咨询与建议

限定检索结果

文献类型

  • 48 篇 会议
  • 25 篇 期刊文献

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 29 篇 计算机科学与技术...
    • 21 篇 软件工程
    • 8 篇 信息与通信工程
    • 6 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 电气工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 机械工程
    • 2 篇 光学工程
    • 2 篇 化学工程与技术
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 纺织科学与工程
  • 27 篇 理学
    • 13 篇 数学
    • 7 篇 物理学
    • 4 篇 化学
    • 4 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 2 篇 地质学
    • 1 篇 系统科学
  • 17 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 9 篇 图书情报与档案管...
    • 4 篇 工商管理
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 6 篇 educational inst...
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 mathematics
  • 3 篇 clustering algor...
  • 2 篇 computer science
  • 2 篇 intrusion detect...
  • 2 篇 data privacy
  • 2 篇 deep learning
  • 2 篇 prototypes
  • 2 篇 mobile agents
  • 2 篇 network topology
  • 2 篇 efficiency
  • 2 篇 wireless communi...
  • 2 篇 migrating birds ...
  • 2 篇 data engineering
  • 2 篇 optimization
  • 2 篇 covariance matri...
  • 2 篇 computers
  • 2 篇 bioinformatics

机构

  • 7 篇 school of mathem...
  • 4 篇 school of mathem...
  • 4 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of ap...
  • 3 篇 college of mathe...
  • 3 篇 key laboratory o...
  • 3 篇 college of mathe...
  • 3 篇 school of mathem...
  • 2 篇 school of mathem...
  • 2 篇 center of radio ...
  • 2 篇 college of infor...
  • 2 篇 school of electr...
  • 2 篇 haide college oc...
  • 2 篇 national enginee...
  • 2 篇 school of mechat...
  • 2 篇 computer center ...
  • 2 篇 school of engine...

作者

  • 4 篇 pei zheng
  • 3 篇 li lian
  • 3 篇 xiaodong wang
  • 3 篇 li xining
  • 3 篇 du yajun
  • 3 篇 jiazao lin
  • 3 篇 lin jiazao
  • 3 篇 lian li
  • 3 篇 yingjie wu
  • 3 篇 xining li
  • 2 篇 jun-hua duan
  • 2 篇 yang yi
  • 2 篇 tao meng
  • 2 篇 gui fu
  • 2 篇 leng jiaqi
  • 2 篇 qing-da chen
  • 2 篇 xiao deqin
  • 2 篇 xu yong
  • 2 篇 hernán a. díaz
  • 2 篇 quan-ke pan

