咨询与建议

限定检索结果

文献类型

  • 57,218 篇 会议
  • 8,959 篇 期刊文献
  • 395 册 图书

馆藏范围

  • 66,572 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41,527 篇 工学
    • 26,516 篇 计算机科学与技术...
    • 22,011 篇 软件工程
    • 11,514 篇 信息与通信工程
    • 7,175 篇 电子科学与技术(可...
    • 6,970 篇 电气工程
    • 6,928 篇 控制科学与工程
    • 3,745 篇 生物工程
    • 3,141 篇 生物医学工程(可授...
    • 3,049 篇 光学工程
    • 2,730 篇 机械工程
    • 2,637 篇 动力工程及工程热...
    • 2,453 篇 仪器科学与技术
    • 1,972 篇 化学工程与技术
    • 1,433 篇 材料科学与工程(可...
    • 1,412 篇 安全科学与工程
    • 1,323 篇 交通运输工程
    • 1,165 篇 建筑学
  • 21,356 篇 理学
    • 11,384 篇 数学
    • 6,819 篇 物理学
    • 4,081 篇 生物学
    • 3,619 篇 统计学(可授理学、...
    • 2,597 篇 系统科学
    • 2,054 篇 化学
  • 9,295 篇 管理学
    • 5,622 篇 管理科学与工程(可...
    • 4,115 篇 图书情报与档案管...
    • 3,116 篇 工商管理
  • 2,513 篇 医学
    • 2,180 篇 临床医学
    • 2,039 篇 基础医学(可授医学...
    • 1,363 篇 药学(可授医学、理...
  • 1,665 篇 法学
    • 1,365 篇 社会学
  • 1,121 篇 经济学
  • 762 篇 教育学
  • 737 篇 农学
  • 277 篇 文学
  • 177 篇 军事学
  • 66 篇 艺术学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 1,655 篇 accuracy
  • 1,461 篇 computational mo...
  • 1,289 篇 feature extracti...
  • 1,147 篇 training
  • 920 篇 deep learning
  • 888 篇 real-time system...
  • 840 篇 machine learning
  • 781 篇 predictive model...
  • 718 篇 computer science
  • 702 篇 optimization
  • 665 篇 computer archite...
  • 641 篇 support vector m...
  • 622 篇 data models
  • 579 篇 internet of thin...
  • 573 篇 neural networks
  • 552 篇 wireless sensor ...
  • 518 篇 data mining
  • 518 篇 monitoring
  • 510 篇 convolutional ne...
  • 458 篇 artificial intel...

机构

  • 166 篇 dept. of electri...
  • 82 篇 north-west unive...
  • 81 篇 institut univers...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 national centre ...
  • 66 篇 università di ca...
  • 61 篇 dept. of electr....
  • 58 篇 dept. of electri...
  • 56 篇 dept. of compute...
  • 56 篇 dept. of informa...
  • 52 篇 dept. of electri...
  • 52 篇 school of automa...
  • 49 篇 leiden universit...
  • 44 篇 dept. of compute...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...
  • 37 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 82 篇 gal t.
  • 81 篇 chen a.
  • 81 篇 bozza c.
  • 61 篇 kalekin o.
  • 52 篇 kulikovskiy v.
  • 44 篇 huang f.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.
  • 40 篇 díaz a.f.
  • 37 篇 androulakis g.
  • 34 篇 de palma m.
  • 34 篇 khatun a.
  • 32 篇 eirini eleni tsi...
  • 27 篇 kougianos elias
  • 27 篇 david reigosa

