咨询与建议

限定检索结果

文献类型

  • 530,706 篇 会议
  • 6,096 册 图书
  • 5,665 篇 期刊文献
  • 6 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 542,454 篇 电子文献
  • 44 种 纸本馆藏

日期分布

学科分类号

  • 322,598 篇 工学
    • 227,548 篇 计算机科学与技术...
    • 186,100 篇 软件工程
    • 73,314 篇 信息与通信工程
    • 47,224 篇 控制科学与工程
    • 35,475 篇 电气工程
    • 33,289 篇 生物工程
    • 30,026 篇 电子科学与技术(可...
    • 29,637 篇 机械工程
    • 27,823 篇 生物医学工程(可授...
    • 20,161 篇 光学工程
    • 18,307 篇 仪器科学与技术
    • 18,242 篇 化学工程与技术
    • 17,096 篇 动力工程及工程热...
    • 13,353 篇 安全科学与工程
    • 13,049 篇 材料科学与工程(可...
    • 11,834 篇 交通运输工程
    • 10,860 篇 土木工程
  • 147,543 篇 理学
    • 79,811 篇 数学
    • 36,995 篇 物理学
    • 35,897 篇 生物学
    • 24,438 篇 统计学(可授理学、...
    • 17,169 篇 化学
    • 17,121 篇 系统科学
  • 86,320 篇 管理学
    • 53,487 篇 管理科学与工程(可...
    • 36,854 篇 图书情报与档案管...
    • 25,855 篇 工商管理
  • 22,961 篇 医学
    • 19,496 篇 临床医学
    • 18,595 篇 基础医学(可授医学...
    • 12,263 篇 药学(可授医学、理...
  • 14,290 篇 法学
    • 11,670 篇 社会学
  • 10,726 篇 教育学
  • 10,713 篇 经济学
  • 8,219 篇 农学
  • 3,969 篇 文学
  • 1,500 篇 军事学
  • 1,243 篇 艺术学
  • 61 篇 哲学
  • 37 篇 历史学

主题

  • 23,895 篇 computer science
  • 14,673 篇 computational mo...
  • 14,567 篇 accuracy
  • 14,483 篇 feature extracti...
  • 12,100 篇 training
  • 10,194 篇 deep learning
  • 8,812 篇 data mining
  • 8,738 篇 computer archite...
  • 8,710 篇 machine learning
  • 8,290 篇 predictive model...
  • 8,179 篇 support vector m...
  • 7,267 篇 data models
  • 7,237 篇 neural networks
  • 7,082 篇 software enginee...
  • 7,079 篇 real-time system...
  • 6,803 篇 artificial intel...
  • 6,632 篇 convolutional ne...
  • 6,500 篇 educational inst...
  • 6,045 篇 optimization
  • 5,894 篇 visualization

机构

  • 1,898 篇 chitkara univers...
  • 1,328 篇 school of comput...
  • 1,073 篇 school of comput...
  • 1,033 篇 school of comput...
  • 861 篇 school of comput...
  • 659 篇 department of co...
  • 641 篇 school of comput...
  • 576 篇 lovely professio...
  • 565 篇 department of co...
  • 541 篇 school of comput...
  • 532 篇 department of co...
  • 528 篇 college of compu...
  • 523 篇 school of comput...
  • 523 篇 college of compu...
  • 514 篇 maharishi school...
  • 502 篇 school of comput...
  • 469 篇 school of electr...
  • 453 篇 department of co...
  • 450 篇 college of compu...
  • 417 篇 college of compu...

作者

  • 279 篇 wang wei
  • 252 篇 li wei
  • 238 篇 liu yang
  • 234 篇 yang yang
  • 234 篇 china
  • 232 篇 yang liu
  • 228 篇 kukreja vinay
  • 228 篇 vinay kukreja
  • 204 篇 wei wang
  • 164 篇 wei li
  • 162 篇 li li
  • 160 篇 zhang yu
  • 156 篇 zhang wei
  • 151 篇 wei zhang
  • 145 篇 wang lei
  • 143 篇 zhang lei
  • 124 篇 liu wei
  • 123 篇 li yang
  • 111 篇 yang li
  • 110 篇 rahul chauhan

