咨询与建议

限定检索结果

文献类型

  • 29,776 篇 会议
  • 4,605 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 34,616 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,474 篇 工学
    • 15,508 篇 计算机科学与技术...
    • 13,027 篇 软件工程
    • 5,725 篇 信息与通信工程
    • 3,399 篇 控制科学与工程
    • 2,641 篇 电子科学与技术(可...
    • 2,586 篇 电气工程
    • 2,298 篇 生物工程
    • 1,847 篇 生物医学工程(可授...
    • 1,505 篇 光学工程
    • 1,332 篇 机械工程
    • 1,197 篇 动力工程及工程热...
    • 1,183 篇 仪器科学与技术
    • 1,001 篇 化学工程与技术
    • 843 篇 安全科学与工程
    • 710 篇 交通运输工程
  • 10,992 篇 理学
    • 5,958 篇 数学
    • 3,011 篇 物理学
    • 2,516 篇 生物学
    • 1,974 篇 统计学(可授理学、...
    • 1,306 篇 系统科学
    • 1,075 篇 化学
  • 5,535 篇 管理学
    • 3,236 篇 管理科学与工程(可...
    • 2,570 篇 图书情报与档案管...
    • 1,787 篇 工商管理
  • 1,560 篇 医学
    • 1,353 篇 临床医学
    • 1,262 篇 基础医学(可授医学...
    • 828 篇 药学(可授医学、理...
    • 655 篇 公共卫生与预防医...
  • 1,011 篇 法学
    • 811 篇 社会学
  • 632 篇 经济学
    • 632 篇 应用经济学
  • 480 篇 农学
  • 426 篇 教育学
  • 154 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,068 篇 accuracy
  • 825 篇 feature extracti...
  • 822 篇 computational mo...
  • 710 篇 deep learning
  • 675 篇 computer science
  • 661 篇 training
  • 506 篇 real-time system...
  • 505 篇 support vector m...
  • 495 篇 machine learning
  • 427 篇 predictive model...
  • 405 篇 internet of thin...
  • 350 篇 computer archite...
  • 348 篇 convolutional ne...
  • 346 篇 data models
  • 327 篇 reliability
  • 301 篇 optimization
  • 283 篇 data mining
  • 274 篇 routing
  • 252 篇 wireless sensor ...
  • 243 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 78 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 68 篇 dept. of informa...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 63 篇 nikhef national ...
  • 61 篇 dept. of compute...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 51 篇 university würzb...
  • 51 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 79 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 73 篇 dallier r.
  • 70 篇 huang f.
  • 66 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 32,742 篇 英文
  • 1,464 篇 其他
  • 309 篇 中文
  • 56 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=dept. of Computer Science and Engineering Student"
34616 条 记 录,以下是4981-4990 订阅
排序:
Study of Feature Extraction Techniques for BCI Processing
Study of Feature Extraction Techniques for BCI Processing
收藏 引用
2022 International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2022
作者: Sudheer, Devulapalli Jothiaruna, N. Potti, Anupama Gangappa, M. Ramasubbareddy, Somula Computer Science and Engineering Vnr Vjiet Hyderabad India Vellore. Institute of Technology Schoolf Computer Science and Enginerring Tamilnadu Vellore India Sree Dattha Institute of Engineering and Science Computer Science and Engineering Hyderabad India Vnr Vjiet Dept. Information Technology Hyderabad India
Brain computer interface (BCI) is used to identify electrical activity in human brain using the electroencephalog-raphy (EEG). EEG records the electrical activity by placing the electrodes on the scalp. By using the r... 详细信息
来源: 评论
Revolutionizing Requirements Elicitation: Deep Learning-Based Classification of Functional and Non-Functional Requirements
Revolutionizing Requirements Elicitation: Deep Learning-Base...
收藏 引用
Pattern Recognition and Machine Learning (PRML), IEEE International Conference on
作者: Grace Hanna Nathan Boyar Nathan Garay Mina Maleki Dept. of Electrical & Computer Engineering & Computer Science University of Detroit Mercy Detroit MI United States
The requirements elicitation phase in the software development life cycle (SDLC) is both critical and challenging, especially in the context of big data and rapid technological advancement. Traditional approaches like... 详细信息
来源: 评论
Exploration and Evaluation of Machine Learning Methods for Detecting Oil Spills in Open Seas
Exploration and Evaluation of Machine Learning Methods for D...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Sibai, Fadi N. Sibai, Ahmad El-Moursy, Ali GUST Engineering & Applied Innovation Research Center Gulf Univ. for Science and Tech. West Mishref Hawalli Kuwait Univ. of South Florida Computer Science & Engg. Dept. TampaFL United States Univ. of Sharjah Comp. Engg. Dept. Sharjah United Arab Emirates
