咨询与建议

限定检索结果

文献类型

  • 34,403 篇 会议
  • 5,316 篇 期刊文献
  • 272 册 图书

馆藏范围

  • 39,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,669 篇 工学
    • 17,660 篇 计算机科学与技术...
    • 14,804 篇 软件工程
    • 6,542 篇 信息与通信工程
    • 3,979 篇 控制科学与工程
    • 3,048 篇 电子科学与技术(可...
    • 2,866 篇 电气工程
    • 2,641 篇 生物工程
    • 2,131 篇 生物医学工程(可授...
    • 1,694 篇 光学工程
    • 1,620 篇 机械工程
    • 1,487 篇 仪器科学与技术
    • 1,369 篇 动力工程及工程热...
    • 1,110 篇 化学工程与技术
    • 984 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 750 篇 网络空间安全
  • 12,355 篇 理学
    • 6,617 篇 数学
    • 3,357 篇 物理学
    • 2,898 篇 生物学
    • 2,198 篇 统计学(可授理学、...
    • 1,536 篇 系统科学
    • 1,190 篇 化学
  • 6,430 篇 管理学
    • 3,831 篇 管理科学与工程(可...
    • 2,915 篇 图书情报与档案管...
    • 2,006 篇 工商管理
  • 1,863 篇 医学
    • 1,594 篇 临床医学
    • 1,481 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 801 篇 公共卫生与预防医...
  • 1,206 篇 法学
    • 979 篇 社会学
  • 735 篇 经济学
  • 569 篇 农学
  • 497 篇 教育学
  • 186 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,290 篇 accuracy
  • 996 篇 feature extracti...
  • 968 篇 computational mo...
  • 871 篇 deep learning
  • 805 篇 training
  • 782 篇 computer science
  • 657 篇 real-time system...
  • 641 篇 machine learning
  • 616 篇 support vector m...
  • 550 篇 predictive model...
  • 497 篇 internet of thin...
  • 470 篇 convolutional ne...
  • 434 篇 data models
  • 382 篇 reliability
  • 356 篇 data mining
  • 340 篇 computer archite...
  • 340 篇 optimization
  • 316 篇 artificial intel...
  • 312 篇 wireless sensor ...
  • 311 篇 routing

