咨询与建议

限定检索结果

文献类型

  • 22,374 篇 会议
  • 3,583 篇 期刊文献
  • 210 册 图书

馆藏范围

  • 26,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,013 篇 工学
    • 11,279 篇 计算机科学与技术...
    • 9,442 篇 软件工程
    • 4,331 篇 信息与通信工程
    • 2,540 篇 控制科学与工程
    • 2,175 篇 电子科学与技术(可...
    • 2,157 篇 电气工程
    • 1,538 篇 生物工程
    • 1,320 篇 生物医学工程(可授...
    • 1,135 篇 光学工程
    • 1,033 篇 机械工程
    • 895 篇 仪器科学与技术
    • 863 篇 动力工程及工程热...
    • 743 篇 化学工程与技术
    • 637 篇 安全科学与工程
    • 531 篇 交通运输工程
    • 473 篇 材料科学与工程(可...
  • 8,287 篇 理学
    • 4,554 篇 数学
    • 2,430 篇 物理学
    • 1,705 篇 生物学
    • 1,393 篇 统计学(可授理学、...
    • 932 篇 系统科学
    • 758 篇 化学
  • 4,054 篇 管理学
    • 2,442 篇 管理科学与工程(可...
    • 1,851 篇 图书情报与档案管...
    • 1,286 篇 工商管理
  • 1,077 篇 医学
    • 952 篇 临床医学
    • 886 篇 基础医学(可授医学...
    • 572 篇 药学(可授医学、理...
  • 716 篇 法学
    • 565 篇 社会学
  • 454 篇 经济学
    • 452 篇 应用经济学
  • 354 篇 教育学
  • 326 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 730 篇 accuracy
  • 543 篇 feature extracti...
  • 502 篇 deep learning
  • 493 篇 computational mo...
  • 389 篇 training
  • 385 篇 support vector m...
  • 370 篇 computer science
  • 326 篇 internet of thin...
  • 311 篇 computer archite...
  • 300 篇 real-time system...
  • 289 篇 machine learning
  • 248 篇 predictive model...
  • 229 篇 reliability
  • 226 篇 routing
  • 221 篇 convolutional ne...
  • 217 篇 optimization
  • 206 篇 neural networks
  • 205 篇 data mining
  • 204 篇 throughput
  • 188 篇 image segmentati...

机构

  • 86 篇 dept. of compute...
  • 84 篇 institut univers...
  • 84 篇 université de st...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 80 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 66 篇 university würzb...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 49 篇 university of jo...
  • 48 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...
  • 42 篇 university moham...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 91 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 75 篇 dallier r.
  • 72 篇 anguita m.
  • 61 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 59 篇 boettcher m.
  • 55 篇 celli s.
  • 52 篇 aly z.
  • 48 篇 dornic d.

