咨询与建议

限定检索结果

文献类型

  • 3,792 篇 会议
  • 1,674 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 5,507 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,353 篇 工学
    • 2,322 篇 计算机科学与技术...
    • 1,905 篇 软件工程
    • 856 篇 信息与通信工程
    • 544 篇 控制科学与工程
    • 406 篇 电气工程
    • 393 篇 生物工程
    • 342 篇 电子科学与技术(可...
    • 299 篇 生物医学工程(可授...
    • 263 篇 光学工程
    • 253 篇 机械工程
    • 209 篇 化学工程与技术
    • 201 篇 网络空间安全
    • 176 篇 安全科学与工程
    • 169 篇 仪器科学与技术
    • 169 篇 动力工程及工程热...
    • 152 篇 材料科学与工程(可...
    • 148 篇 交通运输工程
  • 1,906 篇 理学
    • 893 篇 数学
    • 667 篇 物理学
    • 429 篇 生物学
    • 311 篇 统计学(可授理学、...
    • 224 篇 化学
    • 177 篇 系统科学
  • 969 篇 管理学
    • 617 篇 管理科学与工程(可...
    • 406 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 273 篇 医学
    • 208 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 139 篇 公共卫生与预防医...
  • 165 篇 法学
    • 135 篇 社会学
  • 100 篇 农学
  • 85 篇 经济学
  • 46 篇 教育学
  • 37 篇 文学
  • 27 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 205 篇 accuracy
  • 178 篇 deep learning
  • 141 篇 feature extracti...
  • 132 篇 computational mo...
  • 128 篇 machine learning
  • 126 篇 training
  • 102 篇 convolutional ne...
  • 100 篇 predictive model...
  • 100 篇 hadron colliders
  • 92 篇 real-time system...
  • 91 篇 support vector m...
  • 90 篇 data models
  • 79 篇 artificial intel...
  • 78 篇 security
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 69 篇 cloud computing
  • 68 篇 data mining
  • 63 篇 reliability
  • 61 篇 semantics

