咨询与建议

限定检索结果

文献类型

  • 31,159 篇 会议
  • 4,913 篇 期刊文献
  • 244 册 图书

馆藏范围

  • 36,316 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,638 篇 工学
    • 16,120 篇 计算机科学与技术...
    • 13,476 篇 软件工程
    • 5,972 篇 信息与通信工程
    • 3,700 篇 控制科学与工程
    • 2,866 篇 电子科学与技术(可...
    • 2,856 篇 电气工程
    • 2,362 篇 生物工程
    • 1,940 篇 生物医学工程(可授...
    • 1,589 篇 光学工程
    • 1,488 篇 机械工程
    • 1,338 篇 动力工程及工程热...
    • 1,275 篇 仪器科学与技术
    • 1,157 篇 化学工程与技术
    • 905 篇 安全科学与工程
    • 775 篇 交通运输工程
    • 678 篇 建筑学
  • 11,662 篇 理学
    • 6,265 篇 数学
    • 3,255 篇 物理学
    • 2,585 篇 生物学
    • 2,081 篇 统计学(可授理学、...
    • 1,350 篇 系统科学
    • 1,218 篇 化学
  • 5,837 篇 管理学
    • 3,458 篇 管理科学与工程(可...
    • 2,685 篇 图书情报与档案管...
    • 1,877 篇 工商管理
  • 1,679 篇 医学
    • 1,430 篇 临床医学
    • 1,330 篇 基础医学(可授医学...
    • 872 篇 药学(可授医学、理...
    • 721 篇 公共卫生与预防医...
  • 1,070 篇 法学
    • 862 篇 社会学
  • 676 篇 经济学
  • 497 篇 农学
  • 444 篇 教育学
  • 183 篇 文学
  • 80 篇 军事学
  • 43 篇 艺术学
  • 1 篇 哲学

