咨询与建议

限定检索结果

文献类型

  • 76,446 篇 会议
  • 35,419 篇 期刊文献
  • 621 册 图书
  • 2 篇 学位论文

馆藏范围

  • 112,488 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 67,704 篇 工学
    • 47,600 篇 计算机科学与技术...
    • 38,957 篇 软件工程
    • 17,293 篇 信息与通信工程
    • 11,281 篇 控制科学与工程
    • 8,636 篇 生物工程
    • 8,493 篇 电气工程
    • 7,589 篇 电子科学与技术(可...
    • 6,871 篇 生物医学工程(可授...
    • 5,359 篇 光学工程
    • 5,024 篇 机械工程
    • 3,884 篇 化学工程与技术
    • 3,873 篇 动力工程及工程热...
    • 3,676 篇 仪器科学与技术
    • 3,312 篇 网络空间安全
    • 3,165 篇 安全科学与工程
    • 2,887 篇 材料科学与工程(可...
    • 2,727 篇 交通运输工程
  • 38,013 篇 理学
    • 18,411 篇 数学
    • 11,857 篇 物理学
    • 9,845 篇 生物学
    • 5,792 篇 统计学(可授理学、...
    • 4,216 篇 化学
    • 3,986 篇 系统科学
  • 19,280 篇 管理学
    • 12,032 篇 管理科学与工程(可...
    • 8,173 篇 图书情报与档案管...
    • 5,350 篇 工商管理
  • 7,176 篇 医学
    • 5,968 篇 临床医学
    • 5,344 篇 基础医学(可授医学...
    • 3,259 篇 药学(可授医学、理...
    • 3,140 篇 公共卫生与预防医...
  • 3,358 篇 法学
  • 2,119 篇 经济学
  • 2,003 篇 农学
  • 1,409 篇 教育学
  • 448 篇 文学
  • 314 篇 军事学
  • 192 篇 艺术学
  • 16 篇 哲学
  • 10 篇 历史学

主题

  • 3,820 篇 accuracy
  • 3,445 篇 deep learning
  • 3,332 篇 feature extracti...
  • 2,755 篇 machine learning
  • 2,672 篇 educational inst...
  • 2,570 篇 training
  • 2,547 篇 computational mo...
  • 2,436 篇 computer science
  • 2,048 篇 convolutional ne...
  • 2,009 篇 real-time system...
  • 1,957 篇 internet of thin...
  • 1,925 篇 support vector m...
  • 1,879 篇 predictive model...
  • 1,420 篇 optimization
  • 1,383 篇 data models
  • 1,354 篇 security
  • 1,343 篇 data mining
  • 1,218 篇 neural networks
  • 1,193 篇 artificial intel...
  • 1,185 篇 image segmentati...

机构

  • 1,205 篇 college of compu...
  • 1,056 篇 college of compu...
  • 1,027 篇 department of ph...
  • 1,006 篇 cavendish labora...
  • 989 篇 college of compu...
  • 965 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 801 篇 college of compu...
  • 646 篇 university of ch...
  • 613 篇 infn sezione di ...
  • 589 篇 infn sezione di ...
  • 583 篇 infn laboratori ...
  • 562 篇 fakultät physik ...
  • 548 篇 imperial college...
  • 547 篇 infn sezione di ...
  • 546 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 531 篇 school of physic...
  • 518 篇 h.h. wills physi...

作者

  • 262 篇 a. gomes
  • 261 篇 barter w.
  • 247 篇 beiter a.
  • 245 篇 c. alexa
  • 243 篇 j. m. izen
  • 237 篇 s. chen
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 229 篇 blake t.
  • 226 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 brundu d.
  • 220 篇 amato s.
  • 220 篇 bencivenni g.
  • 219 篇 g. spigo
  • 219 篇 borsato m.
  • 218 篇 bay a.

