咨询与建议

限定检索结果

文献类型

  • 493 篇 会议
  • 121 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 616 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 376 篇 工学
    • 269 篇 计算机科学与技术...
    • 220 篇 软件工程
    • 96 篇 信息与通信工程
    • 70 篇 控制科学与工程
    • 51 篇 电气工程
    • 46 篇 电子科学与技术(可...
    • 33 篇 生物工程
    • 29 篇 仪器科学与技术
    • 26 篇 生物医学工程(可授...
    • 25 篇 机械工程
    • 21 篇 光学工程
    • 20 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 14 篇 材料科学与工程(可...
    • 14 篇 交通运输工程
    • 12 篇 建筑学
    • 12 篇 安全科学与工程
  • 184 篇 理学
    • 88 篇 数学
    • 54 篇 物理学
    • 41 篇 生物学
    • 33 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 22 篇 化学
  • 110 篇 管理学
    • 80 篇 管理科学与工程(可...
    • 45 篇 工商管理
    • 41 篇 图书情报与档案管...
  • 21 篇 医学
    • 20 篇 基础医学(可授医学...
    • 19 篇 临床医学
  • 18 篇 法学
    • 15 篇 社会学
  • 17 篇 经济学
    • 17 篇 应用经济学
  • 14 篇 农学
  • 9 篇 教育学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 18 篇 internet of thin...
  • 15 篇 feature extracti...
  • 14 篇 computational mo...
  • 13 篇 convolutional ne...
  • 11 篇 accuracy
  • 9 篇 computer archite...
  • 9 篇 machine learning
  • 9 篇 software
  • 8 篇 bandwidth
  • 8 篇 real-time system...
  • 8 篇 security
  • 8 篇 training
  • 7 篇 delays
  • 7 篇 wireless communi...
  • 7 篇 cameras
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 complexity theor...
  • 6 篇 computer science
  • 6 篇 reliability

机构

  • 7 篇 dep. of electric...
  • 6 篇 dep. of computer...
  • 6 篇 sound and music ...
  • 6 篇 department of co...
  • 5 篇 dep. of business...
  • 5 篇 dep. of cyber se...
  • 5 篇 dep. of electric...
  • 5 篇 department of co...
  • 5 篇 dep. of medical ...
  • 5 篇 department of co...
  • 5 篇 dep. of informat...
  • 5 篇 applied science ...
  • 4 篇 dep. of informat...
  • 4 篇 dep. of computer...
  • 4 篇 yarmouk universi...
  • 4 篇 dep. computer sc...
  • 4 篇 dep. of info. an...
  • 4 篇 dep. of computer...
  • 4 篇 zarqa university...
  • 4 篇 institute of com...

作者

  • 7 篇 qais al-na'amneh
  • 7 篇 wu chi-jui
  • 7 篇 wang shu-chen
  • 6 篇 tsao yung-chung
  • 6 篇 mehdi adda
  • 6 篇 hasan gharaibeh
  • 6 篇 chen yi-ming
  • 6 篇 yu hsiang-fu
  • 6 篇 tseng li-ming
  • 6 篇 rabia emhamed al...
  • 6 篇 nasayreh ahmad
  • 6 篇 ahmad nasayreh
  • 6 篇 yang hung-chang
  • 6 篇 al-na'amneh qais
  • 6 篇 gharaibeh hasan
  • 5 篇 ahmed aziz
  • 5 篇 tsai yin-te
  • 5 篇 al refai mohamme...
  • 5 篇 kuo yaw-wen
  • 5 篇 yousif i hammadi