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 69 篇 tno technical sc...
  • 66 篇 università di ca...
  • 62 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 nikhef national ...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 73 篇 coleiro a.
  • 68 篇 huang f.
  • 68 篇 gozzini s.r.
  • 58 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,786 篇 英文
  • 1,737 篇 其他
  • 367 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
39991 条 记 录,以下是11-20 订阅
排序:
Sim-to-Real Reinforcement Learning Techniques for Double Inverted Pendulum Control with Recovery Property
收藏 引用
Transactions of the Korean Institute of Electrical Engineers 2023年 第12期72卷 1705-1713页
作者: Lee, Taegun Ju, Doyoon Lee, Young Sam Dept.of Electrical and Computer Engineering Inha University Incheon Korea Republic of
In recent years with the rapid advancement of artificial intelligence, there has been extensive research to address control problems, which was previously unsolvable with traditional control techniques, using reinforc... 详细信息
来源: 评论
ZEROTH-ORDER OPTIMIZATION WITH TRAJECTORY-INFORMED DERIVATIVE ESTIMATION  11
ZEROTH-ORDER OPTIMIZATION WITH TRAJECTORY-INFORMED DERIVATIV...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Shu, Yao Dai, Zhongxiang Sng, Weicong Verma, Arun Jaillet, Patrick Low, Bryan Kian Hsiang Dept.of Computer Science National University of Singapore Singapore Dept.of Electrical Engineering and Computer Science MIT United States
Zeroth-order (ZO) optimization, in which the derivative is unavailable, has recently succeeded in many important machine learning *** algorithms rely on finite difference (FD) methods for derivative estimation and gra... 详细信息
来源: 评论
A framework for locating multiple RFID tags using RF hologram tensors
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 337-348页
作者: Xiangyu Wang Jian Zhang Shiwen Mao Senthilkumar CG Periaswamy Justin Patton Dept.of Electrical and Computer Engineering Auburn UniversityAuburnAL 36849-5201USA Department of Electrical and Computer Engineering Kennesaw State UniversityKennesawGA 30144USA RFID Lab Auburn UniversityAuburnAL 36849USA
In this paper,we present a Deep Neural Network(DNN)based framework that employs Radio Frequency(RF)hologram tensors to locate multiple Ultra-High Frequency(UHF)passive Radio-Frequency Identification(RFID)*** RF hologr... 详细信息
来源: 评论
Analysis of Pattern Matching Techniques used for Information Leakage  15
Analysis of Pattern Matching Techniques used for Information...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Kumar, Abhishek Senapati, K.K. Patnaik, K.S. Dept.of Computer Science & Engineering Birla Institute of Technology Mesra Ranchi India
In the rapidly evolving digital landscape, ensuring the utmost security of sensitive information against the pervasive risks of information leakage has become a paramount *** study dives deep into a critical facet of ... 详细信息
来源: 评论
Energy Efficient LEDCA Analysis for Improved Throughput in Wireless Sensor Networks  6
Energy Efficient LEDCA Analysis for Improved Throughput in W...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Padmageetha, B.G. Naik, Pramod Kumar Patil, Mallanagouda Dept.of Computer Applications Dayananda Sagar University Bengaluru India Dept. of Computer science and Engineering Dayananda Sagar University Bengaluru India Dept. of Computer science and Engineering RVITM Bengaluru India
Wireless Sensor Networks (WSNs) face significant challenges in terms of energy conservation, scalability, and data throughput owing to their limited node energy resources. This paper presents a low-energy data-centric... 详细信息
来源: 评论
E-ATM For Card Less Transactions Using Machine Learning  1
E-ATM For Card Less Transactions Using Machine Learning
收藏 引用
1st IEEE International Conference on Electronics, Computing, Communication and Control Technology, ICECCC 2024
作者: Aishwarya, D. Muralikumar, A. Mohammed Inthiyaz, M. Sathyabama Institute of Science and Technology Dept.of Computer Science and Engineering Tamilnadu Chennai600119 India
A fingerprint recognition technique in the ATM system is the foundation of this study. We chose this to improve client security and facilitate simple transactions. Since every person has unique fingerprint details, th... 详细信息
来源: 评论
Enhancing Cloud Storage Security with Multi-Authority Authentication and File Encryption  7
Enhancing Cloud Storage Security with Multi-Authority Authen...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Jorsen Fredlin, J. Rahul Vijay, P. Janani, S. St.Joseph's College of Engineering Dept.of Computer Science And Engineering Chennai India
The integration of a multi-authority system poses significant challenges but offers numerous benefits for effective collaboration and decision-making across departments or organizations. Harmonizing laws, regulations,... 详细信息
来源: 评论
Smart AI-Based Delivery Robot
Smart AI-Based Delivery Robot
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Vemulapalli, Lavanya Charitha, Kolanti Harshitha, Kuralla Durga Lakshmi Sri, Vallepu Udaya Velagapudi Ramakrishna Siddhartha Engineering College Dept.of Computer Science and Engineering Vijayawada India Velagapudi Ramakrishna Siddhartha Engineering College Dept.of Artificial Intelligence and Data Science Vijayawada India
Humans are responsible for the majority of delivering the packets over the area of a network. When compared to classic delivery system the Autonomous Delivery Robot(ADR's) is meant to deliver the goods instead of ... 详细信息
来源: 评论
A Real-Time Worker's Monitoring System using Deep Learning  15
A Real-Time Worker's Monitoring System using Deep Learning
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Harshavardhan, L. Kumar, Girish T.P. Gowda, Jayanth B.R. Keerthan, B.K. Bevinatti, Mohan K.S. Dept.of Computer Science and Engineering BGS Institute of Technology Karnataka BG Nagara India
The Real-Time Worker Monitoring System employing deep learning and web integration represents a cutting-edge solution for enhancing workplace safety and *** advanced deep learning algorithms, this system continuously ... 详细信息
来源: 评论
Modeling Conditional Relationships in the Management and Monitoring of Type 1 and Type 2 Diabetes through Bayesian Network
Modeling Conditional Relationships in the Management and Mon...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Cascone, Lucia Napolitano, Margherita Maria Nappi, Michele Nappi, Severino Tortora, Genoveffa University of Salerno Dept.of Computer Science Fisciano Italy
Diabetes mellitus is one of the most prevalent chronic diseases, affecting millions of people worldwide. Effective management of diabetes, particularly type 1 (T1DM) and type 2 diabetes (T2DM), requires a deep underst... 详细信息
来源: 评论