咨询与建议

限定检索结果

文献类型

  • 266 篇 会议
  • 85 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 212 篇 工学
    • 133 篇 计算机科学与技术...
    • 99 篇 软件工程
    • 32 篇 信息与通信工程
    • 30 篇 控制科学与工程
    • 20 篇 电气工程
    • 19 篇 生物医学工程(可授...
    • 18 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 14 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 11 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 仪器科学与技术
    • 10 篇 材料科学与工程(可...
    • 9 篇 交通运输工程
    • 9 篇 网络空间安全
  • 128 篇 理学
    • 67 篇 数学
    • 26 篇 物理学
    • 20 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 16 篇 生物学
    • 11 篇 化学
    • 8 篇 海洋科学
  • 59 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 27 篇 工商管理
    • 17 篇 图书情报与档案管...
  • 13 篇 医学
    • 12 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 8 篇 教育学
    • 8 篇 教育学
  • 7 篇 法学
  • 6 篇 农学
  • 5 篇 经济学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 9 篇 support vector m...
  • 8 篇 wireless sensor ...
  • 7 篇 neural networks
  • 7 篇 optimization
  • 7 篇 monitoring
  • 7 篇 artificial intel...
  • 6 篇 computer science
  • 6 篇 decision support...
  • 6 篇 robot sensing sy...
  • 6 篇 decision making
  • 6 篇 analytical model...
  • 6 篇 artificial neura...
  • 6 篇 training
  • 5 篇 intrusion detect...
  • 5 篇 reliability
  • 5 篇 software enginee...
  • 5 篇 navigation
  • 5 篇 software
  • 5 篇 accuracy
  • 5 篇 information stor...

机构

  • 15 篇 department of co...
  • 14 篇 department of sy...
  • 12 篇 department of co...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of co...
  • 6 篇 department of ap...
  • 6 篇 department of co...
  • 6 篇 computer enginee...
  • 5 篇 computer enginee...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 national technic...
  • 5 篇 mart learning ed...
  • 5 篇 computer enginee...
  • 4 篇 computer enginee...
  • 4 篇 national technic...

作者

  • 12 篇 mostafa abotaleb
  • 10 篇 gurkan tuna
  • 8 篇 kayhan gulez
  • 8 篇 hayek ali
  • 8 篇 kuchuk nina
  • 8 篇 abdelhameed ibra...
  • 7 篇 börcsök josef
  • 7 篇 boercsoek josef
  • 7 篇 nina kuchuk
  • 6 篇 sarkar biswajit
  • 6 篇 tuna gurkan
  • 6 篇 hovorushchenko t...
  • 6 篇 v. cagri gungor
  • 6 篇 krini abderrahim
  • 6 篇 roy abi zeid dao...
  • 6 篇 abotaleb mostafa
  • 5 篇 el-sayed m.el-ke...
  • 5 篇 abdelaziz a.abde...
  • 5 篇 zakovorotnyi ole...
  • 5 篇 doaa sami khafag...

