪器科学与技术
    • 1 篇 电气工程
    • 1 篇 控制科学与工程
    • 1 篇 环境科学与工程(可...
  • 3 篇 管理学
    • 3 篇 工商管理
    • 2 篇 管理科学与工程(可...
  • 2 篇 理学
    • 1 篇 化学
    • 1 篇 天文学
    • 1 篇 大气科学
    • 1 篇 地球物理学
    • 1 篇 地质学
    • 1 篇 生物学
  • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 112 篇 artificial intel...
  • 25 篇 other computer s...
  • 17 篇 deep learning
  • 17 篇 computer science...
  • 16 篇 machine learning
  • 14 篇 information secu...
  • 12 篇 databases and in...
  • 6 篇 graphics and hum...
  • 5 篇 theory and algor...
  • 5 篇 computer vision
  • 4 篇 svm
  • 4 篇 neural networks
  • 4 篇 yolo
  • 3 篇 reinforcement le...
  • 3 篇 robotic competit...
  • 3 篇 software enginee...
  • 3 篇 natural language...
  • 3 篇 cnn
  • 3 篇 os and networks
  • 3 篇 bioinformatics

机构

  • 59 篇 san jose state u...
  • 24 篇 university of ma...
  • 2 篇 california polyt...
  • 2 篇 georgia southern...
  • 2 篇 new jersey insti...
  • 2 篇 university of co...
  • 1 篇 amity univ amity...
  • 1 篇 univ nottingham ...
  • 1 篇 western michigan...
  • 1 篇 department of co...
  • 1 篇 wayne state univ...
  • 1 篇 edith cowan univ...
  • 1 篇 univ groningen c...
  • 1 篇 autonomous intel...
  • 1 篇 department of re...
  • 1 篇 univ south pacif...
  • 1 篇 univ chile dept ...
  • 1 篇 university of ne...
  • 1 篇 natl univ sci & ...
  • 1 篇 faculty of envir...

作者

  • 1 篇 ha le thanh
  • 1 篇 ashraf saber
  • 1 篇 komei sugiura
  • 1 篇 niket bhodia
  • 1 篇 anish hemant nar...
  • 1 篇 samanvitha basol...
  • 1 篇 neha atul bhagwa...
  • 1 篇 jr anthony s bus...
  • 1 篇 nicholas a russo
  • 1 篇 preethi sundarav...
  • 1 篇 michael j. brice
  • 1 篇 takeshi takahash...
  • 1 篇 iocchi luca
  • 1 篇 siddharth kumar
  • 1 篇 afaq anam
  • 1 篇 liu yang
  • 1 篇 hurt jason lee
  • 1 篇 muthaiah ramanat...
  • 1 篇 natesh ganesh
  • 1 篇 mehtab iqbal

语言

  • 112 篇 英文
检索条件"主题词=artificial intelligence and robotics"
112 条 记 录,以下是81-90 订阅
排序:
A Study of Face Embedding in Face Recognition
A Study of Face Embedding in Face Recognition
收藏 引用
作者: Le, Khanh Duc California Polytechnic State University
学位级别:M.Sc., Master of Science
Face Recognition has been a long-standing topic in computer vision and pattern recognition field because of its wide and important applications in our daily lives such as surveillance system, access control, and so on... 详细信息
来源: 评论
Measuring Malware Evolution Using Support Vector Machines
Measuring Malware Evolution Using Support Vector Machines
收藏 引用
作者: Mayuri Wadkar San Jose State University
学位级别:硕士
Malware is software that is designed to do harm to computer systems. Malware often evolves over a period of time as malware developers add new features and fix bugs. Thus, malware samples from the same family from dif... 详细信息
来源: 评论
Influence Analysis Based On Political Twitter Data
Influence Analysis Based On Political Twitter Data
收藏 引用
作者: Jace Rose San Jose State University
学位级别:硕士
Studies of online behavior often consider how users interact online, their posting behaviors, what they are tweeting about, and how likely they are to follow other people. The problem is there is that no deeper study ... 详细信息
来源: 评论
Regression Tree Construction For Reinforcement Learning Problems With A General Action Space
Regression Tree Construction For Reinforcement Learning Prob...
收藏 引用
作者: Jr Anthony S Bush Georgia Southern University
学位级别:硕士
Part of the implementation of Reinforcement Learning is constructing a regression of values against states and actions and using that regression model to optimize over actions for a given state. One such common regres... 详细信息
来源: 评论
Javascript Metamorphic Malware Detection Using Machine Learning Techniques
Javascript Metamorphic Malware Detection Using Machine Learn...
收藏 引用
作者: Aakash Wadhwani San Jose State University
学位级别:硕士
Various factors like defects in the operating system, email attachments from unknown sources, downloading and installing a software from non-trusted sites make computers vulnerable to malware attacks. Current antiviru... 详细信息
来源: 评论
Topic Classification Using Hybrid Of Unsupervised And Supervised Learning
Topic Classification Using Hybrid Of Unsupervised And Superv...
收藏 引用
作者: Jayant Shelke San Jose State University
学位级别:硕士
There has been research around the idea of representing words in text as vectors and many models proposed that vary in performance as well as applications. Text processing is used for content recommendation, sentiment... 详细信息
来源: 评论
Differential Estimation Of Audiograms Using Gaussian Process Active Model Selection
Differential Estimation Of Audiograms Using Gaussian Process...
收藏 引用
作者: Trevor Larsen Washington University in St. Louis
学位级别:硕士
Classical methods for psychometric function estimation either require excessive resources to perform, as in the method of constants, or produce only a low resolution approximation of the target psychometric function, ... 详细信息
来源: 评论
Predictive Analysis For Cloud Infrastructure Metrics
Predictive Analysis For Cloud Infrastructure Metrics
收藏 引用
作者: Paridhi Agrawal San Jose State University
学位级别:硕士
In a cloud computing environment, enterprises have the flexibility to request resources according to their application demands. This elastic feature of cloud computing makes it an attractive option for enterprises to ... 详细信息
来源: 评论
Chatbots With Personality Using Deep Learning
Chatbots With Personality Using Deep Learning
收藏 引用
作者: Susmit Gaikwad San Jose State University
学位级别:硕士
Natural Language Processing (NLP) requires the computational modelling of the complex relationships of the syntax and semantics of a language. While traditional machine learning methods are used to solve NLP problems,... 详细信息
来源: 评论
Deep Learning For Image Spam Detection
Deep Learning For Image Spam Detection
收藏 引用
作者: Tazmina Sharmin San Jose State University
学位级别:硕士
Spam can be defined as unsolicited bulk email. In an effort to evade text-based spam filters, spammers can embed their spam text in an image, which is referred to as image spam. In this research, we consider the probl... 详细信息
来源: 评论