咨询与建议

限定检索结果

文献类型

  • 31,128 篇 会议
  • 5,156 篇 期刊文献
  • 253 册 图书

馆藏范围

  • 36,537 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,996 篇 工学
    • 15,987 篇 计算机科学与技术...
    • 13,381 篇 软件工程
    • 5,892 篇 信息与通信工程
    • 3,639 篇 控制科学与工程
    • 2,730 篇 电子科学与技术(可...
    • 2,721 篇 电气工程
    • 2,349 篇 生物工程
    • 1,896 篇 生物医学工程(可授...
    • 1,571 篇 光学工程
    • 1,492 篇 机械工程
    • 1,359 篇 动力工程及工程热...
    • 1,292 篇 仪器科学与技术
    • 1,263 篇 化学工程与技术
    • 1,115 篇 建筑学
    • 1,094 篇 土木工程
    • 1,063 篇 安全科学与工程
    • 965 篇 材料科学与工程(可...
    • 867 篇 交通运输工程
  • 11,979 篇 理学
    • 6,378 篇 数学
    • 3,268 篇 物理学
    • 2,604 篇 生物学
    • 2,140 篇 统计学(可授理学、...
    • 1,365 篇 系统科学
    • 1,277 篇 化学
  • 5,900 篇 管理学
    • 3,551 篇 管理科学与工程(可...
    • 2,659 篇 图书情报与档案管...
    • 1,958 篇 工商管理
  • 1,647 篇 医学
    • 1,397 篇 临床医学
    • 1,306 篇 基础医学(可授医学...
  • 1,086 篇 法学
    • 876 篇 社会学
  • 697 篇 经济学
  • 544 篇 农学
  • 464 篇 教育学
  • 181 篇 文学
  • 79 篇 军事学
  • 43 篇 艺术学
  • 3 篇 哲学

