咨询与建议

限定检索结果

文献类型

  • 537 篇 会议
  • 106 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 648 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 404 篇 工学
    • 269 篇 计算机科学与技术...
    • 214 篇 软件工程
    • 95 篇 信息与通信工程
    • 73 篇 控制科学与工程
    • 57 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物工程
    • 22 篇 光学工程
    • 21 篇 化学工程与技术
    • 20 篇 动力工程及工程热...
    • 19 篇 仪器科学与技术
    • 19 篇 材料科学与工程(可...
    • 16 篇 力学(可授工学、理...
    • 16 篇 生物医学工程(可授...
    • 13 篇 交通运输工程
    • 10 篇 农业工程
  • 206 篇 理学
    • 113 篇 数学
    • 61 篇 物理学
    • 31 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 113 篇 管理学
    • 74 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 11 篇 法学
    • 10 篇 社会学
  • 8 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 19 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 training
  • 12 篇 computer archite...
  • 10 篇 data mining
  • 10 篇 computational mo...
  • 9 篇 wireless communi...
  • 9 篇 real-time system...
  • 9 篇 software
  • 9 篇 technological in...
  • 8 篇 monitoring
  • 8 篇 wireless sensor ...
  • 8 篇 predictive model...
  • 8 篇 genetic algorith...
  • 8 篇 topology
  • 8 篇 mathematical mod...
  • 8 篇 data models
  • 7 篇 fuzzy logic
  • 7 篇 reliability

机构

  • 8 篇 dep. of mathemat...
  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 5 篇 university of ag...
  • 5 篇 kristiania unive...
  • 5 篇 tu wien inst. of...
  • 5 篇 institute of com...
  • 5 篇 school of inform...
  • 5 篇 advanced researc...
  • 4 篇 dep. of computer...
  • 4 篇 king mongkut's u...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 department of ma...
  • 3 篇 dep. of computer...
  • 3 篇 applied computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...

作者

  • 8 篇 arani elahe
  • 8 篇 zonooz bahram
  • 7 篇 thilo sauter
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 cerdà-alabern ll...
  • 5 篇 grønli tor-morte...
  • 5 篇 mukund bhole
  • 5 篇 kaindl hermann
  • 5 篇 wolfgang kastner
  • 5 篇 majchrzak tim a.
  • 4 篇 ganokratanaa thi...
  • 4 篇 kastner wolfgang
  • 4 篇 gómez-pulido jua...
  • 4 篇 ignacio rojas
  • 4 篇 vega-rodríguez m...
  • 4 篇 rosa agostinho c...
  • 4 篇 fernandes carlos...
  • 4 篇 sauter thilo
  • 4 篇 mehdi ghatee

