咨询与建议

限定检索结果

文献类型

  • 1,526 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,137 篇 工学
    • 965 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 268 篇 信息与通信工程
    • 206 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 316 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 137 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 1,513 篇 英文
  • 16 篇 中文
  • 14 篇 其他
  • 3 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1532 条 记 录,以下是391-400 订阅
排序:
Design and research of one-stop system of rural public service governance based on Big data technology  8
Design and research of one-stop system of rural public servi...
收藏 引用
8th international conference on Information systems engineering, ICISE 2023
作者: Zhang, Bo Zhang, Zhiqin Wuhan Donghu University School of Computer Science Wuhan430000 China
As an important content of rural governance, the modernization of rural public service governance is the need to complement the weaknesses of rural basic public service and improve the quality of public service. It is... 详细信息
来源: 评论
Blockchain-based Privacy-Preserving System for Internet of things (IoT)  8
Blockchain-based Privacy-Preserving System for Internet of T...
收藏 引用
8th international conference on Communication and Electronics systems, ICCES 2023
作者: Ravi, C.N. Dinesh Krishnan, S. Kaliyaperumal, Manikannan Kumar, Sumita Ram Prasad, A.V.S. Suma Christal Mary, S. Cmr Engineering College Computer Science & Engineering Department Telangana Hyderabad India B v Raju Institute of Technology Department of Computer Science & Engineering Narsapur India R.M.K Engineering College Computer Science & Engineering R.S.M Nagar 601 206 India Bharati Vidyapeeth Deemed to Be University Computer Science & Engineering Department of Engineering and Technologies kharghar Navi Mumbai India Koneru Lakshmaiah Education Foundation Department of Mechanical Engineering Guntur522502 India Panimalar Engineering College Department of Information Technology Poonamalle Tamil Nadu Chennai India
the shortcomings of conventional healthcare systems are becoming more apparent as the Internet of things (IoT) becomes ever more pervasive in people's daily lives. the standard procedure for dealing with confident... 详细信息
来源: 评论
Increasing Source Privacy and Network Lifetime without Affecting Latency: A Strategic Random Walk for WSNs∗  8
Increasing Source Privacy and Network Lifetime without Affec...
收藏 引用
8th international conference on computer and Communication systems, ICCCS 2023
作者: Mukamanzi, Florence Raja, Manjula Datta, Raja Koduru, Tejodbhav Hanyurwimfura, Damien University of Rwanda ACE-IoT Kigali Rwanda SRM University AP Computer Science and Engineering Amaravathi India Indian Institute of Technology Kharagpur Electronics and Electrical Communication Engineering Kharagpur India
Remote monitoring in wireless sensor networks (WSNs) requires enhanced privacy and long-term monitoring of objects or events without escalating delay. To address this problem, a strategic random walk routing for prote... 详细信息
来源: 评论
Noise Cancellation by Fast Fourier Transform for Wav2Vec2.0 based Speech-to-Text System  8
Noise Cancellation by Fast Fourier Transform for Wav2Vec2.0 ...
收藏 引用
8th ieee international conference for Convergence in Technology, I2CT 2023
作者: Gupta, Surya Prakash Spoorthy, V. Koolagudi, Shashidhar G National Institute of Technology Karnataka Department of Computer Science & Engineering Mangalore Surathkal India
Speech-To-Text (STT) systems are a part of the Speech Recognition domain in which speech is given as input, and it generates the transcript. the input speech sometimes disrupts the STT system and generates incorrect t... 详细信息
来源: 评论
A Robust Hybrid Cryptosystem based on DNA Steganography  8
A Robust Hybrid Cryptosystem based on DNA Steganography
收藏 引用
8th international conference on Communication and Electronics systems, ICCES 2023
作者: Chakraborty, Debadrita Bhowmik, Bishal Bhowmik, Susmita Debbarma, Pankaj Tripura Institute of Technology Computer Science and Engineering Department Tripura Agartala India
