咨询与建议

限定检索结果

文献类型

  • 2,264 篇 会议
  • 1,708 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 3,981 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,383 篇 计算机科学与技术...
    • 1,164 篇 软件工程
    • 730 篇 控制科学与工程
    • 467 篇 信息与通信工程
    • 433 篇 电气工程
    • 331 篇 机械工程
    • 329 篇 电子科学与技术(可...
    • 243 篇 生物工程
    • 217 篇 生物医学工程(可授...
    • 188 篇 光学工程
    • 170 篇 仪器科学与技术
    • 146 篇 动力工程及工程热...
    • 146 篇 化学工程与技术
    • 96 篇 材料科学与工程(可...
    • 90 篇 土木工程
    • 88 篇 交通运输工程
    • 85 篇 安全科学与工程
    • 82 篇 建筑学
  • 1,495 篇 理学
    • 750 篇 数学
    • 411 篇 物理学
    • 278 篇 生物学
    • 264 篇 系统科学
    • 210 篇 统计学(可授理学、...
    • 134 篇 化学
  • 597 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 240 篇 医学
    • 196 篇 临床医学
    • 148 篇 基础医学(可授医学...
    • 102 篇 药学(可授医学、理...
  • 73 篇 法学
  • 47 篇 经济学
  • 44 篇 农学
  • 28 篇 教育学
  • 8 篇 艺术学
  • 7 篇 军事学
  • 2 篇 文学
  • 1 篇 哲学

主题

  • 108 篇 feature extracti...
  • 86 篇 educational inst...
  • 84 篇 control systems
  • 69 篇 computational mo...
  • 67 篇 training
  • 66 篇 optimization
  • 65 篇 mathematical mod...
  • 60 篇 deep learning
  • 55 篇 robustness
  • 50 篇 accuracy
  • 49 篇 neural networks
  • 48 篇 image segmentati...
  • 45 篇 semantics
  • 41 篇 support vector m...
  • 37 篇 object detection
  • 37 篇 algorithm design...
  • 37 篇 machine learning
  • 35 篇 stability analys...
  • 35 篇 visualization
  • 33 篇 real-time system...

机构

  • 254 篇 college of compu...
  • 109 篇 college of compu...
  • 109 篇 college of contr...
  • 81 篇 college of compu...
  • 62 篇 college of compu...
  • 53 篇 fujian provincia...
  • 45 篇 school of contro...
  • 36 篇 college of elect...
  • 33 篇 northeast forest...
  • 29 篇 college of compu...
  • 27 篇 school of comput...
  • 26 篇 college of compu...
  • 24 篇 college of compu...
  • 24 篇 tianjin key labo...
  • 22 篇 computer enginee...
  • 22 篇 college of mecha...
  • 22 篇 fujian provincia...
  • 22 篇 control and inte...
  • 21 篇 department of co...
  • 20 篇 school of inform...

作者

  • 52 篇 li zuoyong
  • 40 篇 chen zengqiang
  • 38 篇 zengqiang chen
  • 27 篇 dai xuefeng
  • 24 篇 el-sayed m.el-ke...
  • 23 篇 zuoyong li
  • 23 篇 abdelhameed ibra...
  • 18 篇 abdelaziz a.abde...
  • 18 篇 zhang jianfei
  • 18 篇 zhongxin liu
  • 17 篇 johansson karl h...
  • 17 篇 feng duan
  • 16 篇 doaa sami khafag...
  • 15 篇 liu zhongxin
  • 15 篇 fan haoyi
  • 14 篇 wang tao
  • 14 篇 wu junfeng
  • 14 篇 teng shenghua
  • 14 篇 kai-tai song
  • 13 篇 yang kailun

