咨询与建议

限定检索结果

文献类型

  • 325 篇 会议
  • 64 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 243 篇 工学
    • 163 篇 计算机科学与技术...
    • 136 篇 软件工程
    • 54 篇 信息与通信工程
    • 44 篇 控制科学与工程
    • 31 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 17 篇 化学工程与技术
    • 17 篇 生物工程
    • 15 篇 光学工程
    • 12 篇 仪器科学与技术
    • 11 篇 材料科学与工程(可...
    • 10 篇 交通运输工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 动力工程及工程热...
    • 9 篇 生物医学工程(可授...
    • 7 篇 环境科学与工程(可...
    • 7 篇 安全科学与工程
  • 130 篇 理学
    • 68 篇 数学
    • 38 篇 物理学
    • 18 篇 生物学
    • 17 篇 系统科学
    • 17 篇 统计学(可授理学、...
    • 15 篇 化学
  • 80 篇 管理学
    • 51 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 7 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 6 篇 教育学
  • 4 篇 法学
  • 4 篇 农学
  • 1 篇 文学

主题

  • 13 篇 feature extracti...
  • 12 篇 accuracy
  • 11 篇 internet of thin...
  • 10 篇 computational mo...
  • 10 篇 training
  • 8 篇 computer archite...
  • 7 篇 technological in...
  • 6 篇 computer science
  • 6 篇 educational inst...
  • 6 篇 genetic algorith...
  • 6 篇 software
  • 6 篇 data models
  • 5 篇 delays
  • 5 篇 cameras
  • 5 篇 data mining
  • 5 篇 wireless sensor ...
  • 5 篇 predictive model...
  • 5 篇 real-time system...
  • 5 篇 machine learning
  • 5 篇 correlation

机构

  • 8 篇 dep. of mathemat...
  • 7 篇 dep. of electric...
  • 6 篇 department of co...
  • 5 篇 advanced researc...
  • 4 篇 dep. of computer...
  • 4 篇 king mongkut's u...
  • 3 篇 guangxi key labo...
  • 3 篇 department of ma...
  • 3 篇 dep. of computer...
  • 3 篇 applied computer...
  • 3 篇 sichuan institut...
  • 3 篇 ministry of land...
  • 3 篇 dep. of informat...
  • 3 篇 state key labora...
  • 3 篇 deimos engenhari...
  • 3 篇 school of resour...
  • 3 篇 dep. of computer...
  • 3 篇 media technology...
  • 3 篇 dep. of electric...
  • 3 篇 theoretical phys...

作者

  • 8 篇 arani elahe
  • 8 篇 zonooz bahram
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 4 篇 ganokratanaa thi...
  • 4 篇 gómez-pulido jua...
  • 4 篇 vega-rodríguez m...
  • 4 篇 mehdi ghatee
  • 4 篇 thittaporn ganok...
  • 4 篇 carlos silvestre
  • 4 篇 chang ching-lung
  • 4 篇 bernardino anabe...
  • 4 篇 elke franz
  • 4 篇 sánchez-pérez ju...
  • 3 篇 ketcham mahasak
  • 3 篇 kovács zsolt fer...
  • 3 篇 yang bo
  • 3 篇 tsao yung-chung
  • 3 篇 patiyuth pramkea...
  • 3 篇 zezhong zheng

