咨询与建议

限定检索结果

文献类型

  • 885 篇 会议
  • 295 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 1,195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 711 篇 工学
    • 499 篇 计算机科学与技术...
    • 425 篇 软件工程
    • 187 篇 信息与通信工程
    • 142 篇 控制科学与工程
    • 135 篇 电子科学与技术(可...
    • 95 篇 电气工程
    • 49 篇 机械工程
    • 42 篇 光学工程
    • 42 篇 仪器科学与技术
    • 39 篇 化学工程与技术
    • 38 篇 生物工程
    • 34 篇 生物医学工程(可授...
    • 29 篇 建筑学
    • 27 篇 动力工程及工程热...
    • 23 篇 材料科学与工程(可...
    • 21 篇 土木工程
    • 19 篇 力学(可授工学、理...
    • 17 篇 航空宇航科学与技...
  • 458 篇 理学
    • 278 篇 数学
    • 165 篇 物理学
    • 63 篇 统计学(可授理学、...
    • 47 篇 生物学
    • 43 篇 化学
    • 33 篇 系统科学
  • 170 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 79 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 36 篇 医学
    • 28 篇 临床医学
    • 24 篇 基础医学(可授医学...
  • 28 篇 法学
    • 20 篇 社会学
  • 15 篇 经济学
  • 13 篇 教育学
  • 7 篇 军事学
  • 5 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 73 篇 computer science
  • 19 篇 computer archite...
  • 19 篇 computational mo...
  • 17 篇 neural networks
  • 17 篇 data mining
  • 17 篇 hardware
  • 17 篇 artificial intel...
  • 16 篇 proton-proton in...
  • 16 篇 databases
  • 16 篇 feature extracti...
  • 15 篇 costs
  • 15 篇 machine learning
  • 14 篇 application soft...
  • 14 篇 humans
  • 13 篇 predictive model...
  • 13 篇 semantics
  • 13 篇 computer vision
  • 12 篇 routing
  • 12 篇 signal processin...
  • 12 篇 optimization

机构

  • 29 篇 yerevan physics ...
  • 29 篇 skobeltsyn insti...
  • 28 篇 department of ph...
  • 27 篇 faculté des scie...
  • 27 篇 department of ph...
  • 27 篇 graduate school ...
  • 27 篇 faculty of scien...
  • 27 篇 division of phys...
  • 27 篇 departamento de ...
  • 27 篇 department of ph...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 infn sezione di ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 fakultät für phy...
  • 27 篇 department of ph...
  • 27 篇 institute of phy...
  • 26 篇 department of ph...
  • 26 篇 physics division...
  • 26 篇 department of ph...

作者

  • 33 篇 c. hensel
  • 31 篇 c. alexa
  • 31 篇 j. m. izen
  • 31 篇 a. harvey
  • 31 篇 s. michal
  • 31 篇 t. poghosyan
  • 30 篇 k. jelen
  • 30 篇 k. bos
  • 30 篇 g. bella
  • 30 篇 j. strandberg
  • 30 篇 d. calvet
  • 30 篇 c. amelung
  • 30 篇 b. toggerson
  • 30 篇 g. m. kolachev
  • 30 篇 f. pastore
  • 30 篇 c. geweniger
  • 30 篇 h. a. gordon
  • 30 篇 s. montesano
  • 30 篇 g. spigo
  • 30 篇 f. siegert

