咨询与建议

限定检索结果

文献类型

  • 2,407 篇 会议
  • 1,316 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,760 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,305 篇 工学
    • 1,636 篇 计算机科学与技术...
    • 1,341 篇 软件工程
    • 623 篇 信息与通信工程
    • 366 篇 控制科学与工程
    • 300 篇 生物工程
    • 288 篇 电气工程
    • 229 篇 生物医学工程(可授...
    • 220 篇 电子科学与技术(可...
    • 180 篇 光学工程
    • 161 篇 机械工程
    • 160 篇 网络空间安全
    • 135 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 115 篇 动力工程及工程热...
    • 111 篇 核科学与技术
    • 107 篇 交通运输工程
    • 102 篇 仪器科学与技术
  • 1,344 篇 理学
    • 602 篇 数学
    • 472 篇 物理学
    • 327 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 154 篇 化学
    • 113 篇 系统科学
  • 691 篇 管理学
    • 431 篇 管理科学与工程(可...
    • 294 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 218 篇 医学
    • 161 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
  • 131 篇 法学
    • 109 篇 社会学
  • 66 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 172 篇 accuracy
  • 141 篇 deep learning
  • 105 篇 feature extracti...
  • 100 篇 hadron colliders
  • 98 篇 machine learning
  • 89 篇 computational mo...
  • 88 篇 training
  • 84 篇 convolutional ne...
  • 73 篇 real-time system...
  • 66 篇 support vector m...
  • 63 篇 predictive model...
  • 61 篇 artificial intel...
  • 55 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 46 篇 cloud computing
  • 46 篇 data models
  • 44 篇 semantics
  • 44 篇 security

