咨询与建议

限定检索结果

文献类型

  • 425,951 篇 会议
  • 158,610 篇 期刊文献
  • 3,628 册 图书
  • 16 篇 学位论文

馆藏范围

  • 588,203 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,950 篇 工学
    • 229,359 篇 计算机科学与技术...
    • 187,035 篇 软件工程
    • 82,090 篇 信息与通信工程
    • 53,342 篇 控制科学与工程
    • 44,988 篇 电气工程
    • 44,130 篇 电子科学与技术(可...
    • 38,817 篇 生物工程
    • 28,669 篇 生物医学工程(可授...
    • 25,667 篇 光学工程
    • 24,351 篇 机械工程
    • 19,046 篇 化学工程与技术
    • 18,455 篇 仪器科学与技术
    • 17,588 篇 动力工程及工程热...
    • 15,023 篇 材料科学与工程(可...
    • 12,172 篇 安全科学与工程
    • 11,329 篇 交通运输工程
    • 11,045 篇 网络空间安全
  • 186,181 篇 理学
    • 94,732 篇 数学
    • 58,037 篇 物理学
    • 43,303 篇 生物学
    • 30,721 篇 统计学(可授理学、...
    • 21,682 篇 系统科学
    • 19,978 篇 化学
  • 86,268 篇 管理学
    • 51,819 篇 管理科学与工程(可...
    • 38,034 篇 图书情报与档案管...
    • 24,609 篇 工商管理
  • 26,108 篇 医学
    • 22,036 篇 临床医学
    • 19,940 篇 基础医学(可授医学...
    • 12,687 篇 药学(可授医学、理...
  • 15,472 篇 法学
    • 12,643 篇 社会学
  • 9,469 篇 经济学
  • 7,464 篇 农学
  • 6,352 篇 教育学
  • 2,634 篇 文学
  • 1,325 篇 军事学
  • 843 篇 艺术学
  • 103 篇 哲学
  • 57 篇 历史学

主题

  • 26,566 篇 computer science
  • 14,207 篇 accuracy
  • 13,955 篇 computational mo...
  • 13,610 篇 feature extracti...
  • 11,745 篇 deep learning
  • 11,448 篇 training
  • 10,505 篇 machine learning
  • 8,020 篇 predictive model...
  • 7,973 篇 data mining
  • 7,602 篇 support vector m...
  • 7,425 篇 computer archite...
  • 7,320 篇 optimization
  • 6,853 篇 real-time system...
  • 6,835 篇 neural networks
  • 6,744 篇 wireless sensor ...
  • 6,686 篇 data models
  • 6,503 篇 convolutional ne...
  • 6,417 篇 costs
  • 6,332 篇 algorithm design...
  • 6,225 篇 protocols

机构

  • 2,471 篇 school of comput...
  • 2,190 篇 school of comput...
  • 2,145 篇 chitkara univers...
  • 2,070 篇 school of comput...
  • 1,784 篇 school of comput...
  • 1,692 篇 department of co...
  • 1,448 篇 school of comput...
  • 1,428 篇 school of comput...
  • 1,332 篇 department of co...
  • 1,318 篇 department of el...
  • 1,316 篇 school of comput...
  • 1,295 篇 school of electr...
  • 1,191 篇 school of comput...
  • 1,154 篇 college of compu...
  • 1,125 篇 department of el...
  • 1,001 篇 school of comput...
  • 1,000 篇 university of ch...
  • 971 篇 department of ph...
  • 951 篇 college of compu...
  • 948 篇 cavendish labora...

作者

  • 421 篇 niyato dusit
  • 325 篇 liu yang
  • 280 篇 yang yang
  • 252 篇 barter w.
  • 234 篇 wang wei
  • 229 篇 blake t.
  • 228 篇 s. chen
  • 227 篇 j. wang
  • 222 篇 betancourt c.
  • 220 篇 borsato m.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 215 篇 amato s.
  • 210 篇 brundu d.
  • 209 篇 boettcher t.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 194 篇 c. alexa
  • 192 篇 j. m. izen
  • 191 篇 c. amelung

