咨询与建议

限定检索结果

文献类型

  • 720 篇 会议
  • 493 篇 期刊文献

馆藏范围

  • 1,213 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 779 篇 工学
    • 431 篇 计算机科学与技术...
    • 366 篇 软件工程
    • 213 篇 控制科学与工程
    • 145 篇 电气工程
    • 118 篇 信息与通信工程
    • 117 篇 机械工程
    • 99 篇 电子科学与技术(可...
    • 81 篇 生物医学工程(可授...
    • 75 篇 生物工程
    • 67 篇 仪器科学与技术
    • 57 篇 光学工程
    • 53 篇 动力工程及工程热...
    • 44 篇 化学工程与技术
    • 25 篇 力学(可授工学、理...
    • 24 篇 交通运输工程
    • 23 篇 冶金工程
    • 23 篇 建筑学
    • 20 篇 材料科学与工程(可...
  • 463 篇 理学
    • 253 篇 数学
    • 113 篇 物理学
    • 85 篇 系统科学
    • 77 篇 生物学
    • 61 篇 统计学(可授理学、...
    • 51 篇 化学
  • 173 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 43 篇 工商管理
  • 65 篇 医学
    • 59 篇 临床医学
    • 55 篇 基础医学(可授医学...
    • 41 篇 药学(可授医学、理...
  • 18 篇 农学
  • 16 篇 法学
  • 12 篇 经济学
  • 12 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 1 篇 军事学

主题

  • 32 篇 automation
  • 27 篇 feature extracti...
  • 25 篇 optimization
  • 24 篇 mathematical mod...
  • 21 篇 control systems
  • 21 篇 genetic algorith...
  • 20 篇 machine learning
  • 19 篇 robots
  • 19 篇 computational mo...
  • 18 篇 computer science
  • 16 篇 deep learning
  • 14 篇 neural networks
  • 14 篇 accuracy
  • 14 篇 training
  • 13 篇 data mining
  • 12 篇 predictive model...
  • 12 篇 robustness
  • 11 篇 support vector m...
  • 11 篇 stability analys...
  • 11 篇 laboratories

机构

  • 124 篇 faculty of infor...
  • 35 篇 school of automa...
  • 21 篇 faculty of infor...
  • 19 篇 school of automa...
  • 18 篇 kunming universi...
  • 16 篇 computer technol...
  • 13 篇 infn sezione di ...
  • 13 篇 north-west unive...
  • 13 篇 université de st...
  • 13 篇 beijing universi...
  • 13 篇 ncsr demokritos ...
  • 13 篇 infn sezione di ...
  • 13 篇 infn sezione di ...
  • 13 篇 infn sezione di ...
  • 13 篇 universitat poli...
  • 13 篇 tbilisi state un...
  • 13 篇 uclouvain centre...
  • 13 篇 università di ge...
  • 13 篇 cadi ayyad unive...
  • 13 篇 università di bo...

作者

  • 22 篇 yuan haitao
  • 22 篇 bi jing
  • 20 篇 fu xiaodong
  • 17 篇 xin xin
  • 16 篇 haitao yuan
  • 16 篇 zhang jia
  • 14 篇 jing bi
  • 13 篇 chen a.
  • 13 篇 benoit d.m.
  • 13 篇 ferrara g.
  • 13 篇 ardid m.
  • 13 篇 calvo d.
  • 13 篇 eddymaoui a.
  • 13 篇 kulikovskiy v.
  • 13 篇 labalme m.
  • 13 篇 gal t.
  • 13 篇 bozza c.
  • 13 篇 díaz a.f.
  • 13 篇 boumaaza j.
  • 13 篇 benhassi m.

