咨询与建议

限定检索结果

文献类型

  • 3,999 篇 会议
  • 3,126 篇 期刊文献
  • 26 册 图书

馆藏范围

  • 7,151 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,494 篇 工学
    • 3,164 篇 计算机科学与技术...
    • 2,577 篇 软件工程
    • 1,174 篇 信息与通信工程
    • 766 篇 控制科学与工程
    • 589 篇 电气工程
    • 491 篇 生物工程
    • 480 篇 电子科学与技术(可...
    • 345 篇 光学工程
    • 333 篇 机械工程
    • 333 篇 生物医学工程(可授...
    • 329 篇 网络空间安全
    • 230 篇 仪器科学与技术
    • 216 篇 动力工程及工程热...
    • 209 篇 交通运输工程
    • 187 篇 化学工程与技术
    • 186 篇 安全科学与工程
    • 180 篇 核科学与技术
  • 2,477 篇 理学
    • 1,149 篇 数学
    • 863 篇 物理学
    • 561 篇 生物学
    • 365 篇 统计学(可授理学、...
    • 241 篇 化学
    • 238 篇 系统科学
  • 1,285 篇 管理学
    • 800 篇 管理科学与工程(可...
    • 562 篇 图书情报与档案管...
    • 280 篇 工商管理
  • 440 篇 医学
    • 337 篇 临床医学
    • 283 篇 基础医学(可授医学...
    • 200 篇 公共卫生与预防医...
  • 234 篇 法学
    • 183 篇 社会学
  • 158 篇 教育学
  • 106 篇 农学
  • 86 篇 经济学
  • 55 篇 文学
  • 15 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 222 篇 deep learning
  • 211 篇 accuracy
  • 185 篇 feature extracti...
  • 179 篇 machine learning
  • 140 篇 computational mo...
  • 139 篇 training
  • 131 篇 semantics
  • 113 篇 internet of thin...
  • 108 篇 real-time system...
  • 106 篇 data mining
  • 94 篇 convolutional ne...
  • 92 篇 optimization
  • 90 篇 support vector m...
  • 87 篇 predictive model...
  • 87 篇 artificial intel...
  • 85 篇 security
  • 83 篇 visualization
  • 76 篇 computer science
  • 74 篇 neural networks
  • 71 篇 data models

机构

  • 286 篇 department of ph...
  • 285 篇 faculty of scien...
  • 285 篇 department for p...
  • 278 篇 departamento de ...
  • 276 篇 department of ph...
  • 275 篇 kirchhoff-instit...
  • 273 篇 institute of phy...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 263 篇 institute of phy...
  • 259 篇 faculté des scie...
  • 257 篇 fakultät für phy...
  • 243 篇 institut für ast...
  • 235 篇 yerevan physics ...
  • 225 篇 department of ph...
  • 224 篇 department of ph...
  • 220 篇 physics division...
  • 219 篇 department of ph...
  • 218 篇 department of ph...
  • 213 篇 instituto de fís...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 264 篇 y. nagasaka
  • 262 篇 s. guindon
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 260 篇 a. kaczmarska

