咨询与建议

限定检索结果

文献类型

  • 30,047 篇 会议
  • 4,659 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 34,941 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,687 篇 工学
    • 15,657 篇 计算机科学与技术...
    • 13,159 篇 软件工程
    • 5,775 篇 信息与通信工程
    • 3,434 篇 控制科学与工程
    • 2,675 篇 电子科学与技术(可...
    • 2,626 篇 电气工程
    • 2,332 篇 生物工程
    • 1,880 篇 生物医学工程(可授...
    • 1,525 篇 光学工程
    • 1,345 篇 机械工程
    • 1,216 篇 动力工程及工程热...
    • 1,199 篇 仪器科学与技术
    • 1,014 篇 化学工程与技术
    • 848 篇 安全科学与工程
    • 712 篇 交通运输工程
  • 11,140 篇 理学
    • 6,033 篇 数学
    • 3,053 篇 物理学
    • 2,562 篇 生物学
    • 2,003 篇 统计学(可授理学、...
    • 1,317 篇 系统科学
    • 1,088 篇 化学
  • 5,582 篇 管理学
    • 3,263 篇 管理科学与工程(可...
    • 2,591 篇 图书情报与档案管...
    • 1,804 篇 工商管理
  • 1,587 篇 医学
    • 1,371 篇 临床医学
    • 1,278 篇 基础医学(可授医学...
    • 835 篇 药学(可授医学、理...
    • 663 篇 公共卫生与预防医...
  • 1,027 篇 法学
    • 824 篇 社会学
  • 636 篇 经济学
    • 636 篇 应用经济学
  • 481 篇 农学
  • 439 篇 教育学
  • 154 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,077 篇 accuracy
  • 832 篇 feature extracti...
  • 829 篇 computational mo...
  • 709 篇 deep learning
  • 680 篇 computer science
  • 671 篇 training
  • 508 篇 support vector m...
  • 508 篇 real-time system...
  • 502 篇 machine learning
  • 430 篇 predictive model...
  • 407 篇 internet of thin...
  • 350 篇 convolutional ne...
  • 347 篇 computer archite...
  • 344 篇 data models
  • 327 篇 reliability
  • 307 篇 optimization
  • 287 篇 data mining
  • 274 篇 routing
  • 256 篇 wireless sensor ...
  • 246 篇 image segmentati...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 65 篇 dept. of informa...
  • 63 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 49 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 47 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 70 篇 huang f.
  • 70 篇 dallier r.
  • 64 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,053 篇 英文
  • 1,478 篇 其他
  • 308 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Engineering Program and Dept. of Computer Science"
34941 条 记 录,以下是231-240 订阅
排序:
Framework for Cloud-Based Data Management in Autonomous Vehicles
Framework for Cloud-Based Data Management in Autonomous Vehi...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Pallapothu, Harshith Gopi Krishna, G. Sunil, Digvijay Teja Yadav, S. Nagasundari, S. Pes University Dept. of Computer Science & Engineering Bengaluru India Research Center for Information Security Forensics and Cyber Resilience Pes University Dept. of Computer Science & Engineering Bengaluru India
The increasing adoption of autonomous vehicles has driven the need for robust data management solutions that support real-time operations and ensure vehicle safety and efficiency. This work introduces a cloud-based fr... 详细信息
来源: 评论
Designing a Secure Audio / Text Based Captcha Using Neural Network  13
Designing a Secure Audio / Text Based Captcha Using Neural N...
收藏 引用
13th International Conference on Cloud Computing, Data science and engineering, Confluence 2023
作者: Pai, H. Aditya Anandkumar, M. Prasad, M.S. Guru Agarwal, Jyoti Christa, Sharon Dept. of Computer Science and Engineering Dehradun India Dept. of Computer Application Dehradun India
A CAPTCHA is used to reduce the misuse in the case of rising automated bots or software systems and also to avoid any corruption of the web services. The Captcha is used as solving a turing test problem by the users, ... 详细信息
来源: 评论
Psychological Wellbeingness Prediction Using Machine Learning with Hybrid Hyparameter Tuning Techniques
Psychological Wellbeingness Prediction Using Machine Learnin...
收藏 引用
2024 International Conference on Artificial Intelligence and Emerging Technology, Global AI Summit 2024
作者: Rajah, Puvanenthira Habib, Masruk Ravikumar, R.N. Nadarajan, Sivakumar Chougule, Bhagyashree Amit Kirubhakaran, M. Marwadi University Dept. of Computer Engineering Rajkot India Alliance University Dept. of Computer Science and Engineering Bangalore India Tatyasaheb Kore Institute of Engineering and Technology Dept. of Computer Engineering Maharashtra India Suriya Engineering College Dept. of Ai & Ds Erode India
This study investigates the application of machine learning (ML) techniques in predicting Psychological Well-being outcomes, emphasizing the use of ensemble methods like AdaBoost and Random Forest for enhanced accurac... 详细信息
来源: 评论
