咨询与建议

限定检索结果

文献类型

  • 121 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 205 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 111 篇 工学
    • 70 篇 计算机科学与技术...
    • 62 篇 软件工程
    • 38 篇 信息与通信工程
    • 21 篇 控制科学与工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 机械工程
    • 9 篇 生物工程
    • 8 篇 电气工程
    • 7 篇 仪器科学与技术
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 5 篇 航空宇航科学与技...
    • 4 篇 光学工程
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 环境科学与工程(可...
    • 3 篇 安全科学与工程
  • 47 篇 理学
    • 22 篇 数学
    • 15 篇 生物学
    • 10 篇 物理学
    • 7 篇 统计学(可授理学、...
  • 21 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 5 篇 公共管理
  • 17 篇 医学
    • 14 篇 临床医学
    • 8 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
    • 4 篇 药学(可授医学、理...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 农学
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 经济学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 13 篇 deep learning
  • 7 篇 accuracy
  • 6 篇 authentication
  • 6 篇 humans
  • 5 篇 computer science
  • 5 篇 information anal...
  • 5 篇 internet
  • 5 篇 measurement
  • 5 篇 computer network...
  • 4 篇 access control
  • 4 篇 reinforcement le...
  • 4 篇 application soft...
  • 4 篇 systems engineer...
  • 4 篇 bandwidth
  • 4 篇 laboratories
  • 4 篇 optimization
  • 4 篇 semantics
  • 4 篇 algorithm design...
  • 4 篇 digital systems
  • 4 篇 feature extracti...

机构

  • 7 篇 national digital...
  • 5 篇 national digital...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 department of di...
  • 4 篇 college of compu...
  • 4 篇 digital system e...
  • 4 篇 department of el...
  • 4 篇 guangdong labora...
  • 4 篇 key laboratory o...
  • 3 篇 department of in...
  • 3 篇 the department o...
  • 3 篇 department of au...
  • 3 篇 digital media sy...
  • 3 篇 the department o...
  • 3 篇 electronic and c...
  • 3 篇 department of el...
  • 3 篇 the shenzhen int...
  • 3 篇 national enginee...
  • 3 篇 department of co...

作者

  • 7 篇 song jian
  • 6 篇 yang fang
  • 5 篇 amal s.mehanna
  • 4 篇 seong joon yoo
  • 4 篇 abdelwahed motwa...
  • 4 篇 sung wook baik
  • 4 篇 wilson v. ruggie...
  • 4 篇 han zhu
  • 4 篇 ho chul shin
  • 4 篇 yung-lyul lee
  • 4 篇 dongil han
  • 4 篇 ishfaq yaseen
  • 4 篇 jeahoon choi
  • 3 篇 moni mohammad al...
  • 3 篇 dae-ha park
  • 3 篇 jian song
  • 3 篇 sun shiyuan
  • 3 篇 chen haotian
  • 3 篇 liu shuxin
  • 3 篇 doo-kwon baik