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 irfu cea univers...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 charles universi...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 120 篇 university of de...
  • 120 篇 department of ph...
  • 118 篇 imperial college...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,136 篇 英文
  • 584 篇 其他
  • 44 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3760 条 记 录,以下是851-860 订阅
排序:
Landslide Monitoring Using IoT System with Cloud Platform
Landslide Monitoring Using IoT System with Cloud Platform
收藏 引用
IEEE UP Section Conference on Electrical computer and Electronics (UPCON)
作者: Pradeep Singh Rawat Prateek Kumar Soni Aryan Goel Gurmeet Kaur Computer Science & Engg. Department DIT University Dehradun India Computer Engineering & Application GLA University Mathura India
The natural disasters poses the losses in the disaster prone area. Landslides pose great socio-economic threats to regions which geography of the location favors it. The hill states of the India are more prone to the ...
来源: 评论
Securing Cloud-Based Systems: DDoS Attack Mitigation using Hypervisor-Intrusion Detection Approach
Securing Cloud-Based Systems: DDoS Attack Mitigation using H...
收藏 引用
6th International Conference on Futuristic Trends in Networks and Computing Technologies, FTNCT 2024
作者: Kumar, Surendra Kumar, Pawan Kumar, Jaydip Singh, Virendra Yadav, Arun Singh Department of Computer Engineering and Applications GLA University Mathura India Department of Computer Science and Applications Coer University Roorkee India Department of Computer Application Integral University Lucknow India Department of Computer Science University of Lucknow Uttar Pradesh Lucknow India
The principle of virtualization and cloud-based technology has facilitated various industries in establishing expansive cloud environments. The Cloud is vulnerable to emerging threats and breaches due to the nature of... 详细信息
来源: 评论
Analyze and Compare the Public Cloud Provider Pricing Model and the Impact on Corporate Financial  7th
Analyze and Compare the Public Cloud Provider Pricing Model ...
收藏 引用
7th International Conference on Microelectronics and Telecommunication engineering, ICMETE 2023
作者: Singh, Jaideep Pal, Souvik Sarkar, Bikramjit Selvi, H. Adhikari, Saurabh Madhumathi, K. Akila, D. Liverpool Business School Liverpool John Moores University Liverpool United Kingdom Department of Management Information Systems Saveetha College of Liberal Arts And Sciences Saveetha Institute of Medical And Technical Sciences Chennai India Kolkata India Department of Computer Science and Engineering JIS College of Engineering Kalyani India Department of Computer Science Saveetha College of Liberal Arts and Sciences SIMATS Deemed University Chennai India School of Engineering Swami Vivekananda University Kolkata India Department of Computer Application Anna Adarsh College for Women Chennai India Department of Computer Applications Saveetha College of Liberal Arts and Sciences SIMATS Deemed University Chennai India
In order to better understand the relative costs of IaaS, PaaS, and SaaS, it is recommended that this study collect data on these three categories of cloud computing services. The purpose of this research is to analyz... 详细信息
来源: 评论
The Role of Machine Learning in Optimizing Industrial Communication Protocols
The Role of Machine Learning in Optimizing Industrial Commun...
收藏 引用
Advances in Computing Research on science engineering and Technology (ACROSET), International Conference on
作者: Vikas Kumar Kharbas Mahesh TR Satish Upadhyay Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Computer Science Engineering Faculty of Engineering and Technology JAIN (Deemed-to-be University) Bangalore India Department of uGDX ATLAS SkillTech University Mumbai India
Due to the complexity and urgency of information exchange in modern companies, optimizing communication protocols in the workplace is essential. Using methods from machine learning, this research takes a fresh tack to... 详细信息
来源: 评论
Empirical Analysis of Prediction of Crime and Forecasting With IGWO-SVM Approach  2
Empirical Analysis of Prediction of Crime and Forecasting Wi...
收藏 引用
2nd International Conference on Edge Computing and applications, ICECAA 2023
作者: Vasuki, R. Ganvir, Neha Sharma, Rohita Kumar, K Senthil Krishna Kumari, Svhn Singh, Kamlesh Mannar Thirumalai Naicker College Department of Computer Application Tamilnadu Madurai India Kj College of Engineering and Management Maharashtra Pune India Lovely Professional University Department of Fine Arts Punjab India School of Computing College of Engineering and Technology Srm Institute of Science and Technology Department of and Communications Tamil Nadu Chennai India Telangana India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India
In order to understand the nuances of the crime data from recent years, in-depth analysis is necessary. Involved parties in law enforcement will benefit from this procedure in terms of making arrests and guiding effor... 详细信息
来源: 评论
Re-Cognition I: An Inspection of Learner's Cognitive Well-Being, Pursuant to Contemporary Period, Facilitates the Academic Life Cycle
Re-Cognition I: An Inspection of Learner's Cognitive Well-Be...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Souvik Ganguly Kailash Pati Mandal Debasis Guha Dept. of Computer Application Dr. B.C. Roy Engineering College Durgapur India Dept. of Computer Science and Engineering National Institute of Technology Durgapur India
Recommender systems enhance the user experience by integrating factual and behavioral practices, enhancing learning strategies, and granting academic opportunities based on learners subjective interests. Cognitive int...
来源: 评论
A Robust DL Approach for Detection of Invasive Ductal Carcinoma in Whole Slide Images using DenseNet169
A Robust DL Approach for Detection of Invasive Ductal Carcin...
收藏 引用
2024 International Conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Menaka, C. Sharma, Sunil Naval, Preeti Brar, Khushmeen Anand, Rohit Alabdeli, Haider Pant, Shivani Department Of Computer Science And Information Technology Bangalore India Vivekananda Global University Department Of Computer Science & Application Jaipur India Maharishi University Of Information Technology Maharishi School Of Engineering & Technology Uttar Pradesh India Chandigarh University Department Of Electronics And Communication Engineering Punjab Mohali India G.B Pant Okhla-1 Campus Department Of Ece New Delhi India The Islamic University Najaf Iraq Uttaranchal University Uttaranchal Institute Of Technology Uttarakhand India
The present research introduces a deep learning method for automatically recognizing and evaluating tissue areas that correspond to invasive ductal carcinoma (IDC) in whole slide images (WSI) of breast cancer (BCa). L... 详细信息
来源: 评论
SSHTDNS: A Blockchain-Based Secure, Scalable, and High-Throughput Domain Name System
SSHTDNS: A Blockchain-Based Secure, Scalable, and High-Throu...
收藏 引用
Advance Computing and Innovative Technologies in engineering (ICACITE), International Conference on
作者: Baldev Singh Kavita Department of Computer Science Engineering Vivekananda Global University Jaipur India Department of Master of Computer Application Chandigarh School of Business
The Internet's crucial domain name system is in charge of translating domain names into IP addresses. However, because of its dispersed structure with a hub, it is subject to significant security concerns. Since t...
来源: 评论
Elevating Cybersecurity in Defence: A Collaborative and Technologically Driven Approach
Elevating Cybersecurity in Defence: A Collaborative and Tech...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Syed Anas Ansar Shruti Aggarwal Swati Arya Mohd Asim Sayeed Nupur Soni Prabhash Chandra Pathak School of Computer Application Babu Banarasi Das University Lucknow India Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Punjab India
As the world enters the 21st century, the imperative of safeguarding cybersecurity has intensified. Considering the expanding dependence on information technology (IT) systems for a broad spectrum of military operatio...
来源: 评论
Empowering Supply Chain Transparency and Risk Management through Hybrid CNN and BiGRU Approach  1
Empowering Supply Chain Transparency and Risk Management thr...
收藏 引用
1st International Conference on Software, Systems and Information Technology, SSITCON 2024
作者: Guhan, K. Lakshmi, S. Verma, Virendra Kumar Sai, M K Satya Sharma, Amit Kumar, B. Suresh Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore India Bharati Vidyapeeth Management Studies and Research Department of Management Business Administration Navi Mumbai India Symbiosis Institute of Business Management Bengaluru India Vignana Bharathi Institute of Technology Department of Mechanical Engineering Hyderabad India Lovely Professional University School of Computer Application Phagwara India Chaitanya Bharathi Institute of Technology Department of Electrical and Electronic Engineering Telangana Hyderabad India
Everything from needs to luxuries has been impacted by the COVID-19 pandemic in the manufacturing sector, and that includes the automotive industry. Thus, there is an immediate need for research into the automotive su... 详细信息
来源: 评论