咨询与建议

限定检索结果

文献类型

  • 22,002 篇 会议
  • 3,552 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,762 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,810 篇 工学
    • 11,148 篇 计算机科学与技术...
    • 9,355 篇 软件工程
    • 4,296 篇 信息与通信工程
    • 2,504 篇 控制科学与工程
    • 2,154 篇 电子科学与技术(可...
    • 2,139 篇 电气工程
    • 1,539 篇 生物工程
    • 1,321 篇 生物医学工程(可授...
    • 1,135 篇 光学工程
    • 1,029 篇 机械工程
    • 884 篇 仪器科学与技术
    • 834 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 624 篇 安全科学与工程
    • 524 篇 交通运输工程
    • 467 篇 材料科学与工程(可...
    • 445 篇 建筑学
  • 8,214 篇 理学
    • 4,524 篇 数学
    • 2,415 篇 物理学
    • 1,705 篇 生物学
    • 1,374 篇 统计学(可授理学、...
    • 916 篇 系统科学
    • 760 篇 化学
  • 3,990 篇 管理学
    • 2,397 篇 管理科学与工程(可...
    • 1,826 篇 图书情报与档案管...
    • 1,258 篇 工商管理
  • 1,071 篇 医学
    • 948 篇 临床医学
    • 882 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
  • 713 篇 法学
    • 561 篇 社会学
  • 445 篇 经济学
  • 346 篇 教育学
  • 316 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 681 篇 accuracy
  • 529 篇 feature extracti...
  • 474 篇 deep learning
  • 473 篇 computational mo...
  • 376 篇 support vector m...
  • 370 篇 training
  • 365 篇 computer science
  • 319 篇 internet of thin...
  • 283 篇 machine learning
  • 281 篇 real-time system...
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 routing
  • 220 篇 reliability
  • 218 篇 optimization
  • 212 篇 data mining
  • 210 篇 neural networks
  • 207 篇 convolutional ne...
  • 199 篇 throughput
  • 193 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 82 篇 tno technical sc...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 90 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 76 篇 dallier r.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 boettcher m.
  • 57 篇 celli s.
  • 54 篇 aly z.
  • 52 篇 dornic d.

