咨询与建议

限定检索结果

文献类型

  • 2,264 篇 会议
  • 18 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 2,298 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,928 篇 工学
    • 1,213 篇 计算机科学与技术...
    • 961 篇 软件工程
    • 390 篇 信息与通信工程
    • 235 篇 控制科学与工程
    • 218 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 164 篇 化学工程与技术
    • 158 篇 材料科学与工程(可...
    • 154 篇 电气工程
    • 128 篇 仪器科学与技术
    • 126 篇 环境科学与工程(可...
    • 115 篇 生物医学工程(可授...
    • 97 篇 生物工程
    • 92 篇 动力工程及工程热...
    • 90 篇 土木工程
    • 78 篇 建筑学
    • 70 篇 光学工程
    • 69 篇 冶金工程
    • 68 篇 安全科学与工程
  • 822 篇 理学
    • 448 篇 数学
    • 157 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 116 篇 生物学
    • 114 篇 系统科学
    • 112 篇 化学
    • 102 篇 生态学
  • 506 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 75 篇 医学
  • 71 篇 经济学
    • 71 篇 应用经济学
  • 62 篇 教育学
  • 58 篇 法学
  • 51 篇 农学
  • 15 篇 艺术学
  • 11 篇 军事学
  • 5 篇 文学
  • 1 篇 哲学

主题

  • 35 篇 data mining
  • 30 篇 educational inst...
  • 26 篇 mobile ad hoc ne...
  • 25 篇 wireless sensor ...
  • 24 篇 bioinformatics
  • 24 篇 genetic algorith...
  • 19 篇 image segmentati...
  • 19 篇 authentication
  • 19 篇 cloud computing
  • 17 篇 feature extracti...
  • 17 篇 web services
  • 17 篇 genomics
  • 16 篇 quality of servi...
  • 16 篇 routing protocol...
  • 15 篇 support vector m...
  • 15 篇 computational mo...
  • 15 篇 remote sensing
  • 15 篇 cryptography
  • 14 篇 students
  • 12 篇 computers

机构

  • 29 篇 college of compu...
  • 12 篇 school of comput...
  • 11 篇 chongqing normal...
  • 11 篇 school of comput...
  • 9 篇 college of physi...
  • 9 篇 college of compu...
  • 8 篇 school of comput...
  • 8 篇 information and ...
  • 7 篇 school of comput...
  • 7 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 department of co...
  • 6 篇 school of mechan...
  • 6 篇 college of compu...
  • 6 篇 school of softwa...
  • 5 篇 school of inform...
  • 5 篇 college of elect...
  • 5 篇 college of manag...

作者

  • 12 篇 ma yan
  • 8 篇 zhang kun
  • 8 篇 dhavachelvan p.
  • 7 篇 wang jing
  • 6 篇 wang hai-feng
  • 6 篇 song li
  • 6 篇 maode ma
  • 6 篇 yuhang yang
  • 6 篇 li ming
  • 6 篇 he guotian
  • 6 篇 ramesh t.
  • 6 篇 mannava vishnuva...
  • 6 篇 wang jun
  • 5 篇 jiapeng xiu
  • 5 篇 xu jing
  • 5 篇 sukumar nandi
  • 5 篇 chen liu
  • 5 篇 liu fuyan
  • 5 篇 li ying
  • 5 篇 xu lijun

