咨询与建议

限定检索结果

文献类型

  • 776 篇 会议
  • 386 篇 期刊文献
  • 19 册 图书
  • 2 篇 学位论文

馆藏范围

  • 1,183 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 689 篇 工学
    • 494 篇 计算机科学与技术...
    • 398 篇 软件工程
    • 161 篇 信息与通信工程
    • 142 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 58 篇 电气工程
    • 57 篇 生物工程
    • 45 篇 机械工程
    • 44 篇 光学工程
    • 43 篇 材料科学与工程(可...
    • 38 篇 生物医学工程(可授...
    • 32 篇 建筑学
    • 32 篇 交通运输工程
    • 31 篇 安全科学与工程
    • 30 篇 化学工程与技术
    • 25 篇 仪器科学与技术
    • 25 篇 土木工程
  • 299 篇 理学
    • 110 篇 物理学
    • 109 篇 数学
    • 67 篇 生物学
    • 47 篇 统计学(可授理学、...
    • 37 篇 系统科学
    • 36 篇 化学
  • 189 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 64 篇 教育学
    • 62 篇 教育学
  • 46 篇 法学
    • 37 篇 社会学
  • 45 篇 医学
    • 40 篇 基础医学(可授医学...
    • 36 篇 临床医学
  • 19 篇 经济学
  • 12 篇 农学
  • 11 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 wireless sensor ...
  • 27 篇 computational mo...
  • 26 篇 security
  • 26 篇 mobile communica...
  • 25 篇 machine learning
  • 25 篇 training
  • 23 篇 students
  • 20 篇 semantics
  • 20 篇 accuracy
  • 19 篇 visualization
  • 19 篇 artificial intel...
  • 19 篇 cloud computing
  • 19 篇 data models
  • 18 篇 information tech...
  • 18 篇 robots
  • 18 篇 robot sensing sy...
  • 18 篇 routing protocol...
  • 17 篇 fuzzy logic
  • 17 篇 electronic mail
  • 17 篇 monitoring

机构

  • 47 篇 department of in...
  • 41 篇 department of co...
  • 31 篇 computer and inf...
  • 30 篇 department of la...
  • 29 篇 graduate school ...
  • 29 篇 department of co...
  • 28 篇 department of co...
  • 23 篇 smart lab depart...
  • 22 篇 computer and inf...
  • 19 篇 department of co...
  • 18 篇 department of co...
  • 16 篇 computer and inf...
  • 15 篇 smart laboratory...
  • 14 篇 college of mecha...
  • 13 篇 school of electr...
  • 13 篇 computer and inf...
  • 13 篇 department of in...
  • 13 篇 purdue universit...
  • 12 篇 computer and inf...
  • 12 篇 department of co...

作者

  • 62 篇 arjan durresi
  • 62 篇 leonard barolli
  • 61 篇 min byung-cheol
  • 48 篇 eric t. matson
  • 42 篇 fatos xhafa
  • 30 篇 matson eric t.
  • 28 篇 magana alejandra...
  • 24 篇 byung-cheol min
  • 21 篇 rayz julia taylo...
  • 20 篇 tao yang
  • 20 篇 yang baijian
  • 19 篇 lukens joseph m.
  • 19 篇 elisa bertino
  • 19 篇 jiang keyuan
  • 18 篇 bertino elisa
  • 17 篇 akio koyama
  • 17 篇 hu qin
  • 17 篇 alejandra j. mag...
  • 17 篇 weiner andrew m.
  • 16 篇 gjergji mino

