咨询与建议

限定检索结果

文献类型

  • 1,178 篇 会议
  • 772 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,958 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,210 篇 工学
    • 866 篇 计算机科学与技术...
    • 716 篇 软件工程
    • 335 篇 信息与通信工程
    • 189 篇 生物工程
    • 188 篇 控制科学与工程
    • 146 篇 电气工程
    • 138 篇 生物医学工程(可授...
    • 120 篇 光学工程
    • 116 篇 电子科学与技术(可...
    • 89 篇 网络空间安全
    • 81 篇 机械工程
    • 76 篇 化学工程与技术
    • 60 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 50 篇 仪器科学与技术
    • 45 篇 动力工程及工程热...
  • 697 篇 理学
    • 320 篇 数学
    • 232 篇 物理学
    • 205 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 83 篇 化学
    • 51 篇 系统科学
  • 360 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 149 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 118 篇 医学
    • 82 篇 基础医学(可授医学...
    • 76 篇 临床医学
    • 57 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 69 篇 法学
    • 58 篇 社会学
  • 34 篇 经济学
  • 28 篇 农学
  • 22 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 83 篇 accuracy
  • 74 篇 deep learning
  • 55 篇 feature extracti...
  • 54 篇 training
  • 49 篇 convolutional ne...
  • 43 篇 machine learning
  • 42 篇 real-time system...
  • 38 篇 computational mo...
  • 38 篇 predictive model...
  • 30 篇 optimization
  • 29 篇 artificial intel...
  • 28 篇 semantics
  • 28 篇 security
  • 27 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 21 篇 medical services
  • 20 篇 scalability
  • 20 篇 cloud computing

