咨询与建议

限定检索结果

文献类型

  • 534 篇 会议
  • 106 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 645 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 402 篇 工学
    • 266 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 95 篇 信息与通信工程
    • 72 篇 控制科学与工程
    • 57 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 28 篇 生物工程
    • 22 篇 光学工程
    • 21 篇 化学工程与技术
    • 20 篇 动力工程及工程热...
    • 19 篇 仪器科学与技术
    • 19 篇 材料科学与工程(可...
    • 16 篇 力学(可授工学、理...
    • 16 篇 生物医学工程(可授...
    • 13 篇 交通运输工程
    • 10 篇 农业工程
  • 205 篇 理学
    • 112 篇 数学
    • 61 篇 物理学
    • 31 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 23 篇 系统科学
    • 16 篇 化学
  • 112 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 37 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 12 篇 农学
  • 11 篇 法学
    • 10 篇 社会学
  • 8 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 19 篇 internet of thin...
  • 19 篇 feature extracti...
  • 17 篇 accuracy
  • 16 篇 training
  • 12 篇 computer archite...
  • 10 篇 data mining
  • 10 篇 computational mo...
  • 9 篇 wireless communi...
  • 9 篇 real-time system...
  • 9 篇 software
  • 9 篇 technological in...
  • 8 篇 wireless sensor ...
  • 8 篇 predictive model...
  • 8 篇 genetic algorith...
  • 8 篇 topology
  • 8 篇 mathematical mod...
  • 8 篇 data models
  • 7 篇 fuzzy logic
  • 7 篇 reliability
  • 7 篇 educational inst...

机构

  • 8 篇 dep. of mathemat...
  • 7 篇 dep. of electric...
  • 7 篇 institute of com...
  • 6 篇 department of co...
  • 5 篇 university of ag...
  • 5 篇 kristiania unive...
  • 5 篇 tu wien inst. of...
  • 5 篇 school of inform...
  • 5 篇 advanced researc...
  • 4 篇 dep. of computer...
  • 4 篇 institute of com...
  • 4 篇 king mongkut's u...
  • 3 篇 dep. of electric...
  • 3 篇 guangxi key labo...
  • 3 篇 department of ma...
  • 3 篇 dep. of computer...
  • 3 篇 applied computer...
  • 3 篇 sichuan institut...
  • 3 篇 fir-uf universit...
  • 3 篇 dep. of integrat...

作者

  • 8 篇 arani elahe
  • 8 篇 zonooz bahram
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 thilo sauter
  • 6 篇 cerdà-alabern ll...
  • 5 篇 grønli tor-morte...
  • 5 篇 mukund bhole
  • 5 篇 kaindl hermann
  • 5 篇 wolfgang kastner
  • 5 篇 majchrzak tim a.
  • 4 篇 ganokratanaa thi...
  • 4 篇 kastner wolfgang
  • 4 篇 gómez-pulido jua...
  • 4 篇 ignacio rojas
  • 4 篇 vega-rodríguez m...
  • 4 篇 rosa agostinho c...
  • 4 篇 fernandes carlos...
  • 4 篇 sauter thilo
  • 4 篇 mehdi ghatee

