咨询与建议

限定检索结果

文献类型

  • 13,045 篇 会议
  • 6,919 篇 期刊文献
  • 348 册 图书

馆藏范围

  • 20,312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,746 篇 工学
    • 8,084 篇 计算机科学与技术...
    • 6,640 篇 软件工程
    • 2,711 篇 信息与通信工程
    • 1,665 篇 控制科学与工程
    • 1,537 篇 生物工程
    • 1,481 篇 生物医学工程(可授...
    • 1,235 篇 电气工程
    • 1,128 篇 电子科学与技术(可...
    • 971 篇 光学工程
    • 766 篇 机械工程
    • 624 篇 仪器科学与技术
    • 515 篇 化学工程与技术
    • 469 篇 动力工程及工程热...
    • 401 篇 安全科学与工程
    • 369 篇 交通运输工程
    • 350 篇 建筑学
  • 7,068 篇 理学
    • 3,418 篇 数学
    • 2,348 篇 物理学
    • 1,750 篇 生物学
    • 1,129 篇 统计学(可授理学、...
    • 792 篇 系统科学
    • 558 篇 化学
  • 3,140 篇 管理学
    • 1,801 篇 管理科学与工程(可...
    • 1,493 篇 图书情报与档案管...
    • 974 篇 工商管理
  • 1,398 篇 医学
    • 1,211 篇 临床医学
    • 1,100 篇 基础医学(可授医学...
    • 718 篇 药学(可授医学、理...
    • 503 篇 公共卫生与预防医...
  • 536 篇 法学
    • 446 篇 社会学
  • 315 篇 经济学
  • 285 篇 教育学
  • 259 篇 农学
  • 61 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 300 篇 computational mo...
  • 276 篇 computer archite...
  • 273 篇 deep learning
  • 253 篇 computer science
  • 220 篇 machine learning
  • 216 篇 data mining
  • 203 篇 image segmentati...
  • 195 篇 internet of thin...
  • 195 篇 feature extracti...
  • 194 篇 training
  • 191 篇 optimization
  • 183 篇 support vector m...
  • 179 篇 artificial intel...
  • 179 篇 accuracy
  • 160 篇 quality of servi...
  • 158 篇 neural networks
  • 157 篇 monitoring
  • 151 篇 bandwidth
  • 138 篇 resource managem...

机构

  • 412 篇 department for p...
  • 405 篇 faculty of scien...
  • 403 篇 department of ph...
  • 386 篇 department of ph...
  • 386 篇 kirchhoff-instit...
  • 383 篇 department of ph...
  • 348 篇 fakultät für phy...
  • 327 篇 institute of phy...
  • 306 篇 department of ph...
  • 303 篇 institute of phy...
  • 280 篇 department of ph...
  • 271 篇 instituto de fís...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 265 篇 graduate school ...
  • 262 篇 ictp trieste
  • 253 篇 department of ph...
  • 252 篇 yerevan physics ...
  • 248 篇 department of ph...
  • 247 篇 nikhef national ...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 333 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 321 篇 r. ströhmer
  • 321 篇 m. rijssenbeek
  • 321 篇 s. jin
  • 321 篇 g. gaudio
  • 321 篇 s. mohapatra
  • 303 篇 s. guindon
  • 301 篇 y. tayalati
  • 287 篇 a. kaczmarska
  • 285 篇 m. klein
  • 270 篇 j. schaarschmidt
  • 261 篇 f. pastore
  • 256 篇 a. d. pilkington

