咨询与建议

限定检索结果

文献类型

  • 444 篇 会议
  • 221 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 674 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 416 篇 工学
    • 251 篇 计算机科学与技术...
    • 215 篇 软件工程
    • 80 篇 信息与通信工程
    • 71 篇 控制科学与工程
    • 52 篇 生物工程
    • 41 篇 生物医学工程(可授...
    • 36 篇 机械工程
    • 31 篇 光学工程
    • 27 篇 电气工程
    • 26 篇 电子科学与技术(可...
    • 26 篇 土木工程
    • 22 篇 化学工程与技术
    • 18 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 16 篇 安全科学与工程
    • 14 篇 建筑学
    • 12 篇 交通运输工程
  • 221 篇 理学
    • 99 篇 数学
    • 69 篇 生物学
    • 49 篇 系统科学
    • 34 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 19 篇 化学
  • 88 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 43 篇 医学
    • 37 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 17 篇 农学
  • 12 篇 法学
  • 11 篇 经济学
  • 9 篇 教育学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 26 篇 computer science
  • 19 篇 software enginee...
  • 16 篇 application soft...
  • 16 篇 software
  • 15 篇 mobile computing
  • 14 篇 protocols
  • 13 篇 data mining
  • 12 篇 computer archite...
  • 12 篇 accuracy
  • 12 篇 robustness
  • 11 篇 control systems
  • 11 篇 analytical model...
  • 11 篇 machine learning
  • 11 篇 routing protocol...
  • 11 篇 mobile communica...
  • 10 篇 mobile ad hoc ne...
  • 10 篇 educational inst...
  • 10 篇 monitoring
  • 10 篇 internet
  • 10 篇 predictive model...

机构

  • 39 篇 beijing key labo...
  • 28 篇 school of electr...
  • 22 篇 seventh research...
  • 10 篇 division of rese...
  • 9 篇 lovely professio...
  • 9 篇 school of electr...
  • 8 篇 department of co...
  • 8 篇 seventh research...
  • 8 篇 division of info...
  • 7 篇 department of co...
  • 7 篇 kkr and ksr inst...
  • 7 篇 department of co...
  • 6 篇 kkr and ksr inst...
  • 6 篇 division of scie...
  • 6 篇 division of info...
  • 6 篇 the seventh rese...
  • 6 篇 division of soft...
  • 6 篇 university of si...
  • 6 篇 department of so...
  • 5 篇 division of neph...

作者

  • 44 篇 yingmin jia
  • 41 篇 junping du
  • 24 篇 fashan yu
  • 16 篇 mohammad s. obai...
  • 12 篇 sanjay k. dhuran...
  • 9 篇 deyuan meng
  • 9 篇 shiying yuan
  • 9 篇 cheol-hoon lee
  • 8 篇 obaidat mohammad...
  • 7 篇 jun zhang
  • 7 篇 dhurandher sanja...
  • 7 篇 won-tae kim
  • 7 篇 do-hyung kim
  • 6 篇 isaac woungang
  • 6 篇 wenling li
  • 6 篇 azka mir
  • 6 篇 pei yan
  • 6 篇 rehman attique u...
  • 6 篇 attique ur rehma...
  • 6 篇 mir azka

