咨询与建议

限定检索结果

文献类型

  • 273,345 篇 会议
  • 111,993 篇 期刊文献
  • 2,804 册 图书

馆藏范围

  • 388,141 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 224,037 篇 工学
    • 148,948 篇 计算机科学与技术...
    • 120,663 篇 软件工程
    • 54,160 篇 信息与通信工程
    • 35,483 篇 控制科学与工程
    • 31,399 篇 电气工程
    • 30,358 篇 电子科学与技术(可...
    • 25,956 篇 生物工程
    • 20,386 篇 生物医学工程(可授...
    • 17,751 篇 光学工程
    • 15,345 篇 机械工程
    • 12,974 篇 化学工程与技术
    • 12,146 篇 仪器科学与技术
    • 12,098 篇 动力工程及工程热...
    • 10,733 篇 材料科学与工程(可...
    • 8,280 篇 安全科学与工程
    • 7,670 篇 网络空间安全
  • 126,674 篇 理学
    • 62,964 篇 数学
    • 41,550 篇 物理学
    • 29,361 篇 生物学
    • 20,317 篇 统计学(可授理学、...
    • 14,868 篇 系统科学
    • 13,897 篇 化学
  • 55,790 篇 管理学
    • 33,608 篇 管理科学与工程(可...
    • 24,364 篇 图书情报与档案管...
    • 16,634 篇 工商管理
  • 19,250 篇 医学
    • 16,141 篇 临床医学
    • 14,501 篇 基础医学(可授医学...
    • 9,147 篇 药学(可授医学、理...
    • 7,681 篇 公共卫生与预防医...
  • 10,508 篇 法学
    • 8,599 篇 社会学
  • 6,434 篇 经济学
  • 5,081 篇 农学
  • 4,151 篇 教育学
  • 1,861 篇 文学
  • 871 篇 军事学
  • 506 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,988 篇 computer science
  • 8,855 篇 accuracy
  • 8,624 篇 computational mo...
  • 7,891 篇 feature extracti...
  • 7,409 篇 deep learning
  • 7,201 篇 machine learning
  • 6,467 篇 training
  • 5,256 篇 data mining
  • 5,119 篇 computer archite...
  • 5,022 篇 support vector m...
  • 4,926 篇 wireless sensor ...
  • 4,825 篇 predictive model...
  • 4,653 篇 costs
  • 4,535 篇 bandwidth
  • 4,489 篇 optimization
  • 4,478 篇 application soft...
  • 4,365 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,328 篇 testing
  • 4,245 篇 neural networks

机构

  • 1,696 篇 department of co...
  • 1,362 篇 department of co...
  • 1,346 篇 department of el...
  • 1,158 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 970 篇 department of ph...
  • 891 篇 department of co...
  • 851 篇 physikalisches i...
  • 841 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 742 篇 university of ch...
  • 638 篇 department of co...
  • 548 篇 department of co...
  • 543 篇 infn sezione di ...
  • 515 篇 chitkara univers...
  • 513 篇 infn sezione di ...
  • 513 篇 infn laboratori ...
  • 501 篇 horia hulubei na...
  • 492 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 255 篇 j. wang
  • 255 篇 s. chen
  • 250 篇 barter w.
  • 240 篇 a. gomes
  • 225 篇 blake t.
  • 221 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 j. m. izen
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 190 篇 j. strandberg

语言

  • 372,071 篇 英文
  • 12,408 篇 其他
  • 3,669 篇 中文
  • 220 篇 日文
  • 48 篇 德文
  • 34 篇 朝鲜文
  • 32 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Engineering and Computer Science"
388142 条 记 录,以下是4501-4510 订阅
排序:
A Comprehensive Review on Family Budget Management  6th
A Comprehensive Review on Family Budget Management
收藏 引用
6th International Conference on Intelligent Computing and Optimization, ICO 2023
作者: Akash, Rashik Shahriar Ullah, Mohammad Islam, Radiful Nahid, Sayed Reza, Ahmed Wasif Arefin, Mohammad Shamsul Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Computer Science and Engineering East West University Dhaka Bangladesh Department of Computer Science and Engineering Chittagong University of Engineering and Technology Chattogram Bangladesh
In the modern economic era, households have become one of the most significant corporate entities, and personal finances are essential management-related topics. Effective management of personal finances at a family l... 详细信息
来源: 评论
Forensic Eye: Convolutional Neural Network-based Crime Scene Object Detection System  2
Forensic Eye: Convolutional Neural Network-based Crime Scene...
收藏 引用
2nd International Conference Computational and Characterization Techniques in engineering and sciences, IC3TES 2024
作者: Sudha, I. Vadivel, M. Lakshmiramana, P. Kalpana, N. Kumar, Nellore Manoj Vinoth, R. Saveethe University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science Tamilnadu Chennai India Excel Engineering College Department of Information Technology Komarapalayam Namakkal India Madanapalle Institute of Technology & Science Department of Computer Science & Technology Andhra Pradesh India Psna College of Engineering and Technology Department of Computer Science and Engineering India Saveetha School of Engineering Department of Mathematics Tamilnadu Chennai India Rmk College of Engineering and Technology Department of Computer Science and Engineering Puduvoyal India
Forensic investigations rely heavily on the accurate detection and analysis of crime related objects present at crime scenes. Traditional methods of object detection often involve manual labor and are error prone proc... 详细信息
来源: 评论
Encrypted Malicious Network Traffic Detection: Leveraging Attention Mechanism and Markov Chain Sequencing
Encrypted Malicious Network Traffic Detection: Leveraging At...
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Zeleke, Sileshi Nibret Jember, Amsalu Fentie Bochicchio, Mario University of Bari Department of Computer Science Bari Italy University of Gondar Departement of Computer Engineering Gondar Ethiopia
Encrypted malware traffic presents a considerable challenge, as traditional signature-based detection methods are incapable of inspecting the contents of such traffic, while deep packet inspection systems are often cr... 详细信息
来源: 评论
Employee Attrition Analysis Using XGBoost
Employee Attrition Analysis Using XGBoost
收藏 引用
2024 International Conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Isha Thapliyal, Nitin Solanki, Sheetal Pandey, Neeraj Kumar Papola, Sangita Graphic Era Hill University Department Of Computer Science Dehradun India Graphic Era Deemed To Be University Department Of Computer Science And Engineering Dehradun India
In today's time, employee attrition is a major problem faced by organisations. The most precious resource for