咨询与建议

限定检索结果

文献类型

  • 30,340 篇 会议
  • 4,661 篇 期刊文献
  • 238 册 图书

馆藏范围

  • 35,239 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,864 篇 工学
    • 15,817 篇 计算机科学与技术...
    • 13,232 篇 软件工程
    • 5,858 篇 信息与通信工程
    • 3,549 篇 控制科学与工程
    • 2,704 篇 电子科学与技术(可...
    • 2,667 篇 电气工程
    • 2,335 篇 生物工程
    • 1,895 篇 生物医学工程(可授...
    • 1,540 篇 光学工程
    • 1,370 篇 机械工程
    • 1,241 篇 动力工程及工程热...
    • 1,220 篇 仪器科学与技术
    • 1,026 篇 化学工程与技术
    • 878 篇 安全科学与工程
    • 743 篇 交通运输工程
  • 11,210 篇 理学
    • 6,077 篇 数学
    • 3,067 篇 物理学
    • 2,565 篇 生物学
    • 2,029 篇 统计学(可授理学、...
    • 1,316 篇 系统科学
    • 1,103 篇 化学
  • 5,688 篇 管理学
    • 3,347 篇 管理科学与工程(可...
    • 2,635 篇 图书情报与档案管...
    • 1,815 篇 工商管理
  • 1,635 篇 医学
    • 1,382 篇 临床医学
    • 1,290 篇 基础医学(可授医学...
    • 835 篇 药学(可授医学、理...
    • 711 篇 公共卫生与预防医...
  • 1,058 篇 法学
    • 853 篇 社会学
  • 639 篇 经济学
    • 639 篇 应用经济学
  • 483 篇 农学
  • 446 篇 教育学
  • 179 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,120 篇 accuracy
  • 856 篇 feature extracti...
  • 847 篇 computational mo...
  • 758 篇 deep learning
  • 683 篇 training
  • 681 篇 computer science
  • 540 篇 real-time system...
  • 540 篇 machine learning
  • 522 篇 support vector m...
  • 444 篇 predictive model...
  • 412 篇 internet of thin...
  • 364 篇 convolutional ne...
  • 355 篇 data models
  • 354 篇 computer archite...
  • 335 篇 reliability
  • 314 篇 optimization
  • 289 篇 data mining
  • 274 篇 routing
  • 256 篇 wireless sensor ...
  • 246 篇 visualization

