咨询与建议

限定检索结果

文献类型

  • 480 篇 会议
  • 77 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 567 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 346 篇 工学
    • 280 篇 计算机科学与技术...
    • 242 篇 软件工程
    • 109 篇 信息与通信工程
    • 52 篇 控制科学与工程
    • 37 篇 电气工程
    • 33 篇 生物工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 安全科学与工程
    • 20 篇 动力工程及工程热...
    • 20 篇 交通运输工程
    • 18 篇 生物医学工程(可授...
    • 16 篇 机械工程
    • 13 篇 网络空间安全
    • 10 篇 光学工程
    • 10 篇 仪器科学与技术
    • 10 篇 建筑学
  • 141 篇 理学
    • 81 篇 数学
    • 37 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 25 篇 系统科学
    • 11 篇 化学
  • 97 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 36 篇 工商管理
  • 26 篇 法学
    • 18 篇 社会学
  • 21 篇 医学
    • 19 篇 临床医学
    • 18 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 教育学
  • 4 篇 农学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 19 篇 security
  • 15 篇 real-time system...
  • 14 篇 computational mo...
  • 14 篇 protocols
  • 14 篇 accuracy
  • 13 篇 training
  • 13 篇 convolutional ne...
  • 12 篇 authentication
  • 12 篇 feature extracti...
  • 11 篇 wireless sensor ...
  • 10 篇 neural networks
  • 10 篇 machine learning
  • 10 篇 artificial intel...
  • 9 篇 optimization
  • 9 篇 data mining
  • 9 篇 servers
  • 9 篇 data models
  • 8 篇 deep learning
  • 8 篇 wireless communi...
  • 8 篇 predictive model...

机构

  • 6 篇 dept. of automat...
  • 6 篇 ufa state aviati...
  • 6 篇 dept. of softwar...
  • 5 篇 dept. of automat...
  • 4 篇 dept. of compute...
  • 4 篇 dept. of compute...
  • 4 篇 networking and i...
  • 4 篇 cyber security s...
  • 4 篇 dept. of informa...
  • 4 篇 dept. of compute...
  • 4 篇 sri lanka instit...
  • 3 篇 dept. of electri...
  • 3 篇 the hashemite un...
  • 3 篇 dept. of compute...
  • 3 篇 dept. of compute...
  • 3 篇 national univers...
  • 3 篇 dept. of digital...
  • 3 篇 dept. of compute...
  • 3 篇 saic motor ai la...
  • 3 篇 max planck insti...

作者

  • 7 篇 vulfin alexey
  • 6 篇 nikumani choudhu...
  • 5 篇 xi zhang
  • 5 篇 nataliia zaiets
  • 5 篇 lidiia vlasenko
  • 5 篇 nataliia lutska
  • 5 篇 farkas csilla
  • 5 篇 jong-hyouk lee
  • 4 篇 wijesekera dumin...
  • 4 篇 chen bing
  • 4 篇 vlasenko lidiia
  • 4 篇 lee jong-hyouk
  • 4 篇 sarantoglou geor...
  • 4 篇 zaiets nataliia
  • 4 篇 v. sreejith
  • 4 篇 weng jian
  • 4 篇 lutska nataliia
  • 4 篇 lee hoon jae
  • 4 篇 koushik reddy ch...
  • 4 篇 mesaritakis char...