语言

  • 588 篇 英文
  • 20 篇 其他
  • 7 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Dep. of Engineering and Computer Science"
616 条 记 录,以下是401-410 订阅
排序:
EVALUATION OF CONTEXT MODELS TO CODE WAVELET-TRANSFORMED HYPERSPECTRAL IMAGES
EVALUATION OF CONTEXT MODELS TO CODE WAVELET-TRANSFORMED HYP...
收藏 引用
IEEE International Conference on Image Processing
作者: Francesc Auli-Llinas Pablo Enfedaque Joan Serra-Sagrista Victor Sanchez Dep. of Information and Communications Engineering Universitat Autonoma de Barcelona Dep. of Computer Science University of Warwick
Context modeling is key in wavelet-based image coding schemes to achieve competitive coding performance. Commonly, context models are devised for a particular coding system and are employed for many different types of... 详细信息
来源: 评论
Intrusion-tolerant Jini service architecture for ensuring survivability of U-services based on WSN
Intrusion-tolerant Jini service architecture for ensuring su...
收藏 引用
4th International Conference on Mobile, Ubiquitous, and Intelligent Computing, MUSIC 2013
作者: Kim, Sung-Ki Choi, Jae-Yeong Kim, Byung-Gyu Min, Byoung-Joon Division of IT Education Sun Moon University 100 Kalsan-ri Tangjeong-myeon Asan-si 336-708 Korea Republic of Dep. of Computer Science and Engineering Sun Moon University 100 Kalsan-ri Tangjeong-myeon Asan-si 336-708 Korea Republic of Dep. of Computer Science and Engineering Incheon National University 119 Academy-ro Yeonsu-gu Incheon 406-772 Korea Republic of
U-Service environment based on WSN(Wireless Sensor Network) is poor in reliability of connection and has a high probability that the intrusion and the system failure may occur. Therefore, it is very important to ensur... 详细信息
来源: 评论
Geometric model for vision-based door detection
Geometric model for vision-based door detection
收藏 引用
International Conference on computer engineering and Systems
作者: Marwa M. Shalaby Mohammed A.-Megeed Salem Alaa Khamis Farid Melgani Dep. of Mechatronics German University in Cairo Egypt Dep. of Scientific Computing Ain Shams University Cairo Egypt Engineering Science Dep. Suez University Egypt Information Engineering & Computer Science Dep. University of Trento Italy
Emerging assistive technologies, such as assistive domotics and socially assistive robots have considerable potential for enhancing the lives of many elderly and physically challenged people throughout the world. Blin... 详细信息
来源: 评论
The development of a multi-piecewise-based thinning description method
The development of a multi-piecewise-based thinning descript...
收藏 引用
IEEE International Symposium on Indep.ndent Computing (ISIC)
作者: Wen-Chang Cheng Dep. of Computer Science and Information Engineering Chaoyang University of Technology Taiwan
In this study, we proposed a multi-piecewise thinning description method. Thinning is a preprocessing technology often applied in the fields of binary image processing; it is used to transform thick elements in an ima... 详细信息
来源: 评论
Supporting Regression Test Scoping with Visual Analytics
Supporting Regression Test Scoping with Visual Analytics
收藏 引用
International Conference on Software Testing, Verification, and Validation, ICST
作者: Emelie Engström Mika Mantylä Per Runeson Markus Borg Dept. of Computer Science Lund University Sweden Dep. of Computer Science and Engineering Aalto University Finland
Background: Test managers have to repeatedly select test cases for test activities during evolution of large software systems. Researchers have widely studied automated test scoping, but have not fully investigated de... 详细信息
来源: 评论
An error-floor reduction technique for short-length LT codes
An error-floor reduction technique for short-length LT codes
收藏 引用
International Symposium on Information Theory and Its Applications, ISITA
作者: Li-Jen Chang Chung-Hsuan Wang John K. Zao Dep. of Electrical and Computer Engineering National Chiao Tung University Hsinchu Taiwan Dep. of Computer Science National Chiao Tung University Hsinchu Taiwan
Luby transform (LT) codes are often employed during best-effort packet transfers to offer rateless erasure protection. Efficient as they are, these randomized codes with a small number of input symbols often post an i... 详细信息
来源: 评论
Adaptive block SSA based ANC implementation for high performances ECG removal from sEMG signals
Adaptive block SSA based ANC implementation for high perform...
收藏 引用
Canadian Conference on Electrical and computer engineering (CCECE)
作者: Mohamed El Fares Djellatou Daniel Massicotte Mounir Boukadoum Dep. Electrical and Computer Engineering Université du Québec à Trois-Rivières Dep. Computer Science Université du Québec à Montréal
This study addresses electrocardiogram (ECG) pulses removal from surface electromyography (sEMG) recordings. We describe a block singular spectrum analysis based adaptive noise canceler (BSSA-ANC) in order to enhance ... 详细信息
来源: 评论
A SCTP-based authentication protocol: SCTPAP  5
A SCTP-based authentication protocol: SCTPAP
收藏 引用
5th International Conference on Data Communication Networking, DCNET 2014 - Part of 11th International Joint Conference on e-Business and Telecommunications, ICETE 2014
作者: Rekik, Malek Meddeb-Makhlouf, Amel Zarai, Faouzi Obaidat, Mohammad S. Hsiao, K.F. LETI laboratory University of Sfax Tunisia Computer Science and Software Engineering Department Monmouth University NJ07764 United States Dep. of Information Management Ming-Chuan University Taoyuan County333 Taiwan
Multihoming is among the features of SCTP (Stream Control Transmission Protocol), which makes it more robust and efficient than TCP(Transmission Control Protocol)but more vulnerable under attack. Nevertheless, a stron... 详细信息
来源: 评论
Time Frequency noise canceller for an optimized separation of the ECG from low back sEMG signals
Time Frequency noise canceller for an optimized separation o...
收藏 引用
IEEE EMBS International Conference on Information Technology Applications in Biomedicine (ITAB)
作者: Mohamed El Fares Djellatou Mounir Boukadoum Daniel Massicotte Dep. Electrical and Computer Engineering Université du Québec à Trois-Rivières Dep. Computer Science Université du Québec à Montréal
This work describes a hybrid adaptive filtering technique, designed to optimize the removal of the electrocardiogram (ECG) from surface electromyography (sEMG) recordings. Using the adaptive noise cancellation techniq... 详细信息
来源: 评论
PIPeR: Impact of power-awareness on social-based opportunistic advertising
PIPeR: Impact of power-awareness on social-based opportunist...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Soumaia Al Ayyat Sherif G. Aly Khaled A. Harras Computer Science and Engineering Dep. The American University in Cairo Cairo Egypt School of Computer Science Carnegie Mellon University Qatar Doha Qatar
Interest and social-awareness can be valuable determinants in decisions related to content delivery in mobile environments. Under certain conditions, we can deliver content with less cost and better delivery ratios, w... 详细信息
来源: 评论