咨询与建议

限定检索结果

文献类型

  • 2,011 篇 会议
  • 500 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,601 篇 工学
    • 982 篇 计算机科学与技术...
    • 825 篇 软件工程
    • 335 篇 信息与通信工程
    • 284 篇 控制科学与工程
    • 224 篇 电气工程
    • 223 篇 电子科学与技术(可...
    • 144 篇 仪器科学与技术
    • 137 篇 生物医学工程(可授...
    • 134 篇 生物工程
    • 125 篇 光学工程
    • 101 篇 机械工程
    • 93 篇 动力工程及工程热...
    • 82 篇 化学工程与技术
    • 69 篇 建筑学
    • 63 篇 航空宇航科学与技...
    • 60 篇 材料科学与工程(可...
  • 910 篇 理学
    • 477 篇 数学
    • 282 篇 物理学
    • 159 篇 生物学
    • 136 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 104 篇 化学
    • 85 篇 地球物理学
  • 394 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 166 篇 工商管理
    • 140 篇 图书情报与档案管...
  • 128 篇 医学
    • 112 篇 临床医学
    • 101 篇 基础医学(可授医学...
    • 65 篇 药学(可授医学、理...
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 60 篇 法学
  • 40 篇 教育学
  • 24 篇 农学
  • 6 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 62 篇 accuracy
  • 45 篇 training
  • 44 篇 optimization
  • 43 篇 computational mo...
  • 35 篇 feature extracti...
  • 33 篇 predictive model...
  • 32 篇 computer archite...
  • 32 篇 software
  • 32 篇 artificial intel...
  • 31 篇 neural networks
  • 30 篇 machine learning
  • 29 篇 internet of thin...
  • 26 篇 costs
  • 25 篇 servers
  • 24 篇 support vector m...
  • 24 篇 hardware
  • 24 篇 estimation
  • 23 篇 computer science
  • 23 篇 neutrons
  • 23 篇 real-time system...

机构

  • 89 篇 infn sezione di ...
  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 87 篇 infn sezione di ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 85 篇 infn sezione di ...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 80 篇 university moham...
  • 80 篇 università la sa...
  • 79 篇 western sydney u...
  • 76 篇 infn sezione di ...
  • 73 篇 università di sa...
  • 70 篇 university of am...
  • 69 篇 tbilisi state un...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 93 篇 brunner j.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 91 篇 di palma i.
  • 90 篇 coniglione r.
  • 89 篇 calvo d.
  • 89 篇 eberl t.
  • 87 篇 bendahman m.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 83 篇 gozzini s.r.
  • 83 篇 dallier r.
  • 83 篇 carretero v.

