咨询与建议

限定检索结果

文献类型

  • 906 篇 会议
  • 450 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 811 篇 工学
    • 603 篇 计算机科学与技术...
    • 434 篇 软件工程
    • 128 篇 控制科学与工程
    • 121 篇 信息与通信工程
    • 59 篇 电气工程
    • 49 篇 电子科学与技术(可...
    • 47 篇 机械工程
    • 47 篇 安全科学与工程
    • 38 篇 生物医学工程(可授...
    • 34 篇 建筑学
    • 34 篇 土木工程
    • 34 篇 生物工程
    • 28 篇 仪器科学与技术
    • 25 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
    • 18 篇 交通运输工程
  • 490 篇 理学
    • 335 篇 数学
    • 81 篇 统计学(可授理学、...
    • 64 篇 物理学
    • 64 篇 系统科学
    • 45 篇 生物学
    • 26 篇 化学
  • 208 篇 管理学
    • 148 篇 管理科学与工程(可...
    • 87 篇 工商管理
    • 61 篇 图书情报与档案管...
  • 42 篇 经济学
    • 40 篇 应用经济学
  • 33 篇 医学
    • 26 篇 基础医学(可授医学...
    • 26 篇 临床医学
  • 27 篇 法学
    • 25 篇 社会学
  • 27 篇 教育学
    • 22 篇 教育学
  • 15 篇 农学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 35 篇 artificial intel...
  • 33 篇 safety
  • 31 篇 computer science
  • 28 篇 computer archite...
  • 27 篇 software
  • 23 篇 monitoring
  • 23 篇 hardware
  • 21 篇 computational mo...
  • 20 篇 application soft...
  • 18 篇 software enginee...
  • 18 篇 semantics
  • 17 篇 data models
  • 16 篇 optimization
  • 15 篇 reliability
  • 14 篇 programming prof...
  • 14 篇 system-on-chip
  • 14 篇 iec standards
  • 13 篇 functional progr...
  • 13 篇 standards
  • 13 篇 training

机构

  • 47 篇 department of ap...
  • 25 篇 department of co...
  • 18 篇 department of ap...
  • 17 篇 department of sy...
  • 17 篇 computer archite...
  • 15 篇 department of co...
  • 15 篇 department of co...
  • 13 篇 department of pr...
  • 13 篇 department of co...
  • 11 篇 department of ap...
  • 10 篇 technical univer...
  • 9 篇 department of co...
  • 9 篇 icas institute f...
  • 9 篇 department of ap...
  • 8 篇 institute for co...
  • 8 篇 department of co...
  • 8 篇 computer techniq...
  • 7 篇 department of ma...
  • 7 篇 department of pr...
  • 7 篇 chair for comput...

作者

  • 43 篇 josef börcsök
  • 34 篇 pal madhumangal
  • 30 篇 ali hayek
  • 22 篇 börcsök josef
  • 20 篇 madhumangal pal
  • 19 篇 gancheva veska
  • 17 篇 veska gancheva
  • 15 篇 börcsök j.
  • 15 篇 boercsoek josef
  • 15 篇 fritzson peter
  • 14 篇 hayek ali
  • 12 篇 mondal shyamal k...
  • 12 篇 maiti manoranjan
  • 12 篇 gurkan tuna
  • 12 篇 mostafa abotaleb
  • 11 篇 mariana arghir
  • 10 篇 tuna gurkan
  • 10 篇 xue jingling
  • 10 篇 roy abi zeid dao...
  • 9 篇 roy sankar kumar