语言

  • 520,739 篇 英文
  • 60,711 篇 其他
  • 7,076 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 84 篇 德文
  • 55 篇 法文
  • 50 篇 斯洛文尼亚文
  • 15 篇 西班牙文
  • 12 篇 阿拉伯文
  • 11 篇 俄文
  • 7 篇 土耳其文
  • 6 篇 葡萄牙文
  • 5 篇 捷克文
  • 5 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Engineering and Computer Science"
588205 条 记 录,以下是4631-4640 订阅
A Comprehensive Analysis of Poisoning Attack and Defence Strategies in Machine Learning Techniques  5
A Comprehensive Analysis of Poisoning Attack and Defence Str...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Surekha, M. Sagar, Anil Kumar Khemchandani, Vineeta Sharda University Computer Science and Engineering Uttar Pradesh Greater Noida India Galgotias University Computer Science and Engineering Uttar Pradesh Greater Noida India
Machine learning (ML) models have achieved remarkable success in various domains making them indispensable tools for critical applications. However, their susceptibility to adversarial attacks, particularly poisoning ... 详细信息
来源: 评论
A novel method using matrix coding on-chain and sharing multimedia data for improved usability and reliability
收藏 引用
Multimedia Tools and Applications 2024年 第40期83卷 87727-87748页
作者: Yang, Lizhu Qin, Yong School of Computer Science and Engineering Guangzhou Institute of Science and Technology Guangzhou China School of Cyberspace Security Dongguan University of Technology Dongguan China
Blockchain technology has the characteristics of non-tampering and forgery, traceability, and so on, which have good application advantages for the storage of multimedia data. So we propose a novel method using matrix... 详细信息
来源: 评论
Secure Access Control of Cloud Data Using DNA Computing  5
Secure Access Control of Cloud Data Using DNA Computing
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Kumar, Tarun Kumar, Prabhat Namasudra, Suyel National Institute of Technology Department of Computer Science and Engineering Bihar Patna India National Institute of Technology Department of Computer Science and Engineering Tripura Agartala India
With the exponential development in the usage of cloud data storage across a variety of applications, developing effective access control measures to secure sensitive user data has become critical. This research prese... 详细信息
来源: 评论
Mental Health Monitoring Using Deep Learning Technique for Early-Stage Depression Detection
收藏 引用
SN computer science 2023年 第6期4卷 1-14页
作者: Singh, Khushboo Ahirwal, Mitul Kumar Pandey, Manish Department of Computer Science and Engineering MANIT Bhopal India
An electroencephalogram, often known as an EEG, can detect neuronal activity by analysing the electrical currents that are generated within the brain by a collection of specific pyramidal cells as a result of the sync... 详细信息
来源: 评论
Renewable Energy Consumption on Solar and Wind Energy Prediction Using Deep Learning and Generative AI  5
Renewable Energy Consumption on Solar and Wind Energy Predic...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Arunkumar, Aluru Pandiyarajan, Pandiselvam Akshaya, S.B.L. Archana, Anthapu Archana, Akula Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering India
Solar and wind energy harvest electricity without producing harmful greenhouse gases or pollutants, considerably dipping their environmental impact when measured against fossil fuels. To forecast solar and wind energy... 详细信息
来源: 评论
3D-EffiViTCaps: 3D Efficient Vision Transformer with Capsule for Medical Image Segmentation  27th
3D-EffiViTCaps: 3D Efficient Vision Transformer with Capsul...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Gan, Dongwei Chang, Ming Chen, Juan School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Medical image segmentation (MIS) aims to finely segment various organs. It requires grasping global information from both parts and the entire image for better segmenting, and clinically there are often certain requir... 详细信息
来源: 评论
Text region detection algorithm for medical instruments screen based on improved DBNet  2
Text region detection algorithm for medical instruments scre...
收藏 引用
2nd International Conference on Pattern Recognition, Machine Vision and Intelligent Algorithms, PRMVIA 2024
作者: Liu, Jiaming Chen, Wei Heilongjiang University of Science and Technology School of Computer and Information Engineering Nantong China Heilongjiang University of Science and Technology School of Computer and Information Engineering Harbin China
Recognition of text in images has become increasingly important with the rapid development of cameras, and the main technology involved is Optical Character Recognition (OCR). In order to enhance the recognition accur... 详细信息
来源: 评论
Autoencoder-Based Architecture for Identification and Mitigating Phishing URL Attack in IoT Using DNN
收藏 引用
Journal of The Institution of Engineers (India): Series B 2023年 第6期104卷 1227-1240页
作者: Gopal, S.B. Poongodi, C. Nanthiya, D. Kirubakaran, T. Kulavishnusaravanan, B. Logeshwar, D. Department of Electronics and Communication Engineering Kongu Engineering College Perundurai India Department of Computer Science and Engineering Vivekanandha College of Engineering for Women Namakkal India Department of Computer Technology-UG Kongu Engineering College Perundurai India
As a new and potentially devastating form of cyberattack, ‘Phishing’ URLs pose a risk to users by impersonating legitimate websites in an effort to obtain sensitive information such as usernames, passwords, and fina... 详细信息
来源: 评论
A three-stage novel framework for efficient and automatic glaucoma classification from retinal fundus images
收藏 引用
Multimedia Tools and Applications 2024年 第37期83卷 85421-85481页
作者: Singh, Law Kumar Khanna, Munish Garg, Hitendra Singh, Rekha Iqbal, Md. Department of Computer Engineering and Applications GLA University Mathura India School of Computing Science and Engineering Galgotias University Greater Noida203201 India Department of Physics Uttar Pradesh Rajarshi Tandon Open University Uttar Pradesh Prayagraj India Department of Computer Science and Engineering Meerut Institute of Engineering and Technology Meerut India
Glaucoma is one of the leading causes of visual impairment worldwide. If diagnosed too late, the disease can irreversibly cause severe damage to the optic nerve, resulting in permanent loss of central vision and blind... 详细信息
来源: 评论
Enhancing Skin Disease Diagnosis with a Dual Vision Transformer Model  15
Enhancing Skin Disease Diagnosis with a Dual Vision Transfor...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Gairola, Ajay Krishan Kumar, Vidit Sahoo, Ashok Kumar Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Graphic Era deemed to be university Department of Computer Science and Engineering Dehradun India
An increasing number of people are experiencing skin problems, and it is never easy for a clinician to make a correct diagnosis. One potential solution to these problems is the use of deep learning for skin disease di... 详细信息
来源: 评论