语言

  • 1,153 篇 英文
  • 41 篇 其他
  • 13 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Faculty of Automation and Computer Science and Engineering"
1213 条 记 录,以下是121-130 订阅
排序:
Efficient Time-Delay System Optimization with Auto-Configured Metaheuristics
Efficient Time-Delay System Optimization with Auto-Configure...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Senkerik, Roman Byrski, Aleksander Guzowski, Hubert Janku, Peter Kadavy, Tomas Oplatkova, Zuzana Kominkova Matusu, Radek Pluhacek, Michal Pekar, Libor Smolka, MacIej Viktorin, Adam Tomas Bata University A.I. Lab Faculty of Applied Informatics Department of Informatics and Artificial Intelligence Zlin Czech Republic Tomas Bata University Faculty of Applied Informatics Department of Automation and Control Engineering Zlin Czech Republic Institute of Computer Science Agh University of Science and Technology Krakow Poland
This paper presents an experimental study that compares the performance of four selected metaheuristic algorithms for optimizing a time delay system model. Time delay system models are complex and challenging to optim...
来源: 评论
Accelerating Point-Voxel Representation of 3-D Object Detection for Automatic Driving
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 254-266页
作者: Cao, JieCheng Tao, Chongben Zhang, Zufeng Gao, Zhen Luo, Xizhao Zheng, Sifa Zhu, Yuan Suzhou University of Science and Technology School of Electronic and Information Engineering Suzhou215009 China Tsinghua University Suzhou Automobile Research Institute Suzhou215134 China College of Mechanical Engineering Tongji University Shanghai200092 China Tsinghua University Department of Automation Beijing100084 China Wuhan Electronic Information Institute Wuhan430019 China McMaster University Faculty of Engineering HamiltonONL8S 0A Canada Soochow University School of Computer Science and Technology Suzhou215009 China Tongji University College of Automotive Studies Shanghai200092 China
Current point-voxel fusion methods for 3-D object detection could not make full use of complementary information in the field of autonomous driving. Therefore, a novel two-stage 3-D object detection method, called acc... 详细信息
来源: 评论
Effects of the Flatness Network Parameter Threshold on the Performance of the Rectified Linear Unit Memristor-Like Activation Function in Deep Learning
收藏 引用
SN computer science 2024年 第8期5卷 1-10页
作者: Tchepgoua Mbakop, Marcelle Mboupda Pone, Justin Roger Chassem Kamdem, Priva Kengne, Romanic Research Unit of Condensed Matter Electronics and Signal Processing (RU-MACETS) Department of Physics Faculty of Science University of Dschang P. O. Box 67 Dschang Cameroon Research Unit of Automation and Applied Computer (RU-AIA) Electrical Engineering Department of IUT-FV University of Dschang P.O. Box 134 Bandjoun Cameroon Research Unit of Fundamental Computer Sciences and Artificial Intelligence (RU-FCSAI) Department of Computer Sciences Faculty of Science University of Dschang P. O. Box 67 Dschang Cameroon
In this contribution, we improve of the performance of the Rectified Linear Unit Memristor Like Activation Function with the implication to help training process of CNN without a lot of epochs by computing the best va... 详细信息
来源: 评论
ARF-NET:Method of spinal segmentation in deformed spine radiographs  11
ARF-NET:Method of spinal segmentation in deformed spine radi...
收藏 引用
11th International Conference on Information Systems and Computing Technology, ISCTech 2023
作者: Lin, XiaTian Liu, Yingli Shen, Tao Gao, Ming Kunming University of Science and Technology Faculty of Information Engineering and Automation Kunming650093 China Kunming University of Science and Technology Yunnan Key Laboratory of Computer Technologies Application Kunming650500 China The First People's Hospital of Yunnan Province Kunming650500 China
Deformed spine radiograph spine segmentation can help doctors to analyze the disease site faster, which is a necessary part of the current development of competent healthcare. For scoliosis diagnosis, this paper desig... 详细信息
来源: 评论
Two-Stage Robust Optimization Under Decision Dependent Uncertainty
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第7期9卷 1295-1306页
作者: Yunfan Zhang Feng Liu Yifan Su Yue Chen Zhaojian Wang João P.S.Catalão State Key Laboratory of Power System and Generation Equipment the Department of Electrical EngineeringTsinghua UniversityBeijing 100084China Department of Mechanical and Automation Engineering the Chinese University of Hong KongHong Kong SARChina Ministry of Education Key Laboratory of System Control and Information Processing the Department of AutomationShanghai Jiao Tong Universityand also with Shanghai Engineering Research Center of Intelligent Control and ManagementShanghai 200240China Faculty of Engineering of the University of Porto and Institute for Systems and Computer Engineering Technology and Science(INESC TEC)Porto 4200-465Portugal IEEE