语言

  • 527,264 篇 英文
  • 11,220 篇 其他
  • 5,118 篇 中文
  • 34 篇 西班牙文
  • 31 篇 土耳其文
  • 28 篇 法文
  • 12 篇 葡萄牙文
  • 9 篇 德文
  • 6 篇 俄文
  • 2 篇 乌克兰文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"任意字段=International Conference on Advances in Computer Science and Engineering"
542479 条 记 录,以下是341-350 订阅
排序:
Privacy Preserving Techniques in Data science : A Review
Privacy Preserving Techniques in Data Science : A Review
收藏 引用
2024 international conference on advances in Computing Research on science engineering and Technology, ACROSET 2024
作者: Panchal, Yuvraj Sheikh, Rashid Sethi, Kamal Kumar Bhanodia, Praveen Kumar Rajput, Shiv Shankar Rathore, Narendra Pal Singh Acropolis Institute of Technology and Research Department of Computer Science and Engineering Indore India
In the field of data science, privacy-preserving methods are essential to guaranteeing the moral and secure use of data. This extensive overview study offers an in-depth examination of privacy-preserving approaches, i... 详细信息
来源: 评论
Abstract Thinking of Beginning Electrical engineering and computer science Students  26th
Abstract Thinking of Beginning Electrical Engineering and Co...
收藏 引用
26th international conference on Interactive Collaborative Learning (ICL) - Towards a Hybrid, Flexible and Socially Engaged Higher Education / 52nd IGIP international conference on engineering Pedagogy
作者: Gero, Aharon Hadish, Mohammed Ali Kvatinsky, Shahar Technion Israel Inst Technol Haifa Israel
The Abstract thinking is the capability to deal with relevant information for a given phase while temporarily disregarding the irrelevant details for the current step. Abstract thinking is required in a wide variety o... 详细信息
来源: 评论
Enhancing Malicious URL Detection with Advanced Machine Learning Techniques  1
Enhancing Malicious URL Detection with Advanced Machine Lear...
收藏 引用
1st international conference on advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Alavala, Hemanth Reddy Singh, Shambhavi Joshi, Priyam Basavaraju, Sagar Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Electronics and Communication Engineering Bengaluru India
Malicious URLs pose a significant threat to online security. The can steal our personal information and can even hack out system. Refraining ourselves from using such malicious websites is the need of the hour. This p... 详细信息
来源: 评论
A Hybrid Approach Using Cryptography and K-Least Significant Bit Steganography Algorithm in Cloud Computing  1
A Hybrid Approach Using Cryptography and K-Least Significant...
收藏 引用
1st international conference on advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Goyal, Anshika Gupta, Bhumika VMSB Uttarakhand Technical University Dept. of Computer Science & Engineering Dehradun India G.B. Pant Institute of Engineering & Technology Dept. of Computer Science & Engineering Pauri India
The exponential growth of communication technologies has broadened the cloud computing ecosystem horizon to meet main communication needs. However, in-parallel upsurge in online attacks has alarmed industries to ensur... 详细信息
来源: 评论
A Comparative Exploration of Time Series Models for Wild Fire Prediction  4
A Comparative Exploration of Time Series Models for Wild Fir...
收藏 引用
4th international conference on advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Sri Sowmya, V. Sasikala, D. Theetchenya, S. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India Sona College of Technology Department of Computer Science and Engineering Salem India
Wildfires pose a great threat to human safety and property arising from both natural and human causes. According to a technical assessment by the Forest Survey of India more than 95% of fires are of anthropogenic orig... 详细信息
来源: 评论
Implementing Multi-factor Authentication in Cloud Services for Enhanced Security
Implementing Multi-factor Authentication in Cloud Services f...
收藏 引用
2024 IEEE international conference on Recent advances in science and engineering Technology, ICRASET 2024
作者: Rekha, K. Sashi Sivagami, V.M. Usharani, R. Amutha, T. Pushparani, S. Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Sri Venkateswara College of Engineering Department of Information Technology Tamil Nadu Chennai India Srm Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Computational Intelligence Kattankulathur Chennai India Care College of Engineering Department of Artificial Intelligence & Data Science Tamil Nadu Trichy India Meenakshi College of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
The cloud services which are now the most common data transmission and endanger organizations' confidential information, it's more and more visible that security of any data should be a main priority for compa... 详细信息
来源: 评论
Augmented Reality-Based Product Promotion Application: A Framework and Implementation  1
Augmented Reality-Based Product Promotion Application: A Fra...
收藏 引用
1st IEEE international conference on advances in Computing, Communication and Networking, ICAC2N 2024
作者: Shrivastaw, Nilesh Siddhant Devu Kumar, Prashant Dr. APJ Abdul Kalam Technical University Bachelor of Technology Computer Science and Engineering 4 Year ITS Engineering Colleges India Dr. APJ Abdul Kalam Technical University ITS Engineering Colleges Department of CSE India
This term paper presents a system and usage of an Augmented Reality (AR)-based item advancement application. The proposed framework leverages AR innovation to improve client engagement by overlaying advanced data onto... 详细信息
来源: 评论
Reliability of Electronic Connections in Fast Chargers of Electric Vehicle  1
Reliability of Electronic Connections in Fast Chargers of El...
收藏 引用
1st international conference on advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Semwal, Priyanka Raturi Ekatpure, Shubham Rajendra Sharma, Merlyn Singh, Neelima Kumar, Anil Pandey, Bhumika Tula's Institute Dehradun Department of Electrical & Electronics Engineering Dehradun India Global Supply Chain in Semiconductor Manufacturing Kulicke and Soffa PA United States IIMT College of Engineering Department of ASH UP Grater Noida India Uttaranchal University Department of Computer Science and Engineering Dehradun India Physics Bharati Vidyapeeth's College of Engineering Dept. of Applied Science New Delhi India Bipin Tripathi Kumaon Institute of Technology Department of ECE Almora Dwarahat India
Global mobility is undergoing a dramatic change as cars fuelled by fossil fuels give way to those with zero or extremely low tailpipe emissions. Every one of the parts in big battery packs normally don't have simi... 详细信息
来源: 评论
Smart Music Player Integrating Facial Emotion Recognition and Music Mood Recommendation  15
Smart Music Player Integrating Facial Emotion Recognition an...
收藏 引用
15th international conference on advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Manjunath, K.G. Pramod, Shreedevi Chiranth, T.P. Siddaganga Institute of Technology Tumkur Department of Computer Science and Engineering Karnataka Tumkuru India Brindavan College of Engineering Bagaluru main Road Bangalore India
We came across many applications that are serve solutions and assistance for the music playlist creation recommendation. To provide more facility and the solutions to the music creation and recommendation of music and... 详细信息
来源: 评论
Review of Machine Learning Approaches and Challenges for Detecting Phishing Attacks  15
Review of Machine Learning Approaches and Challenges for Det...
收藏 引用
15th international conference on advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Hiregoudar, Rudragouda Saboji, S.V. Department of Computer Science and Engineering Basaveshwar Engineering College Bagalkot587104 India Visvesvaraya Technological University Belagavi590018 India
Currently, the practise of "phishing" involves sending emails that seem to be from reputable companies to deceive recipients into divulging personal information, including passwords and credit card numbers. ... 详细信息
来源: 评论