咨询与建议

限定检索结果

文献类型

  • 30,335 篇 会议
  • 4,649 篇 期刊文献
  • 237 册 图书

馆藏范围

  • 35,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,813 篇 工学
    • 15,775 篇 计算机科学与技术...
    • 13,278 篇 软件工程
    • 5,816 篇 信息与通信工程
    • 3,434 篇 控制科学与工程
    • 2,680 篇 电子科学与技术(可...
    • 2,619 篇 电气工程
    • 2,354 篇 生物工程
    • 1,892 篇 生物医学工程(可授...
    • 1,538 篇 光学工程
    • 1,348 篇 机械工程
    • 1,221 篇 动力工程及工程热...
    • 1,206 篇 仪器科学与技术
    • 1,018 篇 化学工程与技术
    • 858 篇 安全科学与工程
    • 721 篇 交通运输工程
  • 11,181 篇 理学
    • 6,050 篇 数学
    • 3,059 篇 物理学
    • 2,573 篇 生物学
    • 2,001 篇 统计学(可授理学、...
    • 1,338 篇 系统科学
    • 1,090 篇 化学
  • 5,625 篇 管理学
    • 3,288 篇 管理科学与工程(可...
    • 2,617 篇 图书情报与档案管...
    • 1,827 篇 工商管理
  • 1,600 篇 医学
    • 1,388 篇 临床医学
    • 1,300 篇 基础医学(可授医学...
    • 851 篇 药学(可授医学、理...
    • 678 篇 公共卫生与预防医...
  • 1,030 篇 法学
    • 824 篇 社会学
  • 645 篇 经济学
    • 645 篇 应用经济学
  • 491 篇 农学
  • 430 篇 教育学
  • 156 篇 文学
  • 77 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,099 篇 accuracy
  • 862 篇 feature extracti...
  • 843 篇 computational mo...
  • 729 篇 deep learning
  • 678 篇 computer science
  • 678 篇 training
  • 521 篇 real-time system...
  • 517 篇 support vector m...
  • 496 篇 machine learning
  • 446 篇 predictive model...
  • 424 篇 internet of thin...
  • 372 篇 convolutional ne...
  • 356 篇 data models
  • 349 篇 computer archite...
  • 330 篇 reliability
  • 308 篇 optimization
  • 289 篇 data mining
  • 281 篇 routing
  • 263 篇 wireless sensor ...
  • 253 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 76 篇 tno technical sc...
  • 67 篇 université de st...
  • 67 篇 dept. of informa...
  • 66 篇 università di ca...
  • 65 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 57 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 52 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 46 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 70 篇 huang f.
  • 70 篇 dallier r.
  • 60 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,307 篇 英文
  • 1,503 篇 其他
  • 311 篇 中文
  • 54 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Applications in Science and Engineering dept."
35221 条 记 录,以下是1001-1010 订阅
排序:
A New Proposed Hybrid Page Replacement Algorithm (HPRA) in Real Time Systems.  5
A New Proposed Hybrid Page Replacement Algorithm (HPRA) in R...
收藏 引用
5th International Conference on Smart Systems and Inventive Technology, ICSSIT 2023
作者: Banerjee, Pallab Raj, Vivek Thakur, Kanika Kumar, Biresh Dehury, Mohan Kumar Amity University Jharkhand Dept. of Computer Science Engineering Ranchi India Amity University Jharkhand Dept. of Computer Science and It Ranchi India
Programming code is variable length. As code size grows larger than primary memory, virtual memory is a relevant concept. As the concept suggests, virtual memory allows to extend primary storage usage with storage dev... 详细信息
来源: 评论
Federated Learning for Cybersecurity: A Promising Frontier  2
Federated Learning for Cybersecurity: A Promising Frontier
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Ananya, G. Bindu Madhavi, V. Murthy, Monisha Guruprasad, N. Global Academy of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India Buddha Institute of Technology Computer Science and Engineering Uttar Pradesh Gorakhpur India
In today's world, Artificial Intelligence and Machine Learning are transforming many industries, but they rely on huge amounts of data leading to privacy issues. A better alternative is Federated learning. Federat... 详细信息
来源: 评论
Cloud Cryptography: Mechanism of Different Encryption Standards  18
Cloud Cryptography: Mechanism of Different Encryption Standa...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Lanke, Ravikumar Md Zubair Rahman, A.M.J. Bhardwaj, Rajat Somashekhara Reddy, D. Jain, Parth Mahesh, T.R. Dept. of Computer Science and Engineering Bangalore India Al-Ameen Engineering College Karundevanpalayam Erode India Aset Amity University Department of Computer Science and Engineering Bengaluru India
The term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. The provision of computing services, including sto... 详细信息
来源: 评论
Automating Dermatological Diagnosis - A Comparative Analysis  5
Automating Dermatological Diagnosis - A Comparative Analysis
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Johnson, Aleen Arora, Vishnupriya Aggarwal, Lakshita Goswami, Puneet Srm University Dept. Of Computer Science & Engineering Haryana Sonepat India Srm University Dept. Of Computer Science Haryana Sonepat India
Evolving and adapting healthcare along with growing technology is an urgent need of an hour using machine learning is an addition to classify health data for the large aspect of identifying dermatological illness. Con... 详细信息
