咨询与建议

限定检索结果

文献类型

  • 781 篇 会议
  • 72 篇 期刊文献
  • 61 册 图书

馆藏范围

  • 912 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 504 篇 工学
    • 336 篇 计算机科学与技术...
    • 199 篇 软件工程
    • 95 篇 控制科学与工程
    • 88 篇 电气工程
    • 71 篇 信息与通信工程
    • 40 篇 机械工程
    • 29 篇 生物医学工程(可授...
    • 27 篇 电子科学与技术(可...
    • 27 篇 生物工程
    • 25 篇 材料科学与工程(可...
    • 24 篇 力学(可授工学、理...
    • 24 篇 建筑学
    • 21 篇 仪器科学与技术
    • 20 篇 光学工程
    • 20 篇 土木工程
    • 19 篇 化学工程与技术
    • 17 篇 航空宇航科学与技...
    • 15 篇 交通运输工程
  • 383 篇 理学
    • 310 篇 数学
    • 66 篇 物理学
    • 62 篇 系统科学
    • 48 篇 统计学(可授理学、...
    • 36 篇 生物学
    • 22 篇 化学
  • 93 篇 管理学
    • 61 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 27 篇 医学
    • 24 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 15 篇 法学
    • 13 篇 社会学
  • 11 篇 农学
  • 10 篇 经济学
  • 10 篇 教育学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 74 篇 discrete wavelet...
  • 49 篇 discrete mathema...
  • 43 篇 discrete cosine ...
  • 42 篇 algorithm analys...
  • 32 篇 discrete fourier...
  • 27 篇 signal processin...
  • 25 篇 discrete event s...
  • 25 篇 feature extracti...
  • 19 篇 algorithms
  • 18 篇 signal processin...
  • 18 篇 genetic algorith...
  • 18 篇 data structures
  • 16 篇 computer communi...
  • 16 篇 image coding
  • 16 篇 numeric computin...
  • 16 篇 watermarking
  • 15 篇 artificial intel...
  • 13 篇 computer graphic...
  • 12 篇 robustness
  • 11 篇 mathematical log...

机构

  • 8 篇 carleton univ sc...
  • 3 篇 università di ca...
  • 3 篇 infn sezione di ...
  • 3 篇 north-west unive...
  • 3 篇 infn sezione di ...
  • 3 篇 indian stat inst...
  • 3 篇 in2p3 lpc campus...
  • 3 篇 institut univers...
  • 3 篇 national centre ...
  • 3 篇 tno technical sc...
  • 3 篇 université de st...
  • 3 篇 simon fraser uni...
  • 3 篇 faculty of compu...
  • 3 篇 nikhef national ...
  • 3 篇 laboratoire univ...
  • 3 篇 university moham...
  • 3 篇 university würzb...
  • 3 篇 université de ha...
  • 3 篇 university of jo...
  • 3 篇 university moham...

作者

  • 8 篇 azar ahmad taher
  • 4 篇 catalani f.
  • 4 篇 de souza v.
  • 4 篇 chudoba j.
  • 4 篇 maheshwari anil
  • 4 篇 ammar hossam has...
  • 4 篇 weili wu
  • 3 篇 chen a.
  • 3 篇 benoit d.m.
  • 3 篇 ferrara g.
  • 3 篇 ardid m.
  • 3 篇 calvo d.
  • 3 篇 gagliardini s.
  • 3 篇 eddymaoui a.
  • 3 篇 kulikovskiy v.
  • 3 篇 labalme m.
  • 3 篇 gal t.
  • 3 篇 bozza c.
  • 3 篇 khatun a.
  • 3 篇 kalekin o.

