咨询与建议

限定检索结果

文献类型

  • 1,390 篇 会议
  • 93 册 图书
  • 21 篇 期刊文献

馆藏范围

  • 1,504 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,214 篇 工学
    • 994 篇 计算机科学与技术...
    • 813 篇 软件工程
    • 269 篇 信息与通信工程
    • 147 篇 生物工程
    • 125 篇 生物医学工程(可授...
    • 120 篇 控制科学与工程
    • 82 篇 电气工程
    • 74 篇 光学工程
    • 72 篇 机械工程
    • 67 篇 电子科学与技术(可...
    • 50 篇 安全科学与工程
    • 49 篇 化学工程与技术
    • 44 篇 仪器科学与技术
    • 40 篇 土木工程
  • 540 篇 理学
    • 286 篇 数学
    • 167 篇 生物学
    • 124 篇 物理学
    • 108 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 45 篇 化学
  • 346 篇 管理学
    • 184 篇 管理科学与工程(可...
    • 182 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 113 篇 医学
    • 110 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 45 篇 公共卫生与预防医...
  • 71 篇 法学
    • 61 篇 社会学
  • 60 篇 教育学
    • 60 篇 教育学
  • 52 篇 农学
    • 49 篇 作物学
  • 33 篇 经济学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 40 篇 artificial intel...
  • 28 篇 computer communi...
  • 24 篇 machine learning
  • 22 篇 information syst...
  • 22 篇 students
  • 20 篇 internet of thin...
  • 18 篇 computer vision
  • 17 篇 convolutional ne...
  • 16 篇 support vector m...
  • 15 篇 computational in...
  • 15 篇 semantics
  • 14 篇 deep learning
  • 13 篇 information stor...
  • 12 篇 feature extracti...
  • 12 篇 accuracy
  • 12 篇 technological in...
  • 11 篇 human computer i...
  • 11 篇 wireless sensor ...
  • 11 篇 visualization
  • 11 篇 decision trees

机构

  • 6 篇 department of co...
  • 5 篇 beijing research...
  • 5 篇 school of comput...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 institute of com...
  • 5 篇 school of comput...
  • 4 篇 university of sc...
  • 4 篇 key laboratory o...
  • 4 篇 gits udaipur
  • 4 篇 jinan university
  • 4 篇 lovely professio...
  • 4 篇 insight sfi rese...
  • 4 篇 department of co...
  • 4 篇 mlr institute of...
  • 4 篇 purdue universit...
  • 4 篇 school of comput...
  • 4 篇 jaypee universit...
  • 4 篇 department of co...

作者

  • 7 篇 sun fuchun
  • 7 篇 harris frederick...
  • 6 篇 bein doina
  • 6 篇 vani v.
  • 6 篇 karthik n.
  • 5 篇 tyagi vipin
  • 5 篇 constantine step...
  • 5 篇 yang yujian
  • 5 篇 margherita anton...
  • 4 篇 rajalakshmi s.
  • 4 篇 de-shuang huang
  • 4 篇 jose joemon m.
  • 4 篇 sharma ajay kuma...
  • 4 篇 ootsu kanemitsu
  • 4 篇 rathore narendra...
  • 4 篇 patel mayank
  • 4 篇 xiaorui zhang
  • 4 篇 yokota takashi
  • 4 篇 baba takanobu
  • 4 篇 elisa bertino

