咨询与建议

限定检索结果

文献类型

  • 6,061 篇 会议
  • 909 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 7,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,443 篇 工学
    • 3,471 篇 计算机科学与技术...
    • 2,907 篇 软件工程
    • 1,321 篇 信息与通信工程
    • 672 篇 控制科学与工程
    • 478 篇 生物工程
    • 436 篇 电气工程
    • 434 篇 电子科学与技术(可...
    • 329 篇 生物医学工程(可授...
    • 305 篇 光学工程
    • 271 篇 机械工程
    • 233 篇 仪器科学与技术
    • 211 篇 动力工程及工程热...
    • 170 篇 化学工程与技术
    • 160 篇 安全科学与工程
    • 159 篇 交通运输工程
    • 132 篇 建筑学
  • 2,121 篇 理学
    • 1,192 篇 数学
    • 539 篇 物理学
    • 496 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 242 篇 系统科学
    • 163 篇 化学
  • 1,165 篇 管理学
    • 697 篇 管理科学与工程(可...
    • 517 篇 图书情报与档案管...
    • 356 篇 工商管理
  • 294 篇 医学
    • 256 篇 临床医学
    • 234 篇 基础医学(可授医学...
    • 141 篇 公共卫生与预防医...
    • 141 篇 药学(可授医学、理...
  • 200 篇 法学
    • 149 篇 社会学
  • 145 篇 农学
  • 117 篇 教育学
  • 109 篇 经济学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 197 篇 accuracy
  • 190 篇 feature extracti...
  • 154 篇 computational mo...
  • 145 篇 training
  • 115 篇 computer science
  • 114 篇 deep learning
  • 111 篇 real-time system...
  • 105 篇 data mining
  • 101 篇 support vector m...
  • 95 篇 servers
  • 94 篇 predictive model...
  • 93 篇 machine learning
  • 87 篇 artificial intel...
  • 84 篇 data models
  • 83 篇 cloud computing
  • 82 篇 internet of thin...
  • 81 篇 protocols
  • 79 篇 semantics
  • 78 篇 computer archite...
  • 78 篇 quality of servi...

机构

  • 115 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 41 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 28 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 graduate institu...
  • 22 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 19 篇 dept. of informa...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...

作者

  • 46 篇 lorenzo bruzzone
  • 25 篇 li kuan-ching
  • 22 篇 jian-jhih kuo
  • 20 篇 libertario demi
  • 20 篇 yen-lin chen
  • 19 篇 ren-hung hwang
  • 18 篇 mei-hui wang
  • 18 篇 chen yen-lin
  • 18 篇 luca turchet
  • 16 篇 francesca bovolo
  • 16 篇 chang-shing lee
  • 16 篇 hwang ren-hung
  • 15 篇 kwon soonhak
  • 15 篇 jia-ching wang
  • 15 篇 hung yi-ping
  • 14 篇 lee yue-shi
  • 14 篇 bae hae-young
  • 13 篇 horng shi-jinn
  • 13 篇 watabe hirokazu
  • 13 篇 wu eric hsiao-ku...