语言

  • 880 篇 英文
  • 32 篇 其他
  • 3 篇 中文
检索条件"任意字段=6th International Conference on Algorithms and Discrete Applied Mathematics"
914 条 记 录,以下是401-410 订阅
排序:
Comparison Solving discrete Space on Flower Pollination Algorithm, PSO and GA
Comparison Solving Discrete Space on Flower Pollination Algo...
收藏 引用
international conference on Knowledge and Smart Technology
作者: Wanthanee Rathasamuth Supakit Nootyaskool Faculty of Information Technology King Mongkut's Institute of Technology
In order to find an optimal solution of a research problem, the problem parameters are encoded in discrete space (e.g. bits or integers). Genetic algorithm (GA) performs the discrete space by binary chromosome. Partic... 详细信息
来源: 评论
Real-Time Implementation of DVFS Enhanced LEON3 MPSoC on FPGA
Real-Time Implementation of DVFS Enhanced LEON3 MPSoC on FPG...
收藏 引用
international conference on Intelligent and Advanced Systems
作者: Zohaib Najam Muhammad Yasir Qadri Shaheryar Najam Umar S. Khan National University of Sciences and Technology Centres of Excellence in Science and Applied Technologies Riphah International University
In the field of embedded system there exists a tradeoff between power/performance optimization, hence many heuristics and techniques were presented at various development levels such as hardware software co-design, sc... 详细信息
来源: 评论
Meteor trail interference of owe density suppression algorithm based on DWT-WF-CP in OthR
Meteor trail interference of owe density suppression algorit...
收藏 引用
international conference on Electronics Information and Emergency Communication
作者: Chao Bo Yong Ning Wenkui Li Zhenhai Ji Hong Gu Weimin Su Eight Five One One Research Institute of China Aerospace Science and Industry Corporation Nanjing Jiangsu Province China Research Center of Electronic Engineering Technology Nanjing University of Science and Technology Nanjing Jiangsu Province China
In general, meteor trail interference of owe density (MTIOD) can degrade target detection performance of over-thehorizon radar (OthR). By exploiting MTIOD suppression algorithm based on dyadic wavelet transform (DWT),... 详细信息
来源: 评论
A discrete Event Simulation Model of an Emergency Department Network for Earthquake Conditions  6
A Discrete Event Simulation Model of an Emergency Department...
收藏 引用
6th international conference on Modeling, Simulation, and applied Optimization (ICMSAO)
作者: Gul, Muhammet Guneri, Ali Fuat Yildiz Tech Univ Dept Ind Engn Istanbul Turkey
Emergency departments (EDs) are the first admission points of hospitals for patients (victims) during normal and disaster conditions. To meet the uncertain patient demand, make the first examination, discharge or admi... 详细信息
来源: 评论
6th international conference Current issues of continuum mechanics and celestial mechanics (6thCICMCM)
收藏 引用
Journal of Physics: conference Series 2017年 第1期919卷
Preface this book contains the papers of the VI international conference Current issues of continuum mechanics and celestial mechanics – CICMCM'2016 held in Tomsk (Russia), November 16–18, 2016. the first confer...
来源: 评论
Automatic Emotion Recognition Based on EEG and ECG Signals While Listening to Quranic Recitation Compared with Listening to Music
Automatic Emotion Recognition Based on EEG and ECG Signals W...
收藏 引用
international conference on Information and Communication Technology for the Muslim World (ICT4M)
作者: Sabaa Ahmed Yahya Al-Galal Imad Fakhri Taha Alshaikhli Abdul Wahab Bin Abdul Rahman International Islamic University Malaysia Kuala Lumpur Wilayah Persekutuan MY
Relaxation and calmness are two emotions that people continually seek. One popular method people frequently use to reduce their tension and pressure levels is listening to various types of relaxing music. However, the... 详细信息
来源: 评论
An application program of fingerprint detection using wavelet transform for authentication
An application program of fingerprint detection using wavele...
收藏 引用
Management and Innovation Technology international conference (MITicon)
作者: Aunchisa Kwaochai Surapong Pongyupinpanich Pratya Areekul Wimol San-Um Thai-Nichi Institute of Technology Bangkok TH Realtime Information Electronics and Embedded Systems (RIEES) Master Program of Forensic Informatics Ramkhamhang University Huamark Bangkapi Bangkok Thailand 10240 Department of Mathematics and Computer Science Chulachomklao Royal Military Academy (CRMA) Amphor Mueng Tambol Promanee Province Nakornnayok Thailand
this paper presents the application program of fingerprint detection using wavelet transform for authentication. Fingerprints are obtained from the site of crime, old documents and excavated things. this paper propose... 详细信息
来源: 评论
Performance Comparison of Various Particle Swarm Optimizers in DWT-SVD watermarking for RGB Images  15
Performance Comparison of Various Particle Swarm Optimizers ...
收藏 引用
6th international conference on Computer & Communication Technology (ICCCT-2015)
作者: Srivastava, Akash NIT Patna Dept Informat Technol Patna Bihar India
In this paper we evaluate a non-blind watermarking technique for colored digital image based on singular value decomposition (SVD) in the DWT (discrete Wavelet Transformation) domain under different PSO variants. PSO ... 详细信息
来源: 评论
On Preservation of Positivity in Some Finite Element Methods for the Heat Equation
On Preservation of Positivity in Some Finite Element Methods...
收藏 引用
6th international conference on Computational Methods in applied mathematics (CMAM)
作者: Chatzipantelidis, Panagiotis Horvath, Zoltan thomee, Vidar Univ Crete Dept Math & Appl Math GR-70013 Iraklion Greece Szechenyi Istvan Univ Dept Math & Computat Sci H-9026 Gyor Hungary Chalmers Math Sci SE-41296 Gothenburg Sweden Univ Gothenburg SE-41296 Gothenburg Sweden FORTH Inst Appl & Computat Math GR-71110 Iraklion Greece
We consider the initial boundary value problem for the homogeneous heat equation, with homogeneous Dirichlet boundary conditions. By the maximum principle the solution is nonnegative for positive time if the initial d... 详细信息
来源: 评论
Wavelet based image steganographic system using chaotic signals
Wavelet based image steganographic system using chaotic sign...
收藏 引用
international conference on Information Communication and Management (ICICM)
作者: Hikmat N. Abdullah Sura F. Yousif Alejandro A. Valenzuela College of Information Engineering Al-Nahrain University Baghdad Iraq College of Engineering Diyala University Diyala Iraq EMT department BRS university of Applied Sciences Sankt Augustin Germany
the main requirements of efficient steganographic systems are transparency, robustness and security. In this work, the proposed system is designed to achieve these requirements, as follows: to increase the transparenc... 详细信息
来源: 评论