咨询与建议

限定检索结果

文献类型

  • 22,002 篇 会议
  • 3,560 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,818 篇 工学
    • 11,160 篇 计算机科学与技术...
    • 9,365 篇 软件工程
    • 4,315 篇 信息与通信工程
    • 2,522 篇 控制科学与工程
    • 2,156 篇 电子科学与技术(可...
    • 2,145 篇 电气工程
    • 1,539 篇 生物工程
    • 1,319 篇 生物医学工程(可授...
    • 1,129 篇 光学工程
    • 1,029 篇 机械工程
    • 883 篇 仪器科学与技术
    • 835 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 627 篇 安全科学与工程
    • 525 篇 交通运输工程
    • 470 篇 材料科学与工程(可...
  • 8,230 篇 理学
    • 4,538 篇 数学
    • 2,413 篇 物理学
    • 1,706 篇 生物学
    • 1,378 篇 统计学(可授理学、...
    • 915 篇 系统科学
    • 763 篇 化学
  • 4,000 篇 管理学
    • 2,395 篇 管理科学与工程(可...
    • 1,838 篇 图书情报与档案管...
    • 1,252 篇 工商管理
  • 1,082 篇 医学
    • 947 篇 临床医学
    • 881 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
    • 451 篇 公共卫生与预防医...
  • 712 篇 法学
    • 560 篇 社会学
  • 444 篇 经济学
  • 346 篇 教育学
  • 315 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 681 篇 accuracy
  • 529 篇 feature extracti...
  • 477 篇 deep learning
  • 473 篇 computational mo...
  • 376 篇 support vector m...
  • 370 篇 training
  • 365 篇 computer science
  • 320 篇 internet of thin...
  • 284 篇 machine learning
  • 280 篇 real-time system...
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 routing
  • 220 篇 reliability
  • 219 篇 optimization
  • 212 篇 data mining
  • 210 篇 neural networks
  • 207 篇 convolutional ne...
  • 199 篇 throughput
  • 194 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 91 篇 kalekin o.
  • 91 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 89 篇 calvo d.
  • 89 篇 coleiro a.
  • 82 篇 gal t.
  • 81 篇 bozza c.
  • 80 篇 chen a.
  • 77 篇 gozzini s.r.
  • 76 篇 dallier r.
  • 75 篇 huang f.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 celli s.
  • 57 篇 boettcher m.
  • 54 篇 aly z.
  • 53 篇 dornic d.