语言

  • 23,310 篇 英文
  • 2,487 篇 其他
  • 271 篇 中文
  • 80 篇 日文
  • 21 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Architecture and Computer Technology"
26167 条 记 录,以下是4901-4910 订阅
排序:
Prediction of Irregular Bangladesh-EU Migration Trends Using Machine Learning Techniques
Prediction of Irregular Bangladesh-EU Migration Trends Using...
收藏 引用
International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)
作者: Md. Shariful Islam Md Abdur Rahim Nitun Kumar Podder Md. Najmul Hossain Md Imran Hossain Dept. of Computer Science and Engineering Pabna University of Scence and Technology Pabna Bangladesh Dept. of Electrical Electronic and Communication Engineering Pabna University of Scence and Technology Pabna Bangladesh Dept. of Inormation and Communication Engineering Pabna University of Scence and Technology Pabna Bangladesh
Remittances are important economic contributors to a countryâs economy. It has increased national savings, lowered foreign exchange limits, and helped balance payments and development budgets. Migrant workers are... 详细信息
来源: 评论
Fuzzy Logic-based Routing Adaptation for QoS Support in WSNs
Fuzzy Logic-based Routing Adaptation for QoS Support in WSNs
收藏 引用
Emerging Technologies for Dependable Internet of Things (ICETI), International Conference on
作者: Yosef A. Abdulmoghni Sharaf A. Alhomdy Yahya Al-Ashmoery Department of Information Technology Faculty of Computer Science and IT Sana’a University Sana’a Yemen Department of IT Al-Razi University Dept. Mathematics & Computer Faculty of Science Sana'a University Sana'a Yemen
Wireless sensor networks (WSNs) have been widely used in dynamic environments where node failure, node mobility, or external events can cause frequent changes to the network architecture. As a result, WSNs cannot use ... 详细信息
来源: 评论
Are Fictitious Nodes Needed at All?
SSRN
收藏 引用
SSRN 2023年
作者: Schweitzer, Nadav Cohen, Liad Hirst, Tirza Dvir, Amit Stulman, Ariel Ariel Cyber Innovation Center Dept. of Computer Science Ariel University Israel Department of Computer Science Jerusalem College of Technology Jerusalem Israel
Mobile ad-hoc networks (manets) are everywhere. They are the basis for many current technologies (including vanets, iot, etc.), and used in multiple domains (including military, disaster zones, etc.). For them to func... 详细信息
来源: 评论
Multidisease Prediction and Causality Analysis with Hospital Management System
Multidisease Prediction and Causality Analysis with Hospital...
收藏 引用
Applied Artificial Intelligence and Computing (ICAAIC), International Conference on
作者: Abhro Kumar Roy Subham Gayen P Renukadevi Dept. Of Computer Science and Engineering (C. Tech Department) SRM Institute of Science and Technology KTR Chennai Computer Science and Engineering (C. Tech Department) SRM Institute of Science and Technology KTR Chennai
In healthcare domain, the demand for efficient diagnosis and hospital management systems has increased unprecedentedly. This research study proposes a novel Symptom Checker integrated with a Multidisease Hospital Mana... 详细信息
来源: 评论
Persuasive: A Node Isolation Attack Variant for Olsr-Based Manets and its Mitigation
SSRN
收藏 引用
SSRN 2023年
作者: Schweitzer, Nadav Cohen, Liad Dvir, Amit Stulman, Ariel Department of Computer Science Jerusalem College of Technology Jerusalem Israel Ariel Cyber Innovation Center Dept. of Computer Science Ariel University Israel
Mobile ad hoc networks (manets) are self-creating, self-configuring, self-healing, decentralized adaptive networks. The Optimized Link State Routing protocol (olsr) is one of four base routing protocols for use in ad ... 详细信息
来源: 评论
Reducing Client-Side Cost in Secure Inner Product Evaluations
Reducing Client-Side Cost in Secure Inner Product Evaluation...
收藏 引用
International Conference on Information Networking
作者: Changhee Hahn Dongyoung Koo Junbeom Hur dept. Electrical and Information Engineering Seoul National University of Science and Technology South Korea dept. Convergence Security Hansung University South Korea dept. Computer Science and Engineering Korea University South Korea
In the era of ubiquitous data collection and analysis, preserving privacy while utilizing data, such as inner product evaluations, poses a significant challenge. One such method is inner product functional encryption ... 详细信息
来源: 评论
Identification of Children with ADHD from EEG Signals Based on Entropy Measures and Support Vector Machine
Identification of Children with ADHD from EEG Signals Based ...
收藏 引用
European Workshop on Visual Information Processing (EUVIP)
作者: Md. Maniruzzaman Md. Al Mehedi Hasan Taro Suzuki Jungpil Shin School of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan Dept. of Computer Science & Engineering Rajshahi University of Engineering and Technology Rajshahi Bangladesh
Attention deficit hyperactivity disorder (ADHD) is one of the major psychiatric and neurodevelopment disorders that affects 11% of children worldwide. Moreover, the prevalence of ADHD has rapidly increased over time w...
来源: 评论
AI Based Monitoring System for Social Engineering  3
AI Based Monitoring System for Social Engineering
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Yapa, K. Udara, S.W.I. Wijayawardane, U.P.B. Kularatne, K.N.P. Navaratne, N.M.P.P. Dharmaphriya, W. G. V. U Sri Lanka Institute of Information Technology Dept. of Computer System Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Dept. of Computer Science and Software Engineering Malabe Sri Lanka
Social media is one of the most predominantly used online platforms by individuals across the world. However, very few of these social media users are educated about the adverse effects of obliviously using social med... 详细信息
来源: 评论
Assessing the Efficacy of Distributed Ledger technology for Immutable Data Logging and Fraud Prevention in IoT Retail Applications
Assessing the Efficacy of Distributed Ledger Technology for ...
收藏 引用
2024 International Conference on Advances in Computing Research on Science Engineering and technology, ACROSET 2024
作者: Ponnrajakumari, M. Elanangai, V. Ramprasad, S.R. Velpula, Vijaya Kumar Bhagyalakshmi, L. Prabha, A.G. Velammal Engineering College Dept. of Ece Chennai India St. Peter's Institute of Higher Education and Research. Avadi Department of Electrical and Electronics Engineering Chennai India School of Computing Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Mlr Institute of Technology Dept of Ece Hyderabad India Rajalakshmi Engineering College Dept. of Ece Chennai India
This paper presents a comprehensive framework for assessing the efficacy of Distributed Ledger technology (DLT) in IoT retail applications. The framework integrates five key algorithms: Data Validation Algorithm (DVA)... 详细信息
来源: 评论
An effective steganographic technique for hiding the image data using the LSB technique
Cyber Security and Applications
收藏 引用
Cyber Security and Applications 2025年 3卷
作者: Panigrahi, Rasmita Padhy, Neelamadhab School of Engineering and Technology Dept. of Computer Science and Engineering GIET University Gunupur Odisha Gobriguda India
Steganography is the art and science of writing secret messages so that neither the sender nor the intended recipient knows there is a hidden message. Data hiding is the art of hiding data for various reasons, such as... 详细信息
来源: 评论