语言

  • 5,966 篇 英文
  • 1,076 篇 其他
  • 126 篇 中文
  • 4 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer and Information Technology and Engineering Education"
7151 条 记 录,以下是671-680 订阅
排序:
Implementation of ABC & WOA-Based Security Defense Mechanism for Distributed Denial of Service Attacks  6
Implementation of ABC & WOA-Based Security Defense Mechanism...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Devi, Suman Sharma, Yogesh Kumar Athithan, Senthil Sachi, Savya Singh, Ajay Kumar Jain, Arpit Chaudhary Devi Lal University Department of Computer Science and Engineering Haryana Sirsa India Koneru Lakshmaiah Education Foundation Department of Computer Science & Engineering AP Guntur India Koneru Lakshmaiah Education Foundation Department of Computer Science & Engineering Andhra Pradesh Vaddeswaram India Lalit Narayan Mishra College of Business Management Department of Information Technology Bihar Muzaffarpur India Allen House Institute of Technology India
computer systems are vulnerable to information theft as a result of the extensive use of the internet, which has caused an increase in security defence mechanisms. In order to overcome these theft various approaches h... 详细信息
来源: 评论
Integrating Social Platforms with IoT: Security Challenges, Applications, and Trust Issues  5
Integrating Social Platforms with IoT: Security Challenges, ...
收藏 引用
5th IEEE India Council International Subsections Conference, INDISCON 2024
作者: Mohanta, Bhabendu Kumar Dehury, Mohan Kumar Tulasi, Desetti Das, Sunayana United Arab Emirates University College of Information Technology Al AinP.O. Box 15551 United Arab Emirates Amity Institute of Information Technology Amity University Jharkhand Ranchi India Koneru Lakshmaiah Education Foundation Dept. of Computer Science and Engineering Vaddeswaram Guntur India Driems University Tangi Dept. of Computer Scinece and Engineering Odisha Cuttack754 022 India
The term Social Internet of Things (Social IoT) refers to an expansion of the term Internet of Things (IoT) that integrates social networking capabilities and concepts into IoT applications. The number of connected de... 详细信息
来源: 评论
Block-Hash Signature (BHS) for Transaction Validation in Smart Contracts for Security and Privacy using Blockchain
收藏 引用
Journal of Mobile Multimedia 2023年 第4期19卷 935-962页
作者: Bhatnagar, Sonika Dayal, Mohit Singh, Deepti Upreti, Shitiz Upreti, Kamal Kumar, Jitender Dept. of Computer Science & Engineering Government Polytechnic Baheri Bareilly India Dept. of Applied Science Bharati Vidyapeeth’s College of Engineering New Delhi India Dept. of Information Technology ABES Institute of Technology Ghaziabad India Dept.of Information Technology Asian Education Group (AEG) Noida India Dept. of Computer Science & Engineering Dr. Akhilesh Das Gupta Institute of Technology and Management New Delhi India Dept. of Computer Science & Engineering J.C Bose University of Science & Technology YMCA Haryana Faridabad India
Some of the well-known signature techniques like Winternitz and Lamport are not considered to be very appropriate for the usage of hashing or smart contracts in Blockchains security because of their size O(n2), which ... 详细信息
来源: 评论
Examining the Effects of Applying AI to Enhance Big Data Retrieval Efficiency
Examining the Effects of Applying AI to Enhance Big Data Ret...
收藏 引用
2023 IEEE International Conference on Paradigm Shift in information Technologies with Innovative Applications in Global Scenario, ICPSITIAGS 2023
作者: Sharma, Nakul S. Yadav, Dhananjay Shrivastava, Manish Mandal, Sanjeev Kumar Ravivarman, G. Jana, D Little Femilin Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Department of Computer Science and Information Technology Karnataka Bangalore India Karpagam Academy of Higher Education Department of Electrical and Electronics Engineering Coimbatore641021 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai India
This studies paper explores how synthetic Intelligence (AI) technologies may be used to improve the efficiency of information retrieval from huge databases, as applied in a diffusion of industries. The paper will disc... 详细信息
来源: 评论
Fog Restoration in Hazy Images using Deep Transfer Learning
Fog Restoration in Hazy Images using Deep Transfer Learning
收藏 引用
2024 International Conference on Smart Devices, ICSD 2024
作者: Agrawal, Navin Kumar Sharma, Viboo Singh, Pranita Sachi, Savya Jain, Arpit Alam, Md Mohtab GLA University Department of Computer Engineering and Applications U.P. Mathura India Hindustan College of Science and Technology Department of IT U.P. Mathura India Roorkee Institute of Technology Department of Computer Science and Engineering U.K. Roorkee India L N Mishra College of Business Management Department of Information Technology Bihar Muzaffarpur India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering AP Vaddeswaram India Eklavya University Department of Computer Science & Engineering M.P. Damoh India