语言

  • 24,769 篇 英文
  • 607 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25770 条 记 录,以下是4781-4790 订阅
排序:
Robust adaptive control for a class of nonlinear systems with uncertainties and input constraints
Robust adaptive control for a class of nonlinear systems wit...
收藏 引用
2005 American Control Conference, ACC
作者: Madani, Kaveh Moezzi Eslami, Mansour Dept. of Electrical Engineering Amir Kabir University of Technology Teheran Iran Dept. of Electrical and Computer Engineering UIC Chicago IL 60607
Robust adaptive controllers for multivariable nonlinear systems with fast convergence rate are designed, in spite of unwanted effects of external disturbances and input constraints. The proposed adaptive controller gu... 详细信息
来源: 评论
Digital Image Encryption Based On Elliptic Curve Cryptography  4
Digital Image Encryption Based On Elliptic Curve Cryptograph...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2024
作者: Hasan, Mahmoud H. S. Ahmed, Medht H. S. H. Alasmarya Islamic University College of Information Technology Dept. Computer Science Zliten Libya Higher Institute of Engineering Technology Dept. Communication Engineer Zliten Libya
Information security is currently a major problem for data communication. Cryptography has emerged as a treatment and is essential to information security systems. Techniques for encryption can effectively prevent att... 详细信息
来源: 评论
Proposed framework for semantic web services
Proposed framework for semantic web services
收藏 引用
IEEE International Conference on Advances in Communication and Computing Technologies, ICACACT 2014
作者: Doshi, Mudra Anuradha, G. Computer Engineering Dept. Faculty of Computer Engineering St. Francis Institute of Technology Mumbai University Mumbai400103 India Department of Computer Engineering St.Francis Institute of Technology Mumbai University Mumbai400103 India
A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links... 详细信息
来源: 评论
Mining the Cluster-level Properties of Bots Network Activities  25
Mining the Cluster-level Properties of Bots Network Activiti...
收藏 引用
25th International computer Conference, computer Society of Iran, CSICC 2020
作者: Kiani, Bahareh Mohammadi Khorsandi, Siavash Shomal University Dept. Information Technology Amol Iran Amirkabir Univ. of Tech. Dept. Computer Engineering Tehran Iran
A Botnet is a malicious network that can be leveraged in a wide range of cyber-attacks with possibly catastrophic results. Consequently, botnet detection is a high priority. In the past few years, many studies have be... 详细信息
来源: 评论
Design of tri band Planar Inverted F Antenna
Design of tri band Planar Inverted F Antenna
收藏 引用
2016 IEEE International Conference on Advances in Electronics, Communication and computer technology, ICAECCT 2016
作者: Jha, Nidhi Pisu, Chinmay Sakhare, Sneha Jagtap, Pramod Degaonkar, Varsha Dept. of Electrical and Computer Engineering University of California Davis United States Dept. of EandTC International Institute of Information Technology Pune India
In this paper, we are presenting a tri-band Planar Inverted F Antenna (PIFA) for mobile application. PIFA basically consist of ground plate, patch, feed and shortening pin connected to ground plate. Antenna is designe... 详细信息
来源: 评论
Augmented reality prototype for visualising large sensors' datasets
收藏 引用
Telkomnika 2011年 第1期9卷 161-170页
作者: Folorunso Olufemi, A. Mohd Shahrizal, S. Ikotun Abiodun, M. UTMVicubeLab Dept. of Graphics and Multimedia Universiti Teknologi Malaysia Malaysia Department of Computer Technology Yaba College of Technology Lagos Nigeria
This paper addressed the development of an augmented reality (AR) based scientific visualization system prototype that supports identification, localisation, and 3D visualisation of oil leakages sensors datasets. Sens... 详细信息
来源: 评论
A new reversible secret image sharing scheme based on multi-level encoding
A new reversible secret image sharing scheme based on multi-...
收藏 引用
2011 International Conference on Internet Computing and Information Services, ICICIS 2011
作者: Wang, Zhi-Hui Chang, Chin-Chen Pizzolatti, Marcos Segalla Dept. of Software Dalian University of Technology DaLian China Dept. of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Lin et al. proposed a non-expansion method to improve the image quality of the recovered image in visual cryptography by taking into account the distribution of black pixels. This paper proposes a new non-expansion me... 详细信息
来源: 评论
Common-mode voltage reduction for medium-voltage current source converters by optimizing switching sequences
Common-mode voltage reduction for medium-voltage current sou...
收藏 引用
5th Annual IEEE Energy Conversion Congress and Exhibition, ECCE 2013
作者: Hu, Anping Zhu, Ning Xu, Dewei David Wu, Bin Su, Jianhui Dept. of Electric Engineering and Automation Hefei University of Technology Hefei China Dept. of Electrical and Computer Engineering Ryerson University Toronto Canada
Common-mode voltages (CMVs) can lead to premature failure of the motor insulation system in medium-voltage (MV) current source drives. This paper proposes a novel space-vector modulation (SVM) based gating strategy th... 详细信息
来源: 评论
User-class based service acceptance policy using cluster analysis
收藏 引用
1st International Conference on Distributed Computing and Internet technology, ICDCIT 2004
作者: Park, Hea-Sook Yan-Ha Lee, Soon-Mi Park, Young-Whan Baik, Doo-Kwon Dept. of Computer & Information Technology Kyungin Womens’s College 548-4 Gyesan-dong Gyeyang-gu Incheon407-740 Korea Republic of Dept. of Computer Science Hansung University Seoul Korea Republic of Dept. of Computer Science Technology Korea University Seoul Korea Republic of
This paper suggests a new policy for consolidating a company’s profits by segregating the clients using the contents service and allocating the media server’s resources distinctively by clusters using the cluster an... 详细信息
来源: 评论
Multishot Adversarial Network Decoding  59
Multishot Adversarial Network Decoding
收藏 引用
59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023
作者: Cotardo, Giuseppe Matthews, Gretchen L. Shapiro, Julia Ravagnani, Alberto Virginia Tech Dept. of Mathematics BlacksburgVA United States Eindhoven University of Technology Dept. of Mathematics and Computer Science Eindhoven Netherlands
We investigate adversarial network coding and decoding focusing on the multishot regime. Errors can occur on a proper subset of the network edges and are modeled via an adversarial channel. The paper contains both bou... 详细信息
来源: 评论