咨询与建议

限定检索结果

文献类型

  • 2,407 篇 会议
  • 775 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 3,222 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,988 篇 工学
    • 1,463 篇 计算机科学与技术...
    • 1,170 篇 软件工程
    • 397 篇 信息与通信工程
    • 268 篇 控制科学与工程
    • 187 篇 电气工程
    • 172 篇 生物工程
    • 163 篇 电子科学与技术(可...
    • 132 篇 机械工程
    • 131 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 112 篇 仪器科学与技术
    • 93 篇 化学工程与技术
    • 78 篇 建筑学
    • 73 篇 材料科学与工程(可...
    • 68 篇 动力工程及工程热...
    • 63 篇 土木工程
  • 1,354 篇 理学
    • 897 篇 数学
    • 329 篇 物理学
    • 250 篇 统计学(可授理学、...
    • 203 篇 生物学
    • 124 篇 系统科学
    • 112 篇 化学
    • 80 篇 地球物理学
  • 481 篇 管理学
    • 269 篇 管理科学与工程(可...
    • 230 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 111 篇 医学
    • 96 篇 临床医学
    • 82 篇 基础医学(可授医学...
  • 79 篇 法学
    • 70 篇 社会学
  • 68 篇 教育学
    • 66 篇 教育学
  • 47 篇 经济学
  • 45 篇 农学
  • 11 篇 文学
  • 9 篇 军事学
  • 5 篇 哲学
  • 3 篇 历史学
  • 3 篇 艺术学

主题

  • 97 篇 computer science
  • 43 篇 mathematics
  • 41 篇 optimization
  • 40 篇 computational mo...
  • 39 篇 accuracy
  • 37 篇 artificial intel...
  • 34 篇 data mining
  • 34 篇 machine learning
  • 33 篇 deep learning
  • 33 篇 feature extracti...
  • 32 篇 predictive model...
  • 32 篇 semantics
  • 32 篇 training
  • 29 篇 support vector m...
  • 29 篇 data models
  • 28 篇 computer archite...
  • 26 篇 software
  • 26 篇 standards
  • 24 篇 image segmentati...
  • 24 篇 neural networks

机构

  • 54 篇 université de st...
  • 49 篇 university moham...
  • 46 篇 north-west unive...
  • 46 篇 infn sezione di ...
  • 45 篇 infn sezione di ...
  • 45 篇 institut univers...
  • 45 篇 tno technical sc...
  • 45 篇 nikhef national ...
  • 45 篇 ncsr demokritos ...
  • 44 篇 national centre ...
  • 44 篇 university würzb...
  • 44 篇 university of jo...
  • 44 篇 infn sezione di ...
  • 44 篇 infn sezione di ...
  • 43 篇 università di sa...
  • 42 篇 infn sezione di ...
  • 42 篇 lpc caen normand...
  • 41 篇 université de ha...
  • 41 篇 comenius univers...
  • 41 篇 university of am...

作者

  • 54 篇 ardid m.
  • 54 篇 kalekin o.
  • 54 篇 díaz a.f.
  • 54 篇 coleiro a.
  • 53 篇 ferrara g.
  • 53 篇 boumaaza j.
  • 52 篇 enzenhöfer a.
  • 52 篇 celli s.
  • 52 篇 dornic d.
  • 52 篇 brunner j.
  • 51 篇 di palma i.
  • 50 篇 coniglione r.
  • 50 篇 eberl t.
  • 48 篇 calvo d.
  • 47 篇 kulikovskiy v.
  • 46 篇 carretero v.
  • 46 篇 ardid s.
  • 46 篇 bendahman m.
  • 45 篇 chen a.
  • 44 篇 gal t.

