咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 60 册 图书
  • 7 篇 期刊文献

馆藏范围

  • 1,923 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,170 篇 工学
    • 962 篇 计算机科学与技术...
    • 814 篇 软件工程
    • 201 篇 信息与通信工程
    • 149 篇 生物工程
    • 117 篇 控制科学与工程
    • 117 篇 生物医学工程(可授...
    • 112 篇 电气工程
    • 73 篇 光学工程
    • 72 篇 机械工程
    • 65 篇 安全科学与工程
    • 62 篇 电子科学与技术(可...
    • 51 篇 仪器科学与技术
    • 45 篇 化学工程与技术
    • 44 篇 交通运输工程
  • 467 篇 理学
    • 206 篇 数学
    • 161 篇 生物学
    • 126 篇 物理学
    • 74 篇 统计学(可授理学、...
    • 65 篇 系统科学
    • 43 篇 化学
  • 363 篇 管理学
    • 203 篇 管理科学与工程(可...
    • 191 篇 图书情报与档案管...
    • 132 篇 工商管理
  • 112 篇 医学
    • 111 篇 临床医学
    • 87 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 43 篇 公共卫生与预防医...
  • 77 篇 法学
    • 61 篇 社会学
  • 49 篇 经济学
    • 49 篇 应用经济学
  • 47 篇 教育学
    • 47 篇 教育学
  • 29 篇 农学
  • 6 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 66 篇 computer archite...
  • 64 篇 computer vision
  • 57 篇 real-time system...
  • 44 篇 accuracy
  • 42 篇 artificial intel...
  • 33 篇 data models
  • 32 篇 computational mo...
  • 31 篇 software
  • 30 篇 software enginee...
  • 29 篇 internet of thin...
  • 29 篇 machine learning
  • 29 篇 training
  • 28 篇 information syst...
  • 28 篇 deep learning
  • 28 篇 computer communi...
  • 28 篇 feature extracti...
  • 27 篇 convolutional ne...
  • 25 篇 recommender syst...
  • 25 篇 cloud computing
  • 24 篇 information tech...

机构

  • 12 篇 department of co...
  • 8 篇 school of comput...
  • 7 篇 university of mi...
  • 7 篇 international in...
  • 6 篇 department of in...
  • 6 篇 department of pr...
  • 6 篇 dicar polytecnic...
  • 6 篇 department of co...
  • 6 篇 international it...
  • 6 篇 monash universit...
  • 6 篇 school of engine...
  • 6 篇 lviv polytechnic...
  • 6 篇 department of ma...
  • 6 篇 west ukrainian n...
  • 5 篇 international in...
  • 5 篇 chitkara univers...
  • 5 篇 artificial intel...
  • 5 篇 de la salle univ...
  • 5 篇 college of compu...
  • 4 篇 computer network...

作者

  • 8 篇 kolesnikova kate...
  • 8 篇 pasichnyk volody...
  • 7 篇 daineko yevgeniy...
  • 6 篇 bernady o. apduh...
  • 6 篇 maria irene falc...
  • 6 篇 jorge gustavo ro...
  • 6 篇 volodymyr pasich...
  • 6 篇 osvaldo gervasi
  • 6 篇 ana maria a. c. ...
  • 6 篇 beniamino murgan...
  • 6 篇 sanjay misra
  • 6 篇 nataliia kunanet...
  • 6 篇 carmelo torre
  • 6 篇 david taniar
  • 5 篇 oh se jong
  • 5 篇 adda mehdi
  • 5 篇 doo ill chul
  • 5 篇 mykola dyvak
  • 5 篇 rakesh ranjan
  • 4 篇 tsoy dana

