咨询与建议

限定检索结果

文献类型

  • 57,279 篇 会议
  • 9,094 篇 期刊文献
  • 455 册 图书
  • 1 篇 科技报告

馆藏范围

  • 66,829 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42,038 篇 工学
    • 26,157 篇 计算机科学与技术...
    • 21,900 篇 软件工程
    • 11,167 篇 信息与通信工程
    • 7,854 篇 电气工程
    • 7,752 篇 电子科学与技术(可...
    • 6,973 篇 控制科学与工程
    • 3,710 篇 生物工程
    • 3,185 篇 生物医学工程(可授...
    • 3,135 篇 光学工程
    • 2,792 篇 动力工程及工程热...
    • 2,761 篇 机械工程
    • 2,500 篇 仪器科学与技术
    • 2,160 篇 化学工程与技术
    • 1,599 篇 材料科学与工程(可...
    • 1,379 篇 安全科学与工程
    • 1,283 篇 交通运输工程
  • 22,005 篇 理学
    • 11,661 篇 数学
    • 7,289 篇 物理学
    • 4,039 篇 生物学
    • 3,710 篇 统计学(可授理学、...
    • 2,667 篇 系统科学
    • 2,262 篇 化学
  • 9,139 篇 管理学
    • 5,594 篇 管理科学与工程(可...
    • 3,948 篇 图书情报与档案管...
    • 3,076 篇 工商管理
  • 2,472 篇 医学
    • 2,147 篇 临床医学
    • 2,002 篇 基础医学(可授医学...
    • 1,354 篇 药学(可授医学、理...
  • 1,583 篇 法学
    • 1,305 篇 社会学
  • 1,152 篇 经济学
    • 1,150 篇 应用经济学
  • 841 篇 教育学
  • 733 篇 农学
  • 275 篇 文学
  • 178 篇 军事学
  • 61 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 1,377 篇 accuracy
  • 1,350 篇 computational mo...
  • 1,187 篇 feature extracti...
  • 1,046 篇 training
  • 899 篇 computer science
  • 757 篇 deep learning
  • 746 篇 machine learning
  • 701 篇 real-time system...
  • 700 篇 predictive model...
  • 674 篇 optimization
  • 566 篇 support vector m...
  • 559 篇 computer archite...
  • 539 篇 neural networks
  • 537 篇 internet of thin...
  • 535 篇 data models
  • 481 篇 mathematical mod...
  • 475 篇 data mining
  • 470 篇 bandwidth
  • 461 篇 wireless sensor ...
  • 446 篇 monitoring

机构

  • 164 篇 dept. of electri...
  • 89 篇 institute of inf...
  • 82 篇 north-west unive...
  • 80 篇 institut univers...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 73 篇 national centre ...
  • 66 篇 università di ca...
  • 63 篇 dept. of electr....
  • 58 篇 school of automa...
  • 58 篇 dept. of electri...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of electri...
  • 44 篇 leiden universit...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...
  • 39 篇 dept. of compute...
  • 37 篇 dept. of compute...

作者

  • 87 篇 chen a.
  • 86 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 82 篇 gal t.
  • 78 篇 bozza c.
  • 56 篇 kalekin o.
  • 54 篇 kulikovskiy v.
  • 48 篇 huang f.
  • 42 篇 benoit d.m.
  • 42 篇 eddymaoui a.
  • 42 篇 labalme m.
  • 41 篇 gagliardini s.
  • 38 篇 androulakis g.
  • 38 篇 díaz a.f.
  • 34 篇 de palma m.
  • 33 篇 khatun a.
  • 29 篇 eirini eleni tsi...
  • 28 篇 berti a.
  • 28 篇 ambrosi g.