语言

  • 3,125 篇 英文
  • 79 篇 其他
  • 13 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 法文
检索条件"机构=Dept. of Applied Math and Computer Science"
3222 条 记 录,以下是221-230 订阅
排序:
Low-cost Smart Glasses for People with Visual Impairments  1
Low-cost Smart Glasses for People with Visual Impairments
收藏 引用
1st IEEE International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems, ICAECIS 2023
作者: Nayana, B.R. Raju N R, Yogesh Velidi, Abhav S M S Ramaiah Univesrity of Applied Sciences Dept. of Computer Science Engineering Karnataka Bangalore India Sir M Visvesvaraya Institute of Technology Dept. of Electrical and Electronics Engineering Karnataka Bangalore India National Institute of Technology Dept. of Electronics and Commuincation Engineering Suratkal Karnataka India
An efficient visual aid is essential for visually impaired candidate. At the same instance it has to be simple, robust and cost effective. However, regardless of being expensive, it is challenging to incorporate high ... 详细信息
来源: 评论
Improving Messenger Phishing Detection Using Heterogeneous Phishing Data
Improving Messenger Phishing Detection Using Heterogeneous P...
收藏 引用
International Conference on Electronics, Information and Communications (ICEIC)
作者: Seokjin Oh Keonwoong Noh Sunyub Kim Dohyung An Woohwan Jung Dept. of Applied Artificial Intelligence Hanyang University Seoul Republic of Korea Dept. of Computer Science Hanyang University Ansan Republic of Korea
Recently, as messenger phishing has been occurring more frequently, the need for its detection has increased; however, datasets for messenger phishing detection are publicly unavailable. In this paper, we address the ... 详细信息
来源: 评论
Data Augmentation for Messenger Phishing Detection Using Large Language Models
Data Augmentation for Messenger Phishing Detection Using Lar...
收藏 引用
International Conference on Electronics, Information and Communications (ICEIC)
作者: Keonwoong Noh Seokjin Oh Sunyub Kim Dohyung An Woohwan Jung Dept. of Applied Artificial Intelligence Hanyang University Seoul Republic of Korea Dept. of Computer Science Hanyang University Ansan Republic of Korea
In this study, we introduce a new dataset specifically designed for detecting messenger phishing, an increasingly significant issue in cybercrime. To overcome the scarcity of labeled phishing data, we employ large lan... 详细信息
来源: 评论
On Securing Sensitive Data Using Deep Convolutional Autoencoders
On Securing Sensitive Data Using Deep Convolutional Autoenco...
收藏 引用
International Conference on Control, Decision and Information Technologies (CoDIT)
作者: Abib Sy Fehmi Jaafar Kevin Bouchard Dept. of Math and Computer Science Université du Québec à Chicoutimi Quebec Canada
There are various traditional methods used for securing sensitive data, such as cryptography algorithms like AES-HMAC-SHA256, Twofish, and Chacha20. However, several studies showed that these cryptography algorithms s... 详细信息
来源: 评论
Efficient Trajectory Inference in Wasserstein Space Using Consecutive Averaging
arXiv
收藏 引用
arXiv 2024年
作者: Banerjee, Amartya Lee, Harlin Sharon, Nir Moosmüller, Caroline Dept. of Computer Science UNC Chapel Hill United States SDSS UNC Chapel Hill United States Dept. of Applied Math Tel Aviv University Dept. of Mathematics UNC Chapel Hill United States
Capturing data from dynamic processes through cross-sectional measurements is seen in many fields, such as computational biology. Trajectory inference deals with the challenge of reconstructing continuous processes fr... 详细信息
来源: 评论
BERT Goes to SQL School: Improving Automatic Grading of SQL Statements
BERT Goes to SQL School: Improving Automatic Grading of SQL ...
收藏 引用
computer science, computer Engineering, & applied Computing (CSCE), Congress in
作者: Pablo Rivas Donald R. Schwartz Ernesto Quevedo Dept. of Computer Science School of Eng. & Computer Science Baylor University Dept. of Computing Technology School of Computer Science & Math. Marist College
Automated grading of SQL queries is a challenging task due to the complexity of the language and the variety of acceptable solutions for a given problem. In this paper, we propose a novel approach that leverages deep ...
来源: 评论
High Isolation Dual Port MIMO Antenna for Vehicle-to-Vehicle Communication
High Isolation Dual Port MIMO Antenna for Vehicle-to-Vehicle...
收藏 引用
2023 IEEE International Conference on Communications, Information, Electronic and Energy Systems, CIEES 2023
作者: Sharma, Preeti Singh, Prabhakar Tiwari, Rakesh N. Kumar, Pradeep Galgotias University Physics Division School of Basic Sciences Greater Noida India Greater Noida Institute of Technology Dept. of Applied Science Greater Noida India Madanapalle Institute of Technology & Science Dept. of Electronics and Communication Engineering Madanapalle India University of KwaZulu-Natal Dept. of Electrical Electronic and Computer Engineering Durban South Africa
This research paper reports a very thin 2-port multiple-input multiple-output (MIMO) antenna with a small footprint of 14× 10× 0.58mm3. The proposed design works between the frequencies of 8.73 to 15.86 GHz.... 详细信息
来源: 评论
An adaptive Particle Swarm Optimization to Solve Modern Security System
An adaptive Particle Swarm Optimization to Solve Modern Secu...
收藏 引用
Innovative Approaches in Smart Technologies (ISAS), International Symposium on
作者: Mohammed H. Ahmed Asaad Noori Hashim Khalid A. Hussein dept. Computer Science College of Education Mustansiriyah University Baghdad Iraq dept. Computer Science College of Computer Science and Math University of Kufa Najaf Iraq
Nonlinear stream ciphers hold a vital position in ensuring confidentiality within contemporary cryptographic systems. In this context, we interduce a new approach known as the Adaptive Three Sub-Swarm PSO based on Reg...
来源: 评论
Content Based Classification of Short Messages using Recurrent Neural Networks in NLP
Content Based Classification of Short Messages using Recurre...
收藏 引用
Artificial Intelligence, computer, Data sciences and Applications (ACDSA), International Conference on
作者: Deepthi Tabitha Bennet Preethi Samantha Bennet Priya Thiagarajan Sundarakantham. K Dept. of Applied Mathematics and Computational Science Thiagarajar College of Engineering Madurai India Dept. of Computer Science and Business Systems Thiagarajar College of Engineering Madurai India Dept. of Computer Science and Engineering Thiagarajar College of Engineering Madurai India
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
来源: 评论
Detection Systems for Distributed Denial-of-Service (DDoS) Attack Based on Time Series: A Review
Detection Systems for Distributed Denial-of-Service (DDoS) A...
收藏 引用
IEEE SSD International Multi-Conference on Systems, Signals and Devices
作者: Ahmed Adil Nafea Mustafa Maad Hamdi Baraa saad Abdulhakeem Ahmed Thair Shakir Mustafa S. Ibrahim Alsumaidaie Ali Muwafaq Shaban dept. Artificail inteligence College of Computer Science and Information Technology University of Anbar Ramadi Iraq dept. of Computer Science College of Computer Science and IT University of Anbar Ramadi Iraq dept. of Information System College of Computer Science and IT University of Anbar Ramadi Iraq dept. of Biophysics College of Applied Sciences University of Anbar Ramadi Iraq dept. Information System College of Computer Science and Information Technology University of Anbar Ramadi Iraq
The Distributed Denial-of-Service (DDoS) attacks are one of the most critical threats to the stability and security of the Internet. With the increasing number of devices connected to the Internet, the frequency and s... 详细信息
来源: 评论