咨询与建议

限定检索结果

文献类型

  • 8,608 篇 会议
  • 1,286 册 图书

馆藏范围

  • 9,894 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,080 篇 工学
    • 7,071 篇 计算机科学与技术...
    • 1,984 篇 软件工程
    • 1,653 篇 信息与通信工程
    • 1,138 篇 控制科学与工程
    • 702 篇 机械工程
    • 525 篇 生物工程
    • 376 篇 生物医学工程(可授...
    • 309 篇 网络空间安全
    • 172 篇 光学工程
    • 172 篇 电气工程
    • 155 篇 安全科学与工程
    • 152 篇 化学工程与技术
    • 145 篇 交通运输工程
    • 142 篇 电子科学与技术(可...
    • 139 篇 动力工程及工程热...
  • 1,572 篇 理学
    • 878 篇 数学
    • 551 篇 生物学
    • 272 篇 物理学
    • 261 篇 统计学(可授理学、...
    • 149 篇 系统科学
  • 955 篇 教育学
    • 955 篇 教育学
  • 935 篇 管理学
    • 599 篇 管理科学与工程(可...
    • 418 篇 工商管理
    • 323 篇 图书情报与档案管...
  • 338 篇 医学
    • 334 篇 临床医学
    • 330 篇 基础医学(可授医学...
    • 197 篇 药学(可授医学、理...
    • 162 篇 公共卫生与预防医...
  • 185 篇 法学
    • 145 篇 社会学
  • 131 篇 经济学
    • 131 篇 应用经济学
  • 118 篇 农学
  • 10 篇 军事学
  • 1 篇 文学

主题

  • 973 篇 computational in...
  • 836 篇 artificial intel...
  • 552 篇 machine learning
  • 372 篇 deep learning
  • 240 篇 communications e...
  • 220 篇 data engineering
  • 160 篇 cyber-physical s...
  • 151 篇 professional com...
  • 143 篇 internet of thin...
  • 107 篇 blockchain
  • 99 篇 big data
  • 89 篇 iot
  • 88 篇 control, robotic...
  • 86 篇 industry 4.0
  • 83 篇 natural language...
  • 83 篇 students
  • 81 篇 higher education
  • 80 篇 education
  • 78 篇 covid-19
  • 78 篇 signal, image an...

机构

  • 67 篇 global knowledge...
  • 33 篇 faculty of scien...
  • 23 篇 iseg universidad...
  • 22 篇 univ tecnol peru...
  • 21 篇 inesc tec porto
  • 18 篇 bauman moscow st...
  • 18 篇 saga university ...
  • 18 篇 univ esan lima p...
  • 18 篇 univ salerno dep...
  • 17 篇 moroccan society...
  • 17 篇 univ politecn sa...
  • 16 篇 cti global
  • 16 篇 ukrainian engn p...
  • 16 篇 middlesex univer...
  • 16 篇 department of in...
  • 15 篇 silesian tech un...
  • 14 篇 rabat morocco
  • 14 篇 reshetnev siberi...
  • 14 篇 systems research...
  • 13 篇 department of co...

作者

  • 82 篇 amit joshi
  • 53 篇 kohei arai
  • 29 篇 janusz kacprzyk
  • 27 篇 álvaro rocha
  • 26 篇 ajith abraham
  • 23 篇 rhalem wajih
  • 22 篇 prajapat shaligr...
  • 22 篇 leonard barolli
  • 20 篇 ticona wilfredo
  • 20 篇 kumar tarun
  • 19 篇 anu bajaj
  • 19 篇 xin-she yang
  • 19 篇 nilanjan dey
  • 18 篇 radek silhavy
  • 17 篇 nugent chris
  • 17 篇 valentina emilia...
  • 16 篇 abhishek swaroop
  • 15 篇 bahaaeddin alare...
  • 15 篇 qjidaa hassan
  • 14 篇 tomonobu senjyu

