咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 2,530 篇 期刊文献
  • 119 册 图书

馆藏范围

  • 5,895 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,427 篇 工学
    • 2,194 篇 计算机科学与技术...
    • 1,738 篇 软件工程
    • 686 篇 控制科学与工程
    • 667 篇 信息与通信工程
    • 477 篇 电气工程
    • 414 篇 电子科学与技术(可...
    • 362 篇 生物工程
    • 339 篇 生物医学工程(可授...
    • 293 篇 机械工程
    • 243 篇 光学工程
    • 217 篇 仪器科学与技术
    • 191 篇 动力工程及工程热...
    • 156 篇 化学工程与技术
    • 146 篇 材料科学与工程(可...
    • 135 篇 交通运输工程
    • 114 篇 安全科学与工程
  • 1,947 篇 理学
    • 927 篇 数学
    • 601 篇 物理学
    • 465 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 291 篇 系统科学
    • 186 篇 化学
  • 935 篇 管理学
    • 630 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 305 篇 工商管理
  • 400 篇 医学
    • 340 篇 临床医学
    • 264 篇 基础医学(可授医学...
    • 155 篇 药学(可授医学、理...
    • 138 篇 公共卫生与预防医...
  • 155 篇 法学
    • 127 篇 社会学
  • 115 篇 经济学
  • 74 篇 农学
  • 71 篇 教育学
  • 20 篇 文学
  • 19 篇 艺术学
  • 10 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 156 篇 computer science
  • 148 篇 deep learning
  • 140 篇 machine learning
  • 115 篇 artificial intel...
  • 103 篇 computational mo...
  • 92 篇 feature extracti...
  • 87 篇 accuracy
  • 82 篇 systems engineer...
  • 74 篇 optimization
  • 72 篇 internet of thin...
  • 68 篇 training
  • 67 篇 neural networks
  • 62 篇 mathematical mod...
  • 61 篇 control systems
  • 52 篇 computational in...
  • 52 篇 educational inst...
  • 52 篇 predictive model...
  • 50 篇 support vector m...
  • 50 篇 robustness
  • 48 篇 data mining

机构

  • 44 篇 faculty of compu...
  • 32 篇 department of co...
  • 26 篇 department of in...
  • 24 篇 institute for sy...
  • 24 篇 faculty of engin...
  • 20 篇 graduate school ...
  • 20 篇 inesc tec - inst...
  • 20 篇 computer enginee...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 faculty of engin...
  • 17 篇 faculty of compu...
  • 17 篇 faculty of compu...
  • 16 篇 department of co...
  • 15 篇 department of el...
  • 15 篇 department of in...
  • 15 篇 department of in...
  • 15 篇 ieee
  • 15 篇 faculty of compu...
  • 15 篇 rt-rk institute ...

作者

  • 37 篇 pedrycz witold
  • 27 篇 tao dacheng
  • 26 篇 el-sayed m.el-ke...
  • 24 篇 xin xin
  • 21 篇 abdelwahed motwa...
  • 17 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 tomio watanabe
  • 15 篇 gallegos luis en...
  • 15 篇 anwer mustafa hi...
  • 13 篇 k. inoue
  • 13 篇 watanabe tomio
  • 13 篇 fahd n.al-wesabi
  • 12 篇 ahmed bestoun s.
  • 12 篇 manar ahmed hamz...
  • 12 篇 abdelhameed ibra...
  • 11 篇 radwa marzouk
  • 11 篇 yunyoung nam
  • 11 篇 m. ishikawa
  • 11 篇 nengkun yu