语言

  • 1,336 篇 英文
  • 32 篇 其他
  • 8 篇 中文
  • 1 篇 日文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Computer Programming"
1379 条 记 录,以下是391-400 订阅
排序:
Correction: Study of the hardfacing process using self-shielding flux-cored wire with an exothermic addition with a combined oxidizer of the Al-(CuO/Fe2O3) system
收藏 引用
The International Journal of Advanced Manufacturing Technology 2024年 第7期134卷 3985-3985页
作者: Trembach, Bohdan Silchenko, Yury Balenko, Oleksii Hlavchev, Dmytro Kulahin, Kostiantyn Heiko, Hennadii Bellorin-Herrera, Oleksandra Khabosha, Serhii Zakovorotnyi, Oleksandr Trembach, Illia Private Joint Stock Company “Novokramatorsky Mashinostroitelny Zavod” Kiev Ukraine Department of Computer Engineering and Programming National Technical University “Kharkiv Polytechnic Institute” Kharkiv Ukraine Scientific Research Department Ivan Kozhedub Kharkiv National Air Force University Kharkiv Ukraine
来源: 评论
Application of computer-Aided Technologies for Analysis if Statistical Data of Collectors Wearing Measurements and for Diagnosis of Traction Motors
Application of Computer-Aided Technologies for Analysis if S...
收藏 引用
2020 International Multi-Conference on Industrial Engineering and Modern Technologies, FarEastCon 2020
作者: Zolkin, A.L. Magomedov, I.A. Kucher, O.V. Povolzhskiy State University of Telecommunications and Informatics Computer and Information Sciences Department Samara Russia Chechen State University Programming Information and Communication Technologies Department Grozny Russia Kuban State Agricultural University Named after I.T. Trubilin Economic Cybernetic Department Krasnodar Russia
This article is dedicated to the study of an integrated approach to technological process of control of measurement of wearing parameters of traction electric motor collectors. Also the article presents the results of... 详细信息
来源: 评论
Automatic Detection of Smishing Attacks by Machine Learning Methods  1
Automatic Detection of Smishing Attacks by Machine Learning ...
收藏 引用
1st International Informatics and Software Engineering Conference, IISEC 2019
作者: Balim, Caner Gunal, Efnan Sora Afyon Kocatepe University Dept. of Computer Programming Sandikli Vocational School Afyonkarahisar Turkey Eskisehir Osmangazi University Dept. of Computer Engineering Faculty of Engineering and Architecture Eskisehir Turkey
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to ste... 详细信息
来源: 评论
Methods for Using Class Based N-gram Language Models in the Kaldi Toolkit  23rd
Methods for Using Class Based N-gram Language Models in the ...
收藏 引用
23rd International Conference on Speech and computer, SPECOM 2021
作者: Pakoci, Edvin Popović, Branislav AlfaNum Speech Technologies Bulevar vojvode Stepe 40 Novi Sad21000 Serbia Faculty of Technical Sciences Department of Power Electronic and Telecommunication Engineering University of Novi Sad Trg Dositeja Obradovića 6 Novi Sad21000 Serbia Department of Music Production and Sound Design Academy of Arts Alfa BK University Nemanjina 28 Belgrade11000 Serbia Computer Programming Agency Code85 Odžaci Železnička 51 Odžaci25250 Serbia
This paper explains in detail several methods for utilization of class based n-gram language models for automatic speech recognition, within the Kaldi speech recognition framework. It reexamines an existing implementa... 详细信息
来源: 评论
Faster R-CNN Deep Learning Model for Pedestrian Detection from Drone Images
收藏 引用
SN computer Science 2020年 第2期1卷 1-9页
作者: Hung, Goon Li Sahimi, Mohamad Safwan Bin Samma, Hussein Almohamad, Tarik Adnan Lahasan, Badr Intelligent Biometric Group School of Electrical and Electronic Engineering Engineering Campus Universiti Sains Malaysia Penang Nibong Tebal 14300 Malaysia Department of Computer Programming Faculty of Education–Shabwa University of Aden Shabwa Yemen School of Information Science and Technology Xiamen University Malaysia Jalan Sunsuria Bandar Sunsuria Selangor Darul Ehsan Sepang 43900 Malaysia
Pedestrian detection from a drone-based images has many potential applications such as searching for missing persons, surveillance of illegal immigrants, and monitoring of critical infrastructure. However, it is consi... 详细信息
来源: 评论
Structure and Functioning of Information Systems of Background Monitoring of Landscape Elements of Gorgany Nature Reserve  10