语言

  • 7,184 篇 英文
  • 2,692 篇 其他
  • 18 篇 中文
检索条件"丛书名=Lecture Notes in Networks and Systems"
9894 条 记 录,以下是3681-3690 订阅
排序:
Optimization of Procurement Strategy Supported by Simulated Annealing and Genetic Algorithm  1
收藏 引用
19th International Conference on Dependability of Computer systems (DepCoS-RELCOMEX)
作者: Niewiadomski, Szymon Mzyk, Grzegorz Wroclaw Univ Sci & Technol Wroclaw Poland
The problem of optimizing purchasing plans in a large enterprise, taking into account non-linear constraints, was analyzed and formalized. A critical review of available methods was made in the context of their potent... 详细信息
来源: 评论
URL Classification with Intrusion Detection System  1
收藏 引用
Intelligent systems Conference (IntelliSys)
作者: Uppara, Veeresh Iqbal, Akif Vishal, P. Vinay, M. V. Sarasvathi, V. PES Univ Dept CSE Bengaluru India
The generation we live in has almost everything processed through the internet. When a user wants a question to be answered they open their web browser and search for a query, many websites show up on the screen which... 详细信息
来源: 评论
New Approach to Facial Expression Recognition and Classification Using Typical Testors
New Approach to Facial Expression Recognition and Classifica...
收藏 引用
Intelligent systems Conference
作者: Alvarado-Moreira, Roberto Ibarra-Fiallo, Julio Univ San Francisco Quito Colegio Ciencias & Ingn Cumbaya Ecuador
Within the study of testors in the world of classification processes, the limitation for non-discrete data sets is presented. The usual technique is to binarize the data, but in this work, we seek to propose a method ... 详细信息
来源: 评论
A Review on Image Steganography  1
收藏 引用
9th International Congress on Information and Communication Technology (ICICT)
作者: Faraj, Bana Shekh Siddiq, Abdulrahman Blackburn Coll Blackburn England
This paper is concerned with an important aspect of data security, known as steganography. In steganography, a secret message is hidden into another data file such as image, video, audio, or text file. The advantage o... 详细信息
来源: 评论
A Review on Cybersecurity Law and Management  4th
A Review on Cybersecurity Law and Management
收藏 引用
4th Congress on Intelligent systems (CIS)
作者: Gaur, Kuntal Chakraborty, Roshmeet Khemani, Gulshan Sharma, Khushi Jangid, Mohit Manipal Univ Jaipur Dept Comp Applicat Jaipur Rajasthan India
The most pressing issue in this quickly developing digital world, where everything is interconnected by the Internet, is cybersecurity. The Internet has always had both benefits and drawbacks. The curse it brings will... 详细信息
来源: 评论
An Overwhelmed Perspective from Cancer Disease with Opinion Analytics  8th
An Overwhelmed Perspective from Cancer Disease with Opinion ...
收藏 引用
8th Smart Trends in Computing and Communications (SmartCom)
作者: Nagalpara, Sirajbhai Abbasbhai Patel, Bhavesh M. Gaur, Sanjay Patel, Natvar Sardarbhai HNGU Dept Comp Sci Patan Gujrat India JECRC Dept Comp Sci & Engn Jaipur Rajasthan India
Cancer is a formidable adversary, challenging both the physical and emotional resiliences of those affected by the disease. Cancer patients and their loved ones experience a range of emotions, from fear and uncertaint... 详细信息
来源: 评论
RPL-Shield: A Deep Learning GNN-Based Approach for Protecting IoT networks from RPL Routing Table Falsification Attacks  4th
RPL-Shield: A Deep Learning GNN-Based Approach for Protectin...
收藏 引用
4th International Conference on Digital Technologies and Applications (ICDTA)
作者: Krari, Ayoub Hajami, Abdelmajid Hassan First Univ Settat Fac Sci & Technol Lab Res Watch Emerging Technol VETE Settat Morocco
Considering the growing threats within the domain of the Internet of Things (IoT), this research responds to the pressing need for protection measures that would help to prevent routing table falsification attacks. Th... 详细信息
来源: 评论
A Dependable Hybrid Deep Learning Model for IoT Trust Management System  16th
A Dependable Hybrid Deep Learning Model for IoT Trust Manage...
收藏 引用
16th International Conference on Ubiquitous Computing and Ambient Intelligence
作者: Aaqib, Muhammad Ali, Aftab Chen, Liming Nibouche, Omar Ulster Univ Belfast BT15 1ED Antrim North Ireland Dalian Univ Technol Dalian Peoples R China
Trust management systems (TMS) are essential for securing internet of things (IoT) systems, particularly given the growing complexity and frequency of cyber-attacks. This research offers a hybrid model that combines t... 详细信息
来源: 评论
Observer-Based Path Following Control Method for Mobile Robots with an Event-Triggering Mechanism  7th
Observer-Based Path Following Control Method for Mobile Robo...
收藏 引用
7th International Conference on Green Technology and Sustainable Development
作者: Ngo An Thuyen Pham Nguyen Nhut Thanh Ho Pham Huy Anh Ho Chi Minh City Univ Technol HCMUT 268 Ly Thuong Kiet StDist 10 Ho Chi Minh City Vietnam Vietnam Natl Univ Ho Chi Minh City VNU HCM Linh Trung Ward Ho Chi Minh City Vietnam
This paper investigates a path following control method for mobile robots based on extended state observer (ESO) and event-trigger mechanism. Firstly, by utilizing the Line-of-sight (LOS) method, the path following co... 详细信息
来源: 评论
A Smart Electromagnetic Lens Antenna Design for Next-Generation Location-Based Wireless Communication  21st
A Smart Electromagnetic Lens Antenna Design for Next-Generat...
收藏 引用
21st International Conference on Smart Technologies and Education (STE) on Smart Technologies for a Sustainable Future
作者: Shaikh, Muneer Ahmed Wagan, Asif Ali Shaikh, Sarmad Ahmed Arshad, Muhammad Minhaj Ahmed, Syed Masaab Arshad, Shahzad Sindh Madressatul Islam Univ Comp Sci Dept Karachi Pakistan Natl Aerosp Sci & Technol Pk Rawalpindi Pakistan
The next-generation wireless communication systems will require smart techniques to provide network coverage, particularly location-based services. In this paper, we propose a smart electromagnetic (EM) lens antenna d... 详细信息
来源: 评论