语言

  • 6,733 篇 英文
  • 224 篇 其他
  • 60 篇 中文
  • 19 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Information Engineering"
7042 条 记 录,以下是271-280 订阅
排序:
On-Demand Recharge Scheduling Algorithm in Wireless Sensor Networks
On-Demand Recharge Scheduling Algorithm in Wireless Sensor N...
收藏 引用
2022 International Conference on Electronic Systems and Intelligent Computing, ICESIC 2022
作者: Dande, Bhargavi Chang, Chih-Yung Su, Ming-Yang Fan, Cheng-De Tamkang University Dept. of Computer Science and Information Engineering New Taipei City Taiwan Ming Chuan University Dept. of Computer Science and Information Engineering Taoyuan Taiwan
In recent years, energy transfer technology provides a new opportunity for recharging the sensors using the mobile charger. Most of the studies proposed recharging algorithms using a single charger but overlooked the ... 详细信息
来源: 评论
Malaria Detection Using Neural Network
Malaria Detection Using Neural Network
收藏 引用
2023 Intelligent Computing and Control for engineering and Business Systems, ICCEBS 2023
作者: Kavitha, P. Manimala, G. Sanchana, R. Anushree, U. Rmk Engineering College Department of Computer Science and Engineering India Sri Sairam Engineering College Department of Computer Science and Engineering India Sri Sairam Institute of Technology Dept. of Information Technology India
Malaria is a serious and occasionally fatal disease brought on by a parasite that frequently infects a particular species of mosquito that feeds on people. Malaria frequently results in severe illness in its victims, ... 详细信息
来源: 评论
Investigating the Impact of Heuristic Algorithms on Cyberthreat Detection  2
Investigating the Impact of Heuristic Algorithms on Cyberthr...
收藏 引用
2nd International Conference on Advances in Computation, Communication and information Technology, ICAICCIT 2024
作者: Kalla, Dinesh Mohammed, Abdul Sajid Boddapati, Venkata Nagesh Jiwani, Nasmin Kiruthiga, T. Dept. of Computer Science Colorado Technical University CharlotteNC United States Dept of School of Computer and Information Sciences University of the Cumberlands Kentucky United States Dept. of Computer Science Microsoft CharlotteNC United States Dept. of Information Technology University of The Cumberlands WilliamsburgKY United States Department of ECE Vetri Vinayaha College of Engineering and Technology Tamil Nadu Trichy India
This paper investigates the effect of heuristic algorithms on cybersecurity hazard detection and mitigation. To be able to do so, the authors analyze the performance of two heuristics-based algorithms-the simple Heuri... 详细信息
来源: 评论
A Sentiment Analysis Study of Twitter Users' Reactions to the COVID-19 Vaccine  14
A Sentiment Analysis Study of Twitter Users' Reactions to th...
收藏 引用
14th International Conference on information and Communication Systems, ICICS 2023
作者: Alkhushayni, Suboh Alomari, Zakaria Al-Zaleq, Du'a Yarmouk University Faculty of Information Technology and Computer Science Dept. Information Systems Irbid Jordan New York Institute of Technology Dept. Computer Science VancouverBC Canada Al-Ahliyya Amman University Dept. Robotics and Artificial Intelligence Engineering Amman Jordan
This study investigates public attitudes towards the COVID-19 vaccine through Twitter data analysis. Using the Twitter API, tweets were collected, preprocessed, and labeled. Features were extracted using the Bag of Wo... 详细信息
来源: 评论
High-Speed Secure Vanity Address Generator for User Convenience in Blockchain Networks  5
High-Speed Secure Vanity Address Generator for User Convenie...
收藏 引用
5th International Conference on Blockchain Computing and Applications, BCCA 2023
作者: Islam, Md. Mainul Islam, Md. Kamrul Hammoudeh, Mohammad Texas A&M University Dept. of Computer Science and Engineering College Station United States Shahjalal University of Science and Technology Dept. of Electrical and Electronic Engineering Sylhet Bangladesh King Fahd University of Petroleum and Minerals Dept. of Information and Computer Science Dhahran Saudi Arabia
Generating a vanity address (VA) for user convenience in blockchain networks is a memoryless brute-force exercise that involves testing millions of probable private keys. It requires a high-speed processor to compute ... 详细信息
来源: 评论
Power Quality Problems that Occur at a Company Producing Electrical Equipment
Power Quality Problems that Occur at a Company Producing Ele...
收藏 引用
2023 Power Quality and Electromagnetic Compatibility at Low-Frequency, PQEMC-LF 2023
作者: Nicolae, Petre-Marian Nicolae, Ileana-Diana Nicolae, Marian-Stefan University of Craiova Electrical Engineering Energetic and Aeronautics Dept. Craiova Romania University of Craiova Computer Science and Information Technology Dept. Craiova Romania
The paper presents the problems that arise when supplying a company producing electrical equipment from the electricity network. The distorting regimes that appear affect the operation of the electric power network, i... 详细信息
来源: 评论
Advancing Low Resource Natural Language Processing: Techniques, Applications, and Future Directions  2
Advancing Low Resource Natural Language Processing: Techniqu...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Middha, Parth Agarwal, Harshit Rajput, Vaibhav Thakur, Ayush Singh, Sofia Saraswat, Shipra Amity University Dept. of Computer Science & Engineering Noida India Amity Institute of Information Technology Amity University Noida India Amity University Dept. of Artificial Intelligence Noida India
This paper explores the development and application of low resource Natural Language Processing (NLP) modules, addressing the challenges of processing underrepresented languages and domains with limited linguistic res... 详细信息
来源: 评论
Computing and Analysing PQ Indices for a Consumer with Various Sources of Harmonics and Non-symmetries
Computing and Analysing PQ Indices for a Consumer with Vario...
收藏 引用
2023 Power Quality and Electromagnetic Compatibility at Low-Frequency, PQEMC-LF 2023
作者: Nicolae, Ileana - Diana Nicolae, Petre - Marian Cirstea, Daniel-Nicolae University of Craiova Computer Science and Information Technology Dept. Craiova Romania University of Craiova Electrical Engineering Energetic and Aeronautics Dept. Craiova Romania
The paper presents a detailed analysis of certain operating regimes that appear for a consumer with various sources of harmonics and non-symmetries. The analyzed waveforms were acquired with a portable dedicated data ... 详细信息
来源: 评论
About Measurement System in Stations and Substations using Original Data Acquisition Systems
About Measurement System in Stations and Substations using O...
收藏 引用
2023 Power Quality and Electromagnetic Compatibility at Low-Frequency, PQEMC-LF 2023
作者: Nicolae, Ileana-Diana Nicolae, Petre n Marian Nicolae, Marian-Stefan University of Craiova Computer Science and Information Technology Dept. Craiova Romania University of Craiova Electrical Engineering Energetic and Aeronautics Dept. Craiova Romania
The paper deals with a method and measurement system designed for the simultaneous monitoring and recording of time variations of electric quantities with no inter-correlation requirements. The method and measurement ... 详细信息
来源: 评论
Energy Efficient Coverage Optimization in Mobile Wireless Sensor Network Using Grey Wolf Algorithm  14
Energy Efficient Coverage Optimization in Mobile Wireless Se...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Gupta, Ankit Mamatha, K.M. Kiran, M. National Institute of Technology Karnataka Dept. of Information Technology Surathkal India Viseveshvaraya Technological University Dept. of Computer Science and Engineering Belgaum India
The issue of decreased coverage rate in Mobile Wireless Sensor Networks (MWSNs), caused by mobile sensor nodes being randomly placed inside a monitoring area. Additionally, it becomes extremely important to utilise a ... 详细信息
来源: 评论