咨询与建议

限定检索结果

文献类型

  • 30,622 篇 会议
  • 4,949 篇 期刊文献
  • 249 册 图书

馆藏范围

  • 35,820 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,236 篇 工学
    • 15,832 篇 计算机科学与技术...
    • 13,323 篇 软件工程
    • 5,841 篇 信息与通信工程
    • 3,720 篇 控制科学与工程
    • 2,760 篇 电子科学与技术(可...
    • 2,753 篇 电气工程
    • 2,344 篇 生物工程
    • 1,883 篇 生物医学工程(可授...
    • 1,536 篇 光学工程
    • 1,446 篇 机械工程
    • 1,270 篇 动力工程及工程热...
    • 1,250 篇 仪器科学与技术
    • 1,048 篇 化学工程与技术
    • 859 篇 安全科学与工程
    • 747 篇 交通运输工程
  • 11,420 篇 理学
    • 6,202 篇 数学
    • 3,135 篇 物理学
    • 2,564 篇 生物学
    • 2,044 篇 统计学(可授理学、...
    • 1,408 篇 系统科学
    • 1,110 篇 化学
  • 5,667 篇 管理学
    • 3,349 篇 管理科学与工程(可...
    • 2,595 篇 图书情报与档案管...
    • 1,822 篇 工商管理
  • 1,586 篇 医学
    • 1,373 篇 临床医学
    • 1,280 篇 基础医学(可授医学...
    • 850 篇 药学(可授医学、理...
    • 655 篇 公共卫生与预防医...
  • 1,024 篇 法学
    • 825 篇 社会学
  • 646 篇 经济学
    • 646 篇 应用经济学
  • 497 篇 农学
  • 431 篇 教育学
  • 154 篇 文学
  • 81 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,041 篇 accuracy
  • 844 篇 feature extracti...
  • 814 篇 computational mo...
  • 689 篇 deep learning
  • 681 篇 computer science
  • 672 篇 training
  • 511 篇 support vector m...
  • 504 篇 real-time system...
  • 499 篇 machine learning
  • 443 篇 predictive model...
  • 404 篇 internet of thin...
  • 348 篇 computer archite...
  • 344 篇 data models
  • 329 篇 convolutional ne...
  • 321 篇 reliability
  • 313 篇 optimization
  • 290 篇 data mining
  • 277 篇 routing
  • 260 篇 wireless sensor ...
  • 247 篇 conferences