语言

  • 381 篇 英文
  • 10 篇 其他
  • 3 篇 中文
检索条件"机构=Dep. Of Computer Science and Technology"
394 条 记 录,以下是81-90 订阅
排序:
Prediction of Electrical Characteristics of a-IGZO TFT Based on Transfer Learning-Based Variational Autoencoder
Prediction of Electrical Characteristics of a-IGZO TFT Based...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Khean-Thye Bea Shih-Shin Hu Wei-Hsuan Lin Da-Zheng Lin Hsin-Hui Hu Xiu-Zhi Chen Ting-Ru Lin Yen-Lin Chen Kun-Ming Chen Wai Khuen Cheng Dep. of Electronic Engineering National Taipei University of Technology Taipei Taiwan Dep. of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Taiwan Semiconductor Research Institute Hsinchu Taiwan Faculty of Information and Communication Technology Universiti Tunku Abdul Rahman Kampar Malaysia
In this study, we proposed a transfer-learning based variational autoencoder model for predicting the electrical characteristics in the parameter tuning process of a-IGZO TFT structure design. The result achieve a hig...
来源: 评论
Development of an AI-based bioacoustic wolf monitoring system  35th
Development of an AI-based bioacoustic wolf monitoring syste...
收藏 引用
35th International Florida Artificial Intelligence Research Society Conference, FLAIRS-35 2022
作者: Stähli, Olivier Ost, Thomas Studer, Thomas College of Management of Technology EPFL Odyssea Station 5 Lausanne1015 Switzerland Life Science Dep. Supercomputing Systems AG Technoparkstrasse 1 Zürich8005 Switzerland Institute of Computer Science University of Bern Neubrückstrasse 10 Bern3012 Switzerland
Wolves are spreading in the Alpine region at an increasing rate, which leads to human–wolf conflicts. In order to reduce those and to perform an active wolf management, solid information about the presence of wolves ... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management
A Proposed Approach for Risk Planning and Management
收藏 引用
Information technology (ACIT)
作者: Mohammed N. Al Refai Yazan Al-Smadi Adai Al-Momani Zeyad M. Jamhawi Ahmed Ali Otoom Issa Atoum Ahid Yaseen Jafar Ababneh Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Computer Science Applied Science Private University Amman Jordan Department of Cyber Security Applied Science Private University Amman Jordan Software Engineering Department Faculty of Information Technology Philadelphia University Jordan Department of Cyber Security Zarqa University Zarqa Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Automatic computer Shutdown with Image Processing via Webcam to Save Energy
Automatic Computer Shutdown with Image Processing via Webcam...
收藏 引用
Cybernetics and Innovations (ICCI), International Conference on
作者: Narumol Chumuang Mahasak Ketcham Thittaporn Ganokratanaa Patiyuth Pramkeaw Worawut Yimyam Chuamoo Dep. of Digital Media Technology Muban Chombueng Rajabhat University (MCRU) Thailand Dep. of Information Technology Management King Mongkut's University of Technology North Bangkok Thailand Applied Computer Science Program King Mongkut's University of Technology Thonburi Bangkok Thailand Media Technology Program King Mongkut's University of Technology Thonburi Bangkok Thailand Dep. of Business Information Management Phetchaburi Rajabhat University Thailand
The purpose of this research is to help save electricity within organizations and workplaces that use computers. Due to the behavior of general users today, they do not give importance to saving electricity. The resea... 详细信息
来源: 评论
Deep Learning technology Used High Dynamic Range Image Reconstruction And Detection
Deep Learning Technology Used High Dynamic Range Image Recon...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Bheemalingaiah, M. Srinivasan, R. Nathan, V. Vijey Kolluri, Raju Gupta, Amit J.B Institute of Engineering and Technology Department of CSE Telangana Hyderabad India School of Computer Science and Engineering Galgotia University Department of CSE U.P India SRM TRP Engineering College Department of CSE Tamilnadu Tiruchirappalli India Narasaraopet Engineering College Department of ECE Andhra Pradesh Narasaraopet India J.B Institute of Engineering and Technology Dep. of AI & ML Telangana Hyderabad India
The suggested remedy for saturated pixels in digital camera photos introduces a brand-new learning-based method for reconstructing images with high dynamic range (HDR). While current techniques concentrate on increasi... 详细信息
