咨询与建议

限定检索结果

文献类型

  • 630 篇 会议
  • 85 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 492 篇 工学
    • 250 篇 计算机科学与技术...
    • 187 篇 软件工程
    • 123 篇 信息与通信工程
    • 92 篇 电子科学与技术(可...
    • 76 篇 机械工程
    • 72 篇 仪器科学与技术
    • 70 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 30 篇 生物工程
    • 25 篇 动力工程及工程热...
    • 24 篇 电气工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 光学工程
    • 18 篇 安全科学与工程
    • 16 篇 化学工程与技术
    • 13 篇 交通运输工程
  • 131 篇 理学
    • 54 篇 数学
    • 31 篇 生物学
    • 30 篇 物理学
    • 29 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 130 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 36 篇 医学
    • 28 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 15 篇 公共卫生与预防医...
    • 14 篇 药学(可授医学、理...
  • 18 篇 法学
    • 18 篇 社会学
  • 14 篇 教育学
    • 13 篇 教育学
  • 12 篇 农学
  • 8 篇 文学
  • 5 篇 经济学
  • 4 篇 军事学
  • 4 篇 艺术学

主题

  • 20 篇 feature extracti...
  • 20 篇 accuracy
  • 17 篇 cloud computing
  • 15 篇 real-time system...
  • 14 篇 computer science
  • 14 篇 deep learning
  • 14 篇 computational mo...
  • 13 篇 convolutional ne...
  • 10 篇 machine learning
  • 9 篇 monitoring
  • 9 篇 security
  • 8 篇 internet of thin...
  • 8 篇 medical services
  • 8 篇 data mining
  • 8 篇 authentication
  • 8 篇 artificial intel...
  • 8 篇 data models
  • 8 篇 training
  • 7 篇 support vector m...
  • 7 篇 face recognition

机构

  • 5 篇 korea
  • 5 篇 institute of inf...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of mathemat...
  • 4 篇 dept.of computer...
  • 4 篇 dept.of engineer...
  • 4 篇 dept.of informat...
  • 3 篇 graduate school ...
  • 3 篇 dept.of computer...
  • 3 篇 university of hy...
  • 3 篇 school of inform...
  • 3 篇 dept.of computer...
  • 3 篇 dayananda sagar ...
  • 3 篇 hyogo
  • 3 篇 dept.of electron...
  • 3 篇 dept.of computer...
  • 3 篇 dept.of electron...
  • 3 篇 dept of computer...

作者

  • 9 篇 hae-young bae
  • 5 篇 dong-wook lee
  • 5 篇 johan e.carlson
  • 4 篇 fangmin li
  • 4 篇 shinping r.wang
  • 4 篇 yang xiao
  • 4 篇 yonghong li
  • 4 篇 guangzhi qu
  • 4 篇 weijun liu
  • 4 篇 fu-chien kao
  • 4 篇 ling tang
  • 4 篇 shunling chen
  • 4 篇 yun-kai lin
  • 4 篇 chih-chia chen
  • 4 篇 jesper martinsso...
  • 4 篇 kiseon kim
  • 3 篇 ali mohamad abou
  • 3 篇 lara hamawy
  • 3 篇 masakazu morimot...
  • 3 篇 hansen john h.l.