In the conventional robust optimization(RO)context,the uncertainty is regarded as residing in a predetermined and fixed uncertainty *** many applications,however,uncertainties are affected by decisions,making the curr... 详细信息
来源: 评论
Research on elephant flow detection method based on information entropy and improved random forest
Research on elephant flow detection method based on informat...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Hu, Xiaohong Miao, Xianghua Yuan, Meiyu Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Yunnan Key Laboratory of Computer Technology Application Kunming University of Science and Technology Kunming650500 China
In the increasingly complex network environment, various attacks emerge one after another. Being able to accurately detect elephant flow and mouse flow plays an extremely important role in defending against large-scal... 详细信息
来源: 评论
Research on network performance of D2D communication based on interference management  6
Research on network performance of D2D communication based o...
收藏 引用
6th International Conference on Mechatronics and Intelligent Robotics, ICMIR 2022
作者: Song, Hao Peng, Yi Wang, Rui Zhao, Xiong Faculty of Computer Information Kunming Metallurgy College Kunming650033 China Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Faculty of Information and Intelligent Engineering Yunnan University of Business Management Kunming650106 China
D2D(Device-to-device) improves communication quality by reusing cellular users' spectrum resources, becoming one of the key technologies for super-large data processing and massive devices accessing in the 5G. Due... 详细信息
来源: 评论
Detection of Detonators in Baggage Using Deep CNN Architecture: A Comparative Study of Contrast Enhancement and Feature Extraction Methods  8
Detection of Detonators in Baggage Using Deep CNN Architectu...
收藏 引用
8th IEEE International Conference on Image and Signal Processing and their Applications, ISPA 2024
作者: Lynda, Oulhissane Mostefa, Merah Moldovanu, Simona Moraru, Luminita LSS Faculty of Science and Technology Abdelhamid Ibn Badis University Laboratory of Signals and Systems Mostaganem Algeria Faculty of Automation Computers Electrical Engineering and Electronics Dunarea de Jos University of Galati Modelling & Simulation Laboratory MSlab Department of Computer Science and Information Technology Galati Romania Faculty of Sciences and Environment Modelling & Simulation Laboratory Dunarea de Jos University of Galati MSlab Department of Chemistry Physics & Environment Galati Romania
Visual inspection of dual-energy X-ray radiographic images of cabin baggage requires high performance, but is hindered by various challenges such as low target prevalence, variability in target visibility, possible pr... 详细信息
来源: 评论
Energy efficient indoor localisation for narrowband internet of things
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1150-1163页
作者: Ismail Keshta Mukesh Soni Mohammed Wasim Bhatt Azeem Irshad Ali Rizwan Shakir Khan Renato RMaaliw III Arsalan Muhammad Soomar Mohammad Shabaz Computer Science and Information Systems Department College of Applied SciencesAlMaarefa UniversityRiyadhSaudi Arabia Department of CSE University Centre for Research and Development Chandigarh UniversityMohaliPunjabIndia Department of Computer Science and Engineering National Institute of TechnologySrinagarIndia Asghar Mall College Rawalpindi Higher Education Department(HED)Govt.of the PunjabRawalpindiPakistan Department of Industrial Engineering Faculty of EngineeringKing Abdulaziz UniversityJeddahSaudi Arabia College of Computer and Information Sciences Imam Mohammad Ibn Saud Islamic University(IMSIU)RiyadhSaudi Arabia College of Engineering Southern Luzon State UniversityLucbanQuezonPhilippines Department of Automation Electronics and Electrical EngineeringGdansk University of TechnologyGdańskPoland Arba Minch University Arba MinchEthiopia
There are an increasing number of Narrow Band IoT devices being manufactured as the technology behind them develops *** high co‐channel interference and signal attenuation seen in edge Narrow Band IoT devices make it... 详细信息
来源: 评论
Research on intrusion detection algorithm based on dilated convolution and bidirectional gating cyclic unit
Research on intrusion detection algorithm based on dilated c...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Liu, Xingyuan Miao, Xianghua Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Computer Technology Application Key Laboratory of Yunnan Province Kunming650500 China
Intrusion detection based on machine learning plays an important role in the security protection of the network environment. In order to improve the accuracy of network intrusion detection, intrusion detection algorit... 详细信息
来源: 评论