语言

  • 626 篇 英文
  • 14 篇 其他
  • 8 篇 中文
检索条件"机构=Dep. of Computer Architecture and Computer Technology"
648 条 记 录,以下是141-150 订阅
Causal Discovery via Conditional Indep.ndence Testing with Proxy Variables  41
Causal Discovery via Conditional Independence Testing with P...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Liu, Mingzhou Sun, Xinwei Qiao, Yu Wang, Yizhou School of Computer Science Peking University China Peking University China Sch. of Data Science Fudan University China Dep. of Automation Shanghai Jiao Tong University China Inst. for Artificial Intelligence Peking University China Nat'l Eng. Research Center of Visual Technology Peking University China Nat'l Key Lab of General Artificial Intelligence Peking University China
Distinguishing causal connections from correlations is important in many scenarios. However, the presence of unobserved variables, such as the latent confounder, can introduce bias in conditional indep.ndence testing ...
来源: 评论
A Proposed Approach for Risk Planning and Management
A Proposed Approach for Risk Planning and Management
收藏 引用
Information technology (ACIT)
作者: Mohammed N. Al Refai Yazan Al-Smadi Adai Al-Momani Zeyad M. Jamhawi Ahmed Ali Otoom Issa Atoum Ahid Yaseen Jafar Ababneh Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Computer Science Applied Science Private University Amman Jordan Department of Cyber Security Applied Science Private University Amman Jordan Software Engineering Department Faculty of Information Technology Philadelphia University Jordan Department of Cyber Security Zarqa University Zarqa Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Development of an AI-based bioacoustic wolf monitoring system  35th
Development of an AI-based bioacoustic wolf monitoring syste...
收藏 引用
35th International Florida Artificial Intelligence Research Society Conference, FLAIRS-35 2022
作者: Stähli, Olivier Ost, Thomas Studer, Thomas College of Management of Technology EPFL Odyssea Station 5 Lausanne1015 Switzerland Life Science Dep. Supercomputing Systems AG Technoparkstrasse 1 Zürich8005 Switzerland Institute of Computer Science University of Bern Neubrückstrasse 10 Bern3012 Switzerland
Wolves are spreading in the Alpine region at an increasing rate, which leads to human–wolf conflicts. In order to reduce those and to perform an active wolf management, solid information about the presence of wolves ... 详细信息
来源: 评论
A Multivariate Functional Analysis of Inter-Hands Spatiotemporal Coordination in Human Bimanual Tasks and its Implications for Robotics
A Multivariate Functional Analysis of Inter-Hands Spatiotemp...
收藏 引用
International Conference on Autonomous Robots and Agents, ICARA
作者: Marco Baracca Andre Meixner Giuseppe Averta Paolo Salaris Tamim Asfour Matteo Bianchi Dept. of Information Engineering Research Center “E. Piaggio” University of Pisa Pisa Italy Institute for Anthropomatics and Robotics Karlsruhe Institute of Technology Karlsruhe Germany Dep. of Control and Computer Engineering Politecnico di Torino Turin Italy
Dual-arm manipulation is a key enabler for significantly enhancing the interaction between humans and robots, and their capabilities to purposefully shape the surrounding environment. However, the spatiotemporal coord... 详细信息
来源: 评论
Speech Emotion Recognition using Supervised Deep Recurrent System for Mental Health Monitoring
arXiv
收藏 引用
arXiv 2022年
作者: Elsayed, Nelly ElSayed, Zag Asadizanjani, Navid Ozer, Murat Abdelgawad, Ahmed Bayoumi, Magdy School of Information Technology University of Cincinnati OH United States Dep. of Electrical & Computer Engineering University of Florida FL United States School of Engineering and Technology Central Michigan University MI United States Dep. of Electrical & Computer Engineering University of Louisiana at Lafayette LA United States
Understanding human behavior and monitoring mental health are essential to maintaining the community and society's safety. As there has been an increase in mental health problems during the COVID-19 pandemic due t... 详细信息
来源: 评论
A Safety and Security Requirements Management Methodology in Reconfigurable Collaborative Human-Robot Application
A Safety and Security Requirements Management Methodology in...
收藏 引用
IEEE International Workshop on Factory Communication Systems (WFCS)
作者: Ali M. Hosseini Clara Fischer Mukund Bhole Wolfgang Kastner Thilo Sauter Sebastian Schlund Institute of Computer Technology TU Wien Vienna Austria Institute of Management Science TU Wien Vienna Austria Institute of Computer Engineering TU Wien Vienna Austria Dep. of Integrated Sensor Systems Danube Univ. Krems Wiener Neustadt Austria
The current industry has to adapt to rapidly changing customers' needs. Reconfigurable manufacturing, therefore, provides capacity and functionality on demand which is essential for competitiveness in fast-changin...
来源: 评论
Forecasting of Monkeypox Cases Using Optimized SARIMAX Based Model
Forecasting of Monkeypox Cases Using Optimized SARIMAX Based...
收藏 引用
Electronic Engineering (ICEEM), International Conference on
作者: Mahmoud Elshabrawy Marwa M. Eid Abdelaziz A. Abdelhamid El-Sayed M. El-Kenawy Abdelhameed Ibrahim Dept. of Communications & Electronics Delta Higher Institute of Engineering and Technology Mansoura Egypt Faculty of Artificial Intelligence Delta University for Science and Technology Mansoura Egypt Dep. of Computer Science Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt Computer Engineering and Control Systems Dept. Faculty of Engineering University Mansoura Egypt
This study presents a dipper-throated-based ant colony optimization (DTACO) with the Seasonal Auto-Regressive Integrated Moving Average with eXogenous factor (SARIMAX) model (DTACO+SARIMAX) to forecast monkeypox cases...
来源: 评论
Image Encryption using Chaotic Techniques: A Survey Study
Image Encryption using Chaotic Techniques: A Survey Study
收藏 引用
2021 International Conference in Advances in Power, Signal, and Information technology, APSIT 2021
作者: Ayad, Jenan Hasan, Fadhil Sahib Ali, Alaa H. Hussein, Zaid Khudhur Abdulkareem, Hanan J. Jalil, Mustafa A. Ahmed, Ghaidaa Sadiq, Ahmed University of Technology Electrical Engineering Dep. Baghdad Iraq Electrical Engineering Dep. Mustansiriyah University Baghdad Iraq Technical Engineering Al-Esraa University College Medical Instrumentation Baghdad Iraq Al-Esraa University College Computer Technical Engineering Baghdad Iraq
The sharing of information through unsecured networks like the internet has increased fast recently. This information could be text, audio, image, or video. The security of data transmission is an essential issue. Enc... 详细信息
来源: 评论
Improving Distribution Systems Maintenance Management, by Predicting Reliability Indices Using Fully Connected Neural Networks
Improving Distribution Systems Maintenance Management, by Pr...
收藏 引用
Smart Grid Conference (SGC)
作者: Mohammad-Hossein Tananaeifar Mahdis Alimadaday SeyedMohammad-Mahdi Ghadamgahi Mohammad Ghafourian-Nasiri Alireza Fereidunian Construction Engineering and Management Dep. Amirkabir University of Technology Tehran Iran Industrial Engineering Dep. Tarbiat Modares University Tehran Iran Computer Engineering Dep. Kharazmi University Tehran Iran Electrical Engineering Faculty K. N. Toosi University of Technology Tehran Iran
Due to the increasing amount of industrial data worldwide, deep learning solutions have become extensively popular for preventive maintenance programs. Preventive maintenance reduces the costs of equipment failures, t... 详细信息
来源: 评论
Secure Images Transmission Through OFDM System
Secure Images Transmission Through OFDM System
收藏 引用
Computing and Machine Intelligence (ICMI), International Conference on
作者: Jenan Ayad Ahmed Sadiq Basma Makki Zainab Ali Abbood Hanan j. Abdulkareem Zaid Khudhur Hussein Computer Technology Engineering dep Al-Esraa University College Baghdad Iraq Medical Instrumentation Technical Engineering dep. Al-Esraa University College Baghdad Iraq
OFDM (Orthogonal Frequency Division Multiplexing) Next-generation wireless communication networks rely heavily on the OFDM system to transmit digital information in a more effective method as well as other traditional... 详细信息
来源: 评论