语言

  • 543 篇 英文
  • 21 篇 其他
  • 2 篇 中文
  • 1 篇 日文
检索条件"机构=Dept. of Computer and Network Engineering Dept. of Information Systems and Security"
567 条 记 录,以下是221-230 订阅
排序:
Generation of Chinese classical poetry based on pretrained model
Generation of Chinese classical poetry based on pretrained m...
收藏 引用
Big Data, information and computer network (BDICN), International Conference on
作者: Ziyao Wang Lujin Guan Guanyu Liu Jun Ma dept. School of Information Science and Engineering Lanzhou University Lanzhou Gansu China College Of Life Science Technology Huazhong University line Of Science And Technology Wuhan Hubei China School of Computer and Cyberspace Security Communication University of China Beijing China
Chinese traditional poetry is an important art form, and it is a meaningful task to use artificial intelligence algorithm to generate poetry. In the past, researchers have proposed different generation algorithms, but... 详细信息
来源: 评论
Understanding the Robustness of 3D Object Detection with Bird'View Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bir...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition, CVPR 2023
作者: Zhu, Zijian Zhang, Yichi Chen, Hai Dong, Yinpeng Zhao, Shu Ding, Wenbo Zhong, Jiachen Zheng, Shibao Institute of Image Communication and Network Engineering Shanghai Jiao Tong University China Institute for Ai Tsinghua University BNRist Center Thbi Lab Dept. of Comp. Sci. and Tech. China School of Computer Science and Technology Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Information Materials and Intelligent Sensing Laboratory of Anhui Province China Saic Motor Ai Lab Zhongguancun Laboratory China
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird's-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with ... 详细信息
来源: 评论
Improving the Efficiency of a Multistage Evaporator Station for Sugar Production Using Neural networks
Improving the Efficiency of a Multistage Evaporator Station ...
收藏 引用
International Conference on Modern Electrical and Energy systems (MEES)
作者: Nataliia Zaiets Nataliia Lutska Lidiia Vlasenko det. of Automation and Robotic Systems National University of Life and Environmental Sciences of Ukraine Kyiv Ukraine dept. of Automation and Computer Technologies of Control Systems National University of Food Technologies Kyiv Ukraine dept. of Software Engineering and Cyber Security State University of Trade and Economics Kyiv Ukraine
The paper shows the process of developing a model of multistage evaporator station of a sugar factory based on a neural network. The neural network predicts the main performance indicators of the multistage evaporator... 详细信息
来源: 评论
Modular Structure of the Intelligent Oil Production Equipment Control Station  2
Modular Structure of the Intelligent Oil Production Equipmen...
收藏 引用
2nd International Conference on Control systems, Mathematical Modeling, Automation and Energy Efficiency, SUMMA 2020
作者: Tagirova, Clara Gladkih, Alexey Bakiev, Damir Vulfin, Alexey Ufa State Aviation Technical University Dept. of Technical Cynernetics Ufa Russia Ufa State Aviation Technical University Dept. of Computer Engineering and Information Security Ufa Russia
A promising approach to the construction of an intelligent control station for a bore-hole sucker rod pump unit is presented. The approach is based on the decomposition of each specific control station of various manu... 详细信息
来源: 评论
Enhancing Cyber-Physical systems Resilience: Adaptive Self-Healing security Using Long Short-Term Memory networks
Enhancing Cyber-Physical Systems Resilience: Adaptive Self-H...
收藏 引用
Advances in Computing, Communication and Applied Informatics (ACCAI), International Conference on
作者: Franciskus Antonius Alijoyo Chamandeep Kaur Afsana Anjum Veera Ankalu Vuyyuru B Kiran Bala School of Business and Information Technology STMIK LIKMI Bandung Indonesia Department of Computer Science & Information Technology Jazan University Jizan Kingdom of Saudi Arabia Dept. Of Information technology Security Jazan University Jazan Saudi Arabia Department of CSE Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of AI & DS K. Ramakrishnan College of Engineering Trichy India
Cyber-Physical systems (CPS) form the backbone of critical infrastructures, integrating computational and physical processes to enhance efficiency and automation. However, the increasing interconnectivity exposes thes... 详细信息
来源: 评论
Blockchain Integration for Robust Intellectual Property Protection in New Product Development (NPD)
