咨询与建议

限定检索结果

文献类型

  • 643 篇 会议
  • 85 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 730 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 495 篇 工学
    • 249 篇 计算机科学与技术...
    • 186 篇 软件工程
    • 125 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 76 篇 机械工程
    • 73 篇 仪器科学与技术
    • 72 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 30 篇 生物工程
    • 25 篇 动力工程及工程热...
    • 24 篇 电气工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 18 篇 安全科学与工程
    • 16 篇 化学工程与技术
    • 13 篇 交通运输工程
  • 131 篇 理学
    • 54 篇 数学
    • 31 篇 生物学
    • 30 篇 物理学
    • 29 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 36 篇 医学
    • 28 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
    • 14 篇 药学(可授医学、理...
  • 18 篇 法学
    • 18 篇 社会学
  • 14 篇 教育学
    • 13 篇 教育学
  • 12 篇 农学
  • 9 篇 文学
  • 5 篇 经济学
  • 4 篇 军事学
  • 4 篇 艺术学

主题

  • 21 篇 accuracy
  • 20 篇 feature extracti...
  • 18 篇 cloud computing
  • 16 篇 computational mo...
  • 16 篇 real-time system...
  • 14 篇 computer science
  • 14 篇 deep learning
  • 13 篇 convolutional ne...
  • 10 篇 machine learning
  • 9 篇 authentication
  • 9 篇 monitoring
  • 9 篇 security
  • 8 篇 internet of thin...
  • 8 篇 medical services
  • 8 篇 data mining
  • 8 篇 wireless sensor ...
  • 8 篇 artificial intel...
  • 8 篇 data models
  • 8 篇 training
  • 7 篇 support vector m...

机构

  • 5 篇 korea
  • 5 篇 institute of inf...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of mathemat...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of engineer...
  • 4 篇 dept.of informat...
  • 3 篇 graduate school ...
  • 3 篇 dept.of computer...
  • 3 篇 university of hy...
  • 3 篇 school of inform...
  • 3 篇 dept.of computer...
  • 3 篇 dayananda sagar ...
  • 3 篇 hyogo
  • 3 篇 dept.of electron...
  • 3 篇 dept.of computer...
  • 3 篇 dept.of electron...
  • 3 篇 dept of computer...

作者

  • 9 篇 hae-young bae
  • 5 篇 dong-wook lee
  • 5 篇 johan e.carlson
  • 4 篇 fangmin li
  • 4 篇 shinping r.wang
  • 4 篇 yang xiao
  • 4 篇 yonghong li
  • 4 篇 guangzhi qu
  • 4 篇 weijun liu
  • 4 篇 fu-chien kao
  • 4 篇 ling tang
  • 4 篇 shunling chen
  • 4 篇 yun-kai lin
  • 4 篇 chih-chia chen
  • 4 篇 jesper martinsso...
  • 4 篇 kiseon kim
  • 3 篇 ali mohamad abou
  • 3 篇 lara hamawy
  • 3 篇 masakazu morimot...
  • 3 篇 hansen john h.l.

