咨询与建议

限定检索结果

文献类型

  • 5,738 篇 会议
  • 3,492 篇 期刊文献
  • 8 册 图书
  • 1 篇 学位论文

馆藏范围

  • 9,239 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 4,891 篇 工学
    • 2,111 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 1,111 篇 电气工程
    • 1,009 篇 电子科学与技术(可...
    • 887 篇 控制科学与工程
    • 820 篇 信息与通信工程
    • 431 篇 化学工程与技术
    • 416 篇 机械工程
    • 414 篇 材料科学与工程(可...
    • 409 篇 光学工程
    • 361 篇 生物工程
    • 358 篇 动力工程及工程热...
    • 328 篇 仪器科学与技术
    • 317 篇 生物医学工程(可授...
    • 180 篇 力学(可授工学、理...
    • 142 篇 冶金工程
    • 138 篇 土木工程
  • 3,337 篇 理学
    • 1,530 篇 物理学
    • 1,252 篇 数学
    • 497 篇 化学
    • 478 篇 生物学
    • 402 篇 统计学(可授理学、...
    • 388 篇 系统科学
  • 903 篇 管理学
    • 631 篇 管理科学与工程(可...
    • 314 篇 工商管理
    • 307 篇 图书情报与档案管...
  • 341 篇 医学
    • 271 篇 临床医学
    • 225 篇 基础医学(可授医学...
    • 139 篇 药学(可授医学、理...
  • 136 篇 法学
  • 132 篇 经济学
    • 130 篇 应用经济学
  • 79 篇 农学
  • 66 篇 教育学
  • 21 篇 艺术学
  • 19 篇 文学
  • 17 篇 军事学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 357 篇 systems engineer...
  • 246 篇 control systems
  • 188 篇 switches
  • 167 篇 voltage
  • 120 篇 computational mo...
  • 113 篇 computer science
  • 113 篇 frequency
  • 106 篇 application soft...
  • 93 篇 bandwidth
  • 84 篇 algorithm design...
  • 82 篇 costs
  • 80 篇 impedance
  • 79 篇 computer archite...
  • 77 篇 power system mod...
  • 75 篇 robot sensing sy...
  • 74 篇 optimization
  • 74 篇 predictive model...
  • 73 篇 deep learning
  • 73 篇 dc-dc power conv...
  • 73 篇 voltage control

机构

  • 417 篇 department of el...
  • 318 篇 department of ph...
  • 256 篇 national researc...
  • 255 篇 iccub universita...
  • 216 篇 cavendish labora...
  • 209 篇 infn sezione di ...
  • 207 篇 horia hulubei na...
  • 205 篇 h.h. wills physi...
  • 199 篇 massachusetts in...
  • 189 篇 national researc...
  • 188 篇 yandex school of...
  • 186 篇 van swinderen in...
  • 186 篇 electrical compu...
  • 181 篇 warsaw
  • 172 篇 university of ch...
  • 172 篇 oliver lodge lab...
  • 171 篇 university of ci...
  • 168 篇 infn sezione di ...
  • 162 篇 university of ma...
  • 162 篇 infn sezione di ...

作者

  • 192 篇 beiter a.
  • 168 篇 barter w.
  • 166 篇 brundu d.
  • 166 篇 bellee v.
  • 156 篇 casse g.
  • 152 篇 bowcock t.j.v.
  • 149 篇 baker s.
  • 145 篇 blake t.
  • 145 篇 borsato m.
  • 145 篇 betancourt c.
  • 139 篇 bediaga i.
  • 132 篇 amato s.
  • 130 篇 baryshnikov f.
  • 129 篇 boettcher t.
  • 123 篇 bjørn m.
  • 122 篇 arzymatov k.
  • 120 篇 braun s.
  • 118 篇 borisyak m.
  • 112 篇 bizzeti a.
  • 103 篇 atzeni m.

