咨询与建议

限定检索结果

文献类型

  • 2,160 篇 会议
  • 1,022 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 3,184 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,902 篇 工学
    • 1,384 篇 计算机科学与技术...
    • 1,114 篇 软件工程
    • 525 篇 信息与通信工程
    • 333 篇 控制科学与工程
    • 223 篇 生物工程
    • 211 篇 电气工程
    • 196 篇 生物医学工程(可授...
    • 166 篇 电子科学与技术(可...
    • 159 篇 网络空间安全
    • 133 篇 光学工程
    • 122 篇 机械工程
    • 117 篇 安全科学与工程
    • 115 篇 动力工程及工程热...
    • 106 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 94 篇 核科学与技术
  • 1,135 篇 理学
    • 518 篇 数学
    • 409 篇 物理学
    • 254 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 115 篇 化学
    • 108 篇 系统科学
  • 600 篇 管理学
    • 356 篇 管理科学与工程(可...
    • 261 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 209 篇 医学
    • 162 篇 临床医学
    • 159 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
    • 88 篇 药学(可授医学、理...
  • 114 篇 法学
    • 93 篇 社会学
  • 66 篇 农学
  • 60 篇 经济学
  • 31 篇 教育学
  • 24 篇 文学
  • 12 篇 军事学
  • 2 篇 艺术学

主题

  • 148 篇 accuracy
  • 100 篇 hadron colliders
  • 99 篇 deep learning
  • 91 篇 machine learning
  • 73 篇 computational mo...
  • 68 篇 feature extracti...
  • 65 篇 support vector m...
  • 65 篇 convolutional ne...
  • 60 篇 training
  • 58 篇 internet of thin...
  • 50 篇 wireless sensor ...
  • 50 篇 real-time system...
  • 48 篇 optimization
  • 48 篇 predictive model...
  • 47 篇 security
  • 43 篇 medical services
  • 41 篇 artificial intel...
  • 41 篇 data models
  • 38 篇 reliability
  • 34 篇 neural networks