语言

  • 5,646 篇 英文
  • 178 篇 其他
  • 40 篇 中文
  • 29 篇 日文
  • 3 篇 德文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer Science of Systems Engineering"
5895 条 记 录,以下是4981-4990 订阅
排序:
Texture image retrieval using contourlet transform
Texture image retrieval using contourlet transform
收藏 引用
International Symposium on Signals, Circuits and systems (ISSCS)
作者: Ali Mosleh Farzad Zargari Reza Azizi Department of Computer Engineering Science & Research Branch Islamic Azad University Tehran Iran Multimedia Systems Research Group IT Faculty Iran Telecom Research Center Tehran Iran Department of Computer Engineering maybod Branch Islamic Azad University Iran
Content based image retrieval is a challenging issue in management of existing large digital image libraries and databases. The accuracy of image retrieval methods is subject to effective extraction of image features ... 详细信息
来源: 评论
Study of Smart Card Technology and Probe User Awareness about It: A Case Study of Middle Eastern Students
Study of Smart Card Technology and Probe User Awareness abou...
收藏 引用
2009 2nd IEEE International Conference on computer science and Information Technology(ICCSIT 2009)
作者: Hamed Taherdoost Mazdak Zamani Meysam Namayandeh Centre for Advanced Software Engineering Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia 54100 Kuala Lumpur Malaysia
Right now,in most of the countries,inside the people’s wallet,they probably have a couple of credit cards,an identification card,automatic machine teller cards(ATM card),and maybe a few other plastic *** realizing it... 详细信息
来源: 评论
Enhanced architecture for multimodality for real time monitoring of vessels in the Mauritian lagoon
Enhanced architecture for multimodality for real time monito...
收藏 引用
Eurocon
作者: Vinaye Armoogum Sheeba Armoogum Jaleel Polin Department of Industrial Systems Engineering from the School of Innovative Technologies and Engineering University of Technology Mauritius (UTM) Department of Computer Science and Engineering from the Faculty of Engineering University of Mauritius (UOM) Sch. of Adv. Comput. CDAC Mauritius
This paper is a continuation regarding the proposed architecture on multimodality discussed by Armoogum et al. It proposes further enhancements on the current architecture and explores other possibilities regarding it... 详细信息
来源: 评论
Proposal for artificial bone formation using powder-layered manufacturing: Surface and internal chemical composition of formed artificial bone
Transactions of Japanese Society for Medical and Biological ...
收藏 引用
Transactions of Japanese Society for Medical and Biological engineering 2009年 第4期47卷 359-365页
作者: Yamazawa, Kenji Hashizume, Daisuke Nakao, Aiko Anzai, Masahiro Narahara, Hiroyuki Suzuki, Hiroshi Rapid Engineering Team Advanced Technology Support Division Riken Japan Cooperative Support Team Advanced Technology Support Division Riken Japan Advanced Engineering Team Advanced Technology Support Division Riken Japan Department of Mechanical Information Science and Technology Faculty of Computer Science and Systems Engineering Kyushu Institute of Technology Japan
In this study, we proposed a powder-layered manufacturing process, a type of rapid prototyping technique, to produce desired bone shapes for transplants using biomaterial powder. In the experiments, we used convention... 详细信息
来源: 评论
A combined analytical and simulation-based model for performance evaluation of a reconfigurable instruction set processor
A combined analytical and simulation-based model for perform...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Farhad Mehdipour Hamid Noori Bahman Javadi Hiroaki Honda Koji Inoue Kazuaki Murakami Faculty of Information Science and Electrical Engineering Kyushu University Japan Institute of Systems Information Technologies and Nanotechnologies Japan Computer Engineering and IT Department Amirkabir University of Technology슠 Iran Department of Informatics Kyushu University Japan
Performance evaluation is a serious challenge in designing or optimizing reconfigurable instruction set processors. The conventional approaches based on synthesis and simulations are very time consuming and need a con... 详细信息
来源: 评论
Optimality of Affine Policies in Multi-stage Robust Optimization
Optimality of Affine Policies in Multi-stage Robust Optimiza...
收藏 引用
Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
作者: Dimitris Bertsimas Dan A.Iancu Pablo A.Parrilo Faculty of the Sloan School of Management and the Operations Research Center Massachusetts Institute of Technology the Operations Research Center Massachusetts Institute of Technology the Laboratory for Information and Decision Systems and the Faculty of Electrical Engineering and Computer Science Massachusetts Institute of Technology
In this paper,we prove the optimality of disturbance-affine control policies in the context of onedimensional,box-constrained,multi-stage robust *** results cover the finite horizon case,with minimax(worstcase) object... 详细信息
来源: 评论
Managing Malware in Higher Learning Institutions
Managing Malware in Higher Learning Institutions
收藏 引用
International Conference on computer and Electrical engineering, ICCEE
作者: Zuraini Ismail Christine Simfukwe Department of Science College of Science & Technology International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Faculty of Computer Science and Information Systems International Campus Universiti Teknologi Malaysia Kuala Lumpur Malaysia
"Malware" is an umbrella term that describes a variety of Internet-borne threats, including viruses, spyware,Trojan horses, spam, bots and more. This sophisticated and evolving security threat puts all busin... 详细信息
来源: 评论
A Skipping SvS Intersection Algorithm
A Skipping SvS Intersection Algorithm
收藏 引用
International Conference on Computing, engineering and Information, ICC
作者: Jaratdech Chatchaval Veera Boonjing Pisit Chanvarasuth Software Systems Engineering Laboratory Mathematics and Computer Science Department Faculty of Science King Mongkut''s Institute of Technology Ladkrabang Thailand School of Management Technology Sirindhorn International Institute of Technology Thammasat University Pathum Thani Thailand
In this paper, we propose to improve the SvS algorithm by skipping elements of the smaller set for reducing a search boundary. The boundary of skipped element is determined by boundaries of elements prior to and next ... 详细信息
来源: 评论
MedSiGRe: Medical Signal Grid Repository, an integration to Italica project
MedSiGRe: Medical Signal Grid Repository, an integration to ...
收藏 引用
Latin American Network Operations and Management Symposium, (LANOMS)
作者: Federico Milano Juan Francisco Garcia Eijo Adrian Gomez Fernan Gonzalez Bernaldo de Quiros Marcelo Risk Department of Information Systems Engineering Buenos Aires Regional Faculty National Technological University Argentina Laboratory of Complex Systems Department of Computer Science FCEyN University of Buenos Aires Argentina Department of Biomedical Informatics Italian Hospital of Buenos Aires Argentina
The Italica Project is the implementation of an electronic health record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a medical signal grid repository module and its int... 详细信息
来源: 评论
Robust audio steganography via genetic algorithm
Robust audio steganography via genetic algorithm
收藏 引用
International Conference on Information and Communication Technologies (ICICT)
作者: Mazdak Zamani Hamed Taherdoost Azizah A. Manaf Rabiah B. Ahmad Akram M. Zeki Faculty of Computer Science and Information Systems Universiti Teknologi Malaysia Kuala Lumpur Malaysia College of Science and Technology Universiti Teknologi Malaysia Kuala Lumpur Malaysia Centre of Advanced Software Engineering Universiti Teknologi Malaysia Kuala Lumpur Malaysia
Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. The transmission must be possible in spite of subsequent imperceptible alterations (attacks) of... 详细信息
来源: 评论