咨询与建议

限定检索结果

文献类型

  • 10,780 篇 会议
  • 4,813 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 15,649 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,935 篇 工学
    • 5,033 篇 计算机科学与技术...
    • 4,025 篇 软件工程
    • 1,800 篇 信息与通信工程
    • 1,652 篇 控制科学与工程
    • 1,580 篇 电气工程
    • 1,418 篇 电子科学与技术(可...
    • 838 篇 生物工程
    • 805 篇 机械工程
    • 678 篇 光学工程
    • 665 篇 动力工程及工程热...
    • 637 篇 生物医学工程(可授...
    • 619 篇 仪器科学与技术
    • 445 篇 化学工程与技术
    • 355 篇 材料科学与工程(可...
    • 320 篇 交通运输工程
    • 298 篇 土木工程
    • 257 篇 安全科学与工程
  • 4,719 篇 理学
    • 2,279 篇 数学
    • 1,502 篇 物理学
    • 919 篇 生物学
    • 707 篇 统计学(可授理学、...
    • 623 篇 系统科学
    • 452 篇 化学
  • 2,106 篇 管理学
    • 1,413 篇 管理科学与工程(可...
    • 769 篇 图书情报与档案管...
    • 613 篇 工商管理
  • 575 篇 医学
    • 496 篇 临床医学
    • 392 篇 基础医学(可授医学...
    • 251 篇 药学(可授医学、理...
  • 299 篇 法学
  • 251 篇 经济学
    • 250 篇 应用经济学
  • 140 篇 农学
  • 117 篇 教育学
  • 52 篇 文学
  • 38 篇 军事学
  • 27 篇 艺术学
  • 1 篇 哲学

主题

  • 311 篇 computer science
  • 275 篇 systems engineer...
  • 223 篇 deep learning
  • 216 篇 computational mo...
  • 205 篇 neural networks
  • 187 篇 optimization
  • 185 篇 feature extracti...
  • 180 篇 computer archite...
  • 172 篇 data mining
  • 151 篇 bandwidth
  • 142 篇 laboratories
  • 135 篇 accuracy
  • 134 篇 educational inst...
  • 128 篇 control systems
  • 115 篇 routing
  • 115 篇 application soft...
  • 114 篇 reliability
  • 113 篇 throughput
  • 112 篇 support vector m...
  • 109 篇 image segmentati...

机构

  • 103 篇 national enginee...
  • 101 篇 college of compu...
  • 71 篇 school of comput...
  • 65 篇 department of co...
  • 62 篇 national compute...
  • 48 篇 purdue universit...
  • 47 篇 college of infor...
  • 45 篇 ieee
  • 43 篇 key laboratory o...
  • 43 篇 department of el...
  • 43 篇 school of comput...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 38 篇 the key laborato...
  • 37 篇 school of inform...
  • 34 篇 university of ch...
  • 33 篇 department of el...
  • 30 篇 faculty of compu...
  • 30 篇 national enginee...
  • 30 篇 national enginee...

作者

  • 48 篇 david reigosa
  • 48 篇 hai jin
  • 36 篇 yang yang
  • 36 篇 jin hai
  • 35 篇 hamid soltanian-...
  • 33 篇 briz fernando
  • 32 篇 soltanian-zadeh ...
  • 26 篇 chen shu-ching
  • 26 篇 mei-ling shyu
  • 25 篇 robbi rahim
  • 24 篇 jianchao zeng
  • 23 篇 hongliang wang
  • 23 篇 abdelwahed motwa...
  • 23 篇 f. malek
  • 21 篇 liuchen chang
  • 20 篇 wang lei
  • 20 篇 wang xingjun
  • 20 篇 mengchu zhou
  • 19 篇 ji zhen
  • 19 篇 hu shengshan

