咨询与建议

限定检索结果

文献类型

  • 8,321 篇 会议
  • 65 篇 期刊文献
  • 37 册 图书
  • 1 篇 学位论文

馆藏范围

  • 8,424 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,724 篇 工学
    • 5,421 篇 计算机科学与技术...
    • 4,734 篇 软件工程
    • 1,288 篇 信息与通信工程
    • 749 篇 生物工程
    • 670 篇 电气工程
    • 670 篇 控制科学与工程
    • 548 篇 生物医学工程(可授...
    • 545 篇 机械工程
    • 415 篇 电子科学与技术(可...
    • 382 篇 光学工程
    • 287 篇 动力工程及工程热...
    • 273 篇 仪器科学与技术
    • 273 篇 安全科学与工程
    • 264 篇 化学工程与技术
    • 211 篇 土木工程
    • 208 篇 材料科学与工程(可...
  • 2,715 篇 理学
    • 1,486 篇 数学
    • 812 篇 生物学
    • 620 篇 物理学
    • 437 篇 统计学(可授理学、...
    • 324 篇 系统科学
    • 226 篇 化学
  • 1,682 篇 管理学
    • 1,034 篇 管理科学与工程(可...
    • 744 篇 图书情报与档案管...
    • 526 篇 工商管理
  • 478 篇 医学
    • 441 篇 临床医学
    • 417 篇 基础医学(可授医学...
    • 275 篇 药学(可授医学、理...
  • 287 篇 法学
    • 209 篇 社会学
  • 236 篇 教育学
    • 228 篇 教育学
  • 208 篇 经济学
  • 152 篇 农学
  • 53 篇 文学
  • 27 篇 军事学
  • 18 篇 艺术学

主题

  • 263 篇 software
  • 202 篇 software enginee...
  • 142 篇 computational mo...
  • 135 篇 computer science
  • 122 篇 internet of thin...
  • 109 篇 machine learning
  • 109 篇 software design
  • 104 篇 feature extracti...
  • 103 篇 application soft...
  • 100 篇 software testing
  • 91 篇 support vector m...
  • 91 篇 computer archite...
  • 89 篇 semantics
  • 86 篇 computer vision
  • 85 篇 deep learning
  • 82 篇 software algorit...
  • 79 篇 computer softwar...
  • 78 篇 data mining
  • 74 篇 convolutional ne...
  • 73 篇 neural networks

机构

  • 41 篇 graphic era deem...
  • 28 篇 school of comput...
  • 25 篇 school of comput...
  • 23 篇 department of co...
  • 20 篇 chitkara univers...
  • 19 篇 college of compu...
  • 17 篇 department of so...
  • 16 篇 school of comput...
  • 15 篇 nitte meenakshi ...
  • 14 篇 school of comput...
  • 13 篇 college of compu...
  • 13 篇 college of softw...
  • 13 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 school of softwa...
  • 12 篇 college of compu...
  • 11 篇 school of comput...
  • 11 篇 software college...
  • 11 篇 school of softwa...
  • 10 篇 university of sc...

作者

  • 13 篇 pant bhasker
  • 12 篇 pareek piyush ku...
  • 12 篇 chakravarthi m. ...
  • 12 篇 gangodkar durgap...
  • 11 篇 wang wei
  • 11 篇 li jing
  • 10 篇 wang jian
  • 9 篇 huang kai
  • 9 篇 kumar yogesh
  • 9 篇 herawan tutut
  • 8 篇 zhang lei
  • 8 篇 liu yang
  • 8 篇 yang yang
  • 8 篇 liu wei
  • 8 篇 mishra debahuti
  • 8 篇 tripathi vikas
  • 7 篇 li yang
  • 7 篇 al-turjman fadi
  • 7 篇 chen chen
  • 7 篇 li heng