语言

  • 64,401 篇 英文
  • 1,256 篇 其他
  • 749 篇 中文
  • 316 篇 朝鲜文
  • 109 篇 日文
  • 6 篇 德文
  • 3 篇 西班牙文
  • 3 篇 土耳其文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Electrical and Computer Engineering Dept. of Computer Science"
66829 条 记 录,以下是4901-4910 订阅
排序:
Combining Photometric Features and Relative Position to Detect and Track Target Person  2
Combining Photometric Features and Relative Position to Dete...
收藏 引用
2nd International Conference on computer engineering, Network, and Intelligent Multimedia, CENIM 2019
作者: Dewantara, Bima Sena Bayu Miura, Jun Politeknik Elektronika Negeri Surabaya Dept. of Informatics and Computer Engineering Surabaya Indonesia Toyohashi University of Technology Dept. of Computer Science and Engineering Toyohashi Japan
Tracking a target person is a vital job in human-robot interaction. The robot must always notice a particular person as the interaction target partner. However, it is sometimes very hard to distinguish the target pers... 详细信息
来源: 评论
Mixed FBB and RBB low leakage technique for high durable CMOS circuit
Mixed FBB and RBB low leakage technique for high durable CMO...
收藏 引用
2014 International Conference on Informatics, Electronics and Vision, ICIEV 2014
作者: Barua, Parag Jafar, Imran Bin Sengupta, Prianka Noor, Md. Sadaf Dept. of Electrical and Electronic Engineering BRAC University Dhaka Bangladesh Dept. of Electrical and Computer Engineering University of Texas San Antonio United States
CMOS logic circuit is extensively used for designing low power Very Large Scale Integration (VLSI). Reducing the dimension of CMOS in a nanometer range, functionality and efficiency can be increased, but as a result w... 详细信息
来源: 评论
Rule-based approach for enhancing the motion trajectories in human activity recognition
Rule-based approach for enhancing the motion trajectories in...
收藏 引用
2010 10th International Conference on Intelligent Systems Design and Applications, ISDA'10
作者: Hassan, Sherien Mohamed Al-Sadek, Ahmed Farouk Hemayed, Elsayed E. Computer Science Dept. October University for Modern Sciences and Arts MSA Egypt Computer Engineering Dept. Faculty of Engineering Cairo University Giza Egypt
In this paper, we propose a rule-based system for semantically understanding and analyzing the motion of the trajectories of the human activity. The proposed system can be used as a preprocessing phase for enhancing t... 详细信息
来源: 评论
Tender Coconut Classification using Decision Tree and Deep Learning Technique  10
Tender Coconut Classification using Decision Tree and Deep L...
收藏 引用
10th International Conference on Signal Processing and Integrated Networks, SPIN 2023
作者: Bhat, Ishani Umadevi, V. Jagadeesh, Nishchitha Bhat, Savithri Shenoy, Rashmi S Pes University Dept. of Computer Science Bengaluru India B.MS. College of Engineering Dept. of Computer Science Bengaluru India B.MS. College of Engineering Dept. of Biotechnology Bengaluru India
A number of industry sectors such as Food & nutraceuticals, Pharma, Irrigation, Transport and Automobile use coconut and its parts for varied products. As different sectors make use of different type and parts of ... 详细信息
来源: 评论
Virtual network embedding with border matching
Virtual network embedding with border matching
收藏 引用
2012 4th International Conference on Communication Systems and Networks, COMSNETS 2012
作者: Chen, Xuzhou Luo, Yan Wang, Jie Dept. of Computer Science Fitchburg State University Fitchburg MA 01720 United States Dept. of Electrical and Computer Engineering University of Massachusetts Lowell Lowell MA 01854 United States Dept. of Computer Science University of Massachusetts Lowell Lowell MA 01854 United States
A major challenge in virtual network embedding is to find an efficient mapping of each virtual network (VN) to the nodes and links in the substrate network (SN) so that the residual SN can host as many VN requests as ... 详细信息
来源: 评论
A Novel Single Helix Magnetic Lead Screw for Wave Energy Converter  13
A Novel Single Helix Magnetic Lead Screw for Wave Energy Con...
收藏 引用
13th International Symposium on Linear Drives for Industry Applications, LDIA 2021
作者: Zhu, Lixun Yao, Zhaoyang Liu, Shiyi Jiang, Jiacheng Wu, Weimin Koh, Chang-Seop Dept. of Electrical Engineering Shanghai Maritime University Shanghai China Dept. Electrical and Computer Engineering Chungbuk National University Cheongju Korea Republic of
A new type magnetic lead screw (MLS) is proposed in this paper. The proposed magnetic lead screw is assembled with a single helix permanent magnet (PM) on the translator, and the rotor adopts double helical PMs which ... 详细信息
来源: 评论
Power Quality Problems that Occur at a Company Producing electrical Equipment
Power Quality Problems that Occur at a Company Producing Ele...
收藏 引用
2023 Power Quality and Electromagnetic Compatibility at Low-Frequency, PQEMC-LF 2023
作者: Nicolae, Petre-Marian Nicolae, Ileana-Diana Nicolae, Marian-Stefan University of Craiova Electrical Engineering Energetic and Aeronautics Dept. Craiova Romania University of Craiova Computer Science and Information Technology Dept. Craiova Romania
The paper presents the problems that arise when supplying a company producing electrical equipment from the electricity network. The distorting regimes that appear affect the operation of the electric power network, i... 详细信息
来源: 评论
High-Speed Secure Vanity Address Generator for User Convenience in Blockchain Networks  5
High-Speed Secure Vanity Address Generator for User Convenie...
收藏 引用
5th International Conference on Blockchain Computing and Applications, BCCA 2023
作者: Islam, Md. Mainul Islam, Md. Kamrul Hammoudeh, Mohammad Texas A&M University Dept. of Computer Science and Engineering College Station United States Shahjalal University of Science and Technology Dept. of Electrical and Electronic Engineering Sylhet Bangladesh King Fahd University of Petroleum and Minerals Dept. of Information and Computer Science Dhahran Saudi Arabia
Generating a vanity address (VA) for user convenience in blockchain networks is a memoryless brute-force exercise that involves testing millions of probable private keys. It requires a high-speed processor to compute ... 详细信息
来源: 评论
Shot boundary detection based on mutual information and canny edge detector
Shot boundary detection based on mutual information and cann...
收藏 引用
International Conference on computer science and Software engineering, CSSE 2008
作者: Zhao, Huan Li, Xiuhuan Yu, Lilei Dept. of Computer and Communication Hunan University Changsha China Dept. of Computer and Information Engineering Heilongjiang Science and Technology University Harbin China
Shot boundary detection servers as the preliminary step to Video Retrieval. Most of error detections in the present algorithms are caused by object and camera. Many researchers make use of mutual information to detect... 详细信息
来源: 评论
Simple packet scheduling method for data-partitioned video streaming over broadband wireless  6
Simple packet scheduling method for data-partitioned video s...
收藏 引用
2014 6th computer science and Electronic engineering Conference, CEEC 2014
作者: Al-Jobouri, Laith Fleury, Martin Ghanbari, M. Ali, Ismail A. School of Computer Science and Electronic Engineering University of Essex Colchester United Kingdom Dept. of Electrical and Computer Engineering University of Duhok Duhok Iraq
Source-coded data partitioning of a compressed video stream protects more important data, reducing the risk of error corruption in wireless networks. However, because the data partitions of a video slice are each assi... 详细信息
来源: 评论