语言

  • 1,442 篇 英文
  • 50 篇 其他
  • 30 篇 中文
检索条件"任意字段=7th IASTED International Conference on Advances in Computer Science and Technology"
1504 条 记 录,以下是1301-1310 订阅
排序:
A new method of requirements engineering process design
A new method of requirements engineering process design
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Shuhang, Guo Yuqing, Lan Maozhong, Jin Jing, Gao Hongjuan, Li Software Engineering Institute School of Computer Science BeiHang University XueYuan Road 37 Beijing China
A framework is presented that guides the requirements engineer in the implementation and execution of an effective requirements development process. We achieve this goal by providing a modeling method of requirements ... 详细信息
来源: 评论
Discretization of integrated moment invariants for writer identification
Discretization of integrated moment invariants for writer id...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Muda, Azah Kamilah Shamsuddin, Siti Mariyam Darus, Maslina Faculty of Computer Science and Information System University Technology of Malaysia 81310 Skudai Johor Malaysia
Conservative regular moments have been proven to exhibit some shortcomings in the original formulations of moment functions in terms of scaling factor. Hence, an incorporated scaling factor of geometric functions into... 详细信息
来源: 评论
Usage of BPEL and GRID in the implementation of E-Governance applications
Usage of BPEL and GRID in the implementation of E-Governance...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Sumathi, P. Janakiraman, V.S. Department of Computer Science and Applications PSG College of Arts and Science Coimbatore-641 014 Tamil Nadu India
this paper provides a design framework for integration of Business Process Execution Language (BPEL), Grid computing and e-governance applications. BPEL is an XML-based language for defining business processes that pr... 详细信息
来源: 评论
A reinforcement profile learning agent for documents filtering
A reinforcement profile learning agent for documents filteri...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Al Murtadha, Yahya M. Bin Sulaiman, Md. Nasir Muda, Zaiton Faculty of Computer Science and Information Technology Universiti Putra Malaysia 43400 UPM Serdang Selangor Darul Ehsan Malaysia
People spend an increasing amount of time using the web and the information sources. Some significant factors of that time are spent on navigation overhead like searching for relevant information through huge of irrel... 详细信息
来源: 评论
A novel multi-ip verification methodology using an soc platform
A novel multi-ip verification methodology using an soc platf...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Park, Joo-Yul Chung, Ki-Seok Department of Electronics Computer and Communication Engineering Hanyang University Seoul Korea Republic of
It is well-known that in ASIC designs, verification is more difficult and time consuming than design itself. As the number of IPs in an SoC design increases, verifying multiple IPs together is really important to redu... 详细信息
来源: 评论
A classification and visualization approach for knowledge management of a special interest group
A classification and visualization approach for knowledge ma...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Sulaiman, Shahida Ismail, Aisyah Khader, Ahamad Tajudin Sabudin, Maziani Sulaiman, Sarina School of Computer Sciences Universiti Sains Malaysia 11800 USM Penang Malaysia Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 81310 Skudai Johor Malaysia
Some Web portals are developed to support electronic community or e-community of special interest groups (SIG) that provide the platforms to communicate, share ideas and knowledge among the members. By incorporating t... 详细信息
来源: 评论
the effect of varying the crossover rate in the evolution of bidding strategies
The effect of varying the crossover rate in the evolution of...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Soon, Gan Kim Anthony, Patricia Teo, Jason School of Engineering and Information Technology University Malaysia Sabah Locked Bag 2073 88999 Kota Kinabalu Sabah Malaysia
Many researchers have shown that the crossover operator is essential for genetic algorithm. Crossover in genetic algorithm works to combine short low-order schemata into high-fitness strings. this paper investigates t... 详细信息
来源: 评论
Visualization of surface movement data using tin-based temporal modeling approach
Visualization of surface movement data using tin-based tempo...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Rahim, Mohd Shafry Mohd Othman, Nur Zuraifah Syazrah Daman, Daut Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System Universiti Teknologi Malaysia 81300 Skudai Johor Malaysia
the research area of spatiotemporal visualization has received much attention over the past decade considering that visualization is very much needed for dealing with large and complex spatiotemporal datasets. In this... 详细信息
来源: 评论
Robust and secure image transmission in wireless sensor networks using enhanced compression and encryption
Robust and secure image transmission in wireless sensor netw...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Mukesh, Rajeswari Damodaram, A. Bharathi, V.Subbiah Dept of Computer Science and Engg Easwari Engineering College Chennai-600 089 India JNTU College of Engineering Hyderabad-500 072 India Dean Academics DMI College of engineering Chennai-601 302 India
Security in Wireless Sensor Networks has become very much important as sensor networks are being used for sensitive applications like weather forecasting, military, medicine etc. In Wireless Sensor Network (WSN) the b... 详细信息
来源: 评论
Generating DNA code word for DNA computing with real-Time PCR
Generating DNA code word for DNA computing with real-Time PC...
收藏 引用
4th iasted international conference on advances in computer science and technology, ACST 2008
作者: Mohamed Saaid, Muhammad Faiz Ibrahim, Zuwairie Sarmin, Nor Haniza Faculty of Electrical Engineering Universiti Teknologi Malaysia 81310UTM Skudai Johor Darul Takzim Malaysia Universiti Teknologi Malaysia 81310UTM Skudai Johor Darul Takzim Malaysia Department of Mathematics Faculty of Science Universiti Teknologi Malaysia 81310UTM Skudai Johor Darul Takzim Malaysia
A number of DNA computing models to solve mathematical graph problem such as the Hamiltonian Path Problem (HPP), Traveling Salesman Problem (TSP), and the Shortest Path Problem (SPP) have been proposed and demonstrate... 详细信息
来源: 评论