语言

  • 68 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=School of Mathematic and Computer Engineering"
73 条 记 录,以下是1-10 订阅
排序:
Efficient Ship:A Hybrid Deep Learning Framework for Ship Detection in the River
收藏 引用
computer Modeling in engineering & Sciences 2024年 第1期138卷 301-320页
作者: Huafeng Chen Junxing Xue Hanyun Wen Yurong Hu Yudong Zhang School of Computer Engineering Jingchu University of TechnologyJingmen448000China School of Computer Science Yangtze UniversityJingzhou434023China School of Computing and Mathematic Sciences University of LeicesterLeicesterLE17RHUK
Optical image-based ship detection can ensure the safety of ships and promote the orderly management of ships in offshore *** deep learning researches on optical image-based ship detection mainly focus on improving on... 详细信息
来源: 评论
Asynchronous Control for T-S Fuzzy Semi-Markovian Jump Delay Systems Via Quantized Sampled-Data Control
Asynchronous Control for T-S Fuzzy Semi-Markovian Jump Delay...
收藏 引用
2023 International Conference on New Trends in Computational Intelligence, NTCI 2023
作者: Zhang, Jiangping Xiong, Lianglin School of Mathematic and Computer Science Yunnan Minzu University Kunming China School of Media and Information Engineering Yunnan Open University Kunming China
This article, by quantized sampled-data controller (QS-DC), addresses asynchronous control for T-S fuzzy semi-Markovian jump delay systems (TSFSMJDSs), which a weak innitesimal operator (WIO) working on a function wit... 详细信息
来源: 评论
Wireless Sensor Network Intrusion Detection Model for Real-time Hazardous Chemical Monitoring  3
Wireless Sensor Network Intrusion Detection Model for Real-t...
收藏 引用
3rd International Conference on Smart Data Intelligence, ICSMDI 2023
作者: Xu, Bing Chen, Youying School of Computer Science and Engineering Yulin Normal University Guangxi Yulin537000 China School of Mathematic and Computer Science Guangdong Ocean University Guangdong Zhanjiang524088 China
Intelligent video surveillance technology is composed of the extremely complex algorithms and technologies. Hence, this article proposes a wireless sensor network intrusion detection model to perform real-time hazardo... 详细信息
来源: 评论
A BTN-Based Method for Multi-Entity Bitcoin Transaction Analysis and Influence Assessment
收藏 引用
Distributed Ledger Technologies: Research and Practice 2024年 第4期3卷 1-23页
作者: Yan Wu Liuyang Zhao Jia Zhang Leilei Shi Lu Liu John Panneerselvam Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhengjiang Jiangsu China and School of Computer Science and Communication Engineering Jiangsu University Zhengjiang Jiangsu China School of Computer Science and Communication Engineering Jiangsu University Zhengjiang Jiangsu China Department of Computer Science University of Exeter Exeter UK School of Computing and Mathematic Sciences University of Leicester Leicester UK
Bitcoin transaction analysis is valuable for examining Bitcoin events. However, most of the existing methods are inadequate for dealing with transactions involving multiple entities. Furthermore, existing Bitcoin tran... 详细信息
来源: 评论
Wireless Sensor Network Intrusion Detection Model for Real-time Hazardous Chemical Monitoring
Wireless Sensor Network Intrusion Detection Model for Real-t...
收藏 引用
Smart Data Intelligence (ICSMDI), International Conference on
作者: Bing Xu Youying Chen School of Computer Science and engineering Yulin Normal University Yulin Guangxi China School of Mathematic and Computer Science Guangdong Ocean University Zhanjiang Guangdong China
Intelligent video surveillance technology is composed of the extremely complex algorithms and technologies. Hence, this article proposes a wireless sensor network intrusion detection model to perform real-time hazardo... 详细信息
来源: 评论
Implementation of Preprocessing in Text Summarization Techniques for Indonesian Language Documents Using the Flax T5 Approach  11
Implementation of Preprocessing in Text Summarization Techni...
收藏 引用
11th International Conference on Cyber and IT Service Management, CITSM 2023
作者: Lubis, Arif Ridho Safitri, Habibi Ramdani Irvan Lubis, Muharman Al-Khowarizmi Nugroho, Okvi Politeknik Negeri Medan Department of Computer Engineering and Informatics Medan Indonesia Universitas Muhammadiyah Sumatera Utara Department of Mathematic Education Medan Indonesia Telkom University School of Industrial Engineering Bandung Indonesia Universitas Muhammadiyah Sumatera Utara Department of Information Technology Medan Indonesia Kulkas It Medan Indonesia
As information develops, many individuals or communities change their habits in obtaining information, which is usually consumed in large quantities, so that sometimes it is difficult to understand, it becomes easier ... 详细信息
来源: 评论
Asynchronous Control for T-S Fuzzy Semi-Markovian Jump Delay Systems Via Quantized Sampled-Data Control
Asynchronous Control for T-S Fuzzy Semi-Markovian Jump Delay...
收藏 引用
New Trends in Computational Intelligence (NTCI), International Conference on
作者: Jiangping Zhang Lianglin Xiong School of Mathematic and Computer Science Yunnan Minzu University Kunming China School of Media and Information Engineering Yunnan Open University Kunming China
This article, by quantized sampled-data controller (QS-DC), addresses asynchronous control for T-S fuzzy semi-Markovian jump delay systems (TSFSMJDSs), which a weak innitesimal operator (WIO) working on a function wit...
来源: 评论
Bidirectional Choice for Many-to-many Online Task Assignment in Mobile Crowdsourcing
Bidirectional Choice for Many-to-many Online Task Assignment...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Xinhao Li Yingjie Wang Feng Jiang Yang Gao Chunxiao Mu Zhipeng Cai Yingxin Li Shilong Jin School of Computer and Control Engineering Yantai University Yantai China Chongqing University Chongqing China School of Mathematic and Information Sciences Yantai University Yantai China Department of Computer Science Georgia State University Atlanta GA USA
The evolution of 5G and 6G technologies has boosted mobile network speed, reduced delays, and widened coverage, empowering Mobile Crowd Sensing (MCS) to overcome surface and terrain obstacles. However, this advancemen... 详细信息
来源: 评论
A three-layer hierarchical architecture for optimized routing protocol based on clustering and khalimsky topology for mobile wireless sensor networks
A three-layer hierarchical architecture for optimized routin...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Omnia Mezghani Mahmoud Mezghani National Engineering School of Sfax (ENIS) Sfax University Tunisia Department of Mathematic and Computer Engineering National Engineering School of Sfax Sfax University Tunisia Department of Electrical and Computer Engineering National Engineering School of Sfax (ENIS) Sfax University Tunisia
In this paper, we proposed a new concept regarding mobile sensor nodes deployment based on hierarchical WSNs architecture. The proposed architecture is based on three layers topology. In the upper layer fixed sensors ... 详细信息
来源: 评论
Green Computing: A Novel Approach for Scheduling Pctgs on Mpsocs
SSRN
收藏 引用
SSRN 2023年
作者: Tariq, Umair Ullah Ali, Haider Nadeem, Muhammad Shahroz Liu, Lu Grandhi, Srimannarayana Wang, Zhenglin School of Engineering and Technology University of Derby Derby United Kingdom School of Engineering and Arts Science and Technology Suffolk University Ipswich United Kingdom School of Computing and Mathematic Sciences University of Leicester Leicester United Kingdom School of Computer Science of Engineering and Technology The Central Queensland University Sydney Australia
Multiprocessor System-on-Chips (MPSoCs) architectures are gaining an increased popularity owing to their Quality-of-Service (QoS) and high-performance capabilities, making them particularly well-suited for computation... 详细信息
来源: 评论