机构

  • 185 篇 institute of com...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 charles universi...
  • 124 篇 zhejiang univers...
  • 123 篇 department of ph...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 119 篇 imperial college...
  • 119 篇 rwth aachen univ...
  • 115 篇 department of ph...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,050 篇 英文
  • 371 篇 其他
  • 87 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Application"
5507 条 记 录,以下是391-400 订阅
排序:
Bit level image encryption algorithm based on hyperchaotic system
收藏 引用
Optoelectronics Letters 2023年 第3期19卷 186-192页
作者: MAN Zhenlong ZHANG Yue ZHOU Ying LU Xiaoli WANG Zhaoquan School of Electronic and Information Engineering Liaoning Technical UniversityHuludao 125100China Advanced Interactive Technology and Application Laboratory Computer Network Information CenterChinese Academy of SciencesBeijing 100190China
Because chaotic systems are unpredictable,ergodic and sensitive to initial values and parameters,they are often used in the field of *** avoid the bad randomness of the random key generated by the low dimensional chao... 详细信息
来源: 评论
Interference coordination techniques for D2D communications in a spectrum sharing environment  2
Interference coordination techniques for D2D communications ...
收藏 引用
2nd International Conference on Artificial Intelligence and Machine Learning applications, AIMLA 2024
作者: Inzimam Ranganathaswamy, M.K. Kumar, Ashwini Vivekananda Global University Department of Computer Science & Application Jaipur India School of Engineering and Technology Department of Mechanical Engineering Karnataka Bangalore India ARKA JAIN University Department of Mechnical Engineering Jharkhand Jamshedpur India
device-to-tool (D2D) communications has become an essential a part of allowing understanding transfer, records sharing, and collaboration. As such, green usage of spectrum assets for D2D communications in a spectrum-s... 详细信息
来源: 评论
Investigating the Impact of Public-Key Infrastructure in Information Security Models for Networked applications  5th
Investigating the Impact of Public-Key Infrastructure in Inf...
收藏 引用
5th International Conference on Data Science, Machine Learning and applications, ICDSMLA 2023
作者: Shree, Ritu Saxena, Kumud Mehta, Deepak Pandeya, Megha Department of Computer Science and Application Vivekananda Global University Jaipur India Department of Computer Science Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Public-key infrastructure (PKI) is poised to play a crucial function in the use of secure data technology systems. With the increasing complexity of these dais’s networks and packages, PKI gives a reliable way to ele... 详细信息
来源: 评论
Neighbor Reward with Optimal Reciprocal Collision Avoidance for Swarm Agents  3
Neighbor Reward with Optimal Reciprocal Collision Avoidance ...
收藏 引用
2021 3rd International Conference on Robotics, Intelligent Control and Artificial Intelligence, ICRICA 2021
作者: Du, Linlin Tang, Hao Li, Pengfei Ma, Tao Ge, Shuangquan Cao, Kang Computer Application Institute China Academy of Engineering Physics Mianyang621900 China
Navigating in an unknown area safely is counted as the underlying work which can support swarm agents for more complex tasks. When available information of search regions are lacking, agents make real-time action deci... 详细信息
来源: 评论
Research on implicit transmission monitoring of files across business systems  3
Research on implicit transmission monitoring of files across...
收藏 引用
3rd International Conference on computer Science and Communication Technology, ICCSCT 2022
作者: Zhou, Chunru Zeng, Wenjing Wu, Guo Li, Junhao Pan, Wenqiang Institute of Computer Application China Academy of Engineering Physics Sichuan Mianyang China
File transmission is a key concern of Intranet Security Monitoring. Compared with explicit file transmission within a single system, the implicit transmission of files across various business systems is a difficult pr... 详细信息
来源: 评论
Enhanced License Plate Detection using YOLOv8n: An Approach for Efficient Vehicle Identification  3
Enhanced License Plate Detection using YOLOv8n: An Approach ...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Chandok, Vishesh Maurya, Sudhanshu Mirza, Kashish Kumar Yadav, Ajay Thomas Varghese, Sneha Garg, Rachit Symbiosis Institute of Technology Nagpur Campus Pune India Graphic Era Hill University Department of Computer Science & Engineering Uttarakhand Bhimtal Campus India United Institute of Management Department of Computer Application Prayagraj India Lovely Professional University School of Computer Science and Engineering Phagwara India
An essential feature of the intelligent transportation system is the automatic detection and recognition of license plate information. The e-payment systems for parking and toll collection in traffic control security ... 详细信息
来源: 评论
Improving Accuracy and Robustness in Depression Detection with Ensemble Learning and Optimization Techniques  1
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Kumari, Meena Singh, Gurpreet Pande, Sagar Dhanraj School of Computer Application Lovely Professional University Punjab Phagwara India School of Computer Science and Engineering Lovely Professional University Punjab Phagwara India VIT-AP University Andhra Pradesh Amaravati India
Chronic melancholy, lack of interest or enjoyment in activities, changes in diet or weight, abnormalities in sleep patterns, feelings of guilt or unworthiness, difficulty in concentration, and suicide or death thought... 详细信息
来源: 评论
ATLE2FC: Design of an Augmented Transfer Learning Model for Explainable IoT Forensics using Ensemble Classification  1
ATLE2FC: Design of an Augmented Transfer Learning Model for ...
收藏 引用
1st International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2022
作者: Pethe, Yoginee Surendra Dandekar, Pranali Rahul Shri Ramdeobaba College of Engineering and Management Department of Computer Application Nagpur India
Existing forensic models are majorly focussed towards improving efficiency of data analysis, but a very few models are proposed for intelligent evidence extraction & explain-ability. Inspired by these limitations,... 详细信息
来源: 评论
Remotely Controlled Electronic Noticeboard Using NodeMCU  14
Remotely Controlled Electronic Noticeboard Using NodeMCU
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Kumar, Ayush Singh, Gurpreet Rawat, Vandana Negi, Deepti Joshi, Aditya Graphic Era Deemed to Be University Department of Computer Application Dehradun India Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Graphic Era Hill University Department of Computer Science & Engineering Dehradun India
In today's digital age, traditional notice boards are being replaced by more dynamic and interactive solutions. This research paper presents the design and implementation of a remotely controlled notice board usin... 详细信息
来源: 评论
Exploit Reversible Gates to Implement Fast Quantum Sorting Algorithm  1
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Bhattacharjee, Subhasree Das, Kunal Sadhu, Arindam Sarkar, Soumyadip Sarkar, Bikramjit Department of Computer Application Narula Institute of Technology West Bengal Kolkata India Department of Computer Science Acharya Prafulla Chandra College West Bengal Kolkata India Department of Electronics and Communication Engineering Greater Kolkata College of Engineering and Management West Bengal Kolkata India Department of Computer Science and Engineering JIS College of Engineering West Bengal Kalyani India
This paper proposes an algorithm of divide-compare-swap-based (DCS) sorting that reduces time complexity by utilizing quantum parallelism. A new cost optimized comparator circuit has been designed and simulated using ... 详细信息
来源: 评论