咨询与建议

限定检索结果

文献类型

  • 262 篇 期刊文献
  • 253 篇 会议

馆藏范围

  • 515 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 288 篇 工学
    • 177 篇 计算机科学与技术...
    • 141 篇 软件工程
    • 60 篇 信息与通信工程
    • 42 篇 控制科学与工程
    • 36 篇 生物医学工程(可授...
    • 33 篇 电气工程
    • 33 篇 电子科学与技术(可...
    • 22 篇 生物工程
    • 21 篇 光学工程
    • 20 篇 材料科学与工程(可...
    • 15 篇 仪器科学与技术
    • 14 篇 化学工程与技术
    • 11 篇 安全科学与工程
    • 10 篇 动力工程及工程热...
  • 182 篇 理学
    • 67 篇 物理学
    • 64 篇 数学
    • 36 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 22 篇 系统科学
    • 16 篇 化学
  • 85 篇 管理学
    • 45 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 26 篇 工商管理
    • 12 篇 公共管理
  • 46 篇 医学
    • 37 篇 临床医学
    • 30 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
    • 16 篇 公共卫生与预防医...
  • 20 篇 法学
    • 18 篇 社会学
  • 15 篇 教育学
    • 11 篇 教育学
  • 12 篇 农学
  • 6 篇 经济学
  • 2 篇 艺术学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 14 篇 computer science
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 feature extracti...
  • 8 篇 wireless sensor ...
  • 8 篇 semantics
  • 8 篇 students
  • 8 篇 cloud computing
  • 7 篇 internet of thin...
  • 7 篇 informatics
  • 6 篇 data mining
  • 6 篇 visualization
  • 6 篇 diseases
  • 5 篇 covid-19
  • 5 篇 deep learning
  • 5 篇 cognition
  • 5 篇 computer archite...
  • 5 篇 prototypes
  • 5 篇 monitoring
  • 5 篇 training

机构

  • 19 篇 department of el...
  • 18 篇 school of comput...
  • 16 篇 school of electr...
  • 10 篇 computer science...
  • 9 篇 department of co...
  • 8 篇 department of co...
  • 7 篇 institute of dat...
  • 7 篇 ericsson researc...
  • 7 篇 department of in...
  • 6 篇 department of el...
  • 6 篇 interdisciplinar...
  • 5 篇 leeds institute ...
  • 5 篇 department of ph...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 ilsbio llc bioba...

作者

  • 12 篇 ghim wei ho
  • 9 篇 amin ebrahimzade...
  • 9 篇 nagaraj nithin
  • 9 篇 kathpalia aditi
  • 8 篇 rafael h. bordin...
  • 7 篇 lu shijian
  • 7 篇 kot alex c.
  • 6 篇 minmin gao
  • 6 篇 aditi kathpalia
  • 6 篇 musse soraia rau...
  • 5 篇 low bryan kian h...
  • 5 篇 wu zhaoxuan
  • 5 篇 shen lei
  • 5 篇 teerakiat kerdch...
  • 5 篇 alison r. paniss...
  • 5 篇 roch h. glitho
  • 5 篇 connor kang nuo ...
  • 5 篇 liangliang zhu
  • 4 篇 milan paluš
  • 4 篇 el sayed zaki ma...