Deep Learning-Driven Cloud Intrusion Detection: Internet of Things and Cloud Networks  1
Deep Learning-Driven Cloud Intrusion Detection: Internet of ...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Moon, Iffath Tanjim Islam Mondal, Md. Nazrul Rajshahi University of Engineering & Technology Dept. of Computer Science & Engineering Rajshahi6204 Bangladesh
In this paper, we have utilized deep learning approaches to detect cloud intrusion for the Internet of Things (IoT). The emerging growth of IoT and cloud environments has revolutionized many industries by allowing rea... 详细信息
来源: 评论
Authentication and Authorization in Zero Trust IoT: A Survey  35
Authentication and Authorization in Zero Trust IoT: A Survey
收藏 引用
35th Irish Systems and Signals Conference, ISSC 2024
作者: James, Meha Newe, Thomas O'Shea, Donna O'Mahony, George D. Munster Technological University Dept. Computer Science Cork Ireland University of Limerick Dept. Electronic and Computer Engineering Limerick Ireland
A critical challenge in implementing Zero trust (ZT) in Internet of Things (IoT) environments is ensuring secure authentication and authorization mechanisms. The work in this article delves into the intricate realm of... 详细信息
来源: 评论
A 4x4 MIMO Antenna Array for the Wi-Fi7Access Point on a Metal Wall Application
A 4x4 MIMO Antenna Array for the Wi-Fi7Access Point on a Met...
收藏 引用
2024 International Symposium on Antennas and Propagation, ISAP 2024
作者: Su, Hsin-Lung Zhan, You-Sheng Dept. of Computer and Communication National Pingtung University Taiwan Dept. of Computer Science and Information Engineering National Pingtung University Taiwan
A 4×4 CPW MIMO Antenna array with an artificial magnetic conductor (AMC) reflector is presented for Wi-Fi7 access point on a metal wall application in the study. The 10-dB impedance of the integrated MIMO antenna... 详细信息
来源: 评论
ML Assisted Web Application Firewall  12
ML Assisted Web Application Firewall
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Kalariya, Pranav Jethva, Manthan Alginahi, Yasser University of Windsor Electrical and Computer Engineering Dept. Windsor Canada Computer Science Dept. Adrian College MI United States
This study presents the development and implementation of a sophisticated Web Application Firewall (WAF) empowered by machine learning techniques to bolster cybersecurity measures. Traditional WAFs primarily rely on r... 详细信息
来源: 评论
CELL SEGMENTATION IN FLUORESCENCE MICROSCOPY IMAGES
CELL SEGMENTATION IN FLUORESCENCE MICROSCOPY IMAGES
收藏 引用
2024 IET International Conference on engineering Technologies and Applications, ICETA 2024
作者: Yin, Shao-Yun Hsu, Wei-Wen Hsia, Chih-Hsien Master Program of Artificial Intelligence National Ilan University Ilan Taiwan Dept. of Computer Science and Information Engineering National Taitung University Taitung Taiwan Dept. of Computer Science and Information Engineering National Ilan University Ilan Taiwan
For microscopic cells images, cells’ morphologies are widely varied among different imaging modalities and staining methods. For fluorescence microscopy images, Poisson noises present in images due to the lightening,... 详细信息
来源: 评论
DURATION-BASED INVESTIGATION OF USER CONTENT CHOICES IN THE EXIT OF FILTER BUBBLES  6
DURATION-BASED INVESTIGATION OF USER CONTENT CHOICES IN THE ...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Bunza, Rabiatu DEPT. OF COMPUTER SCIENCE FACULTY OF SCIENCE AND ENGINEERING SWANSEA UNIVERSITY United Kingdom
Content personalization on social platforms has been linked to the creation of filter bubbles. The algorithms provide content recommendations based on the user’s browsing history and interests, which limits content d... 详细信息
来源: 评论
Effect of pulsed current cathodic protection on pipeline steel API 5L X65 corrosion mitigation: An investigation and machine learning-assisted modeling
收藏 引用
Corrosion Communications 2023年 第4期12卷 29-45页
作者: Hosein Eslamian Mehdi Javidi Mohammad Reza Zamani Mohammad Mahdi Dana Eghbal Mansoori Department of Materials Science and Engineering School of Engineering Shiraz University School of Metallurgy and Materials Engineering College of Engineering University of Tehran Computer Science Eng.and IT Dept. School of Electrical and Computer Engineering Shiraz University
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameter... 详细信息
来源: 评论