机构

  • 134 篇 yerevan physics ...
  • 131 篇 national and kap...
  • 131 篇 centro brasileir...
  • 131 篇 istanbul technic...
  • 130 篇 irfu cea univers...
  • 129 篇 university of sp...
  • 129 篇 indian institute...
  • 128 篇 universidad iber...
  • 127 篇 brunel universit...
  • 127 篇 charles universi...
  • 126 篇 università di to...
  • 126 篇 academy of scien...
  • 126 篇 department of ph...
  • 126 篇 infn sezione di ...
  • 123 篇 infn sezione di ...
  • 122 篇 zhejiang univers...
  • 122 篇 university of de...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 120 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,018 篇 英文
  • 137 篇 其他
  • 31 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Technology and Application Department"
3184 条 记 录,以下是31-40 订阅
排序:
Multi-class Classification Approach for Smart Intrusion Attack Detection Using AI and ML Classifiers  8th
Multi-class Classification Approach for Smart Intrusion Atta...
收藏 引用
8th International Conference on Information and Communication technology for Intelligent Systems, ICTIS 2024
作者: Rathod, Dushyantsinh B. Patel, Yesha Jethava, Archana Gohel, Namrata Suthar, Dhruvi Prajapati, Ramesh Rathod, Ghanshyam Computer Engineering Department Ahmedabad Institute of Technology Gujarat Ahmedabad India Department of CSE Faculty of Engineering and Technology GLS University Gujarat Ahmedabad India Computer Engineering Department Shree Swaminarayan Institute of Technology Gujarat Gandhinagar India Department of Computer Application Parul Institute of Computer Application Baroda India
Due to increased network traffic and security concerns, intrusion detection system (IDS) research has received a lot of attention in computer science. Advanced intrusion detection systems have arbitrary incursion cate... 详细信息
来源: 评论
Enhanced Proof of Authentication(E-PoA) Consensus Blockchain-Based Secured Health Care Data Transmission in Internet of Things
Enhanced Proof of Authentication(E-PoA) Consensus Blockchain...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Keerthana, T. Krithika, D.R. Vels Institute of Science Technology and Advanced Studies Department of Computer Application Chennai India
Blockchain and the Internet of Things (IoT) are revolutionizing healthcare, presenting the potential for transformation. The IoT is achieving more and more confidence as the infrastructure for future applications. The... 详细信息
来源: 评论
Enhanced Security in e-Tendering System Using Blockchain with Efficient Smart Contracts and Hybrid Cryptography  5th
Enhanced Security in e-Tendering System Using Blockchain wit...
收藏 引用
5th International Conference on Trends in Computational and Cognitive Engineering, TCCE 2023
作者: Gupta, Amritesh Kumar Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology Gorakhpur Gorakhpur India
Many organizations use tendering including government to obtain goods and services from the providers of the service and manufacturing companies. There has been an advanced evolution in the process from traditional ha... 详细信息
来源: 评论
A Blind Deblurring Strategy for Images based on Iterative and Guided Filtering  11
A Blind Deblurring Strategy for Images based on Iterative an...
收藏 引用
11th Joint International Information technology and Artificial Intelligence Conference, ITAIC 2023
作者: Liu, Xiaojing Fan, Zhen Qinghai University Department of Computer Technology and Application Qinghai China
Image deblurring is an important branch of image restoration tasks. In order to eliminate blurring in a single image, an image deblurring strategy is proposed. Specifically, first enhance the image, then delimit the s... 详细信息
来源: 评论
Design of Lightweight Decentralized Secure Communication  16
Design of Lightweight Decentralized Secure Communication
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Silwal, Aditya Pandey, Bishwajeet Gl Bajaj College of Technology and Management Department of Computer Application Greater Noida India
This research focuses on developing a Peer-to-Peer Encrypted Chat application, offering secure, decentralized communication without reliance on centralized servers. Utilizing SSL/TLS (Secure Socket Layers and Transpor... 详细信息
来源: 评论
Real-Time Smart Alert System for Prevention of Vehicle Accident and Fire: An IoT-Based Alarm System  2nd
Real-Time Smart Alert System for Prevention of Vehicle Accid...
收藏 引用
2nd International Conference on Innovations in Data Analytics, ICIDA 2023
作者: Dalui, Indrani Jana, Debopriyo Ghosh, Papri Patra, Suman Kundu, Aritra Das Sarkar, Pubali Department of Computer Application Eminent College of Management and Technology West Bengal Barasat India
There has been a significant increase in road and rail accidents owing to driver drowsiness, which results in massive deadly incidents. When the driver falls asleep, he loses control, resulting in an accident. People ... 详细信息
来源: 评论
Comprehensive Analysis of Routing Protocols in the Context of Internet of Vehicles  21
Comprehensive Analysis of Routing Protocols in the Context o...
收藏 引用
21st OITS International Conference on Information technology, OCIT 2023
作者: Jaswani, Nidhi Dasgupta, Mou National Institute of Technology Department of Computer Application Raipur India
The future of Internet of Vehicles (IoV) technology has significant potential for development. Since the introduction of smart vehicles (automobiles that are equipped with sensors, electronic control units (ECUs) and ... 详细信息
来源: 评论
Understanding Fun in Cooking: Preliminary Study of Serious Games on Cooking Domain
Understanding Fun in Cooking: Preliminary Study of Serious G...
收藏 引用
2024 International Conference on Information technology Systems and Innovation, ICITSI 2024
作者: Halim, Steven Andrew Rumi, Jalaluddin Pratama, Galih Dea Ramdhan, Dimas Bina Nusantara University School of Computer Science Game Application & Technology Computer Science Department Jakarta Indonesia
Cooking is an important life skill to master. Despite the importance, a study suggests that there is a decline in cooking skills between generations. In accordance with that, serious games emerge as a form of solution... 详细信息
来源: 评论
Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture  5th
Anonymous and Practical Multi-factor Authentication for Mo...
收藏 引用
5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022
作者: Cao, Haiyan Xie, Yong Department of Computer Technology and Application Qinghai University Xining China
At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal privilege attack, dictionary guessing attack, and other attacks. To ... 详细信息
来源: 评论
Urban Growth Estimation of Moradabad City Using Sentinel-2 Images
Urban Growth Estimation of Moradabad City Using Sentinel-2 I...
收藏 引用
2024 International Conference on Artificial Intelligence and Emerging technology, Global AI Summit 2024
作者: Srivastava, Saurabh Ahmed, Tasneem Kumar, Rajeev Moradabad Institute of Technology Department of Computer Science & Engineering Moradabad India Integral University Department of Computer Application Lucknow India
Accurate monitoring and assessment are necessary due to the enormous challenges posed by rapid urbanization to sustainable development and resource management. This study utilizes Sentinel-2 satellite images of Morada... 详细信息
来源: 评论