语言

  • 14,742 篇 英文
  • 542 篇 其他
  • 322 篇 中文
  • 38 篇 日文
  • 14 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Computer Engineering and System"
15649 条 记 录,以下是641-650 订阅
排序:
Exploring Low Rate Dos Attack Detection Methods: A Bibliometric Analysis and Roadmap for Further Research
Exploring Low Rate Dos Attack Detection Methods: A Bibliomet...
收藏 引用
2023 IEEE International Conference on Data and Software engineering, ICoDSE 2023
作者: Widodo, Anteng Rochim, Adian Fatchur Warsito, Budi School of Postgraduated Studies Diponegoro University Doctoral Program of Information System Semarang Indonesia Muria Kudus University Faculty of Engineering Department of Information System Kudus Indonesia Diponegoro University Faculty of Engineering Department of Computer Engineering Semarang Indonesia Diponegoro University Faculty of Science and Mathematics Department of Statistics Semarang Indonesia
Low-Rate Denial of Service (LDoS) attacks, an emerging breed of DoS attacks, present a formidable challenge in terms of their detectability. Within the realm of network security, these attacks cast a substantial shado... 详细信息
来源: 评论
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID CRYPTOGRAPHY METHODS: SHORT OVERVIEW  4
DESIGN OF TECHNOLOGY FOR SECURE FILE STORAGE BASED ON HYBRID...
收藏 引用
4th IEEE International Conference on Smart Information systems and Technologies, SIST 2024
作者: Abitova, Gulnara A. Manap, Abu Said Kulniyaziva, Korlan Nikulin, Vladimir Dep. of Electrical Engineering and Computer Science Dep. of Computer Engineering State University of New York Astana IT University BinghamtonNY United States Astana Kazakhstan Astana IT University Astana Kazakhstan Dep.of System analysis and management L.N. Gumilyov Eurasian National University Astana Kazakhstan Dep. of Electrical Engineering and Computer Science Binghamton University BinghamtonNY United States
In the era of pervasive digital data, ensuring secure file storage has become a paramount concern. This paper explores the significance of hybrid cryptography for design of an advanced tools and techniques for secure ... 详细信息
来源: 评论
Deep Learning Techniques for Advanced Large-Scale Data Processing  15
Deep Learning Techniques for Advanced Large-Scale Data Proce...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Sunil, M.P. Shekhawat, Jyoti Vanaja, T. Mohammed, Vazeer Ali Thaware, Shailesh J. Singh, Vaishali Karnataka Bangalore India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Information Technology Prince Shri Venkateshwara Padmavathy Engineering College Chennai127 India Department of Computer & Information System Lewis University Illinois United States Department of Computer Engineering Vishwakarma Institute of Technology Pune India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India
Deep getting to know techniques have become increasingly more popular due to their potential to improve huge-scale records processing performance. Leveraging specialized hardware which includes GPUs, deep getting to k... 详细信息
来源: 评论
Paintings vs Photos Classification Using Deep Learning  3
Paintings vs Photos Classification Using Deep Learning
收藏 引用
3rd International Conference on Technological Advancements in Computational Sciences, ICTACS 2023
作者: Agarwal, Aryan Ratra, Aryan Vats, Satvik Sharma, Vikrant Singh, Sunny Singh, Karan Graphic Era Hill University Computer Science Engineering Dehradun India Nextgen Techedge Pvt. Ltd. India School of Computer and System Science Jawaharlal Nehru University New Delhi India
Identifying a picture's content based on its attributes is a fundamental task in computer vision known as image classification. In this article, we provide a study on the use of machine learning algorithms to cate... 详细信息
来源: 评论
Unveiling Ethical Challenges and Malpractice in Academic Research and Integrity  3
Unveiling Ethical Challenges and Malpractice in Academic Res...
收藏 引用
3rd International Conference on Creative Communication and Innovative Technology, ICCIT 2024