语言

  • 18,155 篇 英文
  • 2,007 篇 其他
  • 142 篇 中文
  • 18 篇 日文
  • 9 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 朝鲜文
检索条件"机构=Computer Engineering and Informatics"
20312 条 记 录,以下是1281-1290 订阅
排序:
Blockchain-based Security for Cloud Data Storage  9
Blockchain-based Security for Cloud Data Storage
收藏 引用
9th IEEE International Conference on Smart Instrumentation, Measurement and Applications, ICSIMA 2023
作者: Bin Idrus, Mohammad Ariff Zakwan Rahman, Farah Diyana Abdul Khalifa, Othman Omran Yusoff, Nelidya Md Islamic University Malaysia Department of Electrical and Computer Engineering International Kuala Lumpur Malaysia Universiti Teknologi Malaysia Razak Faculty of Technology and Informatics Kuala Lumpur Malaysia
Data Cloud Storage is a service that allows data to save data on offsite storage system and managed by third-party and is made accessible by a web services user. It has become one of the most convenient and efficient ... 详细信息
来源: 评论
A Framework for Detection of MitM Cyberattacks in Smart Grid Networks Based on the Application of the Ensemble Process for Feature Selection  13
A Framework for Detection of MitM Cyberattacks in Smart Grid...
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Nicheporuk, Andrii Savenko, Oleg Sachenko, Anatoliy Nicheporuk, Anastasiia Khmelnytskyi National University Department of Computer Engineering and Information Technologies Khmelnytskyi Ukraine Kazimierz Pulaski University of Technology and Humanities Department of Informatics and Tele infomatics Radom Poland
Recent years have shown an increase in the number and complexity of cyberattacks not only on traditional IT infrastructures, but also on smart energy supply networks. Cybercriminals and cyberspies are becoming more so... 详细信息
来源: 评论
Comparative Analysis of Word vs. Character Embedding for Machine Learning Based Detection of Malicious URLs and DGA-Generated Domains  15
Comparative Analysis of Word vs. Character Embedding for Mac...
收藏 引用
15th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2023
作者: Ayodele, Oludayo C. Yerima, Suleiman Y. School of Computer Science and Informatics De Montfort University Leicester United Kingdom British University in Dubai Faculty of Engineering and Information Technology Dubai United Arab Emirates
This study presents a comprehensive comparative analysis of the effectiveness of word-level and character-level embeddings in the context of machine learning-based detection of malicious URLs and DGA-generated domains... 详细信息
来源: 评论
Performance Evaluation of Oversampling Methods on Deep Learning-Based Skin Cancer Classification
Performance Evaluation of Oversampling Methods on Deep Learn...
收藏 引用
2023 International Seminar on Application for Technology of Information and Communication, iSemantic 2023
作者: Supriyanto, Catur Salam, Abu Zeniarja, Junta Wijaya, Adi Universitas Dian Nuswantoro Bachelor Program in Informatics Engineering Faculty of Computer Science Semarang Indonesia Universitas Indonesia Maju Department of Health Information Management Jakarta Indonesia
The field of dermatology faces considerable challenges when it comes to early detection of skin cancer. Our study focused on using different datasets, including original data, augmented data, and SMOTE oversampled dat... 详细信息
来源: 评论
computer Numerical Control (CNC) Technology for Duplicing Signatures Using Microcontroller Arduino
Computer Numerical Control (CNC) Technology for Duplicing Si...
收藏 引用
2022 International Conference on Information Technology Research and Innovation, ICITRI 2022
作者: Baco, Syarifuddin Muddin, Saripuddin Aziz, Firman Martani, Ahmad Almunir, Hafid Universitas Islam Makassar Informatics Engineering Makassar Indonesia Mechanical Engineering Universitas Islam Makassar Makassar Indonesia Universitas Pancasakti Makassar Computer Science Makassar Indonesia Universitas Islam Makassar Graduate Informatics Engineering Makassar Indonesia
The main requirement in the office sector is the administrative process. At the engineering faculty of the Islamic University of Makassar, some of the administrative processes have used technology to make it easier fo... 详细信息
来源: 评论
Numerical Modelling of The System of Doubly Nonlinear Diffusion Equations with Convective Transfer and Damping
Numerical Modelling of The System of Doubly Nonlinear Diffus...
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Sadullaeva, Shakhlo Azimbaevna Anarova, Shahzoda Amanbayevna Khaydarov, Abdugaffor Fayzullayeva, Zarnigor Nazirova, Dilorom Mirkhodzhaeva, Nazhiba departament Intellegent systems Joint Belarusian-Uzbek Intersectoral Institute of Applied Technical Qualifications Tashkent Uzbekistan Department of Convergence of Digital Technologies Computer Engineering Faculty Tashkent University of Information Technologies Tashkent Uzbekistan Department of Applied Mathematics and Computer Analysis National University of Uzbekistan Tashkent Uzbekistan Department of Informatics Computer Engineering Faculty Tashkent University of Information Technologies Tashkent Uzbekistan Department of Applied Mathematics and Computer Analysis NUUz Tashkent Uzbekistan
Currently, studies of double nonlinear equations and systems of double nonlinear equations representing many processes found in nature are considered relevant and necessary. These equations and systems, as a rule, are... 详细信息
来源: 评论
Twister2 Cross-platform resource scheduler for big data
Twister2 Cross-platform resource scheduler for big data
收藏 引用
作者: Uyar, Ahmet Gunduz, Gurhan Kamburugamuve, Supun Wickramasinghe, Pulasthi Widanage, Chathura Govindarajan, Kannan Perera, Niranda Abeykoon, Vibhatha Akkas, Selahattin Fox, Geoffrey School of Informatics Computing and Engineering Indiana University BloomingtonIN United States Department of Computer Engineering Faculty of Engineering Mugla Sitki Kocman University Mugla Turkey
Twister2 is an open-source big data hosting environment designed to process both batch and streaming data at scale. Twister2 runs jobs in both high-performance computing (HPC) and big data clusters. It provides a cros... 详细信息
来源: 评论
Improved IP lookup technology for trie-based data structures
收藏 引用
Journal of computer and System Sciences 2023年 133卷 41-55页
作者: Lin, Yen-Heng Hsieh, Sun-Yuan Master Degree Program on Artificial Intelligence National Cheng Kung University Tainan701 Taiwan Department of Computer Science and Information Engineering Institute of Manufacturing Information Systems Institute of Medical Informatics National Cheng Kung University Tainan701 Taiwan Department of Computer Science and Information Engineering National Chi Nan University Nantou Puli Township54561 Taiwan
Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory... 详细信息
来源: 评论
Cross-modality perturbation synergy attack for person re-identification  24
Cross-modality perturbation synergy attack for person re-ide...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Yunpeng Gong Zhun Zhong Yansong Qu Zhiming Luo Rongrong Ji Min Jiang School of Informatics Xiamen University School of Computer Science and Information Engineering Hefei University of Technology
In recent years, there has been significant research focusing on addressing security concerns in single-modal person re-identification (ReID) systems that are based on RGB images. However, the safety of cross-modality...
来源: 评论
Multi-Criteria Decision-Making Approach for Laptop Selection: A Case Study  3
Multi-Criteria Decision-Making Approach for Laptop Selection...
收藏 引用
3rd IEEE Asian Conference on Innovation in Technology, ASIANCON 2023
作者: Channi, Harpreet Kaur Sandhu, Ramandeep Faiz, Mohammad Islam, Sardar M. N. Chandigarh University Gharuan Department of Electrical Engineering Punjab Mohali India School of Computer Science and Engineering Lovely Professional University Punjab Jalandhar India Victoria University Applied Informatics Research Melbourne Australia
This article uses the well-known multi-criteria decision-making (MCDM) theory to determine which laptop is the best among those that are currently on the market. To illustrate the importance of decision-making in a cl... 详细信息
来源: 评论