咨询与建议

限定检索结果

文献类型

  • 643 篇 会议
  • 85 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 730 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 495 篇 工学
    • 249 篇 计算机科学与技术...
    • 186 篇 软件工程
    • 125 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 76 篇 机械工程
    • 73 篇 仪器科学与技术
    • 72 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 30 篇 生物工程
    • 25 篇 动力工程及工程热...
    • 24 篇 电气工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 18 篇 安全科学与工程
    • 16 篇 化学工程与技术
    • 13 篇 交通运输工程
  • 131 篇 理学
    • 54 篇 数学
    • 31 篇 生物学
    • 30 篇 物理学
    • 29 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 36 篇 医学
    • 28 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
    • 14 篇 药学(可授医学、理...
  • 18 篇 法学
    • 18 篇 社会学
  • 14 篇 教育学
    • 13 篇 教育学
  • 12 篇 农学
  • 9 篇 文学
  • 5 篇 经济学
  • 4 篇 军事学
  • 4 篇 艺术学

主题

  • 21 篇 accuracy
  • 20 篇 feature extracti...
  • 18 篇 cloud computing
  • 16 篇 computational mo...
  • 16 篇 real-time system...
  • 14 篇 computer science
  • 14 篇 deep learning
  • 13 篇 convolutional ne...
  • 10 篇 machine learning
  • 9 篇 authentication
  • 9 篇 monitoring
  • 9 篇 security
  • 8 篇 internet of thin...
  • 8 篇 medical services
  • 8 篇 data mining
  • 8 篇 wireless sensor ...
  • 8 篇 artificial intel...
  • 8 篇 data models
  • 8 篇 training
  • 7 篇 support vector m...

机构

  • 5 篇 korea
  • 5 篇 institute of inf...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of mathemat...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of engineer...
  • 4 篇 dept.of informat...
  • 3 篇 graduate school ...
  • 3 篇 dept.of computer...
  • 3 篇 university of hy...
  • 3 篇 school of inform...
  • 3 篇 dept.of computer...
  • 3 篇 dayananda sagar ...
  • 3 篇 hyogo
  • 3 篇 dept.of electron...
  • 3 篇 dept.of computer...
  • 3 篇 dept.of electron...
  • 3 篇 dept of computer...

作者

  • 9 篇 hae-young bae
  • 5 篇 dong-wook lee
  • 5 篇 johan e.carlson
  • 4 篇 fangmin li
  • 4 篇 shinping r.wang
  • 4 篇 yang xiao
  • 4 篇 yonghong li
  • 4 篇 guangzhi qu
  • 4 篇 weijun liu
  • 4 篇 fu-chien kao
  • 4 篇 ling tang
  • 4 篇 shunling chen
  • 4 篇 yun-kai lin
  • 4 篇 chih-chia chen
  • 4 篇 jesper martinsso...
  • 4 篇 kiseon kim
  • 3 篇 ali mohamad abou
  • 3 篇 lara hamawy
  • 3 篇 masakazu morimot...
  • 3 篇 hansen john h.l.