来源: 评论
JARVIS - Smart AI Support System  3
JARVIS - Smart AI Support System
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Ramya Manaswi, V. Saketh, Meduri Ravi Tejha, Mandumula Sai Karthikeya, Atluri Sai Prakash, Dharani Chandra Alkhayyat, Ahmad Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science Engineering Hyderabad India Gitam University Dept. of Computer Science Engineering with Specialisation of Cybersecurity Hyderabad India K.G Reddy College of Engineering and Technology Dept. of Electronics & Communication Engineering Telangana Hyderabad India College of Technical Engineering The Islamic University Dept. of Computers Techniques Engineering Najaf Iraq
The JARVIS AI Support System represents a remarkable fusion of modern technology, blending a sophisticated GUI design, seamless voice control, and inventive features like the captivating 'Air Canvas' facilitat... 详细信息
来源: 评论
Predicting DDoS Attacks: A Machine Learning Approach using ALDDoS Dataset  15
Predicting DDoS Attacks: A Machine Learning Approach using A...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Shookdeb, Shantanu Muduli, Debendra Bhatta, Sandesh Adhikari, Aayush Sapkota, Aaron Chaturvedi, Prabhat C V Raman Global University Dept. of computer Science and Eng. Bhubaneswar India C V Raman Global University Dept. of computer Science and Engineering Bhubaneswar India
The DDoS attack stands as Distributed Denial of Service attack refers a harmful effort to intercept on the regular traffic of a targeted web service or server. DDoS attack interferes with the normal network flow of th... 详细信息
来源: 评论
Ethereum Fraud Prevention: A Supervised Learning Approach for Fraudulent Account Recognition  1
Ethereum Fraud Prevention: A Supervised Learning Approach fo...
收藏 引用
1st International Conference on Trends in engineering Systems and Technologies, ICTEST 2024
作者: Dutta, Sourav Sharma, Anjali Rajgor, Jaymin Lovely Professional University Punjab Dept. of Computer Science and Engg. Kolkata India Jss Academy of Technical Education Dept. of Computer Science and Engg. Bangalore India Shan and Anchor Kutchhi Engineering College Dept. of Computer Science and Engg. Mumbai India
In recent times, blockchain technology, especially Ethereum, has gained tremendous popularity for supporting various financial transactions. Ethereum, the second most prominent cryptocurrency platform after Bitcoin, p... 详细信息
来源: 评论
Enhanced Classification of Alzheimer's Disease Using Deep Learning and Machine Learning Models with MRI Scans
Enhanced Classification of Alzheimer's Disease Using Deep Le...
收藏 引用
2024 International Conference on Frontiers of Information Technology, FIT 2024
作者: Salahudin, Amna Qadeer, Eeman Ahmed, Ayesha Fahad, Labiba Gillani Dept. of Software Engineering FAST National University of Computer and Emerging Sciences Islamabad Pakistan Dept. of Computer Science FAST National University of Computer and Emerging Sciences Islamabad Pakistan
Alzheimer's disease (AD) is a slowly progressive neurodegenerative disease, which necessitates early and accurate diagnosis for effective management. This research presents a comprehensive approach to the classifi... 详细信息
来源: 评论
Suitable and Style-Consistent Multi-Texture Recommendation for Cartoon Illustrations
收藏 引用
ACM Transactions on Multimedia Computing, Communications and applications 2024年 第7期20卷 1-26页
作者: Wu, Huisi Wang, Zhaoze Li, Yifan Liu, Xueting Lee, Tong-Yee College of Computer Science and Software Engineering Shenzhen University No. 3688 Nanhai Road Nanshan District Guangdong Shenzhen518060 China Dept. of Computer Science and Information Engineering National Cheng-Kung University No. 1 University Road Tainan70101 Taiwan
Texture plays an important role in cartoon illustrations to display object materials and enrich visual experiences. Unfortunately, manually designing and drawing an appropriate texture is not easy even for proficient ... 详细信息
来源: 评论
A Time-varying Velocity Control Strategy for Balancing Exploration and Exploitation Behaviour of a Binary PSO
A Time-varying Velocity Control Strategy for Balancing Explo...
收藏 引用
2023 International Conference on Next-Generation Computing, IoT and Machine Learning, NCIM 2023
作者: Siddique, Md. Abu Bakkar Islam, Md. Jakirul DUET Gazipur Dept. of Computer Science and Engineering Gazipur Bangladesh
Combinatorial optimization problems (COPs) are NP-hard, and their solution space is discrete, which poses a significant challenge for optimization algorithms. Binary Particle Swarm Optimization (BPSO) is wel-known opt... 详细信息
来源: 评论