作者: Singh Bist, Ankur Rawat, Bhupesh Rahardja, Untung Hardini, Marviola Kamal, Mustofa Graphic Era Hill University Faculty of Computer Science & Engineering Uttarakhand India Graphic Era Hill University Faculty of Computing Uttarakhand India University of Raharja Faculty of Information Technology Tangerang Indonesia University of Raharja Faculty of Computer System Tangerang Indonesia
In the pursuit of knowledge and innovation, academic research stands as a cornerstone of intellectual progress. However, the integrity of this process is susceptible to malpractice, raising profound ethical concerns. ... 详细信息
来源: 评论
Adaptive Intrusion Detection in Cyber-Physical systems using Reinforcement Learning-Based Autoencoders  2
Adaptive Intrusion Detection in Cyber-Physical Systems using...
收藏 引用
2nd IEEE International Conference on Integrated Intelligence and Communication systems, ICIICS 2024
作者: Rajathi, N. Divya, S. Anitha Elavarasi, S. Saritha, G. Jeya ramya, V. Department of Information Technology Kumaraguru College of Technology Coimbatore India Department of Computer Science and Business System Bannari Amman Institute of Technology Erode India Department of Computer Science and Engineering Sona College of Technology Salem India Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India
The increasing integration of Cyber-Physical systems (CPS) in critical infrastructure presents unique challenges for ensuring robust cybersecurity. Traditional Intrusion Detection systems (IDS) often struggle with the... 详细信息
来源: 评论
An integrated 3D model based face recognition method using synthesized facial expressions and poses for single image applications
收藏 引用
Applied Nanoscience (Switzerland) 2023年 第3期13卷 1991-2001页
作者: Milad, Ali Yurtkan, Kamil Management Information System Department Cyprus International University Nicosia 99040 Turkey Computer Engineering Department Middle East Technical University Northern Cyprus Campus Kalkanli 99738 Turkey
The 3D facial expression analysis and synthesis become one of the traditional technics used in face recognition systems which lead to get results with high performance under the varying poses or expressions ... 详细信息
来源: 评论
Improved Chest X-Ray Image Quality Using Median and Gaussian Filter Methods  4
Improved Chest X-Ray Image Quality Using Median and Gaussian...
收藏 引用
4th International Conference on Informatics, Multimedia, Cyber and Information system, ICIMCIS 2022
作者: Kesuma, Lucky Indra Ermatita, Ermatita Erwin, Erwin Sari, Purwita Purabaya, Rudhy Ho Universitas Sriwijaya Doctoral Program in Engineering Faculty of Engineering Palembang Indonesia Universitas Sjakhyakirti India Universitas Sriwijaya Information System Faculty of Computer Science Palembang Indonesia Universitas Sriwijaya Faculty of Computer Science Departement of Computer System Palembang Indonesia Universitas Sriwijaya Informatic Management Faculty of Computer Science Palembang Indonesia Universitas Pembangunan Nasional Veteran Jakarta Information System Faculty of Computer Science Jakarta Indonesia
The lungs are one of the organs of the body that are responsible for the human respiratory process and are very susceptible to dangerous diseases. For this reason, early detection and diagnosis of lung organs is neede... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
Time Delay Implementation in Sensorless Control for Ultra-High-Speed Air Compressor Motor of Fuel-Cell systems  10
Time Delay Implementation in Sensorless Control for Ultra-Hi...
收藏 引用
10th IEEE International Power Electronics and Motion Control Conference, IPEMC 2024 ECCE Asia
作者: Kang, Sung-Ho Lee, Hyun-Jun Woo, Tae-Gyeom You, Chang-Seok Lim, Sang-Hak Yoon, Young-Doo Hanyang University Department of Automotive Engineering Automotive-Computer Convergence Korea Republic of Hanyang University Department of Automotive Engineering Korea Republic of Hyundai Motor Company Fuel Cell System Control Development Team1 Korea Republic of
This paper discusses the implementation of time delays in ultra-high-speed applications. Sensorless controls are used to estimate the rotor speed and angle. In model-based sensorless control, the voltage and current s... 详细信息
来源: 评论