语言

  • 103,454 篇 英文
  • 7,636 篇 其他
  • 1,449 篇 中文
  • 60 篇 日文
  • 12 篇 德文
  • 9 篇 法文
  • 9 篇 斯洛文尼亚文
  • 4 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Panimalar Engineering College"
112488 条 记 录,以下是161-170 订阅
排序:
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-33页
作者: Mallidi, S. Kumar Reddy Ramisetty, Rajeswara Rao Computer Science and Engineering Jawaharlal Nehru Technological University AP Kakinada533003 India Computer Science and Engineering Sri Vasavi Engineering College AP Tadepalligudem534101 India Computer Science and Engineering Jawaharlal Nehru Technological University Gurajada AP Vizianagaram535003 India
As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. This systematic literature review (SLR) explores the advan... 详细信息
来源: 评论
ANovel Light Weight CNN Framework Integrated with Marine Predator Optimization for the Assessment of Tear Film-Lipid Layer Patterns
收藏 引用
computer Modeling in engineering & sciences 2023年 第7期136卷 87-106页
作者: Bejoy Abraham Jesna Mohan Linu Shine Sivakumar Ramachandran Department of Computer Science and Engineering College of Engineering MuttatharaThiruvananthapuramKerala695008India Department of Computer Science and Engineering Mar Baselios College of Engineering and TechnologyThiruvananthapuramKerala695015India Department of Electronics and Communication Engineering College of Engineering TrivandrumKerala695016India
Tear film,the outermost layer of the eye,is a complex and dynamic structure responsible for tear *** tear film lipid layer is a vital component of the tear film that provides a smooth optical surface for the cornea an... 详细信息
来源: 评论
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali Department of Computer Applications Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India Department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex... 详细信息
来源: 评论
Augmented FCN: rethinking context modeling for semantic segmentation
收藏 引用
science China(Information sciences) 2023年 第4期66卷 193-211页
作者: Dong ZHANG Liyan ZHANG Jinhui TANG School of Computer Science and Engineering Nanjing University of Science and Technology College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics
The effectiveness of modeling contextual information has been empirically shown in numerous computer vision tasks. In this paper, we propose a simple yet efficient augmented fully convolutional network(AugFCN) by aggr... 详细信息
来源: 评论
A Novel Approach for Network Vulnerability Analysis in IIoT
收藏 引用
computer Systems science & engineering 2023年 第4期45卷 263-277页
作者: K.Sudhakar S.Senthilkumar Department of Computer Science and Engineering University College of EngineeringPattukkottaiRajamadam614701India
Industrial Internet of Things(IIoT)offers efficient communication among business partners and *** an enlargement of IoT tools connected through the internet,the ability of web traffic gets *** to the raise in the size... 详细信息
来源: 评论
A supervised deep learning-based sentiment analysis by the implementation of Word2Vec and GloVe Embedding techniques
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 979-1012页
作者: Rakshit, Pranati Sarkar, Avik Computer Science & Engineering JIS College of Engineering Block A Phase III West Bengal Kalyani741235 India
Sentiment analysis provides valuable insights into people’s opinions, emotions, and attitudes, enabling businesses to make more informed decisions, improve customer satisfaction, and stay competitive in today’s mark... 详细信息
来源: 评论
DDSS: Driver decision support system based on the driver behaviour prediction to avoid accidents in intelligent transport system
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 1-13页
作者: S, Balasubramani D, John Aravindhar Renjith, P.N. Ramesh, K. Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram India Department of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering Sri Krishna College of Engineering and Technology Coimbatore India
Accidents caused by drivers who exhibit unusual behavior are putting road safety at ever-greater risk. When one or more vehicle nodes behave in this way, it can put other nodes in danger and result in potentially cata... 详细信息
来源: 评论
Classification of autism severity levels using facial features and eye gaze patterns
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 15853-15866页
作者: Jiji, G. Wiselin Department of Computer Science and Engineering Dr. Sivanthi Aditanar College of Engineering Tamil Nadu Thiruchendur India
Autism Spectrum Disorder (ASD) is a complex neurodevelopmental condition with varying degrees of severity. Early diagnosis and classification of autism severity are crucial for personalized intervention and support. T... 详细信息
来源: 评论
Building a Robust and Efficient Defensive System Using Hybrid Adversarial Attack
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4470-4478页
作者: Dhanaraj, Rachel Selva Sridevi, M. Goa College of Engineering Computer Engineering Department Goa 403401 India National Institute of Technology Department of Computer Science and Engineering Tiruchirappalli620015 India
Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence ... 详细信息
来源: 评论
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 948-958页
作者: A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad Department of Information Systems College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... 详细信息
来源: 评论