语言

  • 196 篇 英文
  • 6 篇 中文
  • 3 篇 其他
检索条件"机构=Department of Computer and Digital System Engineering"
205 条 记 录,以下是81-90 订阅
排序:
Known User Continuous Authentication system for Consumer Application Software
Known User Continuous Authentication System for Consumer App...
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Ines Brosso Graca Bressan Wilson V. Ruggiero College of Computation and Informatics Mackenzie Presbyterian University Sao Paulo Brazil Laboratory of Computer Architecture and Networks Department of Computer and Digital System Engineering Polytechnic of São Paulo University Brazil
This paper presents KUCAS (Known User Continuous Authentication system), a work-in-progress security system, that has a continuous authentication mechanism of users/consumers. The KUCAS system makes use of environment... 详细信息
来源: 评论
Automatic detection and classification algorithm of thyroid nodules in CT images based on YOLOv5s  9
Automatic detection and classification algorithm of thyroid ...
收藏 引用
9th International Conference on computer and Communications, ICCC 2023
作者: Guo, Ruifeng Xu, Lei Guo, Jiahui Wang, Hongliang Shenyang Institute of Computing Technology Chinese Academy of Sciences Shenyang China University of Chinese Academy of Sciences Shenyang China Liaoning Prov. Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China The First Hospital of China Medical University Department of Endocrinology and Metabolism Shenyang China
Thyroid nodular lesions are one of the most common diseases in the population. As the number of patients increases, it is clinically important to provide physicians with an accurate early aid to determine the benignit... 详细信息
来源: 评论
Rotation Invariant Multiple Face-detection Architecture for Smart TV
收藏 引用
IERI Procedia 2014年 6卷 33-38页
作者: Jeahoon Choi Seong Joon Yoo Sung Wook Baik Ho Chul Shin Dongil Han Depertment of Computer Engineering Sejong University Seoul Korea Digital Contents Research Institute Sejong University Seoul Korea Robot Cognitive System Research Department Electronics and Telecommunications Research Institute (ETRI) Daejeon Korea
This paper suggests a design of high quality real-time rotation face detection architecture for gesture recognition of smart TV. For high performance rotated face detection, the multiple-MCT(Modified Census Transform)... 详细信息
来源: 评论
Rotation Invariant Multiple Face-Detection Architecture for Smart TV
Rotation Invariant Multiple Face-Detection Architecture for ...
收藏 引用
2013 International Conference on Future Software engineering and Multimedia engineering(ICFM 2013)
作者: Jeahoon Choi Seong Joon Yoo Sung Wook Baik Ho Chul Shin Dongil Han Depertment of Computer Engineering Sejong University Digital Contents Research Institute Sejong University Robot Cognitive System Research DepartmentElectronics and Telecommunications Research Institute(ETRI)
This paper suggests a design of high quality real-time rotation face detection architecture for gesture recognition of smart TV. For high performance rotated face detection, the multiple-MCT(Modified Census Transform)... 详细信息
来源: 评论
The Design of HD Image Rectification Architecture Using Floating Point IP
收藏 引用
IERI Procedia 2014年 6卷 39-44页
作者: Dongil Han Jeahoon Choi Seong Joon Yoo Sung Wook Baik Ho Chul Shin Depertment of Computer Engineering Sejong University Seoul Korea Digital Contents Research Institute Sejong University Seoul Korea Robot Cognitive System Research Department Electronics and Telecommunications Research Institute (ETRI) Daejeon Korea
This paper proposes a real-time HD stereo images rectification hardware design architecture in order to remove vertical parallax of images caused by distortion within the cameras and alignment between them. After calc... 详细信息
来源: 评论
Inter-Channel Interference Cancellation Technique for Cdma Mobile/personal Communication Base Stations
Inter-Channel Interference Cancellation Technique for Cdma M...
收藏 引用
IEEE International Symposium on Spread Spectrum Techniques and Applications
作者: S. Kubota S. Kato K. Feher NTT Radio Communication System Laboratories Yokosuka Japan Digital Communication Laboratory Department of Electrical and Computer Engineering University of California슠Davis Davis CA USA
来源: 评论
The Design of HD Image Rectification Architecture Using Floating Point IP
The Design of HD Image Rectification Architecture Using Floa...
收藏 引用
2013 International Conference on Future Software engineering and Multimedia engineering(ICFM 2013)
作者: Dongil Han Jeahoon Choi Seong Joon Yoo Sung Wook Baik Ho Chul Shin Depertment of Computer Engineering Sejong University Digital Contents Research Institute Sejong University Robot Cognitive System Research DepartmentElectronics and Telecommunications Research Institute(ETRI)
This paper proposes a real-time HD stereo images rectification hardware design architecture in order to remove vertical parallax of images caused by distortion within the cameras and alignment between them. After calc... 详细信息
来源: 评论
Telecom Fraud Detection via Imbalanced Graph Learning
Telecom Fraud Detection via Imbalanced Graph Learning
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Xinxin Hu Haotian Chen Hongchang Chen Shibo Zhang Shuxin Liu Xing Li National Digital Switching System Engineering and Technological Research Center Zhengzhou China The Edward S. Rogers Sr. Department of Electrical & Computer Engineering University of Toronto Toronto Canada
In recent years, an increasing number of telecom frauds have caused huge losses to people around the world. Graph neural network(GNN) brings new possibilities for telecom fraud detection. However, due to the existence... 详细信息
来源: 评论
A Cooperative Co-Evolution Algorithm with Variable-Importance Grouping for Large-Scale Optimization  13
A Cooperative Co-Evolution Algorithm with Variable-Importanc...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Li, Yongfeng Zhang, Yuze Ma, Lijia Ji, Junkai Liu, Dugang Leung, Victor C. M. Li, Jianqiang Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Guangdong Laboratory of Artificial Intelligence and Digital Economy Shenzhen518123 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518172 China The University of British Columbia Department of Electrical and Computer Engineering VancouverV6T 1Z4 Canada
Cooperative co-evolution (CC) is a promising direction in solving large-scale multiobjective optimization problems (LMOPs). However, most existing methods of grouping decision variables face some difficulties when sea... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论