语言

  • 1,150 篇 英文
  • 24 篇 其他
  • 13 篇 中文
  • 7 篇 日文
  • 1 篇 泰文
检索条件"机构=Inst. of Computer Science Information Engineering"
1195 条 记 录,以下是1-10 订阅
排序:
Enhancing Hyperspectral Image Compression Through Stacked Autoencoder Approach  6
Enhancing Hyperspectral Image Compression Through Stacked Au...
收藏 引用
6th International Conference on Electrical engineering and information and Communication Technology, ICEEICT 2024
作者: Afrin, Afsana Haque, Md. Rakibul Mamun, Md. Al Inst. of Information and Communication Technology Rajshahi University of Engineering Technology Rajshahi6204 Bangladesh Rajshahi University of Engineering & Technology Dept. of Computer Science & Engineering Rajshahi6204 Bangladesh
Hyperspectral Image (HSI) consisting of numerous high-resolution spectral bands creates challenges of the high dimensionality problem in HSI classification which hinder real-life applications despite their abundance o... 详细信息
来源: 评论
Cloud Insider Threat Detection using Deep Learning Models  18
Cloud Insider Threat Detection using Deep Learning Models
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Shanmugapriya, D. Dhanya, C.J. Asha, S. Padmavathi, G. Suthisini, D. Nethra Pingala Avinashilingam Inst. for Home Science and Higher Education for Women Department of Information Technology Coimbatore India Avinashilingam Inst. for Home Science and Higher Education for Women Department of Computer Science Coimbatore India
Insider attacks are a major threat to cloud security since they can harm organizational assets and have overlapping security mechanisms. Therefore, insider threat detection in the cloud environment is necessary to com... 详细信息
来源: 评论
How to Construct Pseudorandom Bit Sequences from Mazes by a Method Digging Out Walls
How to Construct Pseudorandom Bit Sequences from Mazes by a ...
收藏 引用
2023 International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023
作者: Miyazaki, Takeru Araki, Shunsuke Uehara, Satoshi Kyushu Inst. of Information Sciences Faculity of Management and Information Sciences Fukuoka Japan Kyushu Inst. of Technology Faculty of Computer Science and Systems Engineering Fukuoka Japan The Univ. of Kitakyushu Faculty of Environmental Engineering Fukuoka Japan
In this paper, we propose a new pseudorandom bit sequence generator, which is based on a method digging out walls. Although each of these sequences lacks enough randomness, synthesized sequences of them can pass all o... 详细信息
来源: 评论
Design and In-training Optimization of Binary Search ADC for Flexible Classifiers  25
Design and In-training Optimization of Binary Search ADC for...
收藏 引用
30th Asia and South Pacific Design Automation Conference, ASP-DAC 2025
作者: Lozano Duarte, Paula Carolina Afentaki, Florentia Zervakis, Georgios Tahoori, Mehdi Department of Computer Science Karlsruhe Inst. of Tech. Karlsruhe Germany Computer Engineering and Informatics Department Univ. of Patras Patras Greece
Flexible Electronics (FE) offer distinct advantages, including mechanical flexibility and low process temperatures, enabling extremely low-cost production. To address the demands of applications such as smart sensors ... 详细信息
来源: 评论
Detecting Cross-Site Scripting Attack using Machine Learning Algorithms  18
Detecting Cross-Site Scripting Attack using Machine Learning...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Karthika, S. Padmavathi, G. Roshni, A. Varshini, S. Avinashilingam Inst. for Home Science and Higher Education for Women Department of Information Technology Coimbatore India Avinashilingam Inst. for Home Science and Higher Education for Women Department of Computer Science Coimbatore India Avinashilingam Inst. for Home Science and Higher Education for Women Centre for Cyber Intelligence Coimbatore India
Cross-Site scripting attacks can have a significant impact on a user's computer due to their ability to infect it with malware. This is because the code is embedded in a vulnerable program, allowing attackers to g... 详细信息
来源: 评论
Decoding the Skin with AI: A Review of Cutting-Edge Technologies and Applications  2
Decoding the Skin with AI: A Review of Cutting-Edge Technolo...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Kumari, Sejal Umrao, Sandhya Kushwaha, Dileep Noida Inst. of Engg. and Technology Computer Science & Engineering Greater Noida India Greater Noida India
The skin of humans can tell stories through its textures and colors, providing insights into both health and disease. Dermatologists have been interpreting these stories for years, using their expertise to diagnose an... 详细信息
来源: 评论
Chinese Medical Record Entity Recognition Based on Lexicon and Self-attention
Chinese Medical Record Entity Recognition Based on Lexicon a...
收藏 引用
2023 IEEE International Conference on Sensors, Electronics and computer engineering, ICSECE 2023
作者: Wang, Le Zhao, Yahui Cui, Rongyi Jin, Guozhe Wang, Jinxiang Yanbian University Inst. of Intelligent Information Processing Yanji133002 China Yanbian University Computer Science and Technology College of Engineering Yanji China
Named Entity Recognition (NER) is a pivotal challenge in the field of natural language processing. In the medical field, NER plays a crucial role in identifying medical entities, such as diagnoses and drugs, from elec... 详细信息
来源: 评论
Detection of Iris Template Attacks using Machine Learning and Deep Learning Methods  10
Detection of Iris Template Attacks using Machine Learning an...
收藏 引用
17th INDIACom;2023 10th International Conference on Computing for Sustainable Global Development, INDIACom 2023
作者: Shanmugapriya, D. Padmavathi, G. Aysha, A. Avinashilingam Inst. for Home Science and Higher Education for Women Dept. of Information Technology Coimbatore India Dept. of Computer Science Avinashilingam Inst. for Home Science and Higher Education for Women Coimbatore India
Iris recognition is a biometric identification method that uses patterns in the iris, the coloured ring around the eye's pupil, to identify individuals. One of the most vulnerable attacks in iris detection is the ... 详细信息
来源: 评论
Performance Analysis of Cyberbullying Threats in Social Media using Machine Learning Techniques  18
Performance Analysis of Cyberbullying Threats in Social Medi...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Suthisini, D. Nethra Pingala Merlien, J. Juliet Shanmugapriya, D. Padmavathi, G. Roshni, A. Avinashilingam Inst. for Home Science and Higher Education for Women Department of Information Technology Coimbatore India Avinashilingam Inst. for Home Science and Higher Education for Women Department of Computer Science Coimbatore India Centre for Cyber Intelligence Avinashilingam Institute for Home Science and Higher Education for Women Coimbatore India
Cyberbullying is the use of internet media to harass, threaten, or hurt others, has become a widespread problem on social media platforms. As social media becomes more prevalent, so does cyberbullying, which hurts vic... 详细信息
来源: 评论
MoFLeuR: Motion-based Federated Learning Gesture Recognition  4
MoFLeuR: Motion-based Federated Learning Gesture Recognition
收藏 引用
4th IEEE International Conference on Human-Machine Systems, ICHMS 2024
作者: Jamal Seyedmohammadi, S. Sheikholeslami, S. Mohammad Abouei, Jamshid Mohammadi, Arash Plataniotis, Konstantinos N. Concordia University Inst. Of Information Systems Engineering Montreal Canada University Of Toronto Dept. Of Electrical And Computer Engineering Toronto Canada Yazd University Dept. Of Electrical Engineering Yazd Iran
Most of the recent works on Human Gesture Recognition (HGR) using motion data rely on gathering a dataset, that faces two major challenges: a) the datasets are originally stored on the smart devices at the end-users, ... 详细信息
来源: 评论