语言

  • 492 篇 英文
  • 19 篇 其他
  • 4 篇 中文
检索条件"机构=The Computer Science Programme"
515 条 记 录,以下是1-10 订阅
排序:
Simple, robust and systematic QCA clocking scheme for area-efficient nanocircuits
收藏 引用
International Journal of Electronics Letters 2025年 第2期13.0卷 210-218页
作者: Goswami, Mrinal Sharma, Tonmoy Jyoti Nath Boruah, Arpita Programme of Computer Science & Engineering Faculty of Engineering Assam Down Town University Assam Guwahati India
Quantum-dot cellular automata (QCA) represent an innovative forefront in nanotechnology, exploring the utilisation of quantum dots as carriers of data in computational systems. Temporal controls govern the coordinatio... 详细信息
来源: 评论
A Novel Contour Tracing Algorithm for Object Shape Reconstruction Using Parametric Curves
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 331-350页
作者: Nihat Arslan Kali Gurkahraman Defence Technology Programme Sivas University of Science and TechnologySivas58070Turkey Department of Computer Engineering Sivas Cumhuriyet UniversitySivas58140Turkey
Parametric curves such as Bézier and B-splines, originally developedfor the design of automobile bodies, are now also used in image processing andcomputer vision. For example, reconstructing an object shape in an... 详细信息
来源: 评论
Hybrid Time Series Methods and Machine Learning for Seismic Analysis and Volcano Eruption Predict
HighTech and Innovation Journal
收藏 引用
HighTech and Innovation Journal 2025年 第1期6卷 104-122页
作者: Mandita, Fridy Ashari, Ahmad Wibowo, Moh. Edi Suryanto, Wiwit Department of Engineering Universitas 17 Agustus 1945 Surabaya Surabaya60118 Indonesia Programme of Computer Science Universitas Gadjah Mada Yogyakarta55281 Indonesia Department of Computer Science and Electronics Universitas Gadjah Mada Yogyakarta55281 Indonesia Department of Physics Universitas Gadjah Mada Yogyakarta55281 Indonesia
Volcanic eruption refers to a natural catastrophe on Earth that poses imminent danger to communities surrounding volcanoes. Therefore, ongoing monitoring of volcanic processes is crucial for effective analysis and obs... 详细信息
来源: 评论
A Determination of the Level of Adoption of eGovernment-based Conversational Systems in Nigeria  23
A Determination of the Level of Adoption of eGovernment-base...
收藏 引用
7th International Conference on E-Commerce, E-Business and E-Government, ICEEG 2023
作者: Oyelami, Olufemi Moses Falana, Odunayo Thomas Erinfolami, Oluwaseyi Samuel Computer Science Programme College of Computing and Communication Studies Bowen University Iwo Nigeria
Towards reaping the benefits provided by conversational systems, conversational systems in form of chatbots have been deployed to provide different kinds of services in different countries of the world. However, gover... 详细信息
来源: 评论
Detection of Cross-Site Scripting Attack Using Bagging Ensemble Learning  4th
Detection of Cross-Site Scripting Attack Using Bagging Ensem...
收藏 引用
4th International Conference on Emerging Trends and Technologies on Intelligent Systems, ETTIS 2024
作者: Aier, Liaren Emani Bhowmick, Sreya Das, Barasha Boruah, Arpita Nath Goswami, Mrinal Programme of Computer Science and Engineering Faculty of Engineering Assam down town University Sankar Madhab Path Panikhaiti Gandhi Nagar Assam Guwahati India
In today’s digital age, the Internet is pivotal in bringing both convenience and security concerns. Individuals are vulnerable to unauthorized access and manipulation of their information by potential attackers. A no... 详细信息
来源: 评论
Stacking Ensemble Learning Based Detection of Cross-Site Scripting Attack  6th
Stacking Ensemble Learning Based Detection of Cross-Site Scr...
收藏 引用
6th International Conference on Information Systems and Management science, ISMS 2023
作者: Das, Barasha Bhowmick, Sreya Aier, Liaren Emani Boruah, Arpita Nath Goswami, Mrinal Programme of Computer Science and Engineering Faculty of Engineering Assam Down Town University Sankar Madhab Path Gandhi Nagar Panikhaiti Assam Guwahati India
In accordance with Cybersecurity statistics, a total average of 2,200 cyber-attacks occur per day. Cross-site Scripting (XSS) is one of the most notable weaknesses in web security. It belongs to the injection category... 详细信息
来源: 评论
Traffic Congestion Prevention Using Ant Colony Optimization  8
Traffic Congestion Prevention Using Ant Colony Optimization
收藏 引用
8th International Engineering Conference on Renewable Energy and Sustainability, ieCRES 2023
作者: Abusamra, Aiman Ashour, Abeer Ghazal, Mai Aldahdooh, Jehad Abuarja, Raghad Islamic University of Gaza Computer Engineering Dept. Gaza Palestine University of Helsinki Doctoral Programme in Computer Science Helsinki Finland Islamic University of Gaza Computer Engineering Gaza Palestine
Managing traffic congestion is crucial for improving mobility, reducing fuel consumption, and mitigating environmental impacts in urban areas. To address this challenge, we present a novel framework named TCP-ACO for ... 详细信息
来源: 评论
Language and Knowledge Representation A Stratified Approach
arXiv
收藏 引用
arXiv 2025年
作者: Bagchi, Mayukh Doctoral Programme in Information Engineering and Computer Science Department of Information Engineering and Computer Science University of Trento Italy
Semantic heterogeneity is conventionally understood as the existence of variance in the representation of the same target reality when computationally modelled by independent parties. It can have serious implications ... 详细信息
来源: 评论
A cloud-native framework for globally distributed capture and analysis of Internet Background Radiation  18
A cloud-native framework for globally distributed capture an...
收藏 引用
18th Iberian Conference on Information Systems and Technologies, CISTI 2023
作者: Bortoluzzi, Fabricio Irwin, Barry Westphall, Carla Merkle Noroff University College Department of Applied Computing Kristiansand Norway Rhodes University Grahamstown Department of Computer Science South Africa Federal University of Santa Catarina Postgraduate Programme in Computer Science Florianópolis Brazil
Among the existing methods for analysing internet traffic, one focuses on unsolicited and often harmful packets, referred to as Internet Background Radiation (IBR). IBR data can be captured by using cloud-based comput... 详细信息
来源: 评论
Detection of Fake Reviews on Products Using Machine Learning  7th
Detection of Fake Reviews on Products Using Machine Learning
收藏 引用
7th International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2022
作者: Narayana Royal, M. Reddy, Rajula Pavan Kalyan Sangathya, Gokina Sri Sai Madesh Pretam, B. Kaliappan, Jayakumar Suganthan, C. School of Computer Science and Engineering Vellore Institute of Technology Vellore India Institute of Industry and International Programme Vellore Institute of Technology Vellore India
It is hard to exaggerate how crucial user reviews are in figuring out an organization’s e-commerce income. Before purchasing any goods or service, online customers rely on product and service reviews. As a result, fi... 详细信息
来源: 评论