咨询与建议

限定检索结果

文献类型

  • 13,112 篇 会议
  • 7,020 篇 期刊文献
  • 349 册 图书

馆藏范围

  • 20,481 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,705 篇 工学
    • 8,187 篇 计算机科学与技术...
    • 6,689 篇 软件工程
    • 2,771 篇 信息与通信工程
    • 1,708 篇 控制科学与工程
    • 1,542 篇 生物工程
    • 1,487 篇 生物医学工程(可授...
    • 1,273 篇 电气工程
    • 1,142 篇 电子科学与技术(可...
    • 981 篇 光学工程
    • 777 篇 机械工程
    • 649 篇 仪器科学与技术
    • 522 篇 化学工程与技术
    • 476 篇 动力工程及工程热...
    • 410 篇 安全科学与工程
    • 378 篇 交通运输工程
    • 357 篇 建筑学
  • 7,135 篇 理学
    • 3,429 篇 数学
    • 2,375 篇 物理学
    • 1,760 篇 生物学
    • 1,121 篇 统计学(可授理学、...
    • 793 篇 系统科学
    • 584 篇 化学
  • 3,190 篇 管理学
    • 1,836 篇 管理科学与工程(可...
    • 1,527 篇 图书情报与档案管...
    • 983 篇 工商管理
  • 1,426 篇 医学
    • 1,223 篇 临床医学
    • 1,109 篇 基础医学(可授医学...
    • 718 篇 药学(可授医学、理...
    • 512 篇 公共卫生与预防医...
  • 539 篇 法学
    • 449 篇 社会学
  • 319 篇 经济学
  • 288 篇 教育学
  • 265 篇 农学
  • 61 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 295 篇 computational mo...
  • 285 篇 deep learning
  • 277 篇 computer archite...
  • 253 篇 computer science
  • 233 篇 machine learning
  • 213 篇 data mining
  • 205 篇 image segmentati...
  • 203 篇 training
  • 196 篇 internet of thin...
  • 194 篇 feature extracti...
  • 187 篇 accuracy
  • 186 篇 artificial intel...
  • 185 篇 support vector m...
  • 185 篇 optimization
  • 158 篇 neural networks
  • 156 篇 quality of servi...
  • 149 篇 bandwidth
  • 148 篇 monitoring
  • 135 篇 application soft...

机构

  • 416 篇 department for p...
  • 410 篇 faculty of scien...
  • 404 篇 department of ph...
  • 391 篇 kirchhoff-instit...
  • 386 篇 department of ph...
  • 385 篇 department of ph...
  • 349 篇 fakultät für phy...
  • 325 篇 institute of phy...
  • 307 篇 institute of phy...
  • 306 篇 department of ph...
  • 281 篇 department of ph...
  • 274 篇 instituto de fís...
  • 273 篇 universidade fed...
  • 272 篇 department of ph...
  • 267 篇 graduate school ...
  • 267 篇 ictp trieste
  • 253 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 250 篇 nikhef national ...
  • 248 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 332 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 305 篇 s. guindon
  • 301 篇 y. tayalati
  • 291 篇 a. kaczmarska
  • 284 篇 m. klein
  • 269 篇 j. schaarschmidt
  • 261 篇 f. pastore
  • 253 篇 n. orlando

