咨询与建议

限定检索结果

文献类型

  • 3,792 篇 会议
  • 1,674 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 5,507 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,353 篇 工学
    • 2,322 篇 计算机科学与技术...
    • 1,905 篇 软件工程
    • 856 篇 信息与通信工程
    • 544 篇 控制科学与工程
    • 406 篇 电气工程
    • 393 篇 生物工程
    • 342 篇 电子科学与技术(可...
    • 299 篇 生物医学工程(可授...
    • 263 篇 光学工程
    • 253 篇 机械工程
    • 209 篇 化学工程与技术
    • 201 篇 网络空间安全
    • 176 篇 安全科学与工程
    • 169 篇 仪器科学与技术
    • 169 篇 动力工程及工程热...
    • 152 篇 材料科学与工程(可...
    • 148 篇 交通运输工程
  • 1,906 篇 理学
    • 893 篇 数学
    • 667 篇 物理学
    • 429 篇 生物学
    • 311 篇 统计学(可授理学、...
    • 224 篇 化学
    • 177 篇 系统科学
  • 969 篇 管理学
    • 617 篇 管理科学与工程(可...
    • 406 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 273 篇 医学
    • 208 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 139 篇 公共卫生与预防医...
  • 165 篇 法学
    • 135 篇 社会学
  • 100 篇 农学
  • 85 篇 经济学
  • 46 篇 教育学
  • 37 篇 文学
  • 27 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 205 篇 accuracy
  • 178 篇 deep learning
  • 141 篇 feature extracti...
  • 132 篇 computational mo...
  • 128 篇 machine learning
  • 126 篇 training
  • 102 篇 convolutional ne...
  • 100 篇 predictive model...
  • 100 篇 hadron colliders
  • 92 篇 real-time system...
  • 91 篇 support vector m...
  • 90 篇 data models
  • 79 篇 artificial intel...
  • 78 篇 security
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 69 篇 cloud computing
  • 68 篇 data mining
  • 63 篇 reliability
  • 61 篇 semantics