语言

  • 2,263 篇 英文
  • 32 篇 中文
  • 3 篇 其他
检索条件"任意字段=2012 2nd International Conference on Advances in Computer Science and Engineering, CES 2012"
2298 条 记 录,以下是21-30 订阅
排序:
Analysis of learning behaviour based on edX open data  2
Analysis of learning behaviour based on edX open data
收藏 引用
2020 2nd international conference on Electronics and Communication, Network and computer Technology, ECNCT 2020
作者: Feng, Jian Zhao, Yupeng Computer Science AndTechnology Xi'An University Science and Technology Xi'an Shaanxi710600 China
Since 2012, the continuous development of MOOC has triggered new thinking and research in many aspects, and the massive data it generates provides a foundation for learning behaviour analysis and education data resear... 详细信息
来源: 评论
Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification  2nd
Metaheuristic Based IDS Using Multi-objective Wrapper Featur...
收藏 引用
2nd international conference on advances in Cyber Security, Aces 2020
作者: Ghanem, Waheed Ali H. M. El-Ebiary, Yousef A. Baker Abdulnab, Mohamed Tubishat, Mohammad Alduais, Nayef A. M. Nasser, Abdullah B. Abdullah, Nibras Al-wesabi, Ola A. Faculty of Ocean Engineering Technology and Informatics Universiti Malaysia Terengganu Kuala Terengganu Malaysia Faculty of Engineering and Faculty of Education-Aden and Saber Aden University Aden Yemen Faculty of Informatics and Computing Universiti Sultan Zainal Abidin Kuala Terengganu Malaysia School of Computing and Technology Asia Pacific University of Technology and Innovation Kuala Lumpur Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Parit Raja Malaysia Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Pekan Malaysia National Advanced IPv6 Center Universiti Sains Malaysia Gelugor Malaysia Faculty of Computer Science and Engineering Hodeidah University Al Hudaydah Yemen
Due to the significant ongoing expansion of computer networks in our lives nowadays, the demand for network security and protection from cyber-attacks has never been more imperative to either clients or businesses ali... 详细信息
来源: 评论
Exploratory Data Analysis and Data Visualization on Accidental Drug Related Deaths
Exploratory Data Analysis and Data Visualization on Accident...
收藏 引用
Computing and Data Analytics (ICCDA), international conference on
作者: Ezinne Ogwo-Ude Raza Hasan Shakeel Ahmad Salman Mahmood Department of Science and Engineering Solent University Southampton United Kingdom Department of Computer Science Nazeer Hussain University Karachi Pakistan
The drug overdose epidemic in the United States is rapidly getting worse with substantial associated public health effects. Covering 10,654 cases over a decade (20122022), this study analyses an extensive dataset of... 详细信息
来源: 评论
Image data augmentation method based on maximum activation point guided erasure  2
Image data augmentation method based on maximum activation p...
收藏 引用
2nd international conference on advances in computer Technology, Information science and Communications, CTISC 2020
作者: Jiang, Yun Tao, Shengxin Zhang, Hai Cao, Simin Northwest Normal University College of Computer Science and Engineering Lanzhou730070 China
Deep neural networks usually contain tens to hundreds of millions of orders of learning parameters that provide the necessary representation to solve various visual tasks. But with the increase of the representational... 详细信息
来源: 评论
Light-Fidelity: Next Generation Wireless Networks-A Survey  2
Light-Fidelity: Next Generation Wireless Networks-A Survey
收藏 引用
2nd international conference on Smart Systems and Inventive Technology, ICSSIT 2019
作者: Kumar, Sudesh Sunanda Arora, Sakshi School of Computer Science Engineering Shri Mata Vaishno Devi University India
This is the age of speed and everybody requires high speed connectivity to connect with others for sharing useful and necessary information. Presently the most commonly used network is Wi-Fi (IEEE 802.11n) whose maxim... 详细信息
来源: 评论
Watson-Crick Linear Grammars  2nd
Watson-Crick Linear Grammars
收藏 引用
2nd international conference on Advanced Data and Information engineering, DaEng 2015
作者: Mohamad Zulkufli, N.L. Turaev, S. Mohd Tamrin, M.I. Messikh, A. Department of Computer Science Kulliyyah of Information and Communication Technology International Islamic University Malaysia Kuala Lumpur53100 Malaysia Faculty of Engineering and Natural Sciences International University of Sarajevo Hrasnička cesta 15 Ilidža71210 Bosnia and Herzegovina Department of Information Systems Kulliyyah of Information and Communication Technology International Islamic University Malaysia Kuala Lumpur53100 Malaysia
In this paper, we define Watson-Crick linear grammars extending Watson-Crick regular grammars Subramanian et al. (CCSEIT’12 proceedings of the second international conference on computer science, science, engineering... 详细信息
来源: 评论
The use of Neural Network Modeling for the Selection of Thermophysical Coefficients  2
The use of Neural Network Modeling for the Selection of Ther...
收藏 引用
2nd international conference on Electrical, Communication and computer engineering, ICECCE 2020
作者: Platov, Sergey Latypov, Oleg Dema, Roman Kalugina, Olga Institute of Metallurgy Mechanical Engineering and Material Processing Nosov Magnitogorsk StateTehnical University Magnitogorsk Russia National University of Science and Tehnology MISIS Magnitogorsk Russia Computer Sciense and Information Security Nosov Magnitogorsk StateTehnical University Magnitogorsk Russia
In this work, a simulation model of the thermal state of the work rolls at the hot rolling mill 2000 (m) of Public Joint-Stock Corporation Magnitogorsk iron and steel works (PJSC MMK) is built. A neural network was us... 详细信息
来源: 评论
Energy Efficient Designing Approach of Flip-Flops Using 2-Dot 1-Electron QCA  2nd
Energy Efficient Designing Approach of Flip-Flops Using 2-Do...
收藏 引用
2nd international conference on Computational Intelligence, Communication, and Business Analytics, CICBA 2018
作者: Ghosh, Mili Mukhopadhyay, Debarka Dutta, Paramartha Department of Computer and System Sciences Visva Bharati University Santiniketan731235 India Department of Computer Science Amity School of Engineering and Technology Amity University Kolkata700156 India
The most concerned phenomena in present era of digital industry is the dimensional crunch of devices in nanoscale. Quantum-dot Cellular Automata (QCA) is an well known alternative technology to transcend the limitatio... 详细信息
来源: 评论
An Approach to DNA Cryptography Using 10 × 10 Playfair Cipher
An Approach to DNA Cryptography Using 10 × 10 Playfai...
收藏 引用
2nd international conference on Computational Intelligence, Communication, and Business Analytics, CICBA 2018
作者: Banerjee, Swapnil Roychowdhury, Rajarshi Sarkar, Moumita Roy, Pradipta De, Debashis Department of Computer Science and Engineering Swami Vivekananda Institute of Science and Technology Dakshin Gobindapur P.S.: Sonarpur Kolkata700145 India Department of Computer Science and Engineering Maulana Abul Kalam Azad University of Technology BF-142 Sector-1 Salt Lake CityKolkata700064 India Department of Physics University of Western Australia M013 35 Stirling Highway Crawley PerthWA6009 Australia
Nowadays, sensitive information is conveyed over public communication medium, where data security is an enormous problem and cryptography is the ideal mechanism to handle it. DNA cryptography is a modern cryptographic... 详细信息
来源: 评论
A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System  1
收藏 引用
2nd international conference on Machine Learning for Cyber Security, ML4CS 2019
作者: Lin, Yue Wang, He Yang, Bowen Liu, Mingrui Li, Yin Zhang, Yuqing School of Cyber Engineering Xidian University Xi’anShaanxi China National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences Beijing China
In the process of increasing cybersecurity attack and defense confrontation, there is a natural asymmetry between the offensive and defense. The Cyber Threat Intelligence (CTI) sharing mechanism is an effective means ... 详细信息
来源: 评论