咨询与建议

限定检索结果

文献类型

  • 1,527 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,533 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,138 篇 工学
    • 966 篇 计算机科学与技术...
    • 825 篇 软件工程
    • 268 篇 信息与通信工程
    • 206 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 317 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 138 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 875 篇 英文
  • 656 篇 其他
  • 24 篇 中文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1533 条 记 录,以下是951-960 订阅
排序:
Intrusion Detection System using Ensemble Learning Analytics
Intrusion Detection System using Ensemble Learning Analytics
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Anil Kumar Dasari Saroj Kr. Biswas Saptarsi Sanyal Biswajit Purkayastha Dept. of Computer Science & Engineering National Institute of Technology Silchar Silchar India
An Intrusion Detection System (IDS) monitors and analyses data to find any intrusions into a system or network. the network generates data at a tremendous volume, variety, and speed, making it difficult to detect atta... 详细信息
来源: 评论
Research on Fusion Detection of FDI Attacks in WSNs with Privacy Preservation Under Communication Constraints  1
收藏 引用
8th international conference on Life System Modeling and Simulation, LSMS 2024 and 8th international conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2024
作者: Liu, Jinming Liu, Li Hu, Xin Zhang, He Leng, Kun Wang, Zengfeng School of Information and Electrical Engineering Ludong University Yantai264025 China School of Mathematics and Statistics Ludong University Yantai264025 China
this paper investigates the issue of data security and false data injection (FDI) attack detection and warning speed in wireless sensor networks under bandwidth constraints. Firstly, for non-malicious a... 详细信息
来源: 评论
Image Denoising using Autoencoders : Denoising noisy imgaes by removing noisy pixels/grains from natural images using Deep learning and autoencoders techniques
Image Denoising using Autoencoders : Denoising noisy imgaes ...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Uday Kulkarni Sachin Patil Vikas E Rahul Patil Bodha Kulkarni Meena S. M Akshay Shanbhag School of Computer Science KLE Technological University Hubli India
Denoising images is widely used in applications from critical medical systems to software based image enhancement in our cell phones. the natural noise is simulated by adding noise to an image in random pixels. Curren... 详细信息
来源: 评论
A Modified Dual Loop Droop Control for Parallel Operation of Grid-forming Converters
A Modified Dual Loop Droop Control for Parallel Operation of...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Anshul Awasthi Souvik Bera Ragavan K Electrical Engineering Indian Institute of Technology Gandhinagar India
Distributed Generators (DGs) are becoming more integrated into the existing power system due to the growing popularity of renewable energy sources. However, in contrast to synchronous generators in a conventional powe... 详细信息
来源: 评论
Forest Fire Detection using Convolutional Neural Network Model
Forest Fire Detection using Convolutional Neural Network Mod...
收藏 引用
international conference for Convergence of Technology (I2CT)
作者: Shubham Sah Suneet Prakash Shweta Meena Department of Software Engineering Delhi Technological University Delhi India
Everyone recalls the destruction brought on by the Australian forest fires in 2019. Even though there isn’t much we can do to battle forest fires on our own, we can always rely on technology. By this we are trying to... 详细信息
来源: 评论
Formalized Designing Methodology of ISMS for Critical Infrastructure  8
Formalized Designing Methodology of ISMS for Critical Infras...
收藏 引用
8th ieee international conference on Problems of Infocommunications, Science and Technology, PIC S and T 2021
作者: Ulianovska, Yuliia Florov, Serhii Hrebeniuk, Andrii Katkova, Tatiana Prokopovich-Tkachenko, Dmytro Gvozdov, Roman Dnipro University of Customs And Finance Department of Computer Science And Software Engineering Dnipro Ukraine Dnipro University of Technology Department of Information Security And Telecommunications Dnipro Ukraine Dnipro State University of Internal Affairs Department of Economics And Information Security Dnipro Ukraine Dnipro University of Customs And Finance Department of Cyber Security Dnipro Ukraine Dnipro University of Customs And Finance Department of Cyber Security And Informational Technologies Dnipro Ukraine Kharkiv National University of Radioelectronics Department of Security of Informational Technologies Kharkiv Ukraine
Today, the functioning of the state is impossible without a developed information infrastructure. Such systems are already considered as critical infrastructure. the architecture of information systems is growing alon... 详细信息
来源: 评论
PyTPU: Migration of Python Code for Heterogenous Acceleration with Automated Test Generation
PyTPU: Migration of Python Code for Heterogenous Acceleratio...
收藏 引用
Big Data, Cloud Computing, Data Science & engineering (BCD)
作者: Arghya Kundu Uyen Trang Nguyen Electrical and Computer Engineering York University Toronto Canada
software applications are increasingly built to take advantage of heterogeneous architectures as specialised hardware accelerators take centre stage in today’s computing environment. Tensor processing units (TPUs), t...
来源: 评论
Ka-band Reflectarray Unit-cell with 1-bit Digital Phase Resolution  8
Ka-band Reflectarray Unit-cell with 1-bit Digital Phase Reso...
收藏 引用
8th NAFOSTED conference on Information and computer Science, NICS 2021
作者: Nguyen, Minh thien Tran, Van Su Nguyen, Binh Duong International University Vietnam National University School of Electrical Engineering Ho Chi Minh City Viet Nam
A simple and low-profile reconfigurable unit-cell design for Ka band reconfigurable reflectarray antennas is presented in this paper. the unit-cell is based on a single substrate and a ground plane that allows a simpl... 详细信息
来源: 评论
Channel Robust RF Fingerprint Identification Method with Narrow Band Differential Constellation Trace Figure
Channel Robust RF Fingerprint Identification Method with Nar...
收藏 引用
ieee international conference on Signal and Image Processing (ICSIP)
作者: Xiangqi Meng Linning Peng Ruowei Song Hua Fu Aiqun Hu School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Institute of Advanced Technology University of Science and Technology of China Hefei China School of Information Science and Engineering Southeast University Nanjing China
RF fingerprint (RFF) identification in wideband wireless communication systems is vulnerable to interference from wireless channel variations. this paper proposes a channel robust RFF identification method with narrow...
来源: 评论
FixGPT: A Novel three-Tier Deep Learning Model for Automated Program Repair
FixGPT: A Novel Three-Tier Deep Learning Model for Automated...
收藏 引用
ieee international conference on Data Science in Cyberspace (DSC)
作者: Wenhao Ye Jun Xia Shuo Feng Xiangyu Zhong Shuai Yuan Zhitao Guan STATE GRID HUNAN ELECTRIC POWER COMPANY LIMITED Changsha China School of Control and Computer Engineering North China Electric Power University Beijing China HUNAN SGIT TECHNOLOGY CO. LTD. Changsha China Department of Finance Operations and Information Systems Brock University Ontario Canada
Automatic program repair plays a crucial role in the software development and implementation. While deep learning-based approaches have made significant progress, one inherent challenge is the inefficiency in code rep...
来源: 评论