主题

  • 1,129 篇 accuracy
  • 865 篇 feature extracti...
  • 851 篇 computational mo...
  • 766 篇 deep learning
  • 691 篇 training
  • 688 篇 computer science
  • 548 篇 real-time system...
  • 546 篇 machine learning
  • 524 篇 support vector m...
  • 455 篇 predictive model...
  • 421 篇 internet of thin...
  • 367 篇 convolutional ne...
  • 363 篇 data models
  • 355 篇 computer archite...
  • 342 篇 reliability
  • 316 篇 optimization
  • 292 篇 data mining
  • 277 篇 routing
  • 257 篇 wireless sensor ...
  • 252 篇 artificial intel...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 76 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 62 篇 nikhef national ...
  • 59 篇 dept. of compute...
  • 59 篇 dept. of informa...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 school of automa...
  • 53 篇 leiden universit...
  • 48 篇 dept. of compute...
  • 48 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 44 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 71 篇 dallier r.
  • 69 篇 huang f.
  • 64 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 31,050 篇 英文
  • 4,770 篇 其他
  • 318 篇 中文
  • 119 篇 日文
  • 71 篇 朝鲜文
  • 6 篇 斯洛文尼亚文
  • 4 篇 德文
  • 3 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. Computer Science and System Engineering"
36316 条 记 录,以下是4401-4410 订阅
排序:
OLBR: Optimization of Location-Based Routing Protocols in Vehicular Ad Hoc Networks
OLBR: Optimization of Location-Based Routing Protocols in Ve...
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable Technology, ICRISST 2024
作者: Thangam, S. Srikar Reddy, M. Vivek Ullas, Karthik Khadar Jilani, N. Abdul Venkatesh, K. Janet Kumari, J. Jesy Saleem Raja, A. Amrita School of Computing Dept. of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India University of Technology and Applied Sciences-Shinas College of Computing and Information Sciences It Department Oman
The proposed work employs ns-3, SUMO, and NetAnim to create geographical routing in vehicular ad hoc networks (VANETs). The research attempts to assess the performance of three well-known protocols AODV, DSDV, and OLS... 详细信息
来源: 评论
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
Comparative Analysis of Password Storage Security using Doub...
收藏 引用
2022 IEEE North Karnataka Subsection Flagship International Conference, NKCon 2022
作者: Chethana, Savarala Charan, Sreevathsa Sree Srihitha, Vemula Radha, D. Kavitha, C.R. Amrita School of Computing Bengaluru Dept. of Computer Science & Engineering Amrita Vishwa Vidyapeetham India
Passwords are generally used to keep unauthorized users out of the system. Password hacking has become more common as the number of internet users has extended, causing a slew of issues. These problems include stealin... 详细信息
来源: 评论
Accounting for systemic risk in analysis of crisis scenarios  21
Accounting for systemic risk in analysis of crisis scenarios
收藏 引用
21st International ISCRAM Conference, ISCRAM 2024
作者: Gonzalez, Jose J. Abbas, Reem Paulsen, Sigurd University of Agder Kristiansand Norway Department of Computer Science and Software Engineering Auckland University of Technology Auckland New Zealand Dept. of Organization Crisis Management and Information Security Kristiansand Norway
systemic risk is ubiquitous in our increasingly globalised world owing to the interconnections within and across sectors. However, a review of National Risk Assessments performed in OECD member countries reveals that ... 详细信息
来源: 评论
Integrating Network Security into Software Defined Networking (SDN) Architectures  2
Integrating Network Security into Software Defined Networkin...
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication systems, ICICACS 2024
作者: Vadakkethil Somanathan Pillai, Sanjaikanth E Polimetla, Kiran University Of North Dakota School of Electrical Engineering and Computer Science Grand ForksND United States Adobe Inc. Dept. of Information Technology AustinTX United States
The decision for introduced green and cozy networking solutions has grown as the era continues to evolve. With centralized network control and programmability functions, software applications defined as Networking (SD... 详细信息
来源: 评论
Microgrid Using Intelligent Controlled DSTATCOM for Power Quality Enhancement  6
Microgrid Using Intelligent Controlled DSTATCOM for Power Qu...
收藏 引用
6th International Symposium on computer, Consumer and Control, IS3C 2023
作者: Tan, Kuang-Hsiung Li, Meng-Yang Hu, Chih-Chan Chung Cheng Institute of Technology National Defense University Dept. of Electrical and Electronic Engineering Taoyuan Taiwan National Central University Dept. of Electrical Engineering Chungli Taiwan National Chung-Shan Institute of Science and Technology System Manufacturing Center New Taipei Taiwan
A droop controlled microgrid with distribution static compensator (DSTATCOM) is developed to improve the power quality in this study. Due to the reactive power/voltage QV droop characteristic and the existence of the ... 详细信息
来源: 评论
Semantic Role Labeling for Code-Switched Data  3
Semantic Role Labeling for Code-Switched Data
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Nikitha, M. Savaram, Padmaja Bandu, Sasidhar Saketh Keshav Memorial Institute of Technology Department of Cse Hyderabad India College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Dept. of Computer Science Al-Kharj Saudi Arabia Prince Sattam bin Abdulaziz University Dept. of English Al-Kharj Saudi Arabia University College of Engineering Osmania University Department of Aiml Hyderabad India
In natural language processing, pre-trained language models have shown significant promise in various linguistic tasks. This study investigates the efficacy of various pre-trained models, namely XLM-RoBERTa, M-BERT, a... 详细信息
来源: 评论
Dataset Construction and Classification Based on Pre-trained Models for Opinion Holder Detection  12
Dataset Construction and Classification Based on Pre-trained...
收藏 引用
12th International Congress on Advanced Applied Informatics, IIAI-AAI 2022
作者: Al-Mahmud, Al Shimada, Kazutaka Kyushu Institute of Technology Dept. of Computer Science and Systems Engineering Fukuoka850-8502 Japan
Nowadays, it is getting increased in the massive amount of internet users. People express subjective thinking (i.e., opinion) implicitly and explicitly on online platforms such as Facebook, Twitter, Amazon product rev... 详细信息
来源: 评论
Early Detection of Type 2 Diabetes Using Oversampling-Based Ensemble Learning for Classification of Imbalanced Dataset
Early Detection of Type 2 Diabetes Using Oversampling-Based ...
收藏 引用
International Conference on Signal Processing, Communication, Power and Embedded system (SCOPES)
作者: P Rajasekhar Sridhar Mourya Narasimha Reddy Bathala G Lavanya S Gayatri Munni Shaik Dept. of Computer Science Engineering Vignan's Institute of engineering for women Visakhapatnam India Dept. of Information Technology Malla Reddy University Hyderabad India Dept. of Computer Science Engineering Malla Reddy University Hyderabad India
Diabetes is marked by high blood glucose levels and adversely affects various body systems, notably cardiovascular, renal, and visual. Early diagnosis via automated screening is vital for operative treatment. Advances... 详细信息
来源: 评论
Stealth: A Highly Secured End-to-End Symmetric Communication Protocol
Stealth: A Highly Secured End-to-End Symmetric Communication...
收藏 引用
2022 International Symposium on Networks, computers and Communications, ISNCC 2022
作者: Patgiri, Ripon Muppalaneni, Naresh Babu National Institute of Technology Silchar Dept. Computer Science & Engineering Assam Cachar788010 India
Symmetric key cryptography is applied in almost all secure communications to protect all sensitive information from attackers, for instance, banking, and thus, it requires extra attention due to diverse applications. ... 详细信息
来源: 评论
OCSK-SMOTE: An improved minority oversampling technique for unbalanced dataset using One-Class SVM and K-means  2
OCSK-SMOTE: An improved minority oversampling technique for ...
收藏 引用
2nd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2022
作者: Pandey, Utkarsh Shukla, Sanyam Wadhvani, Rajesh Maulana Azad National Institute of Technology Dept. of Computer Science and Engineering Bhopal462003 India
Classification of dataset that have an imbalance in there classes still a challenge to the real world problem and a lot of research has been done and continuously being done to get a resolution to this problem, SMOTE ... 详细信息
来源: 评论