语言

  • 634 篇 英文
  • 7 篇 中文
  • 4 篇 其他
检索条件"机构=Dep. Computer Architecture & Computer Technology"
645 条 记 录,以下是391-400 订阅
排序:
Rate and UE Selection Algorithms for Interference-Aware Receivers
Rate and UE Selection Algorithms for Interference-Aware Rece...
收藏 引用
IEEE Vehicular technology Conference
作者: Vitaly Abdrashitov Wooseok Nam Dongwoon Bai Dep. of Electrical Eng. & Computer Science Massachusetts Institute of Technology Qualcomm Technologies Inc. Mobile Solution Lab Samsung Research America
In cellular communications, user equipment (UE, i.e., mobile device)-side interference cancellation (IC) along with multicell coordinated scheduling can significantly reduce the effect of the downlink intercell interf... 详细信息
来源: 评论
Metamorphic viruses detection by hidden Markov models
Metamorphic viruses detection by hidden Markov models
收藏 引用
International Symposium on Telecommunications, IST
作者: Fereidoon Rezaei M. Hamedi-Hamzehkolaie Saeid Rezaei Ali Payandeh Kish international campus Tehran University Tehran Iran Dep. computer science Kharazmi University Tehran Iran Kish international campus Tehran University Tehran Iran Dep. Information and Communication technology Malekeashtar University Tehran Iran
Since finding and extracting a fixed signature for metamorphic viruses is hard due to the fact that, their shape changes frequently. Virus writers by using obfuscation methods make their viruses undetectable, in order... 详细信息
来源: 评论
Detecting Encrypted Metamorphic Viruses by Hidden Markov Models
Detecting Encrypted Metamorphic Viruses by Hidden Markov Mod...
收藏 引用
The 2014 10th International Conference on Natural Computation (ICNC 2014) and the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014)(第十届自然计算和第十一届模糊系统与知识发现国际会议)
作者: Fereidoon rezaei Masoud Khalil Nezhad Saeid rezaei Ali Payandeh Kish international campus Tehran University Tehran Iran Karaj Branch Islamic Azad University Karaj Iran Dep. computer science Kharazmi University Tehran Iran Dep. Information and Communication technology Malekeashtar University Tehran Iran
Virus writers make their viruses undetectable by using obfuscation methods,which ends in metamorphic *** propose a method named detection circle which is based on the hidden Markov Model *** have used three elements t... 详细信息
来源: 评论
Developing a Graduate Level Embedded System Programming Course Content by Using Blended Programming Methodologies: Text-Based and Graphical
Developing a Graduate Level Embedded System Programming Cour...
收藏 引用
IEEE Global Engineering Education Conference
作者: Hayriye Korkmaz Ercan Cosgun Sezen Azaklar Bal Kenan Toker University of Marmara Faculty of Technology Dep. of Electrical & Electronics Eng. University of Gedik Vocational School University of Marmara Institute of Pure and Applied Sci. Istanbul University of Marmara Faculty of Technical Education Dep. of Electronics and Computer Education
This article deals with identifying the materials and the methods that will be used in this course based on "Embedded System Programming (ESP)" course for Electrical-Electronics Engineering Graduate program ... 详细信息
来源: 评论
Estimation of ship's extremely low frequency electromagnetic signature based on fuzzy fusion for target detection
Estimation of ship's extremely low frequency electromagnetic...
收藏 引用
IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)
作者: Yihai Liu Xiaomin Zhang Jianfeng Shao Bingqi Zhang School of Marine Science and Technology Northwestern Polytechnical University Xi'an China Dep. of Electrical & Computer Engineering State University of New York New Paltz USA
The alternative electromagnetic (EM) fields radiating from a ship are widely recognized as new contributors to the application of underwater target detection. This paper focuses on the estimation of this extremely low... 详细信息
来源: 评论
Photo rendering with swarms: From figurative to abstract pherogenic imaging
Photo rendering with swarms: From figurative to abstract phe...
收藏 引用
2013 IEEE Symposium on Computational Intelligence for Creativity and Affective Computing, CICAC 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013
作者: Fernandes, Carlos M. Mora, Antonio Merelo, Juan Julian Cotta, Carlos Rosa, Agostinho C. Dep. of Computer Architecture and Technology University of Granada Spain Systems and Robotics Institute Technical University of Lisbon Portugal Dept. of Computer Languages and Computer Science University of Malaga Spain
This paper describes the use of ant colony models for photographic rendering, that is, for the dep.ction or interpretation of photographic images. A description of a previously proposed ant-based edge detection method... 详细信息
来源: 评论
Ensemble SVM for imbalanced data and missing values in postoperative risk management
Ensemble SVM for imbalanced data and missing values in posto...
收藏 引用
2013 IEEE 15th International Conference on e-Health Networking, Applications and Services, Healthcom 2013
作者: Zieba, Maciej Swiatek, Jerzy Wroclaw University of Technology Dep. of Computer Science and Management Institute of Informatics Poland
In this work, we propose the ensemble SVM that solves the problem of missing values of attributes and the imbalanced data phenomenon in the domain of postoperative risk management. Contrary to the other approaches the... 详细信息
来源: 评论
Detection of JavaScript of Malware with Un-readability Using Mahalanobis-Distance
Detection of JavaScript of Malware with Un-readability Using...
收藏 引用
International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA)
作者: Kentaro Takamori Mai Iwamoto Shunsuke Oshima Takuo Nakashima Production System Engineering Course Kumamoto National College of Technology Yatsushiro Kumamoto Japan Kumamoto National College of Technology ICT Center for Learning Support Yatsushiro Kumamoto Japan Kumamoto National College of Technology Center for Technical and Educational Support Yatsushiro Kumamoto Japan Dep. of Electronics Engineering and Computer Science Tokai University Kumamoto Japan
Increasing of Java Scripts of malware requires automatic malware detection systems in these days. Our research takes note of the appearence probability and the state transition probability of first order Markov source... 详细信息
来源: 评论
Comparision of multi-carrier techniques in seven-level asymmetric cascade multilevel inverter
Comparision of multi-carrier techniques in seven-level asymm...
收藏 引用
2013 4th International Conference on Power Engineering, Energy and Electrical Drives, POWERENG 2013
作者: Colak, Ilhami Kabalci, Ersan Keven, Gokhan Faculty of Technology Department of Electric and Electronic Engineering Gazi University Ankara Turkey Faculty of Engineering and Architecture Dep. of Electrical and Electronic Eng. Nevsehir University Nevsehir Turkey Vocational College of Haci Bektaş Veli Dep. of Computer Programming Nevsehir University Nevsehir Turkey
The multilevel inverters (MLIs) are classified into three topologies such as Diode Clamped, Flying Capacitor and Cascade Multilevel Inverter (CMLI). CMLI topologies include two kind of structure that is named symmetri... 详细信息
来源: 评论
ROOM STATISTICS AND DIRECT-TO-REVERBERANT RATIO ESTIMATION FROM DUAL-CHANNEL SIGNALS
ROOM STATISTICS AND DIRECT-TO-REVERBERANT RATIO ESTIMATION F...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: E. Georganti J. Mourjopoulos S. van de Par Laboratory of Experimental Audiology ENT department University Hospital of Zurich Zurich 8091 Switzerland Audio and Acoustic Technology Group Wire Communications Laboratory Electrical & Computer Engineering dep. University of Patras 26500 Greece Acoustics Group Institute of Physics Carl von Ossietzky University Oldenburg 26111 Germany
A method for the estimation of the direct-to-reverberant-ratio (DRR) from dual-channel microphone recordings without having knowledge of the source signal is proposed. The method is based on previous findings for the ... 详细信息
来源: 评论