来源: 评论
The Role of the Internet of Things in Monitoring Air Pollution-A Survey
The Role of the Internet of Things in Monitoring Air Polluti...
收藏 引用
International Conference on Information technology (ICIT)
作者: Ahmad Abusukhon Bareeq Alghannam Computer Science Dep. Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Computer Science and Information System College of Business Studies The Public Authority for Applied Education and Training Kuwait City Kuwait
Air pollution is one of the most common problems that the world is facing today. In fact, there are numerous causes of air pollution, including the large number of industries and automobiles that emit carbon dioxide (...
来源: 评论
Graph Attention Networks and Deep Q-Learning for Service Mesh Optimization: A Digital Twinning Approach
Graph Attention Networks and Deep Q-Learning for Service Mes...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Michel Gokan Khan Javid Taheri Andreas Kassler Arsineh Boodaghian Asl Dep. of Mathematics and Computer Science Karlstad University Karlstad Sweden School of Electronics Electrical Eng. and Computer Science Queen's University Belfast Belfast United Kingdom Faculty of Computer Science Deggendorf Institute of Technology Deggendorf Germany School of Eng. Sciences in Chemistry Biotech. and Health KTH Royal Inst. of Technology Stockholm Sweden
In the realm of cloud native environments, Ku-bernetes has emerged as the de facto orchestration system for containers, and the service mesh architecture, with its interconnected microservices, has become increasingly... 详细信息
来源: 评论
Experimental Comparison of Global Planners for Trajectory Planning of Mobile Robots in an Unknown Environment with Dynamic Obstacles
Experimental Comparison of Global Planners for Trajectory Pl...
收藏 引用
Human-computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Zehra Tüfekçi Gökhan Erdemir Department of Computer Engineering Istinye University İstanbul Turkiye Department of Computer Science and Engineering Istanbul Sabahattin Zaim University Dep. of Engineering Management & Technology University of Tennessee at Chattanooga Tennessee USA
Interacting with their workspace, detecting obstacles, and real-time path planning in the field to reach the goal in the unknown environment are current working areas of mobile robotics. Working in an unknown environm...
来源: 评论
Next Generation Image Watermarking via Combined DWT-SVD Technique  2
Next Generation Image Watermarking via Combined DWT-SVD Tech...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Na'amneh, Qais Almomani, Ammar Nasayreh, Ahmad Nahar, Khalid M.O. Gharaibeh, Hasan Al Mamlook, Rabia Emhamed Alauthman, Mohammad Applied Science Private University Department Of Cyber Security Amman Jordan School Of Computing Skyline University College P.O. Box 1797 Sharjah United Arab Emirates AlHuson University College AlBalqa Applied University I. T. Department Irbid Jordan Yarmouk University Department Of Computer Sciences Irbid211633 Jordan Yarmouk University Faculty Of Information Technology Computer Sciences Irbid211633 Jordan Trine University Dep. Of Business Administration IN United States University Of Zawia Dep.of Mechanical And Industrial Engineering Tripoli Libya University Of Petra Faculty Of Information Technology Department Of Information Security Amman Jordan
Personal computers and the Internet are used in different areas and are easier to use. Most data is easy to transmit and duplicate in digital format, and being tampered with and stolen easily leads to issues for conte... 详细信息
来源: 评论
Usage of Blockchain technology for Improving computer Security
Usage of Blockchain Technology for Improving Computer Securi...
收藏 引用
Information technology (ACIT)
作者: Adai Almomani Al Refai Mohammed N Ahmad Aburomman Omar Khair Alla Alidmat Qotadeh Saber Fuad Alshariedeh Mohammed Khouj Department of Computer Science Zarqa University Zarqa Jordan Software Engineering Dep. Zarqa University Zarqa Jordan Department of Data Science and A Zarqa University Zarqa Jordan Department of Electronic Enginnering Univeristy of Business and Technology Jeddah Saudi Arabia
Cyber threats have grown increasingly sophisticated, surpassing the capabilities of traditional security measures. Blockchain technology, with its decentralized and immutable structure, offers a potential solution to ... 详细信息
来源: 评论