主题

  • 1,121 篇 accuracy
  • 855 篇 feature extracti...
  • 846 篇 computational mo...
  • 762 篇 deep learning
  • 683 篇 training
  • 677 篇 computer science
  • 547 篇 real-time system...
  • 540 篇 machine learning
  • 523 篇 support vector m...
  • 456 篇 predictive model...
  • 414 篇 internet of thin...
  • 369 篇 convolutional ne...
  • 360 篇 data models
  • 346 篇 computer archite...
  • 337 篇 reliability
  • 319 篇 optimization
  • 283 篇 data mining
  • 277 篇 routing
  • 254 篇 wireless sensor ...
  • 251 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 74 篇 tno technical sc...
  • 66 篇 università di ca...
  • 66 篇 université de st...
  • 60 篇 dept. of informa...
  • 59 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 48 篇 dept. of compute...
  • 48 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 44 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 68 篇 huang f.
  • 67 篇 dallier r.
  • 59 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 31,210 篇 英文
  • 4,862 篇 其他
  • 322 篇 中文
  • 102 篇 日文
  • 46 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Civil Engineering and Computer Science Engineering"
36537 条 记 录,以下是4601-4610 订阅
排序:
A Survey on Blockchain-Based Certificate Authentication System: From Traditional to Digital
A Survey on Blockchain-Based Certificate Authentication Syst...
收藏 引用
Ubiquitous Computing and Intelligent Information Systems (ICUIS), International Conference on
作者: R Vijaya Saraswathi Meda Venkata Vasavi Swathi Sakshi Manoj Punwatkar Shreya Konduru Mohammed Abdul Sami Dept. Of Computer Science and Engineering VNR Vignana Jyothi Institute of Engineering and Technology Hyderabad India
This research study pertains to the essential problems of certificate authentication within academic organizations. It concentrates on the major issues of forgery and inefficiencies as well as administrative bottlenec... 详细信息
来源: 评论
Emergency Response Optimization System with Dynamic Traffic Signal Control: (Life Saver)
Emergency Response Optimization System with Dynamic Traffic ...
收藏 引用
Intelligent Cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Rajeshwari B.S Vinay Y Venu Gopal V Tauksik Anil Kumar Viraj Chowdarapu Dept. of Computer Science Engineering B.M.S College of Engineering Bangalore India
The traditional emergency response systems often face significant problems that can delay their services. These systems usually struggle with heavy traffic in cities, outdated ways to communicate, and old-fashioned me... 详细信息
来源: 评论
Intervention Analysis for Predicting Stock Market using Deep Learning Algorithms and Time Series Analysis
Intervention Analysis for Predicting Stock Market using Deep...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Krish Valecha Yash Pandloskar Sowmya Dadheech Pradnya Saval Dept. of Computer Science and Engineering (Data Science) Dwarkadas J. Sanghvi College of Engineering Mumbai India
Stock market being intricate and volatile pose challenges for classical Time Series Analysis techniques in terms of generalization and computation on real-world data. In order to improve prediction capacities, new met... 详细信息
来源: 评论
An Experimental Study on No-Reference Image Quality Assessment of Image Datasets  7
An Experimental Study on No-Reference Image Quality Assessme...
收藏 引用
7th IEEE International conference for Convergence in Technology, I2CT 2022
作者: Magotra, Varun Rohil, Mukesh Kumar Bhartiya Vidya Bhavans Sardar Patel Institute of Technology Dept. of Computer Engineering Mumbai India Birla Institute of Technology and Science Dept. of Computer Science Rajasthan Pilani India
Image quality assessment algorithms are of various types depending upon the the method they are employing. Over the years, these algorithms have found various applications like image compression, image restoration, im... 详细信息
来源: 评论
Global COVID-19 Related Waste Challenges, Response Strategies, and Potential Opportunities
Global COVID-19 Related Waste Challenges, Response Strategie...
收藏 引用
World Environmental and Water Resources Congress 2022: Adaptive Planning and Design in an Age of Risk and Uncertainty
作者: Smith-Lambert, Leigh Ferguson, Izaria Albert, Lynal Dept. of Engineering and Computer Science Tarleton State Univ. StephenvilleTX United States
As the world navigates the COVID-19 pandemic, the surge in waste generation, the varied composition of waste, and its subsequent management has presented several challenges to many communities. Waste management techni... 详细信息
来源: 评论
Data-Driven Assessment of Contaminant Vulnerability in River Ganga Coastal Aquifers
Data-Driven Assessment of Contaminant Vulnerability in River...
收藏 引用
OCEANS 2024 - Halifax, OCEANS 2024
作者: Fauziya, Farheen Das, Kousik Majumder, Prakrity Sen, Somdipta Banerjee, Champa Gupta, Ananya Sen Mukherjee, Abhijit Electrical and Computer Engineering University of Iowa Iowa CityIA United States Srm University-AP Department of Env. Science & Engineering Andhra Pradesh India Iit Kharagpur Dept. of Geology and Geophysics West Bengal Kharagpur India School of Environmental Science and Engineering Indian Institute of Technology Kharagpur West Bengal Kharagpur India
Groundwater of coastal aquifers have strong hy-draulic connections with the coastal hydrodynamics in a various spatiotemporal scale. But the along with the sub daily tidal influence the Tropical cyclone dependent acut... 详细信息
来源: 评论
An Efficient CNN-LSTM Approach for Smartphone Sensor-Based Human Activity Recognition System  5
An Efficient CNN-LSTM Approach for Smartphone Sensor-Based H...
收藏 引用
5th International Conference on Computational Intelligence and Networks, CINE 2022
作者: Choudhury, Nurul Amin Soni, Badal National Institute of Technology Silchar Dept. of Computer Science & Engineering Assam Silchar788010 India
Human Activity Recognition - HAR is one of the most popular area in the filed of sensor technology and smart learning algorithms. Deep learning algorithms are immensely exploited in HAR systems as it eliminates the ne... 详细信息
来源: 评论
An Efficient Use of Toffoli Quantum Gate for Boosting the Embedding Capacity in DNA Sequence
An Efficient Use of Toffoli Quantum Gate for Boosting the Em...
收藏 引用
2022 IEEE Asia-Pacific Conference on computer science and Data engineering, CSDE 2022
作者: Nahar, Mahbubun Kamal, A.H.M. Jatiya Kabi Kazi Nazrul Islam University Dept. of Computer Science and Engineering Trishal Bangladesh
While hiding data in DNA sequence, the steganograpy schemes try to increase the embedding payload, enhance the security of implanted data, protect the stego expansion and preserve the biological characteristics of DNA... 详细信息
来源: 评论
Adversarial Machine Learning Attack on Machine Learning-based Controller for Solar Inverters
Adversarial Machine Learning Attack on Machine Learning-base...
收藏 引用
IEEE Energy Conversion Congress and Exposition, ECCE
作者: Joaquin Massa Kyoung-Tak Kim Taesic Kim BoHyun Ahn Kumar Venayagamoorthy Jianwu Zeng Dept. of Electrical Engineering and Computer Science Texas A&M University-Kingsville Kingsville USA Dept. of Electrical Engineering Soongsil University Seoul Republic of Korea Dept. of Electrical Engineering and Computer Science University of Missour-Columbia Columbia USA Dept. of Electrical and Computer Engineering Clemson University Clemson USA Dept. of Electrical and Computer Engineering and Technology Minnesota State University Mankato Mankato USA
Adversarial machine learning (ML) attacks are stealthy attacks designed to mislead the ML model results. This paper explores adversarial ML attacks that generate adversarial noisy input data in an ML-based controller ... 详细信息
来源: 评论
Optimization of New Radio Physical Uplink Shared Channel Resources Allocation with Efficient Demodulated Referenced Signals and PT-RE Deployment
Optimization of New Radio Physical Uplink Shared Channel Res...
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Deepak Upadhyay Mridul Gupta Kunj Bihari Sharma Abhay Upadhyay Satya Prakash Yadav Dept. of Computer Science and Engineering Graphic Era Hill University Dehradun India Dept. of Electronics and Communication Engineering Graphic Era Deemed to be University Dehradun India Dept. of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India School of Computer Science Engineering and Technology Bennett University Greater Noida India
This paper explores the resource allocation optimisation of New Radio Physical Uplink Shared Channels with an emphasis on the effective implementation of Phase Tracking Reference Signals and Demodulation Reference Sig... 详细信息
来源: 评论