咨询与建议

限定检索结果

文献类型

  • 57,218 篇 会议
  • 8,951 篇 期刊文献
  • 391 册 图书

馆藏范围

  • 66,560 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41,518 篇 工学
    • 26,515 篇 计算机科学与技术...
    • 22,011 篇 软件工程
    • 11,514 篇 信息与通信工程
    • 7,175 篇 电子科学与技术(可...
    • 6,969 篇 电气工程
    • 6,924 篇 控制科学与工程
    • 3,745 篇 生物工程
    • 3,141 篇 生物医学工程(可授...
    • 3,049 篇 光学工程
    • 2,730 篇 机械工程
    • 2,637 篇 动力工程及工程热...
    • 2,453 篇 仪器科学与技术
    • 1,972 篇 化学工程与技术
    • 1,433 篇 材料科学与工程(可...
    • 1,412 篇 安全科学与工程
    • 1,323 篇 交通运输工程
    • 1,165 篇 建筑学
  • 21,355 篇 理学
    • 11,383 篇 数学
    • 6,820 篇 物理学
    • 4,081 篇 生物学
    • 3,619 篇 统计学(可授理学、...
    • 2,597 篇 系统科学
    • 2,054 篇 化学
  • 9,294 篇 管理学
    • 5,621 篇 管理科学与工程(可...
    • 4,115 篇 图书情报与档案管...
    • 3,116 篇 工商管理
  • 2,513 篇 医学
    • 2,180 篇 临床医学
    • 2,039 篇 基础医学(可授医学...
    • 1,363 篇 药学(可授医学、理...
  • 1,665 篇 法学
    • 1,365 篇 社会学
  • 1,121 篇 经济学
  • 762 篇 教育学
  • 737 篇 农学
  • 277 篇 文学
  • 176 篇 军事学
  • 66 篇 艺术学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 1,657 篇 accuracy
  • 1,463 篇 computational mo...
  • 1,293 篇 feature extracti...
  • 1,143 篇 training
  • 925 篇 deep learning
  • 890 篇 real-time system...
  • 838 篇 machine learning
  • 783 篇 predictive model...
  • 727 篇 computer science
  • 708 篇 optimization
  • 666 篇 computer archite...
  • 643 篇 support vector m...
  • 615 篇 data models
  • 575 篇 neural networks
  • 571 篇 internet of thin...
  • 542 篇 wireless sensor ...
  • 533 篇 monitoring
  • 517 篇 data mining
  • 512 篇 convolutional ne...
  • 457 篇 artificial intel...

机构

  • 165 篇 dept. of electri...
  • 82 篇 north-west unive...
  • 80 篇 institut univers...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 76 篇 national centre ...
  • 66 篇 università di ca...
  • 62 篇 dept. of electr....
  • 59 篇 dept. of electri...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of electri...
  • 52 篇 school of automa...
  • 45 篇 leiden universit...
  • 44 篇 dept. of compute...
  • 42 篇 infn lnf via enr...
  • 41 篇 in2p3 lpc campus...
  • 40 篇 dept. of compute...
  • 39 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 81 篇 chen a.
  • 81 篇 gal t.
  • 81 篇 bozza c.
  • 59 篇 kalekin o.
  • 54 篇 kulikovskiy v.
  • 42 篇 benoit d.m.
  • 42 篇 eddymaoui a.
  • 42 篇 labalme m.
  • 42 篇 huang f.
  • 41 篇 gagliardini s.
  • 39 篇 díaz a.f.
  • 38 篇 androulakis g.
  • 35 篇 de palma m.
  • 33 篇 khatun a.
  • 31 篇 eirini eleni tsi...
  • 27 篇 david reigosa
  • 26 篇 kougianos elias