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 tno technical sc...
  • 66 篇 università di ca...
  • 66 篇 université de st...
  • 65 篇 dept. of informa...
  • 61 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 47 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 70 篇 huang f.
  • 70 篇 dallier r.
  • 61 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 30,114 篇 英文
  • 4,729 篇 其他
  • 298 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Engineering Program and Dept. of Computer Science"
35239 条 记 录,以下是271-280 订阅
Deep Learning-Driven Cloud Intrusion Detection: Internet of Things and Cloud Networks  1
Deep Learning-Driven Cloud Intrusion Detection: Internet of ...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Moon, Iffath Tanjim Islam Mondal, Md. Nazrul Rajshahi University of Engineering & Technology Dept. of Computer Science & Engineering Rajshahi6204 Bangladesh
In this paper, we have utilized deep learning approaches to detect cloud intrusion for the Internet of Things (IoT). The emerging growth of IoT and cloud environments has revolutionized many industries by allowing rea... 详细信息
来源: 评论
A 4x4 MIMO Antenna Array for the Wi-Fi7Access Point on a Metal Wall Application
A 4x4 MIMO Antenna Array for the Wi-Fi7Access Point on a Met...
收藏 引用
2024 International Symposium on Antennas and Propagation, ISAP 2024
作者: Su, Hsin-Lung Zhan, You-Sheng Dept. of Computer and Communication National Pingtung University Taiwan Dept. of Computer Science and Information Engineering National Pingtung University Taiwan
A 4×4 CPW MIMO Antenna array with an artificial magnetic conductor (AMC) reflector is presented for Wi-Fi7 access point on a metal wall application in the study. The 10-dB impedance of the integrated MIMO antenna... 详细信息
来源: 评论
Hybrid Fake News Detection Model: Bagging and Logistic Regression Approach  14
Hybrid Fake News Detection Model: Bagging and Logistic Regre...
收藏 引用
14th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2025
作者: Kumar, Shivam Tiwari, Naveen Kumar Bajpai, Abhishek Yadav, Shashank Dept. of Computer Science and Engineering Rajkiya Engineering College Kannauj UP Kannauj India
In Today’s world or from Past Scenario’s Fake News has a Huge Impact on Everyone’s Lives including Politics, Sports, Education, External Foreign Affairs, Defense, etc. This project aims to develop a model for ident... 详细信息
来源: 评论
Authentication and Authorization in Zero Trust IoT: A Survey  35
Authentication and Authorization in Zero Trust IoT: A Survey
收藏 引用
35th Irish Systems and Signals Conference, ISSC 2024
作者: James, Meha Newe, Thomas O'Shea, Donna O'Mahony, George D. Munster Technological University Dept. Computer Science Cork Ireland University of Limerick Dept. Electronic and Computer Engineering Limerick Ireland
A critical challenge in implementing Zero trust (ZT) in Internet of Things (IoT) environments is ensuring secure authentication and authorization mechanisms. The work in this article delves into the intricate realm of... 详细信息
来源: 评论
ML Assisted Web Application Firewall  12
ML Assisted Web Application Firewall
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Kalariya, Pranav Jethva, Manthan Alginahi, Yasser University of Windsor Electrical and Computer Engineering Dept. Windsor Canada Computer Science Dept. Adrian College MI United States
This study presents the development and implementation of a sophisticated Web Application Firewall (WAF) empowered by machine learning techniques to bolster cybersecurity measures. Traditional WAFs primarily rely on r... 详细信息
来源: 评论
DURATION-BASED INVESTIGATION OF USER CONTENT CHOICES IN THE EXIT OF FILTER BUBBLES  6
DURATION-BASED INVESTIGATION OF USER CONTENT CHOICES IN THE ...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Bunza, Rabiatu DEPT. OF COMPUTER SCIENCE FACULTY OF SCIENCE AND ENGINEERING SWANSEA UNIVERSITY United Kingdom
Content personalization on social platforms has been linked to the creation of filter bubbles. The algorithms provide content recommendations based on the user’s browsing history and interests, which limits content d... 详细信息
来源: 评论
CELL SEGMENTATION IN FLUORESCENCE MICROSCOPY IMAGES
CELL SEGMENTATION IN FLUORESCENCE MICROSCOPY IMAGES
收藏 引用
2024 IET International Conference on engineering Technologies and Applications, ICETA 2024
作者: Yin, Shao-Yun Hsu, Wei-Wen Hsia, Chih-Hsien Master Program of Artificial Intelligence National Ilan University Ilan Taiwan Dept. of Computer Science and Information Engineering National Taitung University Taitung Taiwan Dept. of Computer Science and Information Engineering National Ilan University Ilan Taiwan
For microscopic cells images, cells’ morphologies are widely varied among different imaging modalities and staining methods. For fluorescence microscopy images, Poisson noises present in images due to the lightening,... 详细信息
来源: 评论
Cybersecurity for Industrial IoT: A Review on Vulnerabilities and Attacks  8
Cybersecurity for Industrial IoT: A Review on Vulnerabilitie...
收藏 引用
8th International Conference on Electronics, Materials engineering and Nano-Technology, IEMENTech 2025
作者: Kumari, Reetu Kumar, Sunil Amandeep Dutta, Kamlesh Kumari, Aparna Guru Jambheshwar University of Science and Technology Dept. of Computer Science & Engineering Haryana Hisar India Guru Jambheshwar University of Science and Technology Dept. of AI & Data Science Haryana Hisar India National Institute of Technology Hamirpur Dept. of Computer Science & Engineering Himachal Pardesh India Institute of Technology Nirma University Dept. of Computer Science & Engineering Gujarat Ahmedabad India
Internet has evolved from a network of connecting people to a network of connecting things, leading to a more complex and sophisticated network of Industrial Things, known as Industrial IoT (IIoT) today. This evolutio... 详细信息
来源: 评论
Effect of pulsed current cathodic protection on pipeline steel API 5L X65 corrosion mitigation: An investigation and machine learning-assisted modeling
收藏 引用
Corrosion Communications 2023年 第4期12卷 29-45页
作者: Hosein Eslamian Mehdi Javidi Mohammad Reza Zamani Mohammad Mahdi Dana Eghbal Mansoori Department of Materials Science and Engineering School of Engineering Shiraz University School of Metallurgy and Materials Engineering College of Engineering University of Tehran Computer Science Eng.and IT Dept. School of Electrical and Computer Engineering Shiraz University
Pulsed current cathodic protection(PCCP) could be more effective than direct current cathodic protection(DCCP)for mitigating corrosion in buried structures in the oil and gas industries if appropriate pulsed parameter... 详细信息
来源: 评论
Enhancing Security in Communication Networks through Quantum Key Distribution  2
Enhancing Security in Communication Networks through Quantum...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Purushottam, Vaishnavi V Meena, S. Guruprasad, N. Global Academy of Technology Dept. of Computer Science and Engineering Bengaluru India Buddha Institute of Technology Computer Science and Engineering Gorakhpur India
Quantum Key Distribution or QKD revolutionizes secure communication using quantum mechanics. Unlike traditional cryptographic methods vulnerable to advances in computing power, QKD guarantees unconditional security by... 详细信息
来源: 评论