语言

  • 693 篇 英文
  • 12 篇 其他
  • 11 篇 中文
  • 1 篇 日文
检索条件"机构=Dept.of Computer Science and Engineering"
717 条 记 录,以下是21-30 订阅
排序:
High-order Iterative Learning Control for Nonlinear Systems  6
High-order Iterative Learning Control for Nonlinear Systems
收藏 引用
2017 IEEE 6th Data Driven Control and Learning Systems Conference (DDCLS’17)
作者: Guojun Li Dept.of Computer science and Engineering NMAMIT Nitte
Iterative learning control demands the same initial state in each iteration, which is equal to the desired state. But this condition is unattainable in practice. This paper addresses the problem of some fixed initial ... 详细信息
来源: 评论
Magnetic field sensors using arrays of electrospun magnetoelectric Janus nanowires
收藏 引用
Microsystems & Nanoengineering 2018年 第1期4卷 24-35页
作者: Matthew J.Bauer Xiao Wen Prabal Tiwari David P.Arnold Jennifer S.Andrew Dept.of Materials Science and Engineering University of FloridaGainesvilleFL 32611-6400USA Dept.of Electrical and Computer Engineering University of FloridaGainesvilleFL 32611-6200USA
The fabrication and characterization of the first magnetoelectric sensors utilizing arrays of Janus magnetoelectric composite nanowires composed of barium titanate and cobalt ferrite are *** utilizing magnetoelectric ... 详细信息
来源: 评论
An Optimal Algorithm for Solving Collision Distance Between Convex Polygons in Plane
收藏 引用
Journal of computer science & Technology 1993年 第4期8卷 367-373页
作者: 鄢勇 Dept.of Computer Science and Engineering Huazhong University of Science and TechnologyWuhan 430074
In this paper,we study the problem,of calculating the minimum collision distance between two planar convex polygons when one of them moves to another along a given ***,several novel concepts and properties are explore... 详细信息
来源: 评论
Face recognition in the Edge Cloud  2017
Face recognition in the Edge Cloud
收藏 引用
Proceedings of the International Conference on Imaging, Signal Processing and Communication
作者: Nasif Muslim Salekul Islam Dept.of Computer Science & Engineering United International University
Cloud computing opens the door of a new paradigm where it is possible to provide service using Internet thus removing the barrier of limited hardware configuration(i.e., processing and storage) of the mobile device. E... 详细信息
来源: 评论
Floorplan-Driven High-Level Synthesis using Volatile/Non-volatile Registers for Hybrid Energy-Harvesting Systems  12
Floorplan-Driven High-Level Synthesis using Volatile/Non-vol...
收藏 引用
2017 IEEE 12th International Conference on ASIC
作者: Daiki Asai Masao Yanagisawa Nozomu Togawa Dept.of Computer Science and Communications Engineering Waseda University
In this paper,we propose a floorplan-driven highlevel synthesis algorithm utilizing both volatile and non-volatile registers for hybrid energy-harvesting *** our algorithm,we firstly introduce an idea of safety line *... 详细信息
来源: 评论
Empirical Evaluation of Information Leakage Detection Using Net-flow Analysis
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2014年 第6期21卷 16-21页
作者: Jing Xu Fei Xu Xiao-Jun Chen Jin-Qiao Shi Cheng Qi Institute of Information Engineering Chinese Academy of Sciences Dept.of Computer Science Beijing University of Technology
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information *** paper describes an information leakage detection system( ILDS) to detect sensitive informat... 详细信息
来源: 评论
E-Fitness Implementation in Metro Rail using IoT with help of 5G  3
E-Fitness Implementation in Metro Rail using IoT with help o...
收藏 引用
3rd International Conference on Electronics and Communication and Aerospace Technology, ICECA 2019
作者: Vuppala, Sukanya Enugala, Vishnu Priya Reddy Dept.of Computer Science Engineering University College of Engineering Osmania University Hyderabad India Dept.of Computer Science Engineering Telanagna India
As per Indian medical survey reports, MNC employees spend more than 1000 kilocalories of energy stored in their body. This is due to the different official timings and heavy working hours. So, it leads to various heal... 详细信息
来源: 评论
3-Multi ranked encryption with enhanced security in cloud computing
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 313-326页
作者: YeEun Kim Junggab Son Reza M.Parizi Gautam Srivastava Heekuck Oh Major in Bio Artificial Intelligence Dept.of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea Department of Computer Science Kennesaw State UniversityMariettaUSA Department of Software Engineering Kennesaw State UniversityMariettaUSA Department of Mathematics and Computer Science Brandon UniversityBrandonCanada Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Dept.of Computer Science and Engineering Hanyang UniversityAnsanRepublic of Korea
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... 详细信息
来源: 评论
Analysis of micro-forces between micro-parts and their influence factors in MEMS
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2008年 第2期15卷 238-243页
作者: 李瑰贤 彭云峰 张欣 School of Mechanical & Electronic Engineering Harbin Institute of Technology Dept.of Computer Science and Engineering Arizona State University
The research of micro-forces between micro-parts forms the base for micro-machine (MEMS) development. According to the characteristics of the interactions between micro-parts in MEMS, three models were simplified. Bas... 详细信息
来源: 评论
DoS detections based on association rules and frequent itemsets
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2008年 第2期15卷 283-289页
作者: George S Oreku Fredrick JMtenzi 李建中 Dept.of Computer Science and Engineering Harbin Institute of Technology School of Computing Dublin Institute of Technology
To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and u... 详细信息
来源: 评论