语言

  • 24,761 篇 英文
  • 608 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25762 条 记 录,以下是4771-4780 订阅
排序:
A Logic Study of NL Fuzzy Degree  16
A Logic Study of NL Fuzzy Degree
收藏 引用
16th IEEE International Conference on Intelligent Systems and Knowledge Engineering, ISKE 2021
作者: He, Xia Hu, Tingshu Hua, Jie Wang, Chunmei Hong, Long Huaiyin Institute of Technology Dept. of Foreign Languages Huaian China Nanjing University of Posts and Telecommunications Dept. of Computer Science Nanjing China
Natural language is inherently fuzzy. Medium Logic (ML) reveals that the essence of language fuzziness is the intermediary state of its semantics, and the measuring of Medium Truth Degree (MMTD) is the tool quantifyin... 详细信息
来源: 评论
Design and Implementation of a Malware Detection Tool Using Network Traffic Analysis in Android-based Devices
Design and Implementation of a Malware Detection Tool Using ...
收藏 引用
2023 IEEE Jordan International Joint Conference on Electrical Engineering and Information technology, JEEIT 2023
作者: Eltaher, Areen Abu-Juma'a, Dania Hashem, Dania Alawneh, Heba Princess Sumaya University for Technology Dept. of Computer Engineering Amman Jordan Al Hussein Technical University Dept. of Cybersecurity Amman Jordan
Smartphone use and dependability have increased substantially in recent years, as have malicious attempts to compromise mobile devices with various malware. Therefore, smartphones must have an active malware detection... 详细信息
来源: 评论
Diversity performance of multi-code multi-carrier CDMA communications systems
Diversity performance of multi-code multi-carrier CDMA commu...
收藏 引用
2005 International Conference on Wireless Networks, Communications and Mobile Computing
作者: Ugweje, Okechukwu C. Lee, Jinwoo Efthymoglou, George Dept. of Electrical and Computer Engineering University of Akron Akron OH 44325 Dept. of Technology Education and Digital Systems University of Piraeus Greece
A communication system combining multi-code and multi-carrier techniques is analyzed in this paper. The system is denoted as Multi-Code Multi-Carrier CDMA (MC/MC-CDMA). The analytical framework is presented and system... 详细信息
来源: 评论
Fast and reliable target base station selection scheme for Mobile WiMAX handover
Fast and reliable target base station selection scheme for M...
收藏 引用
2012 Australasian Telecommunication Networks and Applications Conference, ATNAC 2012
作者: Ray, Sayan Kumar Sirisena, Harsha Deka, Devatanu Computing and IT Dept. Manukau Institute of Technology Auckland New Zealand Electrical and Computer Engineering Dept. University of Canterbury Christchurch New Zealand
This paper proposes a serving base station (SBS)-controlled fast target base station (TBS) selection scheme for Mobile WiMAX networks. Utilizing the novel principle of orientation matching (OM) between the geographica... 详细信息
来源: 评论
Proposed framework for semantic web services
Proposed framework for semantic web services
收藏 引用
IEEE International Conference on Advances in Communication and Computing Technologies, ICACACT 2014
作者: Doshi, Mudra Anuradha, G. Computer Engineering Dept. Faculty of Computer Engineering St. Francis Institute of Technology Mumbai University Mumbai400103 India Department of Computer Engineering St.Francis Institute of Technology Mumbai University Mumbai400103 India
A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links... 详细信息
来源: 评论
Digital Image Encryption Based On Elliptic Curve Cryptography  4
Digital Image Encryption Based On Elliptic Curve Cryptograph...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2024
作者: Hasan, Mahmoud H. S. Ahmed, Medht H. S. H. Alasmarya Islamic University College of Information Technology Dept. Computer Science Zliten Libya Higher Institute of Engineering Technology Dept. Communication Engineer Zliten Libya
Information security is currently a major problem for data communication. Cryptography has emerged as a treatment and is essential to information security systems. Techniques for encryption can effectively prevent att... 详细信息
来源: 评论
Secure Authentication Scheme for Medical care applications based on IoT  4
Secure Authentication Scheme for Medical care applications b...
收藏 引用
4th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2022
作者: Rajasekaran, Arun Sekar Yuvaraj, D. Maria, Azees Gmr Institute of Technology Dept. of Ece Andhra Pradesh India Cihan University - Duhok Kurdistan Dept. of Computer Science Region Iraq
In the medical business, the Internet of Medical Things (IoMT) has turned into a specialist application framework. It is utilized to accumulate and break down the physiological boundaries of patients. The vital body p... 详细信息
来源: 评论
Robust adaptive control for a class of nonlinear systems with uncertainties and input constraints
Robust adaptive control for a class of nonlinear systems wit...
收藏 引用
2005 American Control Conference, ACC
作者: Madani, Kaveh Moezzi Eslami, Mansour Dept. of Electrical Engineering Amir Kabir University of Technology Teheran Iran Dept. of Electrical and Computer Engineering UIC Chicago IL 60607
Robust adaptive controllers for multivariable nonlinear systems with fast convergence rate are designed, in spite of unwanted effects of external disturbances and input constraints. The proposed adaptive controller gu... 详细信息
来源: 评论
Augmented reality prototype for visualising large sensors' datasets
收藏 引用
Telkomnika 2011年 第1期9卷 161-170页
作者: Folorunso Olufemi, A. Mohd Shahrizal, S. Ikotun Abiodun, M. UTMVicubeLab Dept. of Graphics and Multimedia Universiti Teknologi Malaysia Malaysia Department of Computer Technology Yaba College of Technology Lagos Nigeria
This paper addressed the development of an augmented reality (AR) based scientific visualization system prototype that supports identification, localisation, and 3D visualisation of oil leakages sensors datasets. Sens... 详细信息
来源: 评论
Mining the Cluster-level Properties of Bots Network Activities  25
Mining the Cluster-level Properties of Bots Network Activiti...
收藏 引用
25th International computer Conference, computer Society of Iran, CSICC 2020
作者: Kiani, Bahareh Mohammadi Khorsandi, Siavash Shomal University Dept. Information Technology Amol Iran Amirkabir Univ. of Tech. Dept. Computer Engineering Tehran Iran
A Botnet is a malicious network that can be leveraged in a wide range of cyber-attacks with possibly catastrophic results. Consequently, botnet detection is a high priority. In the past few years, many studies have be... 详细信息
来源: 评论