咨询与建议

限定检索结果

文献类型

  • 9,093 篇 会议
  • 8,192 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 17,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,686 篇 工学
    • 8,060 篇 计算机科学与技术...
    • 6,798 篇 软件工程
    • 2,614 篇 信息与通信工程
    • 1,793 篇 生物工程
    • 1,391 篇 控制科学与工程
    • 1,279 篇 电气工程
    • 1,187 篇 生物医学工程(可授...
    • 1,006 篇 光学工程
    • 890 篇 电子科学与技术(可...
    • 582 篇 机械工程
    • 532 篇 化学工程与技术
    • 442 篇 网络空间安全
    • 432 篇 动力工程及工程热...
    • 430 篇 交通运输工程
    • 411 篇 仪器科学与技术
    • 408 篇 安全科学与工程
  • 6,448 篇 理学
    • 3,229 篇 数学
    • 2,042 篇 生物学
    • 1,716 篇 物理学
    • 1,236 篇 统计学(可授理学、...
    • 660 篇 化学
    • 589 篇 系统科学
  • 3,113 篇 管理学
    • 1,764 篇 管理科学与工程(可...
    • 1,484 篇 图书情报与档案管...
    • 895 篇 工商管理
  • 1,128 篇 医学
    • 937 篇 临床医学
    • 851 篇 基础医学(可授医学...
    • 517 篇 药学(可授医学、理...
    • 477 篇 公共卫生与预防医...
  • 558 篇 法学
    • 479 篇 社会学
  • 338 篇 经济学
  • 275 篇 农学
  • 166 篇 教育学
  • 61 篇 文学
  • 31 篇 军事学
  • 23 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 663 篇 deep learning
  • 596 篇 accuracy
  • 440 篇 machine learning
  • 436 篇 feature extracti...
  • 398 篇 computational mo...
  • 384 篇 training
  • 324 篇 predictive model...
  • 323 篇 real-time system...
  • 301 篇 semantics
  • 258 篇 internet of thin...
  • 237 篇 optimization
  • 223 篇 support vector m...
  • 217 篇 convolutional ne...
  • 196 篇 neural networks
  • 193 篇 reinforcement le...
  • 185 篇 data mining
  • 183 篇 data models
  • 159 篇 image segmentati...
  • 145 篇 artificial intel...
  • 144 篇 visualization