语言

  • 648 篇 英文
  • 18 篇 其他
  • 7 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and Software Engineering Division"
674 条 记 录,以下是151-160 订阅
排序:
Conscience algorithm in neural network
Conscience algorithm in neural network
收藏 引用
International Conference on Neural Information Processing
作者: Geok See Ng Loo See Tan School of Computer Engineering Division of Software Systems Nanyang Technological University Singapore
A type of network called the Contender Network (CN) was earlier proposed by Ng, Erdogan and Ng (1995). A classification algorithm is used to assign weighted vote in a monotonically decreasing function of the rank in C... 详细信息
来源: 评论
Adaptive Coordination with Graph Convolution Networks and Grey Wolf Optimization for Next-Gen 5G Network Slicing
Adaptive Coordination with Graph Convolution Networks and Gr...
收藏 引用
2024 International Conference on Fuzzy Theory and Its Applications, iFUZZY 2024
作者: Kowsalya, M. Ra, In-Ho Naveenraj, K.S. Thruvenkadam, S. Park, Seok-Woo School of Electrical Engineering Vellore Institute of Technology Vellore India School of Computer & Software Kunsan National University Gunsan Korea Republic of Jio Platform Limited Internet Protocol Division Mumbai India
The need for flexible and effective 5G communication networks has prompted studies into novel approaches for network slicing, a fundamental paradigm that permits network service personalization for a range of applicat... 详细信息
来源: 评论
Optimizing Generative Adversarial Networks Models for Non-Pneumatic Tire Design: A Comparative Analysis and Evaluation  23
Optimizing Generative Adversarial Networks Models for Non-Pn...
收藏 引用
2023 Research in Adaptive and Convergent Systems, RACS 2023
作者: Seong, Ju-Yong Ji, Seung-Min Choi, Dong-Hyun Lee, Sungchul Division of Computer Science and Engineering Sunmoon University Chungcheongnam-do Asan-si Korea Republic of Department of Artificial Intelligence and Software Technology Sunmoon University Chungcheongnam-do Asan-si Korea Republic of
Pneumatic tires1 are used in a wide range of industries. However, they are difficult to design and rely on the knowledge of experienced designers. To aid in the design of pneumatic tires, this paper suggests the use o... 详细信息
来源: 评论
Constructing a non-linear model with neural networks for workload characterization
Constructing a non-linear model with neural networks for wor...
收藏 引用
IEEE International Symposium on Workload Characterization, IISWC-2006
作者: Yoo, Richard M. Lee, Han Chow, Kingsum Lee, Hsien-Hsin S. School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA 30332 United States Middleware Products Division Software and Solutions Group Intel Corp. Hillsboro OR 97123 United States
Workload characterization involves the understanding of the relationship between workload configurations and performance characteristics. To better assess the complexity of workload behavior, a model based approach is... 详细信息
来源: 评论
Virtual device system for maximizing user experience on portable consumer electronic devices
Virtual device system for maximizing user experience on port...
收藏 引用
8th International Conference on Information Science and Digital Content Technology, ICIDT 2012
作者: Kim, Do-Hyung Lee, Jae-Ho Ryu, Cheol Yoon, Seok-Jin Lee, Cheol-Hoon Embedded SW Research Division Electronics and Telecommunications Research Institute Daejeon Korea Republic of Dept. of Computer Engineering System Software Lab. Chungnam National University Daejeon Korea Republic of
We proposed a virtual device system to maximize user experience without real portable consumer electronic device before purchasing the product. The virtual device system can execute the entire software stack which is ... 详细信息
来源: 评论
Hierarchical means: Single number benchmarking with workload cluster analysis
Hierarchical means: Single number benchmarking with workload...
收藏 引用
2007 IEEE International Symposium on Workload Characterization, IISWC
作者: Yoo, Richard M. Lee, Hsien-Hsin S. Lee, Han Chow, Kingsum School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta GA 30332 United States Managed Runtime Division Software and Solutions Group Intel Corp. Hillsboro OR 97123 United States
Benchmark suite scores are typically calculated by averaging the performance of each individual workload. The scores are inherently affected by the distribution of workloads. Given the applications of a benchmark suit... 详细信息
来源: 评论
Preventing packet dropping and message tampering attacks on AODV-based Mobile Ad Hoc Networks
Preventing packet dropping and message tampering attacks on ...
收藏 引用
2012 International Conference on computer, Information and Telecommunication Systems, CITS 2012
作者: Obaidat, Mohammad S. Woungang, Isaac Dhurandher, Sanjay Kumar Koo, Vincent Department of Computer Science and Software Engineering Monmouth University West Long Branch NJ 07764 United States Department of Computer Science Ryerson University Toronto ON Canada Division of Information Technology Netaji Subhas Institute of Technology University of Delhi India
Due to recent advances in mobile wireless communication and computing technologies, Mobile Ad hoc Networks (MANETs) have become the network of choice for use in various applications. But this advantage comes with seri... 详细信息
来源: 评论
Next-Generation Human Activity Recognition Using Locality Constrained Linear Coding Combined With Machine Learning (NG-HAR-LCML)
收藏 引用
Healthcare Technology Letters 2025年 第1期12卷
作者: Shabbir, Maryam Ahmad, Fahad Alanazi, Saad Awadh Khan, Muhammad Hassan Li, Jianqiang Mahmood, Tariq Naseem, Shahid Anwar, Muhammad Department of Computer Sciences Bahria University Punjab Lahore Pakistan Department of Computer Science Faculty of Computing & Information Technology University of the Punjab Lahore Pakistan School of Computing Faculty of Technology University of Portsmouth Portsmouth United Kingdom University of Portsmouth Portsmouth United Kingdom Department of Computer Science College of Computer and Information Sciences Jouf University Aljouf Sakaka Saudi Arabia The School of Software Engineering Beijing University of Technology Beijing China Lab CCIS Prince Sultan University Riyadh Saudi Arabia Department of Information Sciences University of Education Vehari Pakistan Faculty of Information Sciences Division Science &Technology University of Education Lahore Pakistan
Accurate Human Activity Recognition (HAR) is a critical challenge with wide-ranging applications in healthcare, assistive technologies, and human-computer interaction. Traditional feature extraction methods often stru... 详细信息
来源: 评论
Feedback iterative learning control for time-delay systems based on 2D analysis approach
收藏 引用
控制理论与应用(英文版) 2010年 第4期8卷 457-463页
作者: Deyuan MENG Yingmin JIA Junping DU Shiying YUAN The Seventh Research Division Beihang University Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo Henan 454000 China
This paper deals with the iterative learning control (ILC) design for multiple-input multiple-output (MIMO),time-delay systems (TDS).Two feedback ILC schemes are considered using the so-called two-dimensional ... 详细信息
来源: 评论
Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments
Network layer based secure routing protocol for wireless ad ...
收藏 引用
作者: Dhurandher, Sanjay K. Obaidat, Mohammad S. Gupta, Deepank Gupta, Nidhi Asthana, Anupriya Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India Department of Computer Science and Software Engineering Monmouth University NJ United States
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages.... 详细信息
来源: 评论