语言

  • 1,862 篇 英文
  • 50 篇 其他
  • 9 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"任意字段=14th International Conference on Computer Systems and Technologies, CompSysTech 2013"
1923 条 记 录,以下是71-80 订阅
排序:
Intelligent Anti-theft System with Automated Spray Control using ESP32 WROOM
Intelligent Anti-Theft System with Automated Spray Control u...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Geetha Shanmugam Deepa Balusamy Elamparithi S Vetriselvan R Mourin Praamoth S Department of Computer Science and Engineering Nandha Engineering College Erode India
this project demonstrates a low-cost anti-theft solution built around the ESP32-WROOM microcontroller, with integrated chemical spray for security. the system is designed to detect unauthorized entry and respond with ... 详细信息
来源: 评论
From Misinformation to Truth: Fake News Detection with Transformer-Based Models
From Misinformation to Truth: Fake News Detection with Trans...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Arvind Mewada Mohd. Aquib Ansari Sushil Kumar Maurya Computer Science & Engineering Bennett University Greater Noida India Computer Science & Engineering Siksha ‘O’ Anusandhan Bhubaneswar India
Nowadays, technological advancements have significantly transformed information dissemination and consumption strategies. People acquire news through online portals such as social media and news websites. However, thi... 详细信息
来源: 评论
Intrusion Detection at the Edge Computing: A Deep Learning Approach Using the UNSW-NB15 Dataset
Intrusion Detection at the Edge Computing: A Deep Learning A...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Vipin Kumar Vivek Kumar Abhay Pratap Singh Bhadauria Jay Dixit Amit Kumar Department of Computer Science Gurukula Kangri (Deemed to be University) Haridwar India Department of Computer Engineering & Applications GLA University Mathura Department of Computer Engineering & Applications GLA University Mathura UP
Edge computing has transformed technology by enabling seamless connections between IoT devices, but it also introduces significant security challenges. EC is crucial for providing minimal latency processing and reduci... 详细信息
来源: 评论
A Bayesian Optimization Framework for Adaptive Node Deployment in Wireless Sensor Networks
A Bayesian Optimization Framework for Adaptive Node Deployme...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Rahul Priyadarshi Jayant Kumar Rout Anish Kumar Vishwakarma Nikhil Dhengre Rakesh Ranjan Amit Verma Faculty of Engineering and Technology ITER SOA Bhubaneswar India School of Computer Application KIIT Bhubaneswar India School of Computer Science UPES Dehradun Uttarakhand India Department of ECE IIIT Nagpur Maharashtra India
Wireless Sensor Networks (WSNs) require efficient node deployment strategies to optimize network longevity, energy consumption, and coverage. this paper introduces a novel approach for strategic node deployment in WSN... 详细信息
来源: 评论
Accelerated MR image reconstruction using non convex regularized non-subsampled Contourlet transform and total variation based prior
Accelerated MR image reconstruction using non convex regular...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Nikhil Dhengre Rakesh Ranjan Sagar Motdhare Department of ECE IIIT Nagpur Maharashtra India School of Computer Science UPES Dehradun Uttarakhand India
In the domain of compressive sensing MRI (CSMRI), MRI image is reconstructed using partially acquired k-space data, in order to shorten the acquisition time of MRI. Various priors and their combinations have been exam... 详细信息
来源: 评论
GlobalLearn: An Efficient Multilingual Textual Summary for Education Videos
GlobalLearn: An Efficient Multilingual Textual Summary for E...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Pratham R Shetty Prateek M Anirudh Krishna R Ranjive M. Farida Begum Dept. Computer Science and Technology PES University Bengaluru India
Educational videos have become a preferred medium for learning, offering advantages such as self-paced study, the ability to revisit concepts, and a distraction-free environment. However, the effective- ness of such v... 详细信息
来源: 评论
Video Trailer Generation using Multimodal Data Analysis
Video Trailer Generation using Multimodal Data Analysis
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Pranathi Praveen Shreeja Rajesh Prajna Rama Murthy Nikhil Giridhar Surabhi Narayan Department of Computer Science and Engineering PES University Bengaluru India
Trailers have been a vital part of the entertainment industry to pique audience interest. the process of trailer generation has been evolving to provide effective trailers to the public. In this paper we propose a nov... 详细信息
来源: 评论
Machine Learning Models for Intrusion Detection System
Machine Learning Models for Intrusion Detection System
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Sourabh Hiremath Rohit D B Shudhanshu Singh Sheela S V Radhika K R Dept of ISE BMSCE Bengaluru India
Protecting networks from mischievous attacks in the scenario of cybersecurity require Intrusion Detection System (IDS). Leveraging machine learning algorithms to develop IDS has gathered substantial consideration due ... 详细信息
来源: 评论
Leveraging Next-Generation Business Intelligence for Proactive Cybersecurity Defense
Leveraging Next-Generation Business Intelligence for Proacti...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Arijit Sengupta Vidyavati Ramteke Symbiosis Centre for Information Technology Symbiosis International (Deemed University) Pune India
this paper explores how Business Intelligence operates better for protecting cybersecurity through its capability to merge predictive analytics methods with real-time data detection. A qualitative research design enab... 详细信息
来源: 评论
A Hybrid Reinforcement Learning Framework for Optimizing Node Deployment in WSNs
A Hybrid Reinforcement Learning Framework for Optimizing Nod...
收藏 引用
international conference on Communication systems and Network technologies (CSNT)
作者: Rahul Priyadarshi Jayant Kumar Rout Akash Kumar Gupta Rakesh Ranjan Amit Verma Panduranga Ravi Teja Faculty of Engineering and Technology ITER SOA Bhubaneswar India School of Computer Application KIIT Bhubaneswar India Dept of ECE BIT Mesra Deoghar India School of Computer Science UPES Dehradun India
Efficient node deployment in Wireless Sensor Networks (WSNs) is critical for maximizing network coverage, enhancing energy efficiency, and prolonging network lifetime. However, achieving optimal node placement is chal... 详细信息
来源: 评论