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 375 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 306 篇 university of ch...
  • 293 篇 nikhef national ...
  • 292 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 168 篇 bediaga i.
  • 157 篇 baker s.
  • 151 篇 amato s.
  • 147 篇 niyato dusit
  • 147 篇 baryshnikov f.
  • 147 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 16,094 篇 英文
  • 1,200 篇 其他
  • 109 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science & Engineering Data Science"
17386 条 记 录,以下是301-310 订阅
排序:
Enhanced Clickbait Detection through Ensemble Machine Learning Techniques
收藏 引用
Procedia computer science 2025年 258卷 599-608页
作者: Neetu Sardana Deepika Varshney Seema Luthra Department of Computer Science & Engineering-Data Science ABES Engineering College Ghaziabad India
Nowadays online news websites are one of the quickest ways to get information. However, the credibility of news from these sources is sometimes questioned. One common problem with online news is the prevalence of clic... 详细信息
来源: 评论
Criminal Identification Based On database Management Using Blockchain  4
Criminal Identification Based On Database Management Using B...
收藏 引用
4th International Conference on Power, Energy, Control and Transmission Systems, ICPECTS 2024
作者: Suganya, R. Ashok, P. Lekshitha, J. Shanmuga Priya, S. Monica, K. Somasundaram, K. Sri Sai Ram Institute of Technology Department of Computer Science and Engineering Chennai India Saveetha Engineering College Department of Artificial Intelligence and Data Science Chennai India Sri Muthukumaran Institute of Technology Department of Computer Science and Engineering Chennai India
The crime monitoring system is a unique and authentic project which functions with the concepts of block chain language. Blockchain technology has the potential to revolutionize the management of criminal records by p... 详细信息
来源: 评论
A Length-Adaptive Non-Dominated Sorting Genetic Algorithm for Bi-Objective High-Dimensional Feature Selection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第9期10卷 1834-1844页
作者: Yanlu Gong Junhai Zhou Quanwang Wu MengChu Zhou Junhao Wen College of Computer Science Chongqing UniversityChongqing 400044China IEEE Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA College of Big Data and Software Engineering Chongqing UniversityChongqing 400044China
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected *** c... 详细信息
来源: 评论
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application with Blockchain-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1370-1379页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Illinois Institute of Technology Information Technology and Management ChicagoIL60616 United States
The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of electric power transmission. However, the current deploym... 详细信息
来源: 评论
A Secure Approach to Avoid data Repetition in Cloud Storage Systems  2
A Secure Approach to Avoid Data Repetition in Cloud Storage ...
收藏 引用
2nd International Conference on Artificial Intelligence and Machine Learning Applications, AIMLA 2024
作者: Swedhaa, M.A. Sathya, V. Vanitha, M. Jothilakshmi, T. Kongunadu College of Engineering and Technology Artificial Intelligence and Data Science Trichy India Mohamed Sathak A.J. College of Engineering Computer Science and Engineering Tamilnadu Chennai India
Cloud Storage will be current data research and data management field in terms of security and elimination of repeated data-sets. In simple terms, this current research introduces a strong system called "Cloud-Se... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论
An Empirical Investigation of Docker Sockets for Privilege Escalation and Defensive Strategies  5
An Empirical Investigation of Docker Sockets for Privilege E...
收藏 引用
5th International Conference on Innovative data Communication Technologies and Application, ICIDCA 2024
作者: Rajyashree, R. Mathi, Senthilkumar Saravanan, G. Sakthivel, M. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India Department of Artificial Intelligence and Data Science Erode Sengunthar Engineering College Erode India Department of Computer Science and Engineering Erode Sengunthar Engineering College Erode India
Cloud-based infrastructures often leverage virtualization, but its implementation can be expensive. Traditional coding methods can lead to issues when transitioning code from one computing environment to another. In r... 详细信息
来源: 评论
CredAct: Privacy-Preserving Activity Verification for Benefits Schemes in Self-Sovereign Identity  6
CredAct: Privacy-Preserving Activity Verification for Benefi...
收藏 引用
6th IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024
作者: Mukta, Rahma Paik, Hye-Young Lu, Qinghua Kanhere, Salil S. Unsw School of Computer Science and Engineering Sydney Australia Csiro Data61 Sydney Australia
We propose CredAct, a user activity verification designed with data minimisation to protect privacy. Many Benefits Schemes, such as discount offers, loyalty programs, and incentive systems, require verification of use... 详细信息
来源: 评论
Cybersecurity for Industrial IoT: A Review on Vulnerabilities and Attacks  8
Cybersecurity for Industrial IoT: A Review on Vulnerabilitie...
收藏 引用
8th International Conference on Electronics, Materials engineering and Nano-Technology, IEMENTech 2025
作者: Kumari, Reetu Kumar, Sunil Amandeep Dutta, Kamlesh Kumari, Aparna Guru Jambheshwar University of Science and Technology Dept. of Computer Science & Engineering Haryana Hisar India Guru Jambheshwar University of Science and Technology Dept. of AI & Data Science Haryana Hisar India National Institute of Technology Hamirpur Dept. of Computer Science & Engineering Himachal Pardesh India Institute of Technology Nirma University Dept. of Computer Science & Engineering Gujarat Ahmedabad India
Internet has evolved from a network of connecting people to a network of connecting things, leading to a more complex and sophisticated network of Industrial Things, known as Industrial IoT (IIoT) today. This evolutio... 详细信息
来源: 评论
An Efficient and Fast Area Optimization Approach for Mixed Polarity Reed-Muller Logic Circuits
收藏 引用
Chinese Journal of Electronics 2024年 第5期33卷 1165-1180页
作者: Yuhao ZHOU Zhenxue HE Jianhui JIANG Xiaojun ZHAO Fan ZHANG Limin XIAO Xiang WANG School of Software Engineering Tongji University Key Laboratory of Agricultural Big Data of Hebei Province Hebei Agricultural University School of Computer Science and Engineering Beihang University School of Electronic and Information Engineering Beihang University
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller(MPRM) circuits have poor optimizati... 详细信息
来源: 评论