机构

  • 185 篇 institute of com...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 charles universi...
  • 124 篇 zhejiang univers...
  • 123 篇 department of ph...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 119 篇 imperial college...
  • 119 篇 rwth aachen univ...
  • 115 篇 department of ph...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,050 篇 英文
  • 371 篇 其他
  • 87 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Application"
5507 条 记 录,以下是491-500 订阅
排序:
CLAACS-IOD: Certificate-embedded lightweight authentication and access control scheme for Internet of Drones
CLAACS-IOD: Certificate-embedded lightweight authentication ...
收藏 引用
作者: Sadhukhan, Dipanwita Ray, Sangram Dasgupta, Mou Rodrigues, Joel J. P. C. Department of Computer Science and Engineering National Institute of Technology Sikkim Sikkim Ravangla India Department of Computer Application National Institute of Technology Raipur Raipur India Qingdao China Instituto de Telecomunicações Covilhã Portugal
In recent era, the unmanned aerial vehicles (UAVs) commonly known as drones has emerged as a one of the most significant and promising tools which has demonstrated its wide range of implementations variating from comm... 详细信息
来源: 评论
Design of a Blind Guidance System Based on RealSense and the Improved YOLOv5 Algorithm  38th
Design of a Blind Guidance System Based on RealSense and the...
收藏 引用
38th CCF National Conference of computer applications, CCF NCCA 2023
作者: Zhang, Zhao Shen, Xiaobin Ge, Jing Zha, Yingying Liu, Lisai Liu, Sheng College of Computer Science and Technology Huaibei Normal University Huaibei235000 China Anui Engineering Research Center for Intelligent Computing and Application on Cognitive Behavior Huaibei235000 China
To assist blind people in travelling and solve the problems of high hardware costs, insufficient portability of blind assistance devices, and vulnerability to environmental impacts, a modified YOLOv5 algorithm (YOLOv5... 详细信息
来源: 评论
Oddity Based Botnet Recognition Utilizing AI Model in the Internet of Things Framework  4
Oddity Based Botnet Recognition Utilizing AI Model in the In...
收藏 引用
4th International Conference on Computation, Automation and Knowledge Management, ICCAKM 2023
作者: Rani, Rupa Chakraborty, Sudeshna Singh, Pooja Varshney, Neha Abes Institute of Technology Computer Science & Engineering U.P Ghaziabad India Banasthali Vidyapith Department of Computer Science & Engineering Rajasthan India School of Computer Application and Technology Galgotias University UP India Abes Institute of Technology Department of Computer Science & Engineering U.P Ghaziabad India
Advanced hooligans are grabbing the opportunity to mull over related contraptions with their IoT adware. The majority of digital attacks target these devices due to the rapid evolution of IoT advancements. With the di... 详细信息
来源: 评论
Research on Improved Quick Sort Algorithm with Duplicate Value Handling  8
Research on Improved Quick Sort Algorithm with Duplicate Val...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Hemin Yadav, Amit Khan, Asif Sah, Abhishek Pratap Chengdu Neusoft University College of Computer and Software Chengdu China Charles Darwin University College of Engineering It and Environment NT Australia Integral University Department of Computer Application Lucknow India University of Electronic Science and Technology of China School of Management Science and Engineering Chengdu China
An improved algorithm based on Quick Sort algorithm research method is proposed to deal with prevailing duplicate values in the sorting of data. The duplicate values are specially processed, which effectively reduces ... 详细信息
来源: 评论
Comparison of Two AC Current De-tumbling Methods for Uncooperative Space Target through Electromagnetic Characteristic Analysis  1
Comparison of Two AC Current De-tumbling Methods for Uncoope...
收藏 引用
1st Aerospace Frontiers Conference, AFC 2024
作者: Du, Lei Chen, Zhen Hu, Hengzai Liu, Xiangdong Zhang, Qiang Zhang, Kemo Liu, Hui School of Automation Beijing Institute of Technology Beijing100081 China Beijing Institute of Control Engineering Beijing100191 China Beijing Institute Computer for Application Beijing100089 China
A large number of space debris with rotational motion occupy scarce orbital resources, thus, a de-tumbling phase may be necessary prior to the capturing phase to reduce the risk of collision. A new contactless AC curr... 详细信息
来源: 评论
Enhancing Cloud Infrastructure Security with GraphSAGE-Based Intrusion Detection Systems  1
Enhancing Cloud Infrastructure Security with GraphSAGE-Based...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Kumar, G. Nanda Kishor Syed, Shakir Mogal, Amit Karbhari Abid, Tahera Perada, Anvesh Suneetha, Sampathirao University of South Florida United States Malla Reddy University Department of Computer Science and Engineering Hyderabad India Bargersville IN United States Mvp Samaj's Cmcs College Department of Computer Science and Application Nashik India Nawab Shah Alam Khan College of Engineering and Technology Department of Information Technology Hyderabad India Drexel University Department of Electrical and Computer Engineering Philadelphia United States Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Vaddeswaram India
Cloud computing provides scalable and adaptable infrastructure however is significantly susceptible to cyber-attacks. This work presents a hybrid methodology that integrates the GOA and GA for feature selection, along... 详细信息
来源: 评论
Performance Analysis of Deep Learning Techniques for Time Series Forecasting
Performance Analysis of Deep Learning Techniques for Time Se...
收藏 引用
2023 International Conference in Advances in Power, Signal, and Information Technology, APSIT 2023
作者: Tripathy, Nrusingha Hota, Sarbeswara Prusty, Sashikanta Nayak, Subrat Kumar Siksha 'o' Anusandhan Deemed to Be University Department of Computer Science and Engineering Odisha Bhubaneswar India Siksha 'o' Anusandhan Deemed to Be University Department of Computer Application Odisha Bhubaneswar India
Time series data forecasting is a crucial topic in economics, business, and finance. New methods are being created to evaluate and predict time series data as a result of recent improvements in computing power and mor... 详细信息
来源: 评论
Blind Source Separation in Perspective of ICA Algorithms: A Review  1
Blind Source Separation in Perspective of ICA Algorithms: A ...
收藏 引用
1st International Conference on Computational Intelligence and Sustainable engineering Solution, CISES 2022
作者: Agrawal, Jharna Gupta, Manish Garg, Hitendra GLA University Electronics Communication Engineering Mathura India GLA University Computer Engineering Application Mathura India
For many scenarios, the world around us is a never-ending cacophony of signals from various sources, where distinct stimuli do not really mix properly. Separating blind sources is a method of extracting sources from s... 详细信息
来源: 评论
A Hierarchical Traffic Sign Image Recognition Algorithm Keeping the Local Topology  7
A Hierarchical Traffic Sign Image Recognition Algorithm Keep...
收藏 引用
7th International Conference on Advanced Algorithms and Control engineering, ICAACE 2024
作者: Liu, Longhui Gong, Wenhui Wang, Wenjie Zeng, Zhiqiang Li, Wei Xiamen Global Navigation Satellite System Development & Application Co. Ltd. Xiamen China School Of Computer And Information Engineering Xiamen University Of Technology Xiamen China
Traffic sign recognition is crucial in enabling intelligent driving. This paper proposes a robust hierarchical traffic sign image recognition algorithm that maintains local topology. The algorithm is divided into two ... 详细信息
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among IT Students  7
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power engineering, CANDO-EPE 2024
作者: Kollar, Anita Mihalovicsne Katona, Jozsef Institute of Computer Engineering University of Dunaujvaros Department of Software Development and Application Dunaujvaros Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemet Hungary Budapest Business University Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论