语言

  • 7,731 篇 英文
  • 594 篇 其他
  • 139 篇 中文
  • 3 篇 土耳其文
  • 1 篇 西班牙文
检索条件"任意字段=2nd International Conference on Computer Science and Software Engineering, CSASE 2022"
8424 条 记 录,以下是241-250 订阅
排序:
Dynamic Topology Management In Ad-Hoc Networks For Improved Performance  2
Dynamic Topology Management In Ad-Hoc Networks For Improved ...
收藏 引用
2nd IEEE international conference on Advances in Information Technology, ICAIT 2024
作者: Anakath, A.S. Kannadasan, R. Margarat, G. Simi Pandian, A. Pasumpon Antony Sibiya Varghese, V. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology VIT University Tamil Nadu Vellore India Department of Computer Science and Engineering New Prince Shri Bhavani College of Engineering and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering CARE College of Engineering Trichy India Department of Artificial Intelligence and Data Science GRT Institute of Engineering and Technology Tamil Nadu Tiruttani India
Optimization in ad hoc networks is a highly specialized task because the structure of the network is loosely formed, and each node is independently responsible for its operation. In order to obtain a better result fro... 详细信息
来源: 评论
Semi-supervised Balanced Distribution Adaptation Model for Intrusion Detection  2
Semi-supervised Balanced Distribution Adaptation Model for I...
收藏 引用
2nd international conference on computer Vision and Intelligent Technology
作者: Wang, Jianying Chen, Rongrong Zhang, Yong Huzhou Univ Huzhou Univ Lib Huzhou Peoples R China Dalian Univ Sch Software Engn Dalian Peoples R China Huzhou Univ Sch Informat Engn Huzhou Peoples R China Liaoning Normal Univ Dalian Sch Comp & Informat Technol Dalian Peoples R China
Intrusion Detection Systems (IDS) are essential for safeguarding modern network infrastructures against a wide range of cyber threats. However, the development of highly effective IDS models is often constrained by th... 详细信息
来源: 评论
Understanding the Implications: Critical Path Analysis vs Dependent Failure Analysis in ISO 26262 Safety Methodology  1
收藏 引用
31st European conference on Systems, software and Services Process Improvement (EuroSPI)
作者: Hussein, Mohammed Zeyad, Ahmed ElAdawy, Yasser SEITech Solut GmbH Ludwigsburg Germany
ISO26262 - Parts 4,6,9 - 2nd edition [1-3] was published in December 2018 and addressed functional safety management and engineering at organizations and projects involved in safety activities for road vehicles and mo... 详细信息
来源: 评论
eWAPA: An eBPF-based WASI Performance Analysis Framework for WebAssembly Runtimes  2
eWAPA: An eBPF-based WASI Performance Analysis Framework for...
收藏 引用
2nd IEEE international conference on software Services engineering (SSE)
作者: Mao, Chenxi Su, Yuxin Shan, Shiwen Li, Dan Sun Yat Sen Univ Sch Software Engn Zhuhai Peoples R China
WebAssembly (Wasm) is a low-level bytecode format that can run in modern browsers. With the development of standalone runtimes and the improvement of the WebAssembly System Interface (WASI), Wasm has further provided ... 详细信息
来源: 评论
American Sign Language: Detection and Automatic Text Generation  2
American Sign Language: Detection and Automatic Text Generat...
收藏 引用
2nd international conference on Innovative Research in Applied science, engineering and Technology (IRASET)
作者: Farhan, Youssef Ait Madi, Abdessalam Ryahi, Abdennour Derwich, Fatima Ibn Tofail Univ Natl Sch Appl Sci Adv Syst Engn Lab Kenitra Morocco CONFA ELECTRO Co Res & Dev Dept Meknes Morocco
In our daily life, communication is crucial. For people who are hard of hearing (deaf or/and mute) sign language is the means of their communication. Nonetheless, many people are still unaware of sign languages, resul... 详细信息
来源: 评论
Enhancement of Depth Map through Weighted Combination of Guided Image Filters in Shape-From-Focus  2
Enhancement of Depth Map through Weighted Combination of Gui...
收藏 引用
2nd international conference on Digital Futures and Transformative Technologies, ICoDT2 2022
作者: Ahmed, Zubair Shahzad, Ahsan Ali, Usman Department of Computer & Software Engineering Islamabad Pakistan Korea University of Technology and Education School of Computer Science & Engineering Korea Republic of
Estimation of depth map plays a key role in a number of computer vision applications. Shape from focus is a monocular approach that uses image focus as a cue to reconstruct 3D shapes. In the literature, a variety of g... 详细信息
来源: 评论
Detailed Investigation of Influence of Machine learning (ML) and Big Data on Digital Transformation in Marketing  2
Detailed Investigation of Influence of Machine learning (ML)...
收藏 引用
2nd international conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2022
作者: Jain, Ankur Ramachandran, K.K. Sharma, Shikha Sharma, Trishu Pareek, Prakash Pant, Bhasker Iftm University Department of Computer Science & Engineering Uttar Pradesh Moradabad India Commerce/ Management Science Dr G R D College of Science India Amity College of Commerce Amity University Haryana India University Institute of Media Studies Chandigarh University Punjab Mohali India Vishnu Institute of Technology Department of ECE A.P. Bhimavaram India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India
The study explores with Machine learning (ML), which is a type of neural network (AI) that empowers software programmers to start increasing prediction without being done with full to do so. Because data is so valuabl... 详细信息
来源: 评论
Neural Network-Based Sentiment Analysis and Emotional Data Mining of Movie Reviews  24
Neural Network-Based Sentiment Analysis and Emotional Data M...
收藏 引用
2nd international conference on Artificial Intelligence, Systems and Network Security, AISNS 2024
作者: Wang, Zengxiang Lv, Shiyao Wu, Deyan University of Electronic Science and Technology of China Sichuan Chengdu China Chengdu Vocational University of the Arts Sichuan Chengdu China Sichuan Institute of Computer Sciences Sichuan Chengdu China
With the increasing emphasis on spiritual and cultural enrichment, the film industry has seen remarkable growth, leading to a heightened demand for high-quality cinematic productions. Movie reviews, as a vital channel... 详细信息
来源: 评论
Medical BCFL: A blockchain-enabled federated learning architecture for secure healthcare data sharing  24
Medical BCFL: A blockchain-enabled federated learning archit...
收藏 引用
2nd international conference on Artificial Intelligence, Systems and Network Security, AISNS 2024
作者: Dong, Qianyu Liu, Jiazheng Jiang, Yuchen School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Guangdong Shenzhen China School of Computer Science and Technology DongHua University Shanghai China
In response to the growing demand for secure healthcare systems, this paper disaplys a blockchain-enabled federated learning architecture called Medical BCFL. The architecture aims to address privacy concerns and faci... 详细信息
来源: 评论
A Design Method of Equipment Support Simulation Support software  2
A Design Method of Equipment Support Simulation Support Soft...
收藏 引用
2nd international conference on computer science and Blockchain, CCSB 2022
作者: Sun, Yong Wang, Hongfu Zhang, Shaopan Zhang, Jian Zhang, Yongle Zhou, Qiang Zhao, Jinqing Lu, Guangzhao China Research and Development Academy of Machinery Equipment Beijing100089 China
According to the needs of the field of equipment support simulation, this paper proposes a design method of equipment support simulation support software, and realizes the corresponding software based on this method. ... 详细信息
来源: 评论