咨询与建议

限定检索结果

文献类型

  • 9,091 篇 会议
  • 8,136 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,330 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,645 篇 工学
    • 8,037 篇 计算机科学与技术...
    • 6,779 篇 软件工程
    • 2,606 篇 信息与通信工程
    • 1,791 篇 生物工程
    • 1,385 篇 控制科学与工程
    • 1,262 篇 电气工程
    • 1,182 篇 生物医学工程(可授...
    • 1,003 篇 光学工程
    • 888 篇 电子科学与技术(可...
    • 581 篇 机械工程
    • 531 篇 化学工程与技术
    • 442 篇 网络空间安全
    • 432 篇 动力工程及工程热...
    • 428 篇 交通运输工程
    • 410 篇 仪器科学与技术
    • 407 篇 安全科学与工程
  • 6,432 篇 理学
    • 3,220 篇 数学
    • 2,038 篇 生物学
    • 1,713 篇 物理学
    • 1,231 篇 统计学(可授理学、...
    • 656 篇 化学
    • 588 篇 系统科学
  • 3,104 篇 管理学
    • 1,757 篇 管理科学与工程(可...
    • 1,482 篇 图书情报与档案管...
    • 890 篇 工商管理
  • 1,119 篇 医学
    • 932 篇 临床医学
    • 846 篇 基础医学(可授医学...
    • 517 篇 药学(可授医学、理...
    • 474 篇 公共卫生与预防医...
  • 555 篇 法学
    • 477 篇 社会学
  • 336 篇 经济学
  • 274 篇 农学
  • 163 篇 教育学
  • 60 篇 文学
  • 31 篇 军事学
  • 22 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 664 篇 deep learning
  • 595 篇 accuracy
  • 441 篇 machine learning
  • 434 篇 feature extracti...
  • 398 篇 computational mo...
  • 383 篇 training
  • 324 篇 predictive model...
  • 320 篇 real-time system...
  • 301 篇 semantics
  • 258 篇 internet of thin...
  • 238 篇 optimization
  • 223 篇 support vector m...
  • 219 篇 convolutional ne...
  • 195 篇 neural networks
  • 193 篇 reinforcement le...
  • 185 篇 data mining
  • 183 篇 data models
  • 159 篇 image segmentati...
  • 145 篇 visualization
  • 145 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 366 篇 h.h. wills physi...
  • 307 篇 university of ch...
  • 293 篇 nikhef national ...
  • 292 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 168 篇 bediaga i.
  • 157 篇 baker s.
  • 151 篇 amato s.
  • 147 篇 niyato dusit
  • 147 篇 baryshnikov f.
  • 147 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 16,055 篇 英文
  • 1,183 篇 其他
  • 109 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Engineering With Data Science"
17330 条 记 录,以下是301-310 订阅
排序:
Aquify:AI-Enhanced Predictive Analytics Toolkit For Water Contamination  5
Aquify:AI-Enhanced Predictive Analytics Toolkit For Water Co...
收藏 引用
5th International Conference on Circuits, Control, Communication and Computing, I4C 2024
作者: Sanath, G. Deekshitha, S. Shravya, H. Jayanthi, M.G. Kannadaguli, Prashanth Cambridge Institute of Technology Computer Science and Engineering Bengaluru India Cambridge Institute of Technology Information Science and Engineering Bengaluru India Senior Data Science Trainer Dhaarini Academy Bengaluru India
Effective monitoring of water quality remains a problem, in real-time contamination detection and prediction. Despite advancements in the sector, many existing approaches continue to rely on labor-intensive laboratory... 详细信息
来源: 评论
Solving Multi-Objective Vehicle Routing Problems with Time Windows: A Decomposition-Based Multiform Optimization Approach
收藏 引用
Tsinghua science and Technology 2024年 第2期29卷 305-324页
作者: Yiqiao Cai Zifan Lin Meiqin Cheng Peizhong Liu Ying Zhou Xiamen Key Laboratory of Data Security and Blockchain Technology College of Computer Science and TechnologyHuaqiao UniversityXiamen361021China College of Engineering Huaqiao UniversityQuanzhou362000China School of Computer Sciences Shenzhen Institute of Information TechnologyShenzhen518000China
In solving multi-objective vehicle routing problems with time windows (MOVRPTW),most existing algorithms focus on the optimization of a single problem formulation. However,little effort has been devoted to exploiting ... 详细信息
来源: 评论
Enhanced Clickbait Detection through Ensemble Machine Learning Techniques
收藏 引用
Procedia computer science 2025年 258卷 599-608页
作者: Neetu Sardana Deepika Varshney Seema Luthra Department of Computer Science & Engineering-Data Science ABES Engineering College Ghaziabad India
Nowadays online news websites are one of the quickest ways to get information. However, the credibility of news from these sources is sometimes questioned. One common problem with online news is the prevalence of clic... 详细信息
来源: 评论