语言

  • 351 篇 英文
  • 5 篇 其他
  • 2 篇 中文
  • 1 篇 土耳其文
检索条件"机构=Computer Engineering and Programming Department"
359 条 记 录,以下是171-180 订阅
排序:
DSOS and SDSOS optimization: LP and SOCP-based alternatives to sum of squares optimization
DSOS and SDSOS optimization: LP and SOCP-based alternatives ...
收藏 引用
Annual Conference on Information Sciences and Systems (CISS)
作者: Amir Ali Ahmadi Anirudha Majumdar Mathematical Programming Group IBM Watson Research Center Department of Electrical Engineering and Computer Science MIT
Sum of squares (SOS) optimization has been a powerful and influential addition to the theory of optimization in the past decade. Its reliance on relatively large-scale semidefinite programming, however, has seriously ... 详细信息
来源: 评论
Analysis of Cardiotocogram Data for Fetal Distress Determination by Decision Tree Based Adaptive Boosting Approach
Analysis of Cardiotocogram Data for Fetal Distress Determina...
收藏 引用
The 3rd International Conference on Signal and Image Processing(CSIP 2014) & The 6th International Conference on Computational Intelligence and Software engineering(CiSE 2014)
作者: Esra Mahsereci Karabulut Turgay Ibrikci Computer Programming Department Gaziantep UniversityGaziantep Turkey Department of Electrical and Electronics Engineering Cukurova UniversityAdana Turkey
Cardiotocography is one of the most widely used technique for recording changes in fetal heart rate(FHR) and uterine contractions. Assessing cardiotocography is crucial in that it leads to identifying fetuses which su... 详细信息
来源: 评论
Advanced IOT Traffic Light Control System  5
Advanced IOT Traffic Light Control System
收藏 引用
5th International Conference on Advances in Computational Tools for engineering Applications, ACTEA 2023
作者: Hamad, Martin Abou El Hajj, Antonio Daou, Roy Abi Zeid Hayek, Ali Haidar, Gaby Abou Lebanese German University Faculty of Public Health Biomedical Technologies Department Lebanon MART Learning Education and Research Center Lebanon University of Kassel Department of Computer Architecture and System Programming Kassel Germany American University of Science and Technology Engineering Faculty Zahle Lebanon
For several years, traffic congestion has been a major problem in big cities where the number of cars and different means of transportation has been increasing significantly. The problem of congestion is becoming more... 详细信息
来源: 评论
Cyber-Typhon: An Online Multi-task Anomaly Detection Framework  15th
Cyber-Typhon: An Online Multi-task Anomaly Detection Framewo...
收藏 引用
15th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2019
作者: Demertzis, Konstantinos Iliadis, Lazaros Kikiras, Panayiotis Tziritas, Nikos School of Engineering Department of Civil Engineering Faculty of Mathematics Programming and General Courses Democritus University of Thrace Kimmeria Xanthi Greece School of Science Department of Computer Science University of Thessaly Lamia Greece Research Center for Cloud Computing Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen China
According to the Greek mythology, Typhon was a gigantic monster with one hundred dragon heads, bigger than all mountains. His open hands were extending from East to West, his head could reach the sky and flames were c... 详细信息
来源: 评论
Autonomous intruder detection system using wireless networked mobile robots
Autonomous intruder detection system using wireless networke...
收藏 引用
IEEE Symposium on computers and Communications (ISCC)
作者: Gurkan Tuna Coskun Tasdemir Kayhan Gulez Tarik Veli Mumcu Vehbi Cagri Gungor Department of Computer Programming Trakya University Edirne Turkey Department of Control and Automation Engineering Yildiz Technical University Istanbul Turkey Department of Computer Engineering Bahcesehir University Istanbul Turkey
Wireless networked mobile robots pursuing a common objective are envisioned to be an efficient solution for many military, industrial, commercial, and environmental applications. This paper presents the design conside... 详细信息
来源: 评论
Mobile Robot Aided Self-Deploying Wireless Sensor Networks for Radiation Leak Detection
Mobile Robot Aided Self-Deploying Wireless Sensor Networks f...
收藏 引用
New Technologies, Mobility and Security (NTMS)
作者: Gurkan Tuna Kayhan Gulez T. Veli Mumcu V. Cagri Gungor Department of Computer Programming Trakya University Edirne Turkey Department of Control and Automation Engineering Yildiz Technical University Istanbul Turkey Department of Computer Engineering Bahcesehir University Istanbul Turkey
This paper presents a mobile robot aided self deploying wireless sensor network aiming to detect radiation leaks and to measure radiation levels, and explains design considerations to prolong network life. Special att... 详细信息
来源: 评论
Dynamic Calculation and Characterization of Threshold Value in Optical Character Recognition
Dynamic Calculation and Characterization of Threshold Value ...
收藏 引用
International Conference on challenges in IT, engineering and Technology (ICCIET’2014, Phuket)
作者: Ay?e Eldem Fatih Ba??ift?i Department of Computer Technology and Computer Programming Technical Science Vocational High School Karamano?lu Mehmetbey University Department of Computer Engineering Faculty of Technology Selcuk University
Optical character recognition(OCR) can be used in some management mechanisms of state and business world to organize documents scanned or captured by camera. Therefore, OCR is one of the subjects rapidly evolving in t... 详细信息
来源: 评论
Common network attack types and defense mechanisms
Common network attack types and defense mechanisms
收藏 引用
IEEE Signal Processing and Communications Applications (SIU)
作者: Resul Daş Abubakar Karabade Gurkan Tuna Department of Software Engineering Firat Univ. Elazığ Turkey Department of Computer Programming Trakya University Edirne Turkey
For every organization having a well secured network is the primary requirement to reach their goals. A network is said to be secure if it can protect itself from sophisticated attacks. Due to the rapid increase in th... 详细信息
来源: 评论
Scalable QoS approach in a core internet network
Scalable QoS approach in a core internet network
收藏 引用
computer Science Society (SCCC) International Conference Chilean FLAGGED
作者: C.J. Barenco Abbas J.G. Villalba Department Electric Engineering University of Brasilia Brasilia Brazil Department Computer Systems and Programming Complutense University of Madrid Madrid Spain
QoS solutions for Core Internet Networks require that we pay special attention to scalability, as they deal with a lot of flows and demand many resources. In this paper, integrated solutions from the physical layer (S... 详细信息
来源: 评论
Universal mitigation of NBTI-induced aging by design randomization
Universal mitigation of NBTI-induced aging by design randomi...
收藏 引用
East-West Design & Test Symposium (EWDTS)
作者: Maksim Jenihhin Alexander Kamkin Zainalabedin Navabi Somayeh Sadeghi-Kohan Department of Computer Engineering Tallinn University of Technology ESTONIA Institute for System Programming of the Russian Academy of Sciences (ISP RAS) RUSSIA Department of Electrical and Computer Engineering University of Tehran IRAN
In this paper we propose to think out of the box and discuss an approach for universal mitigation of Negative Bias Temperature Instability (NBTI) induced aging untied from the limitations of its modelling. The cost-ef... 详细信息
来源: 评论