咨询与建议

限定检索结果

文献类型

  • 1,330 篇 会议
  • 893 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,403 篇 工学
    • 873 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 331 篇 信息与通信工程
    • 254 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 150 篇 电气工程
    • 133 篇 机械工程
    • 111 篇 生物工程
    • 106 篇 光学工程
    • 98 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 58 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
    • 55 篇 化学工程与技术
    • 50 篇 建筑学
    • 49 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 744 篇 理学
    • 351 篇 数学
    • 221 篇 物理学
    • 127 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 64 篇 化学
  • 352 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 104 篇 医学
    • 87 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 39 篇 经济学
  • 27 篇 教育学
  • 27 篇 农学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 53 篇 deep learning
  • 41 篇 computational mo...
  • 41 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 33 篇 accuracy
  • 31 篇 data mining
  • 31 篇 training
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 25 篇 hardware
  • 25 篇 convolutional ne...
  • 24 篇 internet of thin...
  • 24 篇 predictive model...
  • 23 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 robbi rahim
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 zhi zhang
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe

语言

  • 2,102 篇 英文
  • 79 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer-Computer Technology"
2238 条 记 录,以下是171-180 订阅
排序:
Agent-based user model for personalized retrieval system
Agent-based user model for personalized retrieval system
收藏 引用
International Conference on Green Communications and Networks, GCN 2011
作者: Xu, Lijun Yang, Xianfeng Chen, Jun Institute of Computer and Information Engineering Xinxiang University Xinxiang 453003 Henan China School of Information Engineer Henan Institute of Science and Technology Xinxiang 453000 Henan China
information retrieval system for the current over-emphasis on the recall of information, the information retrieved and the user needs not related to most of this limitation, combined with Agent technology has the auto... 详细信息
来源: 评论
Inertial Navigation Applications in Navigation and Positioning Research
Inertial Navigation Applications in Navigation and Positioni...
收藏 引用
2012 IEEE 11th International Conference on Signal Processing(ICSP 2012)
作者: Li Shufeng Li Cheng Yu Zhenghua Yan Guangwen Beijing Jiaotong University School of Computer and Information Technology Research & Innovation Institute of Beijing Watchdata System Co. Ltd
In order to improve the positioning precision and reliability in dead reckoning (DR), a novel algorithm is proposed on the basis of using accelerometers and gyroscopes in inertial navigation systems. The dead reckonin... 详细信息
来源: 评论
Implemention of cyber security situation awareness based on knowledge discovery with trusted computer
Implemention of cyber security situation awareness based on ...
收藏 引用
APWeb 2014 Workshops: 1st International Workshop on Social Network Analysis, SNA 2014, 1st International Workshop on Network and information Security, NIS 2014 and 1st International Workshop on Internet of Things Search, IOTS 2014
作者: Jiemei, Zeng Xuewei, Feng Dongxia, Wang Lan, Fang Beijing Aerospace Control Center Beijing 100296 China Beijing Institute of System Engineer National Key Laboratory of Science and Technology on Information System Security Beijing 100101 China
Situation awareness aims to provide the global security views of the cyberspace for administrators. In this paper, a novel framework of cyber security situation awareness is proposed. The framework is based on a trust... 详细信息
来源: 评论
A framework of network security situation analysis based on the technologies of event correlation and situation assessment
A framework of network security situation analysis based on ...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
作者: Xuewei, Feng Dongxia, Wang Shanwen, Ke Guoqing, Ma Jin, Li Beijing Institute of System Engineer National Key Laboratory of Science and Technology on Information System Security Beijing 100101 China Xichang Satellite Launch Center Sichuan 615000 China
After analyzing the existing research of network security situation awareness, a framework of situation analysis is proposed in this paper. It is an application and reification of the classic situation awareness model... 详细信息
