咨询与建议

限定检索结果

文献类型

  • 22,015 篇 会议
  • 19,447 篇 期刊文献
  • 514 册 图书

馆藏范围

  • 41,976 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,849 篇 工学
    • 14,064 篇 计算机科学与技术...
    • 11,069 篇 软件工程
    • 5,255 篇 信息与通信工程
    • 4,282 篇 电子科学与技术(可...
    • 4,223 篇 电气工程
    • 3,416 篇 控制科学与工程
    • 2,954 篇 光学工程
    • 2,847 篇 生物工程
    • 2,594 篇 生物医学工程(可授...
    • 2,033 篇 化学工程与技术
    • 2,018 篇 材料科学与工程(可...
    • 1,645 篇 仪器科学与技术
    • 1,509 篇 机械工程
    • 1,361 篇 动力工程及工程热...
    • 886 篇 网络空间安全
    • 810 篇 安全科学与工程
  • 17,481 篇 理学
    • 8,273 篇 物理学
    • 6,550 篇 数学
    • 3,520 篇 生物学
    • 2,475 篇 化学
    • 2,283 篇 统计学(可授理学、...
    • 1,297 篇 系统科学
  • 5,485 篇 管理学
    • 3,472 篇 管理科学与工程(可...
    • 2,132 篇 图书情报与档案管...
    • 1,693 篇 工商管理
  • 2,924 篇 医学
    • 2,367 篇 临床医学
    • 1,975 篇 基础医学(可授医学...
    • 1,211 篇 药学(可授医学、理...
    • 1,112 篇 公共卫生与预防医...
  • 1,019 篇 法学
    • 862 篇 社会学
  • 662 篇 经济学
  • 640 篇 农学
  • 407 篇 教育学
  • 172 篇 文学
  • 80 篇 军事学
  • 54 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 1,024 篇 accuracy
  • 988 篇 deep learning
  • 839 篇 machine learning
  • 821 篇 computer science
  • 633 篇 feature extracti...
  • 618 篇 computational mo...
  • 566 篇 training
  • 554 篇 internet of thin...
  • 547 篇 artificial intel...
  • 481 篇 real-time system...
  • 419 篇 support vector m...
  • 376 篇 predictive model...
  • 368 篇 convolutional ne...
  • 353 篇 optimization
  • 295 篇 reliability
  • 273 篇 scalability
  • 266 篇 data models
  • 242 篇 computer archite...
  • 234 篇 security
  • 227 篇 reinforcement le...

机构

  • 1,102 篇 cavendish labora...
  • 1,030 篇 department of ph...
  • 978 篇 oliver lodge lab...
  • 978 篇 physikalisches i...
  • 706 篇 university of ch...
  • 658 篇 infn laboratori ...
  • 622 篇 infn sezione di ...
  • 603 篇 infn sezione di ...
  • 598 篇 fakultät physik ...
  • 588 篇 infn sezione di ...
  • 557 篇 school of physic...
  • 553 篇 department of ph...
  • 539 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 524 篇 school of physic...
  • 521 篇 imperial college...
  • 520 篇 iccub universita...
  • 514 篇 nikhef national ...
  • 513 篇 h.h. wills physi...
  • 509 篇 stfc rutherford ...

作者

  • 270 篇 barter w.
  • 255 篇 a. gomes
  • 244 篇 c. alexa
  • 244 篇 beiter a.
  • 242 篇 j. m. izen
  • 239 篇 bellee v.
  • 233 篇 brundu d.
  • 232 篇 blake t.
  • 231 篇 g. bella
  • 231 篇 c. amelung
  • 231 篇 bowcock t.j.v.
  • 230 篇 j. strandberg
  • 230 篇 d. calvet
  • 230 篇 j. wang
  • 227 篇 s. chen
  • 225 篇 g. spigo
  • 223 篇 amato s.
  • 220 篇 f. siegert
  • 219 篇 betancourt c.
  • 219 篇 boettcher t.

