咨询与建议

限定检索结果

文献类型

  • 30,380 篇 会议
  • 4,640 篇 期刊文献
  • 236 册 图书

馆藏范围

  • 35,256 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,791 篇 工学
    • 15,761 篇 计算机科学与技术...
    • 13,251 篇 软件工程
    • 5,816 篇 信息与通信工程
    • 3,434 篇 控制科学与工程
    • 2,683 篇 电子科学与技术(可...
    • 2,618 篇 电气工程
    • 2,351 篇 生物工程
    • 1,891 篇 生物医学工程(可授...
    • 1,538 篇 光学工程
    • 1,346 篇 机械工程
    • 1,217 篇 动力工程及工程热...
    • 1,204 篇 仪器科学与技术
    • 1,016 篇 化学工程与技术
    • 855 篇 安全科学与工程
    • 721 篇 交通运输工程
  • 11,170 篇 理学
    • 6,041 篇 数学
    • 3,059 篇 物理学
    • 2,570 篇 生物学
    • 1,996 篇 统计学(可授理学、...
    • 1,336 篇 系统科学
    • 1,088 篇 化学
  • 5,626 篇 管理学
    • 3,281 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,825 篇 工商管理
  • 1,600 篇 医学
    • 1,389 篇 临床医学
    • 1,299 篇 基础医学(可授医学...
    • 851 篇 药学(可授医学、理...
    • 677 篇 公共卫生与预防医...
  • 1,028 篇 法学
    • 822 篇 社会学
  • 644 篇 经济学
    • 644 篇 应用经济学
  • 490 篇 农学
  • 430 篇 教育学
  • 156 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,120 篇 accuracy
  • 867 篇 feature extracti...
  • 860 篇 computational mo...
  • 740 篇 deep learning
  • 691 篇 training
  • 679 篇 computer science
  • 538 篇 real-time system...
  • 523 篇 support vector m...
  • 509 篇 machine learning
  • 457 篇 predictive model...
  • 426 篇 internet of thin...
  • 378 篇 convolutional ne...
  • 363 篇 data models
  • 351 篇 computer archite...
  • 334 篇 reliability
  • 316 篇 optimization
  • 284 篇 data mining
  • 281 篇 routing
  • 255 篇 conferences
  • 252 篇 wireless sensor ...

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 78 篇 tno technical sc...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 65 篇 dept. of informa...
  • 62 篇 nikhef national ...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 54 篇 dept. of compute...
  • 53 篇 dept. of compute...
  • 52 篇 school of automa...
  • 50 篇 leiden universit...
  • 48 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 44 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 75 篇 coleiro a.
  • 75 篇 gozzini s.r.
  • 71 篇 huang f.
  • 67 篇 dallier r.
  • 60 篇 anguita m.
  • 54 篇 kulikovskiy v.
  • 42 篇 benoit d.m.
  • 42 篇 eddymaoui a.
  • 42 篇 labalme m.
  • 41 篇 gagliardini s.
  • 41 篇 del burgo r.