Issues like low vision and the distortion of spectral and spatial information in photographs can be brought on by unfavorable atmospheric circumstances including smog, rain, overcast sky, fog, and smoke. This piece lo... 详细信息
来源: 评论
EVADE: Targeted Adversarial False Data Injection Attacks for State Estimation in Smart Grid
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2025年 第3期10卷 534-546页
作者: Tian, Jiwei Shen, Chao Wang, Buhong Ren, Chao Xia, Xiaofang Dong, Runze Cheng, Tianhao Xi’an Jiaotong University Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an710049 China Air Force Engineering University Air Traffic Control and Navigation College Xi’an710051 China Air Force Engineering University Information and Navigation College Xi’an710043 China Nanyang Technological University School of Electrical and Electronic Engineering 639798 Singapore Xidian University School of Computer Science and Technology Xi’an710126 China
Although conventional false data injection attacks can circumvent the detection of bad data detection (BDD) in sustainable power grid cyber physical systems, they are easily detected by well-trained deep learning-base... 详细信息
来源: 评论
Air Quality Image Classification using Ensemble Based Transfer Learning Techniques
Air Quality Image Classification using Ensemble Based Transf...
收藏 引用
International Conference on computer Vision and Internet of Things 2023, ICCVIoT 2023
作者: Saradha, S. Kumar, M. Praveen Asha, J. Saranya, R. Santhoshkumar, S.P. Department of Computer Science and Engineering Sri Eshwar College of Engineering Tamil Nadu Coimbatore India PSG Institute of Technology and Applied Research Neelambur Coimbatore India Department of Computer Science and Engineering Karpagam Academy of Higher Education Coimbatore India Department of Information Technology Rathinam Technical Campus Coimbatore India
In recent years, research has focused on the efficacy of neural networks, Learning by Transfer (TL), and Ensemble Learning (EL) techniques in image processing. Ensemble approaches, when employed on image classificatio... 详细信息
来源: 评论
Hate Speech Detection Using the GPT-2 and Natural Language Processing  1
Hate Speech Detection Using the GPT-2 and Natural Language P...
收藏 引用
1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023
作者: Sachi, Savya Singh, Ajay Kumar Jain, Arpit Devi, Suman Sharma, Yogesh Kumar Athithan, Senthil Lalit Narayan Mishra College of Business Management Department of Information Technology Bihar Muzaffarpur842001 India Allenhouse Institute of Technology Uttar Pradesh Kanpur India Koneru Lakshmaiah Education Foundation Department of Computer Science & Engineering A.P. Guntur India Chaudhary Devi Lal University Department of Computer Science and Engineering Haryana Sirsa India Koneru Lakshmaiah Education Foundation Department of Computer Science & Engineering AP Guntur India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering A.P. Vaddeswaram India
Hate speech on social media has increased as people use it to communicate and express their thoughts. Automatic hate speech detection has been studied in several languages. This study investigates the conclusion of th... 详细信息
来源: 评论
Confidence-Guided Feature Alignment for Cloth-Changing Person Re-identification  27th
Confidence-Guided Feature Alignment for Cloth-Changing Pers...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Huang, Sirong Zheng, Huicheng School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Much progress has been made in the field of person re-identification, but changes in clothing have hindered the practical application of long-term person re-identification. Cloth-changing person re-identification (CC-... 详细信息
来源: 评论
Investigating the Effectiveness of Birthday Attack Strategies in Cryptography Network Security  3
Investigating the Effectiveness of Birthday Attack Strategie...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Chavan, Gurunath T. Agrawal, Shalu Sakhare, Nitin N. Mondal, Dipannita Vigenesh, M. Vijayalakshmi, G. Vishwakarma Institute of Information Technology Department of Information Technology Pune India Mangalayatan University Department of Management Aligarh India Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Dr. D.Y.Patil College of Engineering and Innovation Artificial Intelligence and Data Science Department Talegaon India Karpagam Academy of Higher Education Department of Computer Science Engineering Coimbatore India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai India
Cryptography is a crucial factor of community safety because it involves growing and decoding mystery codes to guard touchy statistics from unauthorized right of entry. As the era advances, community protection profes... 详细信息
来源: 评论