语言

  • 8,846 篇 英文
  • 244 篇 其他
  • 138 篇 中文
  • 7 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 法文
检索条件"机构=Computer Systems Engineering National Polytechnic Institute"
9239 条 记 录,以下是1-10 订阅
排序:
Mining Big Data with Decision Tree Algorithm  4
Mining Big Data with Decision Tree Algorithm
收藏 引用
4th International Conference on Embedded and Distributed systems, EDiS 2024
作者: Khiat, Salim Ould Ali, Yasmine Polytechnic National School of Oran Computer Systems Engineering Department Oran31000 Algeria Polytechnic National School of Oran Computer Systems Engineering Department Oran31000 Algeria
Decision tree algorithms are very useful approaches in data mining. Indeed, the C4.5 algorithm is a popular data classifier for machine learning. Nowadays there is a wide range of Big Data frameworks such as Hadoop an... 详细信息
来源: 评论
A sentiment analysis of the Ukraine-Russia War tweets using knowledge graph convolutional networks
收藏 引用
International Journal of Information Technology (Singapore) 2025年 1-18页
作者: Menaouer, Brahami Fairouz, Safa Meriem, Mohammed Boulekbachi Mohammed, Sabri Nada, Matta LABAB Laboratory Computer Systems Engineering Department National Polytechnic School of Oran Oran Algeria Computer Systems Engineering Department National Polytechnic School of Oran Oran Algeria TechCICO Laboratory University of Technology of Troyes Troyes France
Nowadays, social networks play a critical role in online social discourse, particularly during major events such as elections, health crises, and wars. Furthermore, individuals have spent significant time on social ne... 详细信息
来源: 评论
Supervised learning techniques for blood product prediction in patients with hematologic diseases: a multi-centre study in Western Algeria
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-12页
作者: Ykhlef, Amel Labri, Nedjla Selma Brahami, Menaouer LABAB Laboratory Computer Systems Engineering Department National Polytechnic School of Oran Oran Algeria
Blood transfusion is a medical procedure that involves transfusing blood or one of its components from one or more donors into a patient. Digital technology and machine learning have played a crucial role in the blood... 详细信息
来源: 评论
Waterfall: Gozalandia. Distributed protocol with fast finality and proven safety and liveness
IET Blockchain
收藏 引用
IET Blockchain 2023年 第4期3卷 182-193页
作者: Grybniak, Sergii Leonchyk, Yevhen Mazurok, Igor Nashyvan, Oleksandr Shanin, Ruslan Odessa National Polytechnic University Institute of Computer Systems Institute of Computer Systems Odesa Ukraine Odessa I.I. Mechnikov National University Faculty of Mathematics Physics and Information Technologies Odesa Ukraine
A consensus protocol is a crucial mechanism of distributed networks by which nodes can coordinate their actions and the current state of data. This article describes a BlockDAG consensus algorithm based on the Proof o... 详细信息
来源: 评论
Generalized Two-Point Visual Control Model of Human Steering for Accurate State Estimation1
收藏 引用
ASME Letters in Dynamic systems and Control 2025年 第1期5卷 011004页
作者: Mai, Rene E. Sears, Katherine Roessling, Grace Julius, Agung Mishra, Sandipan Department of Mechanical Aerospace and Nuclear Engineering Rensselaer Polytechnic Institute TroyNY12180 United States Department of Cognitive Science Rensselaer Polytechnic Institute TroyNY12180 United States Department of Electrical Computer and Systems Engineering Rensselaer Polytechnic Institute TroyNY12180 United States
We derive and validate a generalization of the two-point visual control model, an accepted cognitive science model for human steering behavior. The generalized model is needed as current steering models are either ins... 详细信息
来源: 评论
IMPROVEMENT OF THE ACO ALGORITHM FOR INTELLIGENT TASK SCHEDULING IN CLOUD systems
收藏 引用
Scalable Computing 2025年 第2期26卷 531-539页
作者: DJEBBAR, ESMA INSAF BELALEM, GHALEM Department of Computer Science Systems Engineering National Polytechnic School of Oran-Maurie Audin Oran Algeria Department of Computer Science University of Oran1-Ahmed Ben Bella Algeria
Cloud computing involves accessing and using computing resources, such as servers, storage, and software applications, over the Internet, enabling scalable access on demand. Cloud computing systems are becoming an ess... 详细信息
来源: 评论
METHOD OF DETECTION OF INTRUSIONS BASED ON STACKING META-ALGORITHM  5
METHOD OF DETECTION OF INTRUSIONS BASED ON STACKING META-ALG...
收藏 引用
5th IEEE KhPI Week on Advanced Technology, KhPIWeek 2024
作者: Gavrylenko, Svitlana Zozulia, Vladislav Khatsko, Nataliia Department of Computer Engineering and Programming National Technical University "Kharkiv Polytechnic Institute" Kharkiv Ukraine Department Information Systems and Technologies National Technical University «Kharkiv Polytechnic Institute» Kharkiv Ukraine
An analysis of modern computer network intrusion detection systems was carried out. The application of machine and deep learning methods for classification problems has been investigated. The UNSW-NB15 dataset, develo... 详细信息
来源: 评论
Insider Attack Prevention:LAPUP—Lightweight Authentication Protocol Using PUF
收藏 引用
Journal of Communications and Information Networks 2024年 第2期9卷 192-206页
作者: Siranjeevi Rajamanickam Satyanarayana Vollala N.Ramasubramanian Department of Computer Engineering Government Polytechnic CollegeTiruchirappalli 620022India Department of Computer Science and Engineering Dr.Shyama Prasad Mukherjee International Institute of Information Technology-Naya RaipurChhattisgarh 493661India Department of Computer Science and Engineering National Institute of TechnologyTiruchirappalli 620015India
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha... 详细信息
来源: 评论
A Robust Phaseless Imaging Approach Using Reverse Kullback Leibler Divergence and Wirtinger Flow
A Robust Phaseless Imaging Approach Using Reverse Kullback L...
收藏 引用
2024 IEEE Conference on Computational Imaging Using Synthetic Apertures, CISA 2024
作者: Choudhury, Nazia Afroz Yonel, Bariscan Yazici, Birsen Rensselaer Polytechnic Institute Electrical Computer and Systems Engineering TroyNY United States
Phaseless imaging is a prominent field of study in many imaging modalities. In practical applications, the phaseless measurements usually contain noise and outliers, limiting the reconstruction algorithms' perform... 详细信息
来源: 评论
ContextAug:model-domain failing test augmentation with contextual information
收藏 引用
Frontiers of computer Science 2024年 第2期18卷 43-60页
作者: Zhuo ZHANG Jianxin XUE Deheng YANG Xiaoguang MAO School of Information Technology and Engineering Guangzhou College of CommerceGuangzhou 511363China School of Computer and Information Engineering Institute for Artificial IntelligenceShanghai Polytechnic UniversityShanghai 201209China College of Computer National University of Defense TechnologyChangsha 410073China
In the process of software development,the ability to localize faults is crucial for improving the efficiency of *** speaking,detecting and repairing errant behavior at an early stage of the development cycle consider... 详细信息
来源: 评论