语言

  • 17,672 篇 英文
  • 2,664 篇 其他
  • 148 篇 中文
  • 18 篇 日文
  • 9 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 朝鲜文
检索条件"机构=Informatics and Computer Engineering"
20481 条 记 录,以下是361-370 订阅
排序:
Decentralized control in active distribution grids via supervised and reinforcement learning
收藏 引用
Energy and AI 2024年 第2期16卷 137-149页
作者: Stavros Karagiannopoulos Petros Aristidou Gabriela Hug Audun Botterud Laboratory for Information and Decision Systems(LIDS) Massachusetts Institute of TechnologyCambridgeUSA EEH-Power Systems Laboratory ETH Zurichhysikstrasse 38092 ZurichSwitzerland Department of Electrical Engineering Computer Engineering&InformaticsCyprus
While moving towards a low-carbon, sustainable electricity system, distribution networks are expected to host a large share of distributed generators, such as photovoltaic units and wind turbines. These inverter-based... 详细信息
来源: 评论
Hand Sign Detection and Voice Conversion for the Hearing and Speech Impaired Using Convolutional Neural Networks  4th
Hand Sign Detection and Voice Conversion for the Hearing and...
收藏 引用
4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, ICMISC 2023
作者: Belgaum, Mohammad Riyaz Sowmya, Kurni Sireesha, Kuruva Priyanka, Tatagari Tony Vyshnavi, Uppara Uravakonda Department of Computer Science and Engineering G. Pullaiah College of Engineering and Technology Kurnool India Faculty of Computing and Informatics Multimedia University Cyberjaya Malaysia
Sign Language Recognition (SLR) tries to convert sign language into written or spoken form to enable communication between a deaf-mute person and a normal person. The task of communicating with disabled and impaired p... 详细信息
来源: 评论
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM  3rd
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Khaleel, Thura Jabbar Shiltagh, Nadia Adnan Iraqi Commission for Computers and Information/Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Engineering Department College of Engineering University of Baghdad Baghdad Iraq
Protecting software-defined networking (SDN) against cyber-attacks has become crucial in an expanding digital threat environment. Distributed Denial-of-Service (DDoS) attacks are risky since they may seriously interru... 详细信息
来源: 评论
Malware incident response(IR) informed by cyber threat intelligence(CTI)
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 256-258页
作者: Ying HE Ellis INGLUT Cunjin LUO School of Computer Science and Informatics De Montfort University Key Lab of Medical Electrophysiology Ministry of Education The Health Informatics Group Institute of Cardiovascular Research Southwest Medical University School of Computer Science and Engineering Northeastern University
Dear editor, Security experts have been fighting against cybercriminals for many years and existing research shows that this battle will continue. Malicious software has no remorse when it targets different organizati... 详细信息
来源: 评论
Real-Time Safety Helmet Detection in Construction Site Using Deep Learning  7
Real-Time Safety Helmet Detection in Construction Site Using...
收藏 引用
7th International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2024
作者: Fariza, Arna Karlita, Tita Iqbal, Muhammad Politeknik Elektronika Negeri Surabaya Department of Informatics and Computer Engineering Surabaya Indonesia
Construction is a high-risk industry where workers are frequently exposed to potential injuries, particularly head injuries. Safety helmets serve as a critical defense, yet many workers neglect their use due to low sa... 详细信息
来源: 评论
Selection of Outsource Security Guard using Multi-Objective Optimization Ratio Analysis Method  7
Selection of Outsource Security Guard using Multi-Objective ...
收藏 引用
7th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2023
作者: Aditya Firmansyah, Mochamad Rafly Ismail, Iklima Ermis Hidayati, Anita Politeknik Negeri Jakarta Dept. of Computer and Informatics Engineering Jawa Barat Depok Indonesia
The security guard profession is no longer a profession that only relies on the physical but also other aspects, such as attitude, leadership, language, and others. There are several problems faced by companies provid... 详细信息
来源: 评论
An intrusion detection system using ranked feature bagging
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第2期16卷 1213-1219页
作者: Azhagiri, M. Rajesh, A. Karthik, S. Raja, K. Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Computer Science and Engineering Jain University Bangalore India Department of IT College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ... 详细信息
来源: 评论
A Load-Fairness Prioritization-Based Matching Technique for Cloud Task Scheduling and Resource Allocation
收藏 引用
computer Systems Science & engineering 2023年 第6期45卷 2461-2481页
作者: Abdulaziz Alhubaishy Abdulmajeed Aljuhani College of Computing and Informatics Saudi Electronic UniversityRiyadh11673Saudi Arabia College of Computer Science and Engineering Taibah UniversityMedina41411Saudi Arabia
In a cloud environment,consumers search for the best service provider that accomplishes the required tasks based on a set of criteria such as completion time and *** the other hand,Cloud Service Providers(CSPs)seek to... 详细信息
来源: 评论
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 1029-1048页
作者: Muhammad Usama Arshad Aziz Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev Department of Cyber Security Pakistan Navy Engineering CollegeNational University of Sciences and TechnologyKarachi75350Pakistan Department of Computer Science Main CampusIqra UniversityKarachi75500Pakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Informatics and Its Teaching Methods Tashkent State Pedagogical UniversityTashkent100170Uzbekistan
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t... 详细信息
来源: 评论
Energy-Aware Heterogeneous Federated Learning via Approximate DNN Accelerators
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2054-2066页
作者: Pfeiffer, Kilian Balaskas, Konstantinos Siozios, Kostas Henkel, Jorg Karlsruhe Institute of Technology Chair for Embedded Systems Karlsruhe76131 Germany University of Patras Department of Computer Engineering and Informatics Patras26504 Greece Aristotle University of Thessaloniki Department of Physics Thessaloniki54124 Greece
In Federated Learning (FL), devices that participate in the training usually have heterogeneous resources, i.e., energy availability. In current deployments of FL, devices that do not fulfill certain hardware requirem... 详细信息
来源: 评论