Cryptography is a major concern in the field of computer networks and security of data. By encoding a plain message using cryptographic algorithms, cryptography converts a plain message into an unintelligible format f... 详细信息
来源: 评论
Optimal combination of photovoltaic systems and wind generators in the power network  8
Optimal combination of photovoltaic systems and wind generat...
收藏 引用
8th international conference on Mathematics and computers in Sciences and Industry, MCSI 2023
作者: Fotopoulou, Maria Tsekouras, George Kontargyri, Vassiliki Rakopoulos, Dimitrios Chemical Process and Energy Resources Institute Centre for Research and Technology Hellas Athens Greece University of West Attica Department of Electrical and Electronics Engineering Athens Greece National Technical University of Athens School of Electrical and Computer Engineering Athens Greece
the current energy transition has affected the design and operation of power networks, which need to incorporate Renewable Energy Sources (RES) to reduce their environmental footprint. More specifically, depending on ... 详细信息
来源: 评论
Detecting Tabnabbing Attacks Via An RL-Based Agent  8
Detecting Tabnabbing Attacks Via An RL-Based Agent
收藏 引用
8th international conference on Information Technology Research, ICITR 2023
作者: Fonseka, Ashani Pashenna, Pamali Ariyadasa, Subhash N. Uva Wellassa University of Sri Lanka Department of Computer Science and Informatics Badulla Sri Lanka
Tabnabbing attacks exploit user behavior in web browsers, deceiving users by altering content in inactive tabs to appear legitimate, leading to data disclosure or unintended actions. this research evaluates the effect... 详细信息
来源: 评论
Application of Pose Estimation on Webcam for Fall Risk Assessment  8
Application of Pose Estimation on Webcam for Fall Risk Asses...
收藏 引用
Joint 8th international conference on Digital Arts, Media and Technology and 6th ECTI Northern Section conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2023
作者: Uttama, Surapong Chumpoo, Patsakorn Rueangsirarak, Worasak Center of Excellence in Artificial Intelligence and Emerging Technologies School of Information Technology Mae Fah Luang University Chiang Rai Thailand School of Information Computer Science Program Technology Mae Fah Luang University Chiang Rai Thailand School of Information Technology Computer and Communication Engineering for Capacity Building Mae Fah Luang University Chiang Rai Thailand
Fall risk assessment is an effective and simple measure to evaluate the balance of people especially the elderly who are likely to have balance disorder. Lose of body balance increases a fall risk which could lead to ... 详细信息
来源: 评论
Application of the Simplified Aquila Optimizer with the Multiple Updating Principle in Unmanned Aerial Vehicle Path Planning  8
Application of the Simplified Aquila Optimizer with the Mult...
收藏 引用
8th international conference on computer and Communication systems, ICCCS 2023
作者: Zhao, Juan Liu, Yuan-Man Gao, Zheng-Ming School of Computer Engineering Insititue of Intelligent Computing Technology Jingchu University of Technology China School of Mechanical Engineering Jingchu University of Technology China Institute of Intelligent Computing Technology Hubei Engineering Research Center for Specialty Flowers Biological Breeding Schol of Computer Engineering Jingchu University of Technology China
the unmanned aerial vehicle (UAV) had been popular around the world and the peasant began to use UAVs to transport bags of crop, spray pesticides or herbicides manually causing the uncertainty and difficulty in path p... 详细信息
来源: 评论
A novel Recommendation Algorithm Based on Knowledge Graph Convolution Networks and LDA  8
A novel Recommendation Algorithm Based on Knowledge Graph Co...
收藏 引用
8th international conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Chen, Liqiong Xu, Zhengyu Shanghai Institute of Technology Department of Computer Science and Information Engineering Shanghai China
Recommender systems exist with the aim of helping users discover personalized and useful content and products in a sea of information. Recommender systems have long faced challenges such as data sparsity and cold star... 详细信息
来源: 评论