语言

  • 31,520 篇 英文
  • 3,341 篇 其他
  • 299 篇 中文
  • 54 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Applications in Science and Engineering dept."
35256 条 记 录,以下是1091-1100 订阅
排序:
Footwear 3D Model Generation from Smartphone 2D Images Utilizing Photogrammetry  3
Footwear 3D Model Generation from Smartphone 2D Images Utili...
收藏 引用
3rd International Conference on Electrical, computer and Communication engineering, ECCE 2023
作者: Abrar, Raiyan Islam, Md. Tariquel Naim, Mahapara Tabassum, Nuzhat Military Institute of Science and Technology Dept. of Computer Science and Engineering Dhaka Bangladesh
3D modeling in the shoe industry is growing as the technology becomes more widely available. 3D modeling lets companies customize shoes for individual customers, making manufacturing more flexible and efficient. In th... 详细信息
来源: 评论
Air Quality Evaluator using Arduino  6
Air Quality Evaluator using Arduino
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Pavan Ganesh Reedy, Y. Kadali Jagadees, H. Pravin, A. Dept. of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Air pollution has a negative impact on our ability to do daily tasks and on our standard of living. Ecosystems and human well-being are under danger. Recent years have seen a notable increase in heavy industry, leavin... 详细信息
来源: 评论
Artificial Neural Network Technique for DDOS Attack Prediction in Cyber-IOT System  3
Artificial Neural Network Technique for DDOS Attack Predicti...
收藏 引用
3rd International Conference on Technological Advancements in Computational sciences, ICTACS 2023
作者: Asad, Md Tiwari, Rakesh Kumar Technocrats Institute of Technology & Science Dept. of Computer Science Engineering Bhopal India
An intrusion-detection IoT framework is designed to analyze unauthorized access or security breaches in IoT networks. These systems typically use a combination of hardware and software to analyze network traffic, iden... 详细信息
来源: 评论
Recognition of Data Breach Method from Story Using Advanced Deep Learning  3
Recognition of Data Breach Method from Story Using Advanced ...
收藏 引用
3rd International Conference for Innovation in Technology, INOCON 2024
作者: Jeba, Samiha Maisha Aurpa, Tanjim Taharat Alom, Md Samiul Joy, Md. Wadud Mahmud Ahamed, Asm Shakil Dash, Satya Ranjan Ahmed, Md Shoaib International University of Business Agriculture and Technology Dept. of Computer Science and Engineering Bangladesh Bangabandhu Sheikh Mujibur Rahman Digital University Department of Data Science Bangladesh Kiit University School of Computer Applications Odisha India Boise State University Department of Computer Science BoiseID United States
We often open our eyes in the morning with the appalling news of data breaches of different popular companies. This is a significant threat not only to giant companies but also to the general people's privacy. Var... 详细信息
来源: 评论
Adaptive Contour Noise Generation Network for Semi-supervised Medical Data Segmentation  6
Adaptive Contour Noise Generation Network for Semi-supervise...
收藏 引用
6th International Conference on Artificial Intelligence and Big Data, ICAIBD 2023
作者: Ye, Shunlong Nanjing University of Science and Technology Dept. of Computer Science and Engineering Nanjing China
When training convolutional neural networks, noise distribution in data can affect segmentation accuracy. Therefore, many neural networks will strengthen the segmentation ability of the model by artificially adding no... 详细信息
来源: 评论
An Efficient Deep Learning Technique for Intrusion Detection in Wireless Sensor Network  3
An Efficient Deep Learning Technique for Intrusion Detection...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Kumari, Prity Tiwari, Rakesh Kumar Technocrats Institute of Technology and Science Dept. of Computer Science Engineering Bhopal India
Predicting intrusion detection in a wireless sensor network (WSN) involves using machine learning algorithms to analyze network traffic data and predict whether an intrusion or security breach will occur. The goal of ... 详细信息
来源: 评论
Intelligent System for Detection of Intrusion in Imbalanced Network Traffic  14
Intelligent System for Detection of Intrusion in Imbalanced ...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Bagla, Piyush Mishra, Amit Kumar Pandey, Neeraj Kumar Sharma, Ravi Dumka, Ankur National Institute of Technology Department of Computer Science & Engineering Jalandhar India Graphic Era Hill University Dept. of Computer Science & Engineering Dehradun India Department of Computer Science & Engineering Dehradun India Women Institute of Technology Department of Computer Science & Engineering Uttarakhand Dehradun India
Malicious cyberattacks can frequently hide among enormous amounts of regular data in networks with uneven traffic patterns. The identification of imbalance network traffic is difficult to find and making a challenge i... 详细信息
来源: 评论
GANs for Synthetic Environmental Data Generation (Air Quality) for Low-Resource Regions  2
GANs for Synthetic Environmental Data Generation (Air Qualit...
收藏 引用
2nd International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2024
作者: Verma, Seema Jain, Neha Mahapatra, Madhumita Setia, Sonia Sachdeva, Vrinda Kumar, Manoj Dept. of Computer Science & Engineering Delhi Technical campus Uttar Pradesh Greater Noida India Dept. of Computer Science & Engineering Sharda University Uttar Pradesh Greater Noida India Dept. of Computer Science & Engineering G.L Bajaj Institute of Technology and Management Uttar Pradesh Greater Noida India Uttar Pradesh Ghaziabad India
Due to the significant expenses and logistical difficulties involved in deploying monitoring equipment, many areas, especially those in developing nations, lack adequate environmental data. This work presents a novel ... 详细信息
来源: 评论
A Review on Identification of Unreliability and Fakeness in Social Media Posts using Blockchain Technology  9
A Review on Identification of Unreliability and Fakeness in ...
收藏 引用
9th International Conference on Computing for Sustainable Global Development, INDIACom 2022
作者: Bajpai, Saumya Tripathi Sharma, Dilip Kumar Gla University Dept. of Computer Engineering and Applications Mathura India
With the rapidly growing news industry and usage of social media, the spread of fake news and solution to interrupt this spread has become a big concern. Due to the digitization, anyone can generate a piece of news an... 详细信息
来源: 评论
Design of Alcohol Detection and Alert System for Vehicles  1
Design of Alcohol Detection and Alert System for Vehicles
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Bhardwaj, Indu Saravanan, D. Bhardwaj, Ajay Yadav, Daman Kumari, Vijeta Kumar, R Ramesh Galgotias University Dept. of Electrical Electronics and Communication Engineering Greater Noida India Madanapalle Institute of Technology and Science Dept. of Electrical and Electronics Engineering India Delhi Technological University Dept. of Computer Science and Engineering New Delhi India
Recent days accidents are increasing on an exponential basis due to drinking and drive. Driving after drinking alcohol is a major cause of the majority of the accidents due to which sometimes innocent people lose thei... 详细信息
来源: 评论