Detecting oil spills in open seas is important for the early containment of the pollution diffusion and avoidance of further ecological catastrophes. Herein, we explore and assess the application of several machine le... 详细信息
来源: 评论
Efficient Host Intrusion Detection using Hyperdimensional Computing
Efficient Host Intrusion Detection using Hyperdimensional Co...
收藏 引用
IEEE International Conference on Big Data
作者: Yujin Nam Rachel King Quinn Burke Minxuan Zhou Patrick McDaniel Tajana Rosing Dept. of Computer Science and Engineering UC San Diego USA Dept. of Computer Sciences University of Wisconsin-Madison Madison USA Computer Science Department Illinois Institute of Technology Chicago USA
Modern host-based intrusion detection systems (HIDS) rely on querying provenance graphs—graph representations of activity history on a system—to detect and respond to security threats present on a system. However, a... 详细信息
来源: 评论
Onboard Near-Real-Time Detection of Harmful Algal Blooms Using a Convolutional Neural Network and Multispectral Imagery from a Satellite in Low Earth Orbit
Onboard Near-Real-Time Detection of Harmful Algal Blooms Usi...
收藏 引用
OCEANS
作者: Jonathan D. Parsons Mae L. Seto Computer Science Dept. Dalhousie University Halifax Canada Mechanical Engineering Dept. Dalhousie University Halifax Canada
Freshwater harmful algal blooms (HABs) pose significant ecological and public health risks worldwide. Detecting HABs soon after they form is critical to managing the damage they cause. While in-situ measurements are m... 详细信息
来源: 评论
Minimize Web Applications vulnerabilities through the early Detection of CRLF Injection
arXiv
收藏 引用
arXiv 2023年
作者: Hasan, M.D. Asibul Rahman, Md. Mijanur Dept. of Computer Science and Engineering Southeast University Bangladesh
Carriage return (CR) and line feed (LF), also known as CRLF injection is a type of vulnerability that allows a hacker to enter special characters into a web application, altering its operation or confusing the adminis... 详细信息
来源: 评论
Smart Cities: Transforming Urban Living with IoT
Smart Cities: Transforming Urban Living with IoT
收藏 引用
International Conference on Inventive Research in Computing Applications (ICIRCA)
作者: Niveditha J D R Kumar Raja UM Ashwin Kumar Post Graduate Student dept of Computer Science and Engineering Reva University Bangalore India
The Internet of Things (IoT) is being used by smart cities to harness the power of the IoT and build more efficient and sustainable urban settings as they quickly adapt to the challenges of urbanization. This study ex...
来源: 评论
Harmonizing open banking in the European Union: an analysis of PSD2 compliance and interrelation with cybersecurity frameworks and standards
收藏 引用
International Cybersecurity Law Review 2024年 第1期5卷 79-120页
作者: Gounari, Marianna Stergiopoulos, George Pipyros, Kosmas Gritzalis, Dimitris Dept. of Information & Communication Systems Engineering University of the Aegean Samos Greece Dept. of Computer Science Philips University Nicosia Cyprus Dept. of Informatics Athens University of Economics & Business Athens Greece
This paper focuses on the security protocols enacted in banking transactions across the European Economic Area (EEA), as stipulated by the Second or Revised Payment Service Directive (commonly referred to as ‘PSD2’ ...
来源: 评论
Blockchain-based certificate authentication system with enabling correction
arXiv
收藏 引用
arXiv 2023年
作者: Rahman, Md. Mijanur Tonmoy, Md Tanzinul Kabir Shihab, Saifur Rahman Farhana, Riya Dept. of Computer Science and Engineering Southeast University Bangladesh
Blockchain has proven to be an emerging technology in the digital world, changing the way everyone thinks about data security and bringing efficiency to several industries. It has already been applied to a wide range ... 详细信息
来源: 评论
High Throughput and Energy Efficient SHA-2 ASIC Design for Continuous Integrity Checking Applications
High Throughput and Energy Efficient SHA-2 ASIC Design for C...
收藏 引用
IEEE European Test Symposium (ETS)
作者: Asimina Koutra Vasileios Tenentes Dept. of Computer Science and Engineering University of Ioannina Greece
High throughput and energy efficient integrated cryptographic hash primitives are important for the continuous integrity checking and tampering detection in secure access management mechanisms of on-chip instrumentati...
来源: 评论