语言

  • 2,287 篇 英文
  • 222 篇 其他
  • 25 篇 日文
  • 17 篇 中文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Systems Architecture and Technology"
2553 条 记 录,以下是101-110 订阅
排序:
Dataset Construction and Classification Based on Pre-trained Models for Opinion Holder Detection  12
Dataset Construction and Classification Based on Pre-trained...
收藏 引用
12th International Congress on Advanced Applied Informatics, IIAI-AAI 2022
作者: Al-Mahmud, Al Shimada, Kazutaka Kyushu Institute of Technology Dept. of Computer Science and Systems Engineering Fukuoka850-8502 Japan
Nowadays, it is getting increased in the massive amount of internet users. People express subjective thinking (i.e., opinion) implicitly and explicitly on online platforms such as Facebook, Twitter, Amazon product rev... 详细信息
来源: 评论
Understanding Statistical Correlation of Application Security Vulnerability Data from Detection and Monitoring Tools  33
Understanding Statistical Correlation of Application Securit...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Kasturi, Santanam Li, Xiaolong Pickard, John Li, Peng Indiana State University Technology Management Terre Haute United States Indiana State University Dept. of Electronics and Computer Engineering Terre Haute United States East Carolina University Dept. of Technology Sys Greenville United States East Carolina University Dept. of Technology Systems Greenville United States
Vulnerability data gathered from multiple detection and monitoring capabilities at different layers of an application using a time-series analysis will provide value and insights by doing a statistical correlation wit... 详细信息
来源: 评论
Current Vector Control of AC Servo Motor Considering Output Delay of PWM Inverter
Current Vector Control of AC Servo Motor Considering Output ...
收藏 引用
18th IEEE International Conference on Advanced Motion Control, AMC 2024
作者: Shimamoto, Haruta Yoshioka, Takashi Urushihara, Shiro National Institute of Technology Kagawa College Advanced Course in Industrial and Systems Engineering Takamatsu Japan National Institute of Technology Kagawa College Dept. of Electrical and Computer Engineering Takamatsu Japan
In this paper, to expand a control bandwidth of AC servo motor, a new current vector control considering an output delay of PWM Inverter is proposed. The proposed current control is a I-P control with an additional fe... 详细信息
来源: 评论
Content based Image Retrieval using K-Nearest Neighbours and Convolutional Neural Networks  15
Content based Image Retrieval using K-Nearest Neighbours and...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Kumar, C. Siva Bhaskaru, O. Komatlapalli, Bhargavi Areddula, Phani Sai Kumar Maddali, Manikanta Reddy, Busa Rajasekhar Tirupati India Dept. of CSE Gates Institute of Technology Gooty A.P Ananthapur India Department of Computer Science and Systems Engineering Sree Vidyanikethan Engineering College Tirupati India
Today, there is a lot of digital image material on the Internet. As the need for better image search tools grows, new waysmust be found to solve the problem of telling the difference betweenquestion pictures and recei... 详细信息
来源: 评论
Aqua Safe: Blockchain Based Maritime Communication System using Ad hoc Network  13
Aqua Safe: Blockchain Based Maritime Communication System us...
收藏 引用
13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022
作者: Lokuliyana, Shashika Wellalage, Sasini Warusavithana, Lahiru Pathirana, Madusha Kodithuwakku, Sanjula Munasinghe, Thamali Sri Lanka Institute of Information Technology Dept. of Computer Systems Engineering Malabe Sri Lanka
The lack of a pre-existing infrastructure for facilitating long-range connectivity with the land makes maritime communications extremely difficult. Satellite connections, which are expensive, and use much power, are g... 详细信息
来源: 评论
Blockchain and Artificial Intelligence Feasibility, Implementation and Sustainability in Supply Chain  8
Blockchain and Artificial Intelligence Feasibility, Implemen...
收藏 引用
8th International Conference on Advanced Computing and Communication systems, ICACCS 2022
作者: Moorthy, Srihari Balakrishanan, S. Nithish, K. Rahfar Nisha, R. Rohith, M.R.C. Sri Krishna College of Engineering and Technology Dept. of Computer Science and Business Systems Coimbatore India
This paper aims to study the current deficits in the supply chain and logistics industry and how cutting-edge technologies will be able to solve the problems. Ideas such as blockchains are being used for integrity &am... 详细信息
来源: 评论
Modelling Weave effect in PCBs using 2D cross-sectional analysis
Modelling Weave effect in PCBs using 2D cross-sectional anal...
收藏 引用
2024 IEEE International Symposium on Electromagnetic Compatibility, Signal and Power Integrity, EMC+SIPI 2024
作者: Khilkevich, Victor Hinaga, Scott Missouri University of Science and Technology Dept. of Electrical and Computer Engineering Electromagnetic Compatibility Laboratory RollaMO United States Cisco Systems Inc San JoseCA United States
Printed circuit board dielectric substrates are composite materials produced by embedding fiber glass fabrics into epoxy resin. Because of this the medium in the PCB transmission lines is inhomogeneous which often lea... 详细信息
来源: 评论
Network-based Intrusion Detection Datasets: A Survey  23
Network-based Intrusion Detection Datasets: A Survey
收藏 引用
23rd International Arab Conference on Information technology, ACIT 2022
作者: Ahmed, Lubna Ali Hassan Hamad, Yahia Abdalla Mohamed Abdalla, Ahmed Abdallah Mohamed Ali Sudan University of Science and Technology Dept. of Electronics Engineering Khartoum Sudan Sudan University of Science and Technology Dept. of Computer Networks and Systems Khartoum Sudan
The increasing reliance on computers and the internet has increased the need for protection against attacks and security threats. A network-based intrusion detection system (NIDS) is one of the promising research fiel... 详细信息
来源: 评论
Enhancing Eye Health Diagnosis through Deep Transfer Learning: Unveiling Insights from Low Quality Fundus Images
Enhancing Eye Health Diagnosis through Deep Transfer Learnin...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Sathishkumar, R. Karthikeyan, T. Kumar, P. Praveen Rengarajan, Chitra Tharagesh, A. Govindarajan, M. Manakula Vinayagar Institute of Technology Dept. of Cse Puducherry India Sri Manakula Vinayagar Engineering College Dept. of Computer Science and Business Systems Puducherry India Sri Manakula Vinayagar Engineering College Dept. of Information Technology Puducherry India Tamil Nadu Agricultural University Centre for Agricultural Nanotechnology Tamil Nadu India Annamalai University Dept. of Cse Tamil Nadu Chidambaram India
Due to the frequency of eye illnesses, effective and precise diagnostic instruments are required. This work suggests an approach that uses low quality fundus images with deep transfer learning more precisely, the Effi... 详细信息
来源: 评论
Understanding the Quantum Teleportation Protocol
Understanding the Quantum Teleportation Protocol
收藏 引用
2023 Congress in computer Science, computer Engineering, and Applied Computing, CSCE 2023
作者: Spranger, Kurt T. Grimaila, Michael R. Hodson, Douglas D. Air Force Institute of Technology Dept. of Systems Engineering and Mgmt. Wright-Patterson AFBOH United States Air Force Institute of Technology Dept. of Electrical & Computer Engineering Wright-Patterson AFBOH United States
Decomposing a complex system into smaller abstract functional blocks and developing mathematical models to represent their behavior is an important activity towards developing comprehensive system understanding. In th... 详细信息
来源: 评论