咨询与建议

限定检索结果

文献类型

  • 2,407 篇 会议
  • 1,316 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,760 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,305 篇 工学
    • 1,636 篇 计算机科学与技术...
    • 1,341 篇 软件工程
    • 623 篇 信息与通信工程
    • 366 篇 控制科学与工程
    • 300 篇 生物工程
    • 288 篇 电气工程
    • 229 篇 生物医学工程(可授...
    • 220 篇 电子科学与技术(可...
    • 180 篇 光学工程
    • 161 篇 机械工程
    • 160 篇 网络空间安全
    • 135 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 115 篇 动力工程及工程热...
    • 111 篇 核科学与技术
    • 107 篇 交通运输工程
    • 102 篇 仪器科学与技术
  • 1,344 篇 理学
    • 602 篇 数学
    • 472 篇 物理学
    • 327 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 154 篇 化学
    • 113 篇 系统科学
  • 691 篇 管理学
    • 431 篇 管理科学与工程(可...
    • 294 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 218 篇 医学
    • 161 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
  • 131 篇 法学
    • 109 篇 社会学
  • 66 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 172 篇 accuracy
  • 141 篇 deep learning
  • 105 篇 feature extracti...
  • 100 篇 hadron colliders
  • 98 篇 machine learning
  • 89 篇 computational mo...
  • 88 篇 training
  • 84 篇 convolutional ne...
  • 73 篇 real-time system...
  • 66 篇 support vector m...
  • 63 篇 predictive model...
  • 61 篇 artificial intel...
  • 55 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 46 篇 cloud computing
  • 46 篇 data models
  • 44 篇 semantics
  • 44 篇 security