语言

  • 35,863 篇 英文
  • 5,760 篇 其他
  • 363 篇 中文
  • 20 篇 日文
  • 15 篇 德文
  • 9 篇 法文
  • 5 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Applied Computing Research Institute Department Of Computer Science and Computer Engineering"
41976 条 记 录,以下是851-860 订阅
排序:
Optimized Deep Learning Mechanism for Intrusion Detection: Leveraging RFE-Based Feature Selection and PCA for Improved Accuracy  5
Optimized Deep Learning Mechanism for Intrusion Detection: L...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Rajkumar, M. Vs, Lakshi Karthik, R. Pavithra, S. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Smart Computing Tamil Nadu India B. Tech-Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu India
With the growing demand for wireless networks, network traffic has surged, particularly involving large-scale data transmission. This results in an increased number of network security threats and the emergence of var... 详细信息
来源: 评论
Forest Fire Detection using computer Vision  3
Forest Fire Detection using Computer Vision
收藏 引用
3rd International Conference on Electronics and Sustainable Communication Systems, ICESC 2022
作者: Prasanna Rahavendra, A. Praneash, G.P. Rashmika, T. Natarajan, Aravindhraj Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Coimbatore India
Every year, approximately 70,000 wildfires occur around the world. Forest fires can have a variety of negative effects on forest cover, soil, tree development, vegetation, and general flora and fauna. Fires destroy se... 详细信息
来源: 评论
Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 933-949页
作者: M.V.Rajesh T.Archana Acharya Hafis Hajiyev E.Laxmi Lydia Haya Mesfer Alshahrani Mohamed K Nour Abdullah Mohamed Mesfer Al Duhayyim Department of Computer Science and Engineering Aditya Engineering CollegeSurampalem533437India Department of Business Administration Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Accounting and Audit Azerbaijan State University of Economics(UNEC)BakuRepublic of Azerbaijan Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Research Centre Future University in EgyptNew Cairo11845Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Recently,Internet of Things(IoT)has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track *** sensor network(WSN)is a vital element of IoT... 详细信息
来源: 评论
Power and Area Optimized Memristor-Based Majority Identifier for Digital Applications  3
Power and Area Optimized Memristor-Based Majority Identifier...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Raj, P. Michael Preetam Vittapu, Sravan K. Chinnasamy, P. Gupta, Manu Samatha, K. Sasivijaya, K. Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India Nalla Narasimha Reddy Education Society's Group of Institutions Department of Electronics and Communication Engineering Hyderabad India Kalasalingam Academy of Research and Education Dept. of Computer Science and Engineering Tamil Nadu India Sreenidhi Institute of Science and Technology Department of Electronics and Computer Engineering Hyderabad India
In earlier developments, CMOS technology played a great role in realizing majority identifiers. There are huge drawbacks that affect the circuit's performance. To overcome the drawbacks of CMOS-based majority Iden... 详细信息
来源: 评论
Integrating Cloud-based Data Mining Algorithms for Smart City Infrastructure Management and Decision Support Systems  4
Integrating Cloud-based Data Mining Algorithms for Smart Cit...
收藏 引用
4th International Conference on Soft computing for Security Applications, ICSCSA 2024
作者: Guru Vimal Kumar, M. Jude Moses Anto Devakanth, J. Selvapandian, D. Venkatesan, R. Revathi, J. Aruna, R. Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai India Madanapalle Institute of Technology & Science Department of Computer Applications Chittoor India Academy of Higher Education Department of Computer Science and Engineering Coimbatore India Bannari Amman Institute of Technology Department of Information Technology Erode India Kongu Engineering College Department of Mathematics Erode India Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology School of Computing Department of Computer Science and Engineering Chennai India
This study explores cloud-based data mining algorithm integration in elevating smart city infrastructure management and decision support systems. Specifically, the authors focus on optimizing traffic management throug... 详细信息
来源: 评论
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 114-125页
作者: Yu-Ang Wang Zidong Wang Lei Zou Bo Shen Hongli Dong the College of Information Science and Technology Donghua University the Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of Education IEEE the College of Electrical Engineering and Automation Shandong University of Science and Technology the Department of Computer Science Brunel University London Uxbridge the Sanya Offshore Oil and Gas Research Institute Northeast Petroleum University the Artificial Intelligence Energy Research Institute Northeast Petroleum University Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum University
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... 详细信息
来源: 评论
Stacking Classifier-based Automated Insurance Fraud Detection System
Stacking Classifier-based Automated Insurance Fraud Detectio...
收藏 引用
2022 IEEE Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2022
作者: Shanthini, M. Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Coimbatore India
During the Covid-19 pandemic, the insurance industry's digital shift quickened, resulting in a surge in insurance fraud. To combat insurance fraud, a system that securely manages and monitors insurance processes m... 详细信息
来源: 评论
Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol  5
Strengthening Authentication: The Role of Multi-Level Hashin...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Hariharasudhan, S. Varghese, Vineetha Malarvizhi, K. Santhoshkumar, S.P. Nalini, T. Vikram, D. Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai Avadi India Rathinam Technical Campus Department of Computer Science and Engineering Coimbatore India Jct College of Engineering and Technology Department of Computer Science Al Business Systems Coimbatore India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology School of Computing Department of Computer Science and Engineering Chennai Avadi India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Saveetha University Department of Computer Science and Engineering Chennai India Rathinam Technical Campus Department of Artificial Intelligence Data Science Coimbatore India
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ... 详细信息
来源: 评论
Drawing Order Diagrams Through Two-Dimension Extension
收藏 引用
Journal of Graph Algorithms and Applications 2023年 第9期27卷 783-802页
作者: Dürrschnabel, Dominik Hanika, Tom Stumme, Gerd Knowledge & Data Engineering Group Research Center for Information System Design & Department of Electrical Engineering and Computer Science University of Kassel Germany Institute of Computer Science University of Hildesheim Germany Berlin School of Library and Information Science Humboldt-Universität zu Berlin Germany
Ordinal real-world data such as concept hierarchies, ontologies, genealogies, or task dependencies in scheduling often has the property to not only contain pairwise comparable, but also incomparable elements. Order di... 详细信息
来源: 评论
A multi-feature-based intelligent redundancy elimination scheme for cloud-assisted health systems
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第2期9卷 491-510页
作者: Ling Xiao Beiji Zou Xiaoyan Kui Chengzhang Zhu Wensheng Zhang Xuebing Yang Bob Zhang School of Computer Science and Engineering Central South UniversityChangshaChina Hunan Engineering Research Center of Machine Vision and Intelligent Medicine Central South UniversityChangshaChina The College of Literature and Journalism Central South UniversityChangshaChina Institute of Automation Chinese Academy of SciencesBeijingChina Department of Computer and Information Science University of MacaoMacaoChina
Redundancy elimination techniques are extensively investigated to reduce storage overheads for cloud-assisted health *** eliminates the redundancy of duplicate blocks by storing one physical instance referenced by mul... 详细信息
来源: 评论