Blockchain Integration for Robust Intellectual Property Prot...
收藏 引用
Electronics and Renewable systems (ICEARS), International Conference on
作者: P. Chinnasamy Subashini. B Nijanthan Nijanthan Madasamy Raja. G Devulapally Swetha Sreenivasulu Reddy L Department of Computer Science and Engineering School of Computing Kalasalingam Academy of Research and Education Tamilnadu India Department of Data Science and Business Systems School of Computing SRMIST India Computer Science and Engineering Paavai Engineering College Namakkal Tamilnadu India Information Technology Paavai Engineering College Namakkal Tamilnadu India Dept. of Computer Science and Engineering Vaagdevi Engineering College Telangana India Department of Mathematics School of Advanced Sciences Kalasalingam Academy of Research and Education Krishnankoil Tamilnadu India
The rapid advancement of Blockchain technology has led to its widespread application in several domains of digital activities, such as e-government concerns and monetary security. This article presents a smart contrac... 详细信息
来源: 评论
Machine Learning for Climate Change Impact Assessment and Adaptation Planning
Machine Learning for Climate Change Impact Assessment and Ad...
收藏 引用
Trends in Quantum Computing and Emerging Business Technologies (TQCEBT), International Conference on
作者: T. Suresh Balakrishnan Prabhakar Krishnan U. Samson Ebenezar M. Mohammed Nizarudeen N. Kamal Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Center for Cyber Security Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri-Campus India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai Tamil Nadu India Department of Computer Science and Engineering CARE College of Engineering Trichy Tamil Nadu Dept. of Computer Science and Engineering GRT Institute of Engineering and Technology Tiruttani Tamil Nadu India
The presented research introduces a new advanced data analytics methodology for climate change impact assessment and adaptive planning that utilizes machine learning and deep-learning techniques. Quantitative analysis... 详细信息
来源: 评论
IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs
IB-RPL: Embedding Isolation and Blacklisting of Malicious No...
收藏 引用
International Symposium on Advanced networks and Telecommunication systems (ANTS)
作者: Rashmi Sahay G Geethakumari Barsha Mitra Dept. of Computer Science and Engineering IcfaiTech The Icfai Foundation for Higher Education Hyderabad India Dept. of Computer Science and Information Systems BITS-Pilani Hyderabad India
The constrained characteristics of devices in the Internet of Things (IoT) environment deters the implementation of robust security solutions. Consequently, intrusion of malicious nodes in IoT environment is a frequen... 详细信息
来源: 评论
Digital Map Generation Workflow Demonstrated on ZalaZONE Automotive Proving Ground Elements
Digital Map Generation Workflow Demonstrated on ZalaZONE Aut...
收藏 引用
IEEE Symposium on network Operations and Management
作者: Árpád Somogyi Tamás Tettamanti Pál Varga Zsolt Szalay Dániel Baranyai Tamás Lovas Dept. of Photogrammetry and Geoinformatics Fac. of Civil Engineering Budapest University of Technology and Economics Budapest Hungary Systems and Control Laboratory Institute for Computer Science and Control of the Eötvös Loránd Research Network Budapest Hungary Dept. of Telecommunications and Media Informatics Fac. of Electrical Engineering and Informatics Budapest University of Technology and Economics Budapest Hungary Dept. of Automotive Technologies Fac. of Transportation Eng. and Vehicle Eng. Budapest University of Technology and Economics Budapest Hungary
One major goal of digital twin technology applied in the Architecture, engineering, and Construction (AEC) Industry is the mapping of roads and road environments with their associated information. Such digital twins c...
来源: 评论
TPM, a pattern for an architecture for trusted computing  20
TPM, a pattern for an architecture for trusted computing
收藏 引用
2020 European Conference on Pattern Languages of Programs, EuroPLoP 2020
作者: Muñoz, Antonio Fernandez, Eduardo B. Network Information and Computer Security Lab University of Malaga Malaga Spain Dept. of Computer and Electrical Eng. and Computer Science Florida Atlantic University Boca RatonFL United States
Trusted Computing (TC) is a valuable technology to use when we need to process highly sensitive data and several variants of it are now available. We present here a pattern that describes the architecture of a standar... 详细信息
来源: 评论