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 irfu cea univers...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 charles universi...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 120 篇 university of de...
  • 120 篇 department of ph...
  • 118 篇 imperial college...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,136 篇 英文
  • 584 篇 其他
  • 44 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3760 条 记 录,以下是831-840 订阅
排序:
Enhanced SMOTE Strategy for Handling Imbalanced Data in Machine Learning Classification
Enhanced SMOTE Strategy for Handling Imbalanced Data in Mach...
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering (RMKMATE), International Conference on
作者: Shivam Tiwari Satvik Vats Barkha Bhardwaj Pramod Vishwakarma Yogesh Singh Rathore Department of Computer Science & Engineering Sharda University Greater Noida Computer Science & Engineering Graphic Era Hill University Dehradun India Department of Computer Science and Engineering NIET Greater Noida Computer Science & Engineering (AIT) Chandigarh University Gharuan Mohali Punjab India Computer Science and Application Sharda University Greater Noida
Most real-time datasets have class instances scattered across the data in a non-uniform fashion. Certain classes have an abnormally high number of instances when compared to the rest of the classes. The term "cla...
来源: 评论
An Efficient Sybil Attack Detection Approach for Vehicular Ad-Hoc Networks  7
An Efficient Sybil Attack Detection Approach for Vehicular A...
收藏 引用
7th International Conference on Parallel, Distributed and Grid Computing, PDGC 2022
作者: Lohar, Durgesh Panda, Sanjaya Kumar Padhi, Slokashree Nayak, Sanjib Kumar National Institute of Technology Warangal Department of Computer Science and Engineering Telangana Warangal5060004 India Veer Surendra Sai University of Technology Burla Department of Computer Application Odisha Burla768018 India
Vehicular ad-hoc networks (VANETs) play a vital role in next-generation wireless communication. It consists of a set of moving vehicles, stationary vehicles, and roadside units (RSUs) that are connected through a wire... 详细信息
来源: 评论
Comparative Study Of Various Scraping Tools: Pros And Cons
Comparative Study Of Various Scraping Tools: Pros And Cons
收藏 引用
2022 IEEE Delhi Section Conference, DELCON 2022
作者: Matta, Priya Sharma, Sonal Uniyal, Nitin Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Uttaranchal University Department of Computer Application Dehradun India University of Petroleum and Energy Studies Department of Mathematics Dehradun India
As technology keeps on improving and data is still considered the topmost priority, people need to know how they can make the use of old data available, and impact their worlds. The data these days may be raw data, re... 详细信息
来源: 评论
Fringing Effects in a Capacitive Micromachined Ultrasonic Transducer with a SiC Actuation Layer Insulated by High Dielectric Material  3
Fringing Effects in a Capacitive Micromachined Ultrasonic Tr...
收藏 引用
3rd IEEE International Conference of Electron Devices Society Kolkata Chapter, EDKCON 2024
作者: Ahamed, Sk. Sohel Pal, Moumita Chakraborty, Pritam Neogi, Biswarup Maity, Niladri Das, Reshmi Future Institute of Engineering and Management Dept. of electronics and communication kolkata India JIS College of Engineering Dept. of electronics and communication Kalyani India Institute of Engineering and Management Dept. of computer science and application Kolkata India NITTTR Dept. of technical education Kolkata India Mizoram University Dept. of electronics and communication Mizoram India
Sealed capacitive micromachined ultrasonic transducer (CMUT) mostly consists of two parallel electrodes separated by a structural layer of silicon nitride (Si3N4) and a vacuum cavity. Biasing the transducer element ge... 详细信息
来源: 评论
Leveraging Grey Wolf Optimizer for Reliable Data Transmission in Underwater Wireless Sensor Networks
Leveraging Grey Wolf Optimizer for Reliable Data Transmissio...
收藏 引用
2024 IEEE International Conference on Communication, Computing and Signal Processing, IICCCS 2024
作者: Umamahesh, G. Senthurya, S. Khatarkar, Poonam Alsalami, Zaid Kaur, Jaspal Ramesh, P.S. Aditya Engineering College Department of Computer Science & Engineering India Prince Shri Venkateshwara Padmavathy Engineering College Chennai India Ies College of Technology Department of Electrical & Electronics Engineering M.P. Bhopal India The Islamic University College Of Technical Engineering Department Of Computers Techniques Engineering Najaf Iraq The Islamic University Of Al Diwaniyah College Of Technical Engineering Department Of Computers Techniques Engineering Al Diwaniyah Iraq Chandigarh Group of Colleges Chandigarh Engineering College Department of Computer Application Punjab Jhanjeri Mohali140307 India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Cse Chennai India
This research investigates the application of the Grey Wolf Optimizer (GWO) to enhance reliable data transmission in Underwater Wireless Sensor Networks (UWSNs). UWSNs are critical for various applications, including ... 详细信息
来源: 评论
Development of China's spaceborne SAR satellite,processing strategy,and application:take Gaofen-3 series as an example
收藏 引用
地球空间信息科学学报(英文版) 2024年 第1期27卷 221-236页
作者: Guo Zhang Shunyao Wang Zhenwei Chen Yuzhi Zheng Ruishan Zhao Taoyang Wang Yu Zhu Xinzhe Yuan Wei Wu Weitao Chen State Key Laboratory of Information Engineering in Surveying Mapping and Remote SensingWuhan UniversityWuhanChina School of Law Wuhan UniversityWuhanChina School of Geomatics Liaoning Technical UniversityFuxinChina School of Remote Sensing and Information Engineering Wuhan UniversityWuhanChina Institute of Spacecraft System Engineering China Academy of Space TechnologyBeijingChina National Disaster Reduction Center of China Ministry of Emergency ManagementBeijingChina School of Computer Science China University of GeosciencesWuhanChina Key Laboratory of Space Ocean Remote Sensing and Application Ministry of Natural Resources of the People's Republic of ChinaBeijingChina
After mastering the key technologies of manufacturing spaceborne Synthetic Aperture Radar(SAR),China's SAR satellites have been successfully launched into *** the only civil microwave satellite listed in the"... 详细信息
来源: 评论
Transfer Learning Model to Indicate Heart Health Status Using Phonocardiogram
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 4151-4168页
作者: Vinay Arora Karun Verma Rohan Singh Leekha Kyungroul Lee Chang Choi Takshi Gupta Kashish Bhatia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatialaPunjabIndia Associate Application ITConcentrixGurugramHaryanaIndia School of Computer Software Daegu Catholic UniversityGyeongsanKorea Department of Computer Engineering Gachon UniversitySeongnam13120Korea Information Security Engineering Soonchunhyang UniversityKorea Department of Computer Engineering University College of EngineeringPunjabi UniversityPatialaPunjabIndia
The early diagnosis of pre-existing coronary disorders helps to control complications such as pulmonary hypertension,irregular cardiac functioning,and heart ***-based learning of heart sound is an efficient technology... 详细信息
来源: 评论
Real-time Glass Recycling Quality Assurance and Contamination Reduction with IoT and Random Forest algorithm  7
Real-time Glass Recycling Quality Assurance and Contaminatio...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Balasubadra, K. Shadaksharappa, B. Seeni, Senthil Kumar Sridevi, V. Thamizhamuthu, R. Srinivasan, C. R.M.D. Engineering College Department of Information Technology Chennai Tamil Nadu Kavaraipettai India Sri Sairam College of Engineering Department of Computer Science And Engineering Bengaluru Karnataka Anekal India Cognizant Technology Solutions Department of Mobile Application Development Buffalo GroveIL United States Academy of Maritime Education And Training Deemed To Be University Electrical And Electronics Engineering Tamil Nadu Chennai India Srm Institute of Science And Technology Department of Computing Technologies Kattankulathur Campus Chennai Tamil Nadu Chengalpattu India Saveetha University Saveetha School of Engineering Saveetha Institute of Medical And Technical Sciences Department of Computer Science And Engineering Tamil Nadu Chennai India
The recycling industry is crucial to environmental protection and resource conservation. Glass recycling has great sustainability potential, but quality assurance and contaminant reduction are major challenges. Integr... 详细信息
来源: 评论
PriRoAgg: Achieving Robust Model Aggregation with Minimum Privacy Leakage for Federated Learning
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5690-5704页
作者: Hou, Sizai Li, Songze Jahani-Nezhad, Tayyebeh Caire, Giuseppe Hong Kong University of Science and Technology Hong Kong Southeast University School of Cyber Science and Engineering Nanjing China Supervision and Management (Southeast University) Ministry of Education Engineering Research Center of Blockchain Application China Technische Universität Berlin Department of Electrical Engineering and Computer Science Berlin 10587 Germany
Federated learning (FL), as a promising machine learning paradigm for large-scale distributed data, faces two security challenges of privacy and robustness: the transmitted model updates potentially leak sensitive use... 详细信息
来源: 评论
A Survey of Dynamic Exploration Symmetric Encryption with Backward & Forward Secrecy
A Survey of Dynamic Exploration Symmetric Encryption with Ba...
收藏 引用
Advance Computing and Innovative Technologies in engineering (ICACITE), International Conference on
作者: Satendra Singh Samriti Bhagat Department of Computer Science Engineering Vivekananda Global University Jaipur India Department of Master of Computer Application Chandigarh School of Business
A sophisticated type of symmetric encryption is called Multiuser Dynamic Searchable Symmetric Encryption. It expands the capabilities of conventional symmetric encryption to enable actions such as adding and removing ...
来源: 评论