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 43 篇 zhang yanning
  • 40 篇 xia yong
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,823 篇 英文
  • 112 篇 其他
  • 23 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
1958 条 记 录,以下是1791-1800 订阅
排序:
Analysis for probabilistic and timed intransitive information flow security properties
收藏 引用
Journal of Convergence Information Technology 2012年 第15期7卷 488-495页
作者: Huang, Yong Wu, Jinzhao School of Information Science and Engineering Guangxi University for nationalities Nanning China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Nanning China Chengdu institute of computer application Chinese academy of sciences Chengdu China
It is important to avoid information flow from higher levels to lower levels directly in multilevel systems, namely the so called covert channels. Primary studies of information flow analysis were accomplished based o... 详细信息
来源: 评论
An improved real-valued negative selection algorithm for anomaly detection
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第16期4卷 453-459页
作者: Zeng, Jinquan Tang, Weiwen Liu, Caiming Hu, Jianbin Peng, Lingxi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Communication Research Planning and Designing Co. ltd Chengdu China Laboratory of Intelligent Information Processing and Application Leshan Normal University Leshan China School of Electronics and Information Nantong University Nantong China Department of Computer and Education Software Guangzhou University Guangzhou China
Conventional classification algorithms need samples for all classes (e.g. normal and abnormal) during the training phase. However, in many anomaly detection application, we can only get a class samples (commonly, norm... 详细信息
来源: 评论
Calculating the pre-image using the kernel methods
收藏 引用
Advances in Information sciences and Service sciences 2012年 第22期4卷 612-618页
作者: Tan, Zhiying Feng, Yong Xu, Kejia Jia, Ke Song, Xiaobo School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Chengdu Inst. of Computer Application Chinese Academy of Sciences Chengdu China Changzhou Inst. of Advanced Manufacturing Chinese Academy of Sciences Changzhou China Chongqing Inst. of Green and Intelligent Technology Chinese Academy of Sciences Chongqing China School of electrical SouthWest JiaoTong University Chengdu China
The nonlinear features can be extracted by the kernel methods. The features play the important roles in pattern recognition and image processing. The researching on kernel methods has the great theoretical and practic... 详细信息
来源: 评论
Analytical Drain Current Model for Organic Thin-Film Transistors
Analytical Drain Current Model for Organic Thin-Film Transis...
收藏 引用
2012 IEEE 11th International Conference on Solid-State and Integrated Circuit Technology(ICSICT-2012)
作者: Hongyu He Jin He Wanling Deng Mansun Chan Yuan Liu Ruohe Yao Bin Li Xueren Zheng Peking University Shenzhen SOC Key Laboratory PKU-HKUST Shenzhen-HongKong Institution Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Science and Technology on Reliability Physics and Application of Electronic Component Laboratory School of Electronic and Information Engineering South China University of Technology
Two analytical drain current models for organic thin-film transistors(OTFTs)are *** first one is the surface potential based drain current model considering both deep and tail trap states densities within the energy g... 详细信息
来源: 评论
Interference analysis of TD-SCDMA system and CDMA2000 system
收藏 引用
Journal of Networks 2012年 第1期7卷 101-109页
作者: Hao, Chen Tong, Yang Jian-Fu, Teng Hong, He School of Electronic and Information Engineering Tianjin University Tianjin 300072 China Computer Science and Information Engineering College Tianjin University of Science and Technology Tianjin 300222 China Tianjin Mobile Communications Co. Ltd Tianjin 300052 China School of Electronic and Information Engineering Tianjin University Tianjin 300072 China Tianjin Key Laboratory for Control Theory and Application in Complicated Systems Tianjin University of Technology Tianjin 300384 China
In this paper, the feasibility of co-channel coexistence of Time Division- Synchronous Code Division Multiple Access (TD-SCDMA) and Code Division Multiple Access 2000 (CDMA2000) systems operating in a macro cell envir... 详细信息
来源: 评论
Unknown malicious executables detection based on immune principles
收藏 引用
Research Journal of Applied sciences, engineering and Technology 2012年 第1期4卷 82-85页
作者: Zeng, Jinquan Liu, Caiming Hu, Jianbin Zhang, Yu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Sichuan Communication Research Planning and Designing Co. ltd Chengdu 610041 China Laboratory of Intelligent Information Processing and Application Leshan Normal University Leshan 614004 China School of Electronics and Information Nantong University Nantong 226019 China College of Information Science and Technology Hainan Normal University 571158 Haikou China
Detecting unknown malicious executables is a challenging task. Traditional anti-virus systems use signatures to detect malicious executables. However, the method cannot detect unseen instances or variants. Inspired by... 详细信息
来源: 评论
A study of battery modeling technologies for vehicle system simulations
A study of battery modeling technologies for vehicle system ...
收藏 引用
IEEE Workshop on computers in Power Electronics
作者: Takayuki Sekisue Koichi Shigematsu Takashi Abe Thanh-Son Dao Technical Division Electrical Business Unit. ANSYS Japan K.K. Tokyo Japan Model Based Development Promotion Division Cybernet Systems Company Limited Nagoya Aichi Japan Division of Electrical Engineering and Computer Science Graduate School of Engineering Nagoya University Nagasaki Japan Application Engineering Division Maplesoft Waterloo Canada
The goal of this research is a proposal of a standard model for vehicle system simulations. Recently, the CO 2 reduction and efficiency improvement of the energy consumption are important subjects in development of t... 详细信息
来源: 评论
Combining chain-code and fourier descriptors for fingerprint matching
Combining chain-code and fourier descriptors for fingerprint...
收藏 引用
1st International Conference on Advances in Computing and Communications, ACC 2011
作者: Geevar, C.Z. Sojan Lal, P. Department of Computer Application MES College of Engineering Kuttippuram India School of Computer Science Mahatma Gandhi University Kottayam India
The performance of an fingerprint recognition system is measured by its accuracy in recognition. For a feature-based fingerprint recognition system, the accuracy is heavily depend on the chosen feature set. A fingerpr... 详细信息
来源: 评论
3D LIDAR point cloud based intersection recognition for autonomous driving
3D LIDAR point cloud based intersection recognition for auto...
收藏 引用
IEEE Symposium on Intelligent Vehicle
作者: Quanwen Zhu Long Chen Qingquan Li Ming Li Andreas Nüchter Jian Wang School of Geodesy and Geomatics Wuhan University of China Hubei China Engineering Research Center for Spatio-Temporal Data Smart Acquisition and Application Ministry of Education of China andthe School of Electronic Information Wuhan University of China Hubei China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University of China Wuhan Hubei China Computer School Wuhan University of China Hubei China School of Engineering and Science Jacobs University Bremen Bremen Germany
Finding road intersections in advance is crucial for navigation and path planning of moving autonomous vehicles, especially when there is no position or geographic auxiliary information available. In this paper, we in... 详细信息
来源: 评论
Object-oriented simulation software for an adaptive optics system
Object-oriented simulation software for an adaptive optics s...
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011
作者: Chen, Ying Feng, Yong Tan, Zhiying Shi, Xiaoyu School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Chengdu Inst. of Computer Application Chinese Academy of Sciences Chengdu China
The object-oriented simulation software of an adaptive optics system is used to evaluate the performance of the adaptive optics system. The software includes distorted wavefront correction and turbulence simulation. A... 详细信息
来源: 评论