语言

  • 1,137 篇 英文
  • 40 篇 其他
  • 6 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=Purdue University: Computer and Information Technology"
1183 条 记 录,以下是221-230 订阅
排序:
Path Tracking Using Echoes in an Unknown Environment: The Issue of Symmetries and How to Break Them
收藏 引用
International Journal of Computational Geometry and Applications 2024年 第3-4期34卷 89-111页
作者: Boutin, Mireille Kemper, Gregor Department of Mathematics and Computer Science Technische Universiteit Eindhoven P.O. Box 513 Eindhoven 5600 MB Netherlands Department of Mathematics Purdue University 150 N. University St. West Lafayette 47907 IN United States Technical University of Munich Germany TUM School of Computation Information and Technology Department of Mathematics Boltzmannstr. 3 Garching bei München 85748 Germany
This paper deals with the problem of reconstructing the path of a vehicle in an unknown environment consisting of planar structures using sound. Many systems in the literature do this by using a loudspeaker and microp... 详细信息
来源: 评论
IoT-based Automated Theft Detection in Vehicles: A Combined Approach of YOLO Detection and MediaPipe Pose Analysis
IoT-based Automated Theft Detection in Vehicles: A Combined ...
收藏 引用
International Conference on Control, Automation and Systems ( ICCAS)
作者: Seungheon Lee Sol Kim Inkyoung Byun Jiyun An Colten Glover Department of Computer Science Hoseo University Seoul Republic of Korea Seoul Korea Division of Computer Convergence Chungnam National University Daejeon Republic of Korea Daejeon Korea Department of Computer and Information Technology Purdue University West Lafayette IN USA
Vehicle theft has emerged as a notable societal concern within the United States. Despite advancements in detection technology, rates of vehicle theft persist in an upward trend. In response to this exigent issue, an ... 详细信息
来源: 评论
Eco-Friendly Laser Deterrent System for Woodpeckers Utilizing YOLOv8
Eco-Friendly Laser Deterrent System for Woodpeckers Utilizin...
收藏 引用
IEEE International Conference on Robotic Computing (IRC)
作者: Wonah Kim Seung-Hun Han Hyojin Kim Jaden Soroka Justin Allange Anthony Smith Artificial Intelligence Dong-A University Busan Republic of Korea Software and Computer Engineering Ajou University Suwon Gyeonggi-do Republic of Korea Computer and Information Technology Purdue University West Lafayette Indiana United States
This research introduces a novel approach for deterring woodpeckers to safeguard wooden structures in an environmentally-friendly way. Woodpecker drilling and drumming poses a significant threat to wooden structures, ... 详细信息
来源: 评论
Cost-Effective Solution for Fallen Tree Recognition Using YOLOX Object Detection
Cost-Effective Solution for Fallen Tree Recognition Using YO...
收藏 引用
IEEE International Conference on Robotic Computing (IRC)
作者: Hearim Moon Eunsik Park Junghyun Moon Juyeong Lee Minji Lee Doyoon Kim Minsun Lee Eric T. Matson Department of Computer Science and Engineering Chungnam National University Department of Computer and Information Technology Purdue University
Tropical cyclones are the world’s most deadly natural disasters, especially causing tree death by pulling out or breaking the roots of trees, which has a great impact on the forest ecosystem and forest owners. To min... 详细信息
来源: 评论
Optimizing Cybersecurity Budgets with AttackSimulation
Optimizing Cybersecurity Budgets with AttackSimulation
收藏 引用
IEEE Conference on Technologies for Homeland Security
作者: Alexander Master George Hamilton J. Eric Dietz Department of Computer and Information Technology Purdue Homeland Security Institute Purdue University West Lafayette USA
Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and no... 详细信息
来源: 评论
Cognitive Load-based Affective Workload Allocation for Multi-human Multi-robot Teams
arXiv
收藏 引用
arXiv 2023年
作者: Jo, Wonse Wang, Ruiqi Yang, Baijian Foti, Dan Rastgaar, Mo Min, Byung-Cheol Department of Computer and Information Technology Purdue University West LafayetteIN47906 United States Department of Psychological Sciences Purdue University West LafayetteIN47906 United States School of Engineering Technology Purdue University West LafayetteIN47906 United States
The interaction and collaboration between humans and multiple robots represent a novel field of research known as human multi-robot systems. Adequately designed systems within this field allow teams composed of both h... 详细信息
来源: 评论
Music Emotion Recognition Using Hierarchical Contrastive Learning
Music Emotion Recognition Using Hierarchical Contrastive Lea...
收藏 引用
Artificial Intelligence x Humanities, Education, and Art (AIxHEART)
作者: Siyeol Jung Yubin Choi E. Cho Smith Mia Y. Wang Artificial Intelligence Graduate School UNIST Ulsan Korea Computer Science and Engineering Soongsil University Seoul Korea Computer and Information Technology Purdue University West Lafayette USA Department of Computer Science College of Charleston Charleston USA
The Music Emotion Recognition (MER) task has garnered significant attention from both academic and industrial fields due to its versatility in various fields, such as music recommendation systems and psychotherapy. Du... 详细信息
来源: 评论
Answer Comments As Reviews: Predicting Acceptance By Measuring Valence On Stack Exchange
Answer Comments As Reviews: Predicting Acceptance By Measuri...
收藏 引用
IEEE International Conference on Big Data
作者: William Ledbetter John Springer Department of Computer and Information Technology Purdue University West Lafayette Indiana USA
Online communication has increased the need to interpret complex emotions rapidly; due to the volatility of the data involved, machine learning tasks that process text aim to address the related challenges. Exploring ... 详细信息
来源: 评论
A Corpus of Encoded Malware Byte information as Images for Efficient Classification
A Corpus of Encoded Malware Byte Information as Images for E...
收藏 引用
International IEEE Conference on Signal-Image Technologies and Internet-Based System
作者: Ryan Frederick Joseph Shapiro Ricardo A. Calix Computer Information Technology Purdue University Northwest Hammond United States of America
Malware has become an increasing problem in today’s world. In an attempt to combat this ever-changing problem, this research presents a machine-learning approach for analyzing malware using image classification. This... 详细信息
来源: 评论
A face recognition algorithm based on feature fusion
A face recognition algorithm based on feature fusion
收藏 引用
作者: Zhang, Jiwei Yan, Xiaodan Cheng, Zelei Shen, Xueqi School of Software Engineering Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Department of Computer and Information Technology Purdue University West LafayetteIN United States
In the process of building a smart city, face recognition can be applied to the transformation of enterprises, communities, and parks. The combination of building security system and face recognition technology can im... 详细信息
来源: 评论