语言

  • 705 篇 英文
  • 13 篇 其他
  • 11 篇 中文
  • 1 篇 日文
检索条件"机构=Dept.of Computer Science& Engineering"
730 条 记 录,以下是11-20 订阅
排序:
ZEROTH-ORDER OPTIMIZATION WITH TRAJECTORY-INFORMED DERIVATIVE ESTIMATION  11
ZEROTH-ORDER OPTIMIZATION WITH TRAJECTORY-INFORMED DERIVATIV...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Shu, Yao Dai, Zhongxiang Sng, Weicong Verma, Arun Jaillet, Patrick Low, Bryan Kian Hsiang Dept.of Computer Science National University of Singapore Singapore Dept.of Electrical Engineering and Computer Science MIT United States
Zeroth-order (ZO) optimization, in which the derivative is unavailable, has recently succeeded in many important machine learning *** algorithms rely on finite difference (FD) methods for derivative estimation and gra... 详细信息
来源: 评论
RFID-based 3D human pose tracking: A subject generalization approach
收藏 引用
Digital Communications and Networks 2022年 第3期8卷 278-288页
作者: Chao Yang Xuyu Wang Shiwen Mao Dept.of Electrical and Computer Engineering Auburn UniversityAuburnAL36849-5201USA Dept.of Computer Science California State UniversitySacramentoCA95819-6021USA
Three-dimensional (3D) human pose tracking has recently attracted more and more attention in the computer vision field. Real-time pose tracking is highly useful in various domains such as video surveillance, somatosen... 详细信息
来源: 评论
E-ATM For Card Less Transactions Using Machine Learning  1
E-ATM For Card Less Transactions Using Machine Learning
收藏 引用
1st IEEE International Conference on Electronics, Computing, Communication and Control Technology, ICECCC 2024
作者: Aishwarya, D. Muralikumar, A. Mohammed Inthiyaz, M. Sathyabama Institute of Science and Technology Dept.of Computer Science and Engineering Tamilnadu Chennai600119 India
A fingerprint recognition technique in the ATM system is the foundation of this study. We chose this to improve client security and facilitate simple transactions. Since every person has unique fingerprint details, th... 详细信息
来源: 评论
Analysis of Pattern Matching Techniques used for Information Leakage  15
Analysis of Pattern Matching Techniques used for Information...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Kumar, Abhishek Senapati, K.K. Patnaik, K.S. Dept.of Computer Science & Engineering Birla Institute of Technology Mesra Ranchi India
In the rapidly evolving digital landscape, ensuring the utmost security of sensitive information against the pervasive risks of information leakage has become a paramount *** study dives deep into a critical facet of ... 详细信息
来源: 评论
Enhancing Metaverse using Quantum Technologies
Enhancing Metaverse using Quantum Technologies
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and Technology, ACROSET 2024
作者: Doshi, Jash Shaikh, Sanober Sultana Thadomal Shahani Engineering College Dept.of Computer Engineering Mumbai India Thadomal Shahani Engineering College Dept.of Artifical Intelligence and Data Science Mumbai India
Recently, metaverse technology has seen a boom in users. However, data privacy, security, connectivity, and computational complexity are still the main issues that ruin the user experience and make the metaverse less ... 详细信息
来源: 评论
Enhancing Cloud Storage Security with Multi-Authority Authentication and File Encryption  7
Enhancing Cloud Storage Security with Multi-Authority Authen...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Jorsen Fredlin, J. Rahul Vijay, P. Janani, S. St.Joseph's College of Engineering Dept.of Computer Science And Engineering Chennai India
The integration of a multi-authority system poses significant challenges but offers numerous benefits for effective collaboration and decision-making across departments or organizations. Harmonizing laws, regulations,... 详细信息
来源: 评论
Moth flame optimization algorithm for efficient feature selection and hybrid classification technique for intrusion detection system
收藏 引用
Multimedia Tools and Applications 2025年 1-21页
作者: Keerthanarani, U. Selvakumar, V. Singaravelan, S. Raja, S. Edwin Thenmozhi, K. Shunmugam, D. Arun Dept. of Computer Science and Engineering P.S.R Engineering College Sivakasi India Dept.Of Computer Science and Engineering Vel Tech Rangarajan Dr Sagunthala R & d Institute of Science and Technology Chennai Avadi India Dept. Of Computer Science and Engineering Coimbatore Institute of Engineering and Technology Coimbatore India Dept. Of Electronics and Communication Engineering P.S.R Engineering College Sivakasi India
The rapid expansion of the Internet of Things (IoT) brings numerous benefits but further presents fresh difficulties, especially in terms of security. The distributed and interconnected nature of IoT devices makes the... 详细信息
来源: 评论
A Real-Time Worker's Monitoring System using Deep Learning  15
A Real-Time Worker's Monitoring System using Deep Learning
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Harshavardhan, L. Kumar, Girish T.P. Gowda, Jayanth B.R. Keerthan, B.K. Bevinatti, Mohan K.S. Dept.of Computer Science and Engineering BGS Institute of Technology Karnataka BG Nagara India
The Real-Time Worker Monitoring System employing deep learning and web integration represents a cutting-edge solution for enhancing workplace safety and *** advanced deep learning algorithms, this system continuously ... 详细信息
来源: 评论
Automated Unified System for LPG Refill Booking & Lekage Detection: A Pervasive Approach  15
Automated Unified System for LPG Refill Booking & Lekage Det...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Suraksha, P. Aishwarya Kumari, Kavana L. Dept.of Computer Science and Engineering Vidyavardhaka College of Engineering Karnataka Mysuru India Dept.of Artificial Intelligence and Machine learning Vidyavardhaka College of Engineering Karnataka Mysuru India
Civilization is becoming increasingly aware of natural resources, it results in the use of propane and butane, and hence the use of *** India most people use the LPG *** per current government regulations, intense dem... 详细信息
来源: 评论
Automated Fire Detection System Using Image Surveillance System (ISS) and Convolutional Neural Networks (CNN)  9
Automated Fire Detection System Using Image Surveillance Sys...
收藏 引用
9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023
作者: Nagababu, P. Dhakshitha, K. Chandrika, G. Chowdary, U. Rohith Dept.of Computer Science and Engineering Andhra Pradesh Mylavaram India
Fire has become more complicated for places such as forests, malls, industries, functions with huge crowds, and theaters. Fires cause massive losses to all areas every year. There are a lot of severe threats to the pe... 详细信息
来源: 评论