语言

  • 693 篇 英文
  • 25 篇 其他
  • 11 篇 中文
  • 1 篇 日文
检索条件"机构=Dept.of Computer Science& Engineering"
730 条 记 录,以下是421-430 订阅
排序:
Power-aware control action scheduling in smart grid wireless actuator networks
Power-aware control action scheduling in smart grid wireless...
收藏 引用
2011 International Conference on computers, Communications, Control and Automation
作者: Junghoon Lee Gyung-Leen Park Ho-Young Kwak Dept.of Computer Science and Statistics Jeju National University Dept.of Computer Engineering Jeju National University
This paper designs a power-aware control action scheduler capable of reducing peak power consumption and measures its performance based on the actual implementation,aiming at improving operation reliability in the wir... 详细信息
来源: 评论
A Novel Approach to Provide Mobile RFID-Based Services Combined with Data Mining Technique
A Novel Approach to Provide Mobile RFID-Based Services Combi...
收藏 引用
2011 International Conference on Mechanical engineering and Technology(ICMET 2011)
作者: Juyoung Kang Jinlong Piao Hyeon-Seok Kim Seong Baeg Kim Chan Jung Park Dept.of Computer Science and Engineering Ewha Womans University Dept.of Computer Education Jeju National University
In advance of RFID technology, various types of services based on mobile RFID technology have been developedHowever, there still exists limitation on RFID-based services such as transferring the simple information of ... 详细信息
来源: 评论
Flexible Localization and Identification System Based on RFID and Vision Tracking Technologies
Flexible Localization and Identification System Based on RFI...
收藏 引用
2011 International Symposium on computer science and Society
作者: Ching-Sheng Wang Chun-Chih Chen Dept.of Computer Science and Information Engineering Aletheia University
Among existing indoor localization systems, considering the costs and accuracy, RFID has been one of the best choices for indoor positioning. However, years of research experiences found that the signal strength of RF... 详细信息
来源: 评论
Available Power Analysis for Background Tasks on Ubiquitous Sensor and Actuator Networks
Available Power Analysis for Background Tasks on Ubiquitous ...
收藏 引用
The second International Conference of Electrical and Electronics engineering(ICEEE 2011)
作者: Junghoon Lee Cheol Min Kim Ho-Young Kwak Jikwang Han Dept.of Computer Science and Statistics Jeju National University Dept.of Computer Education Jeju National University Dept.of Computer Engineering Jeju National University
This paper first presents the sensor data processing framework integrating a power consumption scheduler for control actions, and then analyzes the available power for background tasks which are continuously performed... 详细信息
来源: 评论
Improved Retinex Image Enhancement Algorithm
Improved Retinex Image Enhancement Algorithm
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on Information Technology and Ocean engineering(CICC-ITOE 2011)
作者: Ling Tang Shunling Chen Weijun Liu Yonghong Li Sichuan University of Science & Engineering Dept.of Electronic Engineering Sichuan University of Science & Engineering Dept.of Science Engineering Sichuan University of Science & Engineering Computer Application Research of SUSE
Retinex method mainly consists of two steps: estimation and normalization of illumination. How to extract the background illumination accurately is a key problem. The backgrounds of picture sequence in video's adj... 详细信息
来源: 评论
A Improved Method of Discretization of Continuous Attributes
A Improved Method of Discretization of Continuous Attributes
收藏 引用
2011 2ND International Conference on Innovative Computing and Communication and 2011 Asia-Pacific Conference on Information Technology and Ocean engineering(CICC-ITOE 2011)
作者: Shunling Chen Weijun Liu Ling Tang Yonghong Li Sichuan University of Science & Engineering Dept.of Science Engineering Sichuan University of Science & Engineering Computer Application Research of SUSE Sichuan University of Science & Engineering Dept.of Electronic Engineering
Discretization of continuous attributes is one of the important steps in preprocessing of data analysis. In this paper, a new method of supervised discretization of continuous attributes based on entropy and hierarchi... 详细信息
来源: 评论
Target classification system based on the characterization of targets by subspaces
Target classification system based on the characterization o...
收藏 引用
2011 CIE International Conference on Radar(RADAR 2011)
作者: Jonathan Pisane Marc Lesturgie Jacques Verly Dept.of Electrical Engineering & Computer Science University of Liège
This paper presents a novel classification tech- nique based on targets bistatic backscattering coefficients acquired at low frequencies. Each target class is characterized by a subspace. Air targets are then classifi... 详细信息
来源: 评论
Analysis of Direction of Arrival Techniques using Uniform Linear Array
Analysis of Direction of Arrival Techniques using Uniform Li...
收藏 引用
2011 4th IEEE International Conference on computer science and Information Technology(ICCSIT 2011)
作者: S.N.Bhuiya F.Islam M A Matin Dept.of Electrical Engineering and Computer Science North South University
The performance of smart antennas relies heavily on the accurate estimation of the direction of arrival(DOA).This paper analyzed various techniques for DOA estimation and investigated their *** results showed that MUS... 详细信息
来源: 评论
A New Reversible Secret Image Sharing Scheme Based on Multi-Level Encoding
A New Reversible Secret Image Sharing Scheme Based on Multi-...
收藏 引用
2011 International Conference on Internet Computing and Information Services (ICICIS 2011)
作者: Zhi-Hui Wang Chin-Chen Chang Marcos Segalla Pizzolatti Dept.of Software Dalian University of Technology Dept.of Information Engineering and Computer Science Feng Chia University
Lin et al. proposed a non-expansion method to improve the image quality of the recovered image in visual cryptography by taking into account the distribution of black pixels. This paper proposes a new non-expansion me... 详细信息
来源: 评论
Detecting Crosstalk Modules of Combined Networks:the Case for the NF-κB and p53
Detecting Crosstalk Modules of Combined Networks:the Case fo...
收藏 引用
International Conference on Bioscience, Biochemistry and Bioinformatics(ICBBB 2011)
作者: Thanh-Phuong Nguyen Adaoha E.C.Ihekwaba Corrado Priami The Microsoft Research-University of Trento Centre for Computational and Systems Biology TrentoItaly Dept.of Information Engineering and Computer Science University of TrentoTrentoItaly
It has become increasingly clear that signalling pathways are extensively interconnected and are embedded in networks with common protein *** components do not exist in isolation but may gather together to form crosst... 详细信息
来源: 评论