咨询与建议

限定检索结果

文献类型

  • 136 篇 会议
  • 118 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 159 篇 工学
    • 70 篇 计算机科学与技术...
    • 57 篇 软件工程
    • 51 篇 控制科学与工程
    • 22 篇 信息与通信工程
    • 19 篇 电气工程
    • 18 篇 机械工程
    • 13 篇 核科学与技术
    • 10 篇 光学工程
    • 9 篇 电子科学与技术(可...
    • 8 篇 仪器科学与技术
    • 8 篇 生物医学工程(可授...
    • 7 篇 农业工程
    • 6 篇 动力工程及工程热...
    • 6 篇 石油与天然气工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 5 篇 建筑学
  • 79 篇 理学
    • 38 篇 物理学
    • 29 篇 数学
    • 17 篇 系统科学
    • 11 篇 统计学(可授理学、...
    • 9 篇 生物学
    • 6 篇 化学
  • 46 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 17 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 农学
    • 11 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 4 篇 法学
  • 3 篇 教育学
  • 2 篇 艺术学

主题

  • 11 篇 gravitational wa...
  • 9 篇 dipper throated ...
  • 9 篇 feature selectio...
  • 8 篇 control systems
  • 7 篇 stochastic syste...
  • 7 篇 gravitational wa...
  • 7 篇 stochastic proce...
  • 6 篇 deep learning
  • 6 篇 agriculture
  • 6 篇 gravitational wa...
  • 5 篇 metaheuristics
  • 5 篇 image segmentati...
  • 5 篇 information tech...
  • 5 篇 linear matrix in...
  • 5 篇 robustness
  • 4 篇 quantum computin...
  • 4 篇 robust control
  • 4 篇 neural networks
  • 4 篇 noise
  • 4 篇 monitoring

机构

  • 20 篇 institute for pl...
  • 19 篇 department of co...
  • 19 篇 university of so...
  • 19 篇 indian institute...
  • 18 篇 department of as...
  • 18 篇 université libre...
  • 18 篇 department of co...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 department of ph...
  • 17 篇 infn trento inst...
  • 17 篇 max planck insti...
  • 17 篇 université paris...
  • 17 篇 universiteit gen...
  • 17 篇 gran sasso scien...
  • 16 篇 department of ph...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...

作者

  • 20 篇 el-sayed m.el-ke...
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 abdelhameed ibra...
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno
  • 17 篇 g. hemming
  • 17 篇 f. muciaccia
  • 17 篇 b. garaventa