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 tno technical sc...
  • 66 篇 università di ca...
  • 66 篇 dept. of informa...
  • 65 篇 université de st...
  • 61 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 54 篇 school of automa...
  • 52 篇 leiden universit...
  • 49 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 45 篇 university würzb...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 79 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 68 篇 huang f.
  • 68 篇 dallier r.
  • 64 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 34,551 篇 英文
  • 810 篇 其他
  • 349 篇 中文
  • 57 篇 日文
  • 51 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Control Engineering and Computer Science"
35820 条 记 录,以下是441-450 订阅
排序:
From Pixels to Diagnosis: Convolutional Neural Networks in Tuberculosis Screening  6
From Pixels to Diagnosis: Convolutional Neural Networks in T...
收藏 引用
6th International Conference on Electrical engineering and Information and Communication Technology, ICEEICT 2024
作者: Zihan, Tanvir Mahtab Zami, Abduz Ahmed, Mohiuddin Islam, Rakibul Ahmed, Fahim Rajshahi University of Engineering & Technology Dept. of Computer Science & Engineering Rajshahi Bangladesh Uiu Dept. of Cse Dhaka Bangladesh
Tuberculosis (TB) is a chronic lung disease that constitutes one of the top 10 global causes of death. Timely and precise identification of TB is critical, as untreated cases can pose life-threatening risks. Tradition... 详细信息
来源: 评论
Automated Leukemia Diagnosis from Microscopic Blood Smear Images Using Adapted Inception V3
Automated Leukemia Diagnosis from Microscopic Blood Smear Im...
收藏 引用
2024 International Conference on Big Data Analytics in Bioinformatics, DABCon 2024
作者: Pujitha, M Vani Srikantam, Srinija Sahithi, Ch Timmasarti, Akhila Velagapudi Ramakrishna Siddhartha Engineering College Dept. of Computer Science and Engineering Vijayawada India
Leukemia, a cancer characterized by the rapid overproduction of abnormal blood cells, presents notable diagnostic and treatment challenges. Identifying leukemia subtypes promptly and accurately is vital for devising e... 详细信息
来源: 评论
Identifying Hacking Failures in the IaaS, PaaS, and SaaS Networks to Secure Cloud Applications  6
Identifying Hacking Failures in the IaaS, PaaS, and SaaS Net...
收藏 引用
6th Parul International Conference on engineering and Technology, PICET 2024
作者: Bhavsar, Rakesh Thakar, Vishvjit Dept. of Computer Science Engineering School of Engineering Indrashil University Gujarat Mahesana India
From small businesses to major corporations, Cloud computing is quickly taking over as the preferred platform. due to the obligation to guarantee that cloud apps are safe and can shield data from unauthorized attacker... 详细信息
来源: 评论
A 4x4 MIMO Antenna Array for the Wi-Fi7Access Point on a Metal Wall Application
A 4x4 MIMO Antenna Array for the Wi-Fi7Access Point on a Met...
收藏 引用
2024 International Symposium on Antennas and Propagation, ISAP 2024
作者: Su, Hsin-Lung Zhan, You-Sheng Dept. of Computer and Communication National Pingtung University Taiwan Dept. of Computer Science and Information Engineering National Pingtung University Taiwan
A 4×4 CPW MIMO Antenna array with an artificial magnetic conductor (AMC) reflector is presented for Wi-Fi7 access point on a metal wall application in the study. The 10-dB impedance of the integrated MIMO antenna... 详细信息
来源: 评论
Integration of Swarm Intelligence with KNN for Optimal Nearest Neighbors Value Prediction  9
Integration of Swarm Intelligence with KNN for Optimal Neare...
收藏 引用
9th IEEE International Conference on Electronics, Computing and Communication Technologies, CONECCT 2023
作者: Anchalia, Aniketh Kakati, Anirudh Patil, Ambika Bhavana, B.N. Paudel, Ankit Chaudhari, Shilpa Dept. of Computer Science and Engineering Bengaluru India
K-Nearest Neighbors (KNN), a simple and widely used algorithm, is extremely valuable in the field of machine learning models. Finding an optimal value of the nearest neighbor parameter in the KNN algorithm has been a ... 详细信息
来源: 评论
NextGen Dynamic Video Generator using AI  9
NextGen Dynamic Video Generator using AI
收藏 引用
9th IEEE International Conference on Smart Structures and Systems, ICSSS 2023
作者: Anitha, R. Kishore, N. Vijay Anand, M. Dept. of Computer Science and Engineering Chennai India
In an era marked by remarkable technological advancements, the way we create and share information has undergone a profound transformation. This paradigm shift is epitomized by the NextGen Dynamic Video Generator usin... 详细信息
来源: 评论
Advancements in User Security: Enhancing Usability with Graphical Password Authentication  2
Advancements in User Security: Enhancing Usability with Grap...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Harisha Naik, Sandhya Ramesh Vasudeva, Shettigar Sarvani Shrilakshmi, K. Kothwal, Vaishnavi Sahyadri College of Engineering & Management Dept. of Computer Science & Engineering Mangalore Karnataka India
Text-based password authentication is a common method used to verify the identity of users who are trying to access a secure system or service. In order to use this authentication method, the user must input a passwor... 详细信息
来源: 评论
Authentication and Authorization in Zero Trust IoT: A Survey  35
Authentication and Authorization in Zero Trust IoT: A Survey
收藏 引用
35th Irish Systems and Signals Conference, ISSC 2024
作者: James, Meha Newe, Thomas O'Shea, Donna O'Mahony, George D. Munster Technological University Dept. Computer Science Cork Ireland University of Limerick Dept. Electronic and Computer Engineering Limerick Ireland
A critical challenge in implementing Zero trust (ZT) in Internet of Things (IoT) environments is ensuring secure authentication and authorization mechanisms. The work in this article delves into the intricate realm of... 详细信息
来源: 评论
ML Assisted Web Application Firewall  12
ML Assisted Web Application Firewall
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Kalariya, Pranav Jethva, Manthan Alginahi, Yasser University of Windsor Electrical and Computer Engineering Dept. Windsor Canada Computer Science Dept. Adrian College MI United States
This study presents the development and implementation of a sophisticated Web Application Firewall (WAF) empowered by machine learning techniques to bolster cybersecurity measures. Traditional WAFs primarily rely on r... 详细信息
来源: 评论
Comparing Developmental Approaches for Game-Based Learning in Cyber-Security Campaigns  1
Comparing Developmental Approaches for Game-Based Learning i...
收藏 引用
1st IEEE International Conference on Contemporary Computing and Communications, InC4 2023
作者: Sreehari, S. Gokulapriya, R. Dept. of Computer Science and Engineering Bangalore India
Digital game-based learning (DGBL) has been viewed as an effective teaching strategy that encourages students to pick up and learn a subject. This paper explores its viability to help increase the reach and efficiency... 详细信息
来源: 评论