语言

  • 60,226 篇 英文
  • 5,324 篇 其他
  • 732 篇 中文
  • 249 篇 朝鲜文
  • 68 篇 日文
  • 9 篇 土耳其文
  • 5 篇 德文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=dept. of Computer Computer Systems Engineering"
66572 条 记 录,以下是4521-4530 订阅
排序:
Technique for Evaluating the Effectiveness of the Information Security Department  16
Technique for Evaluating the Effectiveness of the Informatio...
收藏 引用
16th IEEE International Scientific and Technical Conference Actual Problems of Electronic Instrument engineering, APEIE 2023
作者: Belov, Viktor M. Pestunova, Tamara M. Belova, Nadezhda V. Kosov, Dmitry L. Information Security Dept. Novosibirsk State Technical University Novosibirsk Russia Computer Systems Dept. Novosibirsk State University Novosibirsk Russia Economics and Planning Dept. PJSC Rosneft Oil Company Moscow Russia
This article proposes a technique that establishes the procedure for evaluating the level of efficiency of the information security department (an employee performing information security functions). The technique use... 详细信息
来源: 评论
Double Layer Message Security for 3D Object Using Mathematical Sequences and Secret Keys
Double Layer Message Security for 3D Object Using Mathematic...
收藏 引用
2023 International Telecommunications Conference, ITC-Egypt 2023
作者: Alkhamese, Aya Elgawalby, Hewayda Eid, Ahmad Hanafy, Ibrahim Awad, Wael Port Said University Faculty of Engineering Dept. Physics and Engineering Mathematics Port Said Egypt Port Said University Faculty of Engineering Electrical Engineering Department Port Said Egypt Port Said University Faculty of Science Dept. Mathematics and Computer Science Port Said Egypt Damietta University Faculty of Computers and Artificial Intelligence Dept. Computer Science Damietta Egypt
It's It's been so crucial lately to emphasize data security applying as the world depends on data exchange extensively almost in all domains. Steganography is one of the main techniques used to ensure informat... 详细信息
来源: 评论
WNetMon: An ML Approach for Real-time DoS Attack Detection in Wireless Networks
WNetMon: An ML Approach for Real-time DoS Attack Detection i...
收藏 引用
Australasian Telecommunication Networks and Applications Conference, ATNAC
作者: Fahim Faisal Birupaxha Mondal Md Fahad Monir Tarem Ahmed Md Zahangir Alam Dept. of Computer Science and Engineering Independent University Bangladesh Dept. of Electrical and Computer Engineering Virginia Tech Blacksburg VA USA
Denial of Service (DoS) attacks have emerged as sophisticated threats that exploit the known vulnerabilities of wireless communication, potentially sabotaging their operations and causing extensive downtime. Among the... 详细信息
来源: 评论
AI-Driven Panic Detection and Alert System Using Smartwatch and LLM Model
AI-Driven Panic Detection and Alert System Using Smartwatch ...
收藏 引用
International Conference on Parallel Distributed and Grid Computing (PDGC)
作者: Balaram Pal Anubhab Gupta Soumyajit Paul Munshi Mustafijur Rahaman Dept. of Computer Science Engineering Bengal Institute of Technology Kolkata India Dept. of Computer Science Engineering GCECT Kolkata India
Technologically, most existing systems cannot detect distress autonomously through pattern recognition, further compounding the challenge of providing timely help. This research paper identifies the significant gap in... 详细信息
来源: 评论
Experimental Demonstration of Hybrid LED-LD Based UOWC Link  2
Experimental Demonstration of Hybrid LED-LD Based UOWC Link
收藏 引用
2nd International Conference on Microwave, Optical and Communication engineering, ICMOCE 2023
作者: Krishna, Gopal Mathew, Jimson Santhanakrishnan, T. Gupta, Sumanta Indian Institute of Technology Patna Dept. of Electrical Engineering India Indian Institute of Technology Patna Dept. of Computer Science and Engineering India DRDO Naval Physical and Oceanographic Laboratory India
In this paper, we have designed and experimentally characterized a hybrid light emitting diode (LED) and laser diode (LD) based underwater optical wireless communication (UOWC) link, which can be suitable for providin... 详细信息
来源: 评论
Latent Semantic Analysis based Real-world Application of Topic Modeling: A Review Study  2
Latent Semantic Analysis based Real-world Application of Top...
收藏 引用
2nd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2022
作者: Gupta, Isha Chatterjee, Indranath Gupta, Neha Mriirs Faculty of Computer Applications Faridabad India Tongmyong University Dept. of Computer Engineering Busan Korea Republic of
Today, we are living in the digital world. Much information is available on the internet about| every topic. But merely the availability of information is not enough. There is a need for automated tools that can extra... 详细信息
来源: 评论
Towards Personalized Fitness with Multi-modal Wearable Heart Rate Monitors: A Proposal  6
Towards Personalized Fitness with Multi-modal Wearable Heart...
收藏 引用
6th International Conference on Vocational Education and Electrical engineering, ICVEE 2023
作者: Nugraha, Alfian Dwi Puspitaningayu, Pradini Hidayatullah, Rahmat Pramukantoro, Eko Sakti Widayaka, Parama Diptya Rochmawati, Naim State University of Surabaya Dept. of Informatics Engineering Surabaya Indonesia State University of Surabaya Dept. of Electrical Engineering Surabaya Indonesia Brawijaya University Faculty of Computer Science Malang Indonesia
Nowadays, the trend for home workouts is getting more and more popular. The growth of wearable fitness trackers from basic accelerometers, pedometers, pulse detectors, and ECGs also supports the advancement of persona... 详细信息
来源: 评论
5G User Equipment (UE) Positioning and Localization Estimation using Machine Learning
5G User Equipment (UE) Positioning and Localization Estimati...
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Sanket Survase Raman Diwan Kumari Nidhi Lal Shishupal Kumar Dept. of Computer Science and Engineering VNIT Nagpur Nagpur India Dept. of Computer Science and Engineering IIIT Nagpur Nagpur India
The emergence of 5G technology has ushered in a new era of connectivity, making communications faster and cheaper. One of the main challenges of 5G networks is accuracy and efficiency, which are important for many app... 详细信息
来源: 评论
Analyzing File Access Characteristics for Deep Learning Workloads on Mobile Devices
Analyzing File Access Characteristics for Deep Learning Work...
收藏 引用
Advances in Electrical engineering and computer Applications( AEECA), 2020 IEEE International Conference on
作者: Jeongha Lee Soojung Lim Hyokyung Bahn Dept. of Computer Engineering Ewha University Seoul Republic of Korea Dept. of Computer Engineering Ewha University Seoul Republic of Koera
Recent advances in artificial intelligence technologies have led to a significant increase in deep learning workloads on mobile devices. Given the limited resources of smartphones, much of the research in mobile deep ... 详细信息
来源: 评论
Image inpainting for corrupted images by using the semi-super resolution GAN
arXiv
收藏 引用
arXiv 2024年
作者: Momen Tayefeh, Mehrshad Momen Tayefeh, Mehrdad Ghahramanie, S. AmirAli Ghafourian Dept. Computer Engineering Sharif University of Technology Tehran Iran Dept. Electrical and Computer Engineering University of Tehran Tehran Iran
Image inpainting is a valuable technique for enhancing images that have been corrupted. The primary challenge in this research revolves around the extent of corruption in the input image that the deep learning model m... 详细信息
来源: 评论