Structure and Functioning of Information Systems of Backgrou...
收藏 引用
10th International Conference on Advanced computer Information Technologies, ACIT 2020
作者: Nykolaychuk, Yaroslav Petrashchuk, Yaroslav Slobodian, Olena Pitukh, Ihor Grynchyshyn, Taras Nykolaychuk, Lyubov Hryha, Volodymyr Ternopil National Economic University Department of Specialized Computer Systems Ternopil Ukraine Gorgany Nature Reserve Nadvirna Ukraine Nadvirna College by National Transport University Department of Programming and Information Technologies Nadvirna Ukraine Ivano-Frankivsk National Technical University of Oil and Gas Department of Social Communication and Law Ivano-Frankivsk Ukraine Vasyl Stefanyk Precarpathian National University Department of Computer Engineering and Electronics Ivano-Frankivsk Ukraine
This paper discusses the structural organization of the background monitoring system (BMS) of the transboundary UNESCO World Heritage Site 'Beech forests of the Carpathians and ancient beech forests of Germany'... 详细信息
来源: 评论
Functorial string diagrams for reverse-mode automatic differentiation
arXiv
收藏 引用
arXiv 2021年
作者: Alvarez-Picallo, Mario Ghica, Dan R. Sprunger, David Zanasi, Fabio Programming Languages Laboratory Huawei Research Centre 2 Semple Str. EdinburghEH3 8BL United Kingdom Computer Science and University of Birmingham Birmingham EnglandB15 2TT United Kingdom Computer Science University College London London EnglandWC1E 6BT United Kingdom
We enhance the calculus of string diagrams for monoidal categories with hierarchical features in order to capture closed monoidal (and cartesian closed) structure. Using this new syntax we formulate an automatic diffe... 详细信息
来源: 评论
A Horizontal Federated Learning Approach to IoT Malware Traffic Detection: An Empirical Evaluation with N-BaIoT Dataset
A Horizontal Federated Learning Approach to IoT Malware Traf...
收藏 引用
International Conference on Advanced Communication Technology (ICACT)
作者: Phuc Hao Do Tran Duc Le Vladimir Vishnevsky Aleksandr Berezkin Ruslan Kirichek The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Saint-Petersburg Russia Danang Architecture University Da Nang Viet Nam Department of Communication Networks and Data Transmission at Bonch-Bruevich Saint-Petersburg State University of Telecommunications Russia University of Science and Technology - The University of Danang Da Nang Viet Nam Information Technology Faculty The University of Danang - University of Science and Technology Danang Vietnam V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences Moscow Russia Institute of Control Sciences of Russian Academy of Sciences Russia Department of Programming Engineering and Computer Science Bonch Bruevich Saint Petersburg State University of Telecommunications
The increasing prevalence of botnet attacks in IoT networks has led to the development of deep learning techniques for their detection. However, conventional centralized deep learning models pose challenges in simulta...
来源: 评论
Synthesis, structural and optical properties of CdO nanocrystalline prepared by sol–gel method
收藏 引用
AIP Conference Proceedings 2022年 第1期2660卷 020141页
作者: Salah Abdul-Jabbar Jassim Eman Mohammed Ali Nassar College of Dentistry Al Maaqal private university Basrah Iraq Department of computer programming Al-Thawra Technical Institute Ministry of Technical Education & Vocational Training Hajjah Yemen
CdO Thin Film and powder nanoparticles have been produced using the sol-gel method. The X-ray diffraction technique is used to evaluate structural properties of powder CdO at different annealing temperatures 623, 673,...
来源: 评论
A non-potential Target Function for Controlling the UAVs Group Flight in Presence of Concave Obstacles
A non-potential Target Function for Controlling the UAVs Gro...
收藏 引用
IEEE International Conference on Actual Problems of Unmanned Air Vehicles Developments Proceedings (APUAVD)
作者: Olexiy M. Glazok Computer and programming engineering National Aviation University Kyiv Ukraine
A solution for the problem of controlling the unmanned quadrotor vehicles group flight in presence of obstacles of complex form is proposed. A traditional approach to construction of the target function does not solve... 详细信息
来源: 评论