语言

  • 3,689 篇 英文
  • 181 篇 其他
  • 101 篇 中文
  • 15 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=College of Control and Computer Engineering"
3981 条 记 录,以下是3571-3580 订阅
排序:
A robust dynamic watermarking scheme
A robust dynamic watermarking scheme
收藏 引用
2009 International Conference on Information engineering and computer Science, ICIECS 2009
作者: Yin, Ke Wang, Zhi-Quan Yin, Ke-Xin School of Automation in Nanjing University of Science Technology Nanjing 210094 China Electric Power Simulation and Control Engineering Center of Nanjing Institute of Technology Nanjing 211167 China College of Computer Science and Engineering Changchun University of Technology 130012 China
A new data structure dynamic watermarking scheme is proposed in this paper. Using Shamir threshold scheme and block encryption, the watermark is divided into several shares. Then these shares are embedded into the dyn... 详细信息
来源: 评论
Digital watermarking Scheme based on chaotic encryption and DWT
Digital watermarking Scheme based on chaotic encryption and ...
收藏 引用
2009 International Conference on Information engineering and computer Science, ICIECS 2009
作者: Yin, Ke Wang, Zhi-Quan Liu, Chang Yin, Ke-Xin School of Automation Nanjing University of Science and Technology Nanjing 210094 China Electric Power Simulation and Control Engineering Center Nanjing Institute of Technology Nanjing 211167 China College of Computer Science and Engineering Changchun University of Technology 130012 China
A novel watermarking scheme based on chaotic encryption in DWT domain is proposed. The original image is transformed into some sub-band coefficients using discrete wavelet transformation, the logistic chaotic sequence... 详细信息
来源: 评论
OWA fuzzy linking histogram approach for image retrieval
OWA fuzzy linking histogram approach for image retrieval
收藏 引用
IEEE 7th International Conference on Computational Cybernetics, ICCC 2009
作者: Mahmoudi, Maryam Tayefeh Beheshti, Maedeh Lucas, Caro Taghiyareh, Fattaneh School of Electrical and Computer Eng. University of Tehran Tehran Iran Knowledge Engineering and Intelligent Systems Group Iran Telecom Research Center Tehran Iran School of Computer Engineering Iran University of Science and Technology Tehran Iran Control and Intelligent Processing Lab. University of Tehran Tehran Iran School of Electrical and Computer Eng. College of Engineering University of Tehran Tehran Iran
Color image histograms are very useful tools for content based image retrieval (CBIR) that can be applied on features such as colour, texture and shape. As these kinds of histograms results with large variations betwe... 详细信息
来源: 评论
Performance evaluation of disk scheduling algorithms in the presence of bad sectors
Performance evaluation of disk scheduling algorithms in the ...
收藏 引用
International International Symposium on computer and Information Sciences (ISCIS)
作者: Tarek Helmy College of Engineering Department of Computer and Automatic Control Tanta University Egypt College of Computer Science and Engineering King Fahd University of Petroleum and Minerals Saudi Arabia
Disk scheduling algorithms have long been a topic of study in computer science. Many researchers studied the performance of the disk scheduling algorithms. However, perhaps due to the difficulty of implementation, tho... 详细信息
来源: 评论
INFORMATION MANAGEMENT SYSTEM FOR COAL MINE DISPATCHING DRAWING BASED ON WEBGIS
INFORMATION MANAGEMENT SYSTEM FOR COAL MINE DISPATCHING DRAW...
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Xiucai Guo Shanjie Feng College of Electrical and Control Engineering Xi'an University of Science and Technology College of Computer Xi'an University of Science and Technology
The paper analyses the significance of coal mine dispatching drawings digitization,discusses the theory and implement method of WEBGIS,builds the information management system for coal mine dispatching drawings, and d... 详细信息
来源: 评论
Localization algorithm based on SVM-data fusion in wireless sensor networks
Localization algorithm based on SVM-data fusion in wireless ...
收藏 引用
3rd International Conference on Genetic and Evolutionary Computing, WGEC 2009
作者: Wang, Wei Huang, Tinglei Liu, Hui Pang, Fei School of Electronic Engineering Guilin University of Electronic Technology Guilin China School of Computer and Control Guilin University of Electronic Technology Guilin China College of Business Administration Liaoning Project Technology University Huludao China
This Positioning process of the Wireless Sensor Network (WSN) nodes is interfered by multipath, multiple access, especially NLOS transmission effect, Basing on TOA/TDOA positioning technology, the article brings forwa... 详细信息
来源: 评论
A Synthetical Cipher Index Technology and its Cryptogram Query Strategy in Outsourced Databases
A Synthetical Cipher Index Technology and its Cryptogram Que...
收藏 引用
International Conference on Computational Intelligence and Software engineering (CiSE)
作者: Ning Wang Wei Zhao Guohua Liu Chunhong Zhao College of Information Science and Engineering China & College of Computer and Control Engineering Qiqihar University Qiqihar China College of Information Science and Engineering Yanshan University슠 Qinhuangdao China
Cipher index is a well established technology for improving query efficiency. However, the existing index schemes have defect of lowness in query hit rate which leads to Internet crowdedness. It is the key for this pr... 详细信息
来源: 评论
Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
Distributed Tag Access with Collision-Avoidance among Mobile...
收藏 引用
IEEE International Conference on Computational Science and engineering, CSE
作者: Kwang-il Hwang Sang-Soo Yeo Jong Hyuk Park Department of Computer Control Engineering Incheon City College South Korea Division of Computer Engineering Mokwon University South Korea Department of Computer Science Engineering Kyungnam University South Korea
Concurrent access among multiple mobile readers brings about a new problem called reader collision that a readerpsilas transmission is interfered by the others. There have been several works to solve the reader collis... 详细信息
来源: 评论
Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering Systems
Adaptive Multi-channel Utilization Scheme for Coexistence of...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Kwang-il Hwang Sang-Soo Yeo Jong Hyuk Park Department of Computer Control Engineering Incheon City College South Korea Division of Computer Engineering Mokwon University South Korea Department of Computer Science Engineering Kyungnam University South Korea
Due to advantages in enough number of channels and favorable bandwidth, 2.4 GHz ISM band is used as the most prevalent band for the IEEE802.15.4 LR-WPAN. However, there are an increasing number of other devices and sy... 详细信息
来源: 评论
Effects of temperature on mechanical properties of shape-memory composite material
Nihon Kikai Gakkai Ronbunshu, A Hen/Transactions of the Japa...
收藏 引用
Nihon Kikai Gakkai Ronbunshu, A Hen/Transactions of the Japan Society of Mechanical Engineers, Part A 2009年 第759期75卷 1556-1561页
作者: Aoki, Teruko Fukunaga, Keigo Iinuma, Nanae Nakasato, Masaki Yamashita, Keitaro Shimamoto, Akira Department of Control and Computer Engineering Oita National College of Technology 1666 Maki Oita-shi Oita 870-0152 Japan
Shape Memory Polymer (SMP) and Shape Memory Alloy (SMA) are known as shape memory materials that mechanical properties change with temperature. Shape-Memory Composite material (SMC) was configured with SMP and SMA. In... 详细信息
来源: 评论