来源: 评论
Analyzing and correlating security events using state machine
Analyzing and correlating security events using state machin...
收藏 引用
10th IEEE International Conference on computer and information technology, CIT-2010, 7th IEEE International Conference on Embedded Software and systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Feng, Xuewei Wang, Dongxia Zeng, Jiemei Ma, Guoqing Li, Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineer Beijing 100101 China Beijing Aerospace Control Center Beijing 100296 China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论
Dual-Tone Radio Interferometric Positioning systems for Multi-Target Localization Using a Single Mobile Anchor
收藏 引用
China Communications 2015年 第1期12卷 25-35页
作者: LI Li'an WANG Yiyin MA Xiaoli CHEN Cailian GUAN Xinping Department of Automation Shanghai Jiao Tong Universityand Key Laboratory of System Control and Information ProcessingMinistry of Education of China School of Electrical & Computer Engineering Georgia Institute of Technology
In this paper, a low-cost dualtone radio interferometric positioning system using a single mobile anchor is proposed to locate multiple targets at the same time. We name it mDRIPS. In mDRIPS, each target continuously ... 详细信息
来源: 评论
Modelling and Simulation of COVID-19 Outbreak Prediction Using Supervised Machine Learning
收藏 引用
computers, Materials & Continua 2021年 第3期66卷 2397-2407页
作者: Rachid Zagrouba Muhammad Adnan Khan Atta-ur-Rahman Muhammad Aamer Saleem Muhammad Faheem Mushtaq Abdur Rehman Muhammad Farhan Khan Department of Computer Information System College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science Riphah International UniversityLahore CampusLahore54000Pakistan Hamdard Institute of Engineering and Technology Hamdard UniversityIslamabad44000Pakistan Department of Information Technology Khwaja Fareed University of Engineering and Information TechnologyRahim Yar Khan64200Pakistan School of Computer Science NCBA&ELahore54000Pakistan Department of Forensic Sciences University of Health SciencesLahore54000Pakistan
Novel Coronavirus-19(COVID-19)is a newer type of coronavirus that has not been formally detected in *** is established that this disease often affects people of different age groups,particularly those with body disord... 详细信息
来源: 评论
Compact sequential aggregate signatures
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied Computing 2007年 249-253页
作者: Mu, Yi Susilo, Willy Zhu, Huafei School of Information Technology and Computer Science University of Wollongong Wollongong NSW 2522 Australia Department of System and Information Security Institute for Infocomm Research 21 Heng Mui Keng Terrace Singapore Singapore
In this paper, a new notion which we call compact sequential aggregate signatures is introduced and formalized. Informally, a compact sequential aggregate signature states the following thing: for a given message vect... 详细信息
来源: 评论
Control of a Quadruped Robot with Bionic Springy Legs in Trotting Gait
收藏 引用
Journal of Bionic engineering 2014年 第2期11卷 188-198页
作者: Mantian Li Zhenyu Jiang Pengfei Wang Lining Sun Shuzhi Sam Ge State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin 150001 P. R. China Institute of Intelligent Systems and Information Technology University of Electronic Seience and Technology of China Chengdu 610000 P.R. China Department of Electrical and Computer Engineering the National University of Singapore Singapore 117576 Singapore
Legged robots have better performance on discontinuous terrain than that of wheeled robots. However, the dynamic trotting and balance control of a quadruped robot is still a challenging problem, especially when the ro... 详细信息
来源: 评论
Energy Efficient Relay Positioning and Power Allocation for One-Way N-Relay Channel
收藏 引用
Journal of Donghua University(English Edition) 2016年 第1期33卷 127-133页
作者: 周健 朱灿焰 王东林 季爱明 Institute of Intelligent Structure and System Soochow University Department of Information Engineering Suzhou Global Institute of Software Technology Department of Electricaland Computer Engineering New York Institute of Technology at Nanjing
Two end-users which have symmetric traffic requirements in terms of data rate are considered. They exchange information in Rayleigh flat-fading channels and multiple serial half-duplex relay nodes are employed to exte... 详细信息
来源: 评论