语言

  • 252 篇 英文
  • 6 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Information and Computing Systems and Control"
259 条 记 录,以下是41-50 订阅
排序:
A novel approach to automatic music composing: Using genetic algorithm
A novel approach to automatic music composing: Using genetic...
收藏 引用
International Computer Music Conference, ICMC 2006
作者: Zad, Damon Daylamani Araabi, Babak N. Lucas, Caru Department of Information Systems and Computing Brunel University United Kingdom Dept. of Electrical and Computer Engineering Control and Intelligent Processing Center of Excellence University of Tehran Iran
Artificial music composition is one of the ever rising problems of computer science. Genetic Algorithm has been one of the most useful means in our hands to solve optimization problems. By use of precise assumptions a... 详细信息
来源: 评论
A family of experiments to validate measures for UML activity diagrams of ETL processes in data warehouses
A family of experiments to validate measures for UML activit...
收藏 引用
作者: Muñoz, Lilia Mazón, Jose-Norberto Trujillo, Juan Lucentia Research Group Department of Information Systems Control Evaluation and Computing Resources Technological University of Panama P.O. Box #0819-07289 Panama Lucentia Research Group Department of Software and Computing Systems University of Alicante San Vicente del Raspeig 03080 Spain
In data warehousing, Extract, Transform, and Load (ETL) processes are in charge of extracting the data from the data sources that will be contained in the data warehouse. Their design and maintenance is thus a corners... 详细信息
来源: 评论
Nonlinear Stochastic systems with Network-Induced Phenomena  1
收藏 引用
1000年
作者: Jun Hu Zidong Wang Huijun Gao
来源: 评论
Sustainability and Time Complexity Estimation of Cryptographic Algorithms Main Operations on Elliptic Curves  11
Sustainability and Time Complexity Estimation of Cryptograph...
收藏 引用
11th International Conference on Advanced Computer information Technologies, ACIT 2021
作者: Yakymenko, Igor Kasianchuk, Mykhailo Yatskiv, Vasyl Shevchuk, Ruslan Koval, Vasyl Yatskiv, Solomiya West Ukrainian National University Department of Cyber Security Ternopil Ukraine West Ukrainian National University Department of Computer Science Ternopil Ukraine West Ukrainian National University Department of Information and Computing Systems and Control Ternopil Ukraine
This paper presents the time complexity estimates for the methods of points exponentiation, which are basic for encrypting information flows in computer systems. As a result of numerical experiments, it is determined ... 详细信息
来源: 评论
Fuzzy controller of Pathological Conditions Diagnosis based on Analysis of Cytological Images  8
Fuzzy Controller of Pathological Conditions Diagnosis based ...
收藏 引用
8th International Conference Advanced Computer information Technologies, ACIT 2018
作者: Dubchak, Lesia Verbovyy, Serhiy Verbova, Olena Vasylkiv, Nadiia Department of Computer Engineering Ternopil National Economic University Ternopil 8 Chekhova str. Ukraine Department of Information and Computing Systems and Control Ternopil National Economic University 11 Lvivska str. Ternopil Ukraine
In this article authors proposed the fuzzy controller for the correct diagnosis of the breast pathological states. This mean can be used in medical practice by the cytologist as an additional way of diagnosis confirmi... 详细信息
来源: 评论
Sensor attack correction for linear systems with known inputs
Sensor attack correction for linear systems with known input...
收藏 引用
作者: Tang, Zhanghan Kuijper, Margreta Chong, Michelle Mareels, Iven Leckie, Christopher School of Electrical and Electronic Engineering University of Melbourne Australia Department of Automatic Control KTH Royal Institute of Technology Sweden IBM Research Australia Australia School of Computing and Information Systems University of Melbourne Australia
We address the problem of attack detection and attack correction for multi-input multi-output discrete-time linear time-invariant systems under sensor attacks. More specifically, we consider the situation that a syste... 详细信息
来源: 评论
Improved Prediction of Metamaterial Antenna Bandwidth Using Adaptive Optimization of LSTM
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 865-881页
作者: Doaa Sami Khafaga Amel Ali Alhussan El-Sayed M.El-kenawy Abdelhameed Ibrahim Said H.Abd Elkhalik Shady Y.El-Mashad Abdelaziz A.Abdelhamid Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Systems Engineering Faculty of Engineering at ShoubraBenha UniversityEgypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia
The design of an antenna requires a careful selection of its parameters to retain the desired ***,this task is time-consuming when the traditional approaches are employed,which represents a significant *** the other h... 详细信息
来源: 评论
Image Contour Analysis in Local Coordinates
Image Contour Analysis in Local Coordinates
收藏 引用
IEEE International Workshop on Intelligent Data Acquisition and Advanced computing systems: Technology and Applications
作者: O.M. Berezsky K.M. Berezska O.P. Adamiv Department of Information Computing Systems and Control Ternopil National Economic University Ternopil Ukraine
The article is devoted to the analysis of an image contour, the algorithms of contours characteristic points determination and algorithms of contours approximation in local coordinates on the example of tumours cells ... 详细信息
来源: 评论
An Intelligent Method for Recognizing Real and Generated Ukrainian-Language Voices
An Intelligent Method for Recognizing Real and Generated Ukr...
收藏 引用
Advanced Technology (KhPIWeek), IEEE KhPI Week on
作者: Khrystyna Lipianina-Honcharenko Dmytro Lendiuk Adam Ivaniush Gena Boguta Mariana Soia Khrystyna Yurkiv Department for Information-Computing Systems and Control West Ukrainian National University Ternopil Ukraine
The modern development of speech synthesis technologies and convolutional neural networks (CNN) creates new opportunities and challenges in the field of voice recognition. One of the key tasks is to ensure the securit... 详细信息
来源: 评论
Reliability improvement and reliability assessment for distributed hardware-software multi-agent systems
收藏 引用
WSEAS Transactions on Computers 2014年 13卷 670-690页
作者: Igumnov, Alexei V. Saradgishvili, Sergey E. Information and Control Systems Department Institute of Computing and Control Saint-Petersburg State Polytechnical University 29 Polytechnicheskaya Street Saint-Petersburg Russia
The problem of reliability of new object of distributed hardware software (DHS) multi-agent system (MAS) is considered. DHS MAS is determined as a system that is based on agent technologies and consists of both agents... 详细信息
来源: 评论