Criminal Identification Based On database Management Using Blockchain  4
Criminal Identification Based On Database Management Using B...
收藏 引用
4th International Conference on Power, Energy, Control and Transmission Systems, ICPECTS 2024
作者: Suganya, R. Ashok, P. Lekshitha, J. Shanmuga Priya, S. Monica, K. Somasundaram, K. Sri Sai Ram Institute of Technology Department of Computer Science and Engineering Chennai India Saveetha Engineering College Department of Artificial Intelligence and Data Science Chennai India Sri Muthukumaran Institute of Technology Department of Computer Science and Engineering Chennai India
The crime monitoring system is a unique and authentic project which functions with the concepts of block chain language. Blockchain technology has the potential to revolutionize the management of criminal records by p... 详细信息
来源: 评论
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application with Blockchain-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1370-1379页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Illinois Institute of Technology Information Technology and Management ChicagoIL60616 United States
The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of electric power transmission. However, the current deploym... 详细信息
来源: 评论
A Length-Adaptive Non-Dominated Sorting Genetic Algorithm for Bi-Objective High-Dimensional Feature Selection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第9期10卷 1834-1844页
作者: Yanlu Gong Junhai Zhou Quanwang Wu MengChu Zhou Junhao Wen College of Computer Science Chongqing UniversityChongqing 400044China IEEE Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA College of Big Data and Software Engineering Chongqing UniversityChongqing 400044China
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected *** c... 详细信息
来源: 评论
A Secure Approach to Avoid data Repetition in Cloud Storage Systems  2
A Secure Approach to Avoid Data Repetition in Cloud Storage ...
收藏 引用
2nd International Conference on Artificial Intelligence and Machine Learning Applications, AIMLA 2024
作者: Swedhaa, M.A. Sathya, V. Vanitha, M. Jothilakshmi, T. Kongunadu College of Engineering and Technology Artificial Intelligence and Data Science Trichy India Mohamed Sathak A.J. College of Engineering Computer Science and Engineering Tamilnadu Chennai India
Cloud Storage will be current data research and data management field in terms of security and elimination of repeated data-sets. In simple terms, this current research introduces a strong system called "Cloud-Se... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论
An Empirical Investigation of Docker Sockets for Privilege Escalation and Defensive Strategies  5
An Empirical Investigation of Docker Sockets for Privilege E...
收藏 引用
5th International Conference on Innovative data Communication Technologies and Application, ICIDCA 2024
作者: Rajyashree, R. Mathi, Senthilkumar Saravanan, G. Sakthivel, M. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India Department of Artificial Intelligence and Data Science Erode Sengunthar Engineering College Erode India Department of Computer Science and Engineering Erode Sengunthar Engineering College Erode India
Cloud-based infrastructures often leverage virtualization, but its implementation can be expensive. Traditional coding methods can lead to issues when transitioning code from one computing environment to another. In r... 详细信息
来源: 评论
CredAct: Privacy-Preserving Activity Verification for Benefits Schemes in Self-Sovereign Identity  6
CredAct: Privacy-Preserving Activity Verification for Benefi...
收藏 引用
6th IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024
作者: Mukta, Rahma Paik, Hye-Young Lu, Qinghua Kanhere, Salil S. Unsw School of Computer Science and Engineering Sydney Australia Csiro Data61 Sydney Australia
We propose CredAct, a user activity verification designed with data minimisation to protect privacy. Many Benefits Schemes, such as discount offers, loyalty programs, and incentive systems, require verification of use... 详细信息
来源: 评论