语言

  • 60,220 篇 英文
  • 5,320 篇 其他
  • 730 篇 中文
  • 249 篇 朝鲜文
  • 68 篇 日文
  • 9 篇 土耳其文
  • 5 篇 德文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=dept. of Computer Computer Systems Engineering"
66560 条 记 录,以下是391-400 订阅
排序:
LTP Performance Evaluation Based on PHY Characteristics for Earth-Moon Satellite Links  10
LTP Performance Evaluation Based on PHY Characteristics for ...
收藏 引用
10th IEEE Information Technology International Seminar, ITIS 2024
作者: Ehile, Israel Ehile Muratov, Alisher Kizilirmak, Refik Caglar Nazarbayev University Dept. of Electrical and Computer Engineering Astana Kazakhstan
As the growth in satellite applications and the Internet is projected to extend beyond Earth into the solar system, satellite networks operating beyond Earth's orbit are becoming a major point of interest. These s... 详细信息
来源: 评论
Machine Learning - Driven Approaches for Detection and Analysis of Phishing attacks: A Robust Framework for Cybersecurity  7
Machine Learning - Driven Approaches for Detection and Analy...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Sarvan, N.D.S.S. Sai Ram Reddy, Venkata Jain, Darshan Rakesh, Guntupalli Anguraj, Dinesh Kumar Kl University Dept. of Computer Science Engineering Guntur India
Phishing is the attempt to trick someone into disclosing confidential and private information by using internet communication, such as bank account details, passwords, credit/debit card details, and usernames. The acc... 详细信息
来源: 评论
Monitoring Post-Earthquake Search and Rescue Operations through UAVs Vision: Teams, Equipment and Structural Damage Detection  8
Monitoring Post-Earthquake Search and Rescue Operations thro...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: Kiratli, Rabia Eroglu, Alperen Necmettin Erbakan University Dept. of Computer Engineering Konya Turkey
With the development of unmanned aerial vehicles and deep learning-based computer vision algorithms, there is an increasing interest in using these technologies together in managing pre- and post-natural disaster oper... 详细信息
来源: 评论
Mobile Gateways for LoRa End-Devices: Support Connectivity on the Move  29
Mobile Gateways for LoRa End-Devices: Support Connectivity o...
收藏 引用
29th IEEE International Workshop on computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2024
作者: Moysiadis, Vasileios Skoutas, Dimitrios N. Skianis, Charalabos Lagkas, Thomas Argyriou, Vasileios Sarigiannidis, Panagiotis University of the Aegean Dept. of Information and Communication Systems Engineering Samos83200 Greece International Hellenic University Dept. of Computer Science Greece University of Western Macedonia Dept. of Electrical and Computer Engineering Kozani Greece Kingston University Dept. of Networks and Digital Media Kingston upon Thames United Kingdom
This paper proposes a method enabling mobile LoRa gateways to support mobile end devices. The approach utilizes trilateration and similar approaches based on RSSI to estimate the position of end devices and specify th... 详细信息
来源: 评论
Enhancing LoRaWAN Security: Protection Against Bit Flipping Attacks in IoT Networks  17
Enhancing LoRaWAN Security: Protection Against Bit Flipping ...
收藏 引用
17th International Conference on Security of Information and Networks, SIN 2024
作者: Dave, Jay Choudhury, Nikumani Havishteja, Dantu Revanth, Katuri Bits Pilani Dept. of Computer Science & Information Systems Hyderabad Campus India
The prominence of the Internet of Things (IoT) has surged in recent years due to tech-nological advancements, increased connectivity, and the widespread adoption of smart devices. Currently, IoT solutions are pervasiv... 详细信息
来源: 评论
Cyberbullying Detection and Severity Classification Using Bi-LSTM  9
Cyberbullying Detection and Severity Classification Using Bi...
收藏 引用
9th International Conference on Communication and Electronics systems, ICCES 2024
作者: Devi, K. Nirmala Rajasekar, Vani Jayanthi, P. Balasubramani, Kavin Kandasamy, Kaviya Gowrisankar, Keerthana Kongu Engineering College Dept. of Computer Science Erode India
Cyberbullying has grown to be a significant issue in the internet age, affecting individuals of all ages, particularly teens. It involves using internet channels to harass, threaten, or disparage people, often with li... 详细信息
来源: 评论
Spatial Data Discovery Using Small Language Model  5
Spatial Data Discovery Using Small Language Model
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Thakur, Sujit Kumar Tyagi, Neha Amity University Dept. of Computer Science & Engineering Noida India
The ubiquitous use of data in a plethora of use cases and different organizational dependence on it for various insight has made data a valuable resource across business and scientific domains. Data has attained much ... 详细信息
来源: 评论
An LPWAN-Based Framework for Food Supply Chain Management Using Blockchain and Federated Multi-Task Learning  8
An LPWAN-Based Framework for Food Supply Chain Management Us...
收藏 引用
8th International Conference on Smart Cities, Internet of Things and Applications, SCIoT 2024
作者: Navidimehr, Mehrnoosh Khalilabad, Ali Mojahed Amintoosi, Haleh Allahbakhsh, Mohammad Ferdowsi University of Mashhad Dept. Computer Engineering Mashhad Iran
The escalating global population has amplified concerns regarding the provision of high-quality food. In response to this issue, various food supply chain monitoring systems have been developed. This paper introduces ... 详细信息
来源: 评论
Real- Time Hand Gesture Recognition for Home Automation: A YOLOv8-Based Approach with Identity Verification and Low-Resource Hardware Implementation  21
Real- Time Hand Gesture Recognition for Home Automation: A Y...
收藏 引用
21st International Multi-Conference on systems, Signals and Devices, SSD 2024
作者: Hussein, Shayda Khalid Ahmed, Abdullah Salam Kul, Zeynep Ashir, Abubakar M. Tishk International University Dept. of Computer Engineering Erbil Iraq
The article introduces an approach for real-time sign language detection tailored for home automation applications. The proposed model utilizes the YOLOv8 (You Only Look Once) architecture for efficient and accurate s... 详细信息
来源: 评论
Enhancing Doodling Experience Using Generative Adversarial Networks  2
Enhancing Doodling Experience Using Generative Adversarial N...
收藏 引用
2nd IEEE Global Conference on Communications and Information Technologies, GCCIT 2024
作者: Ashtagi, Rashmi Rathi, Devanshu Handoo, Ripul Purohit, Rishi Madhavaswala, Abbas Nogamawala, Mohammad Vishwakarma Institute of Technology Dept. Of Computer Engineering Pune India
Interacting with AI systems solely through textual prompts often encounters limitations due to the challenges of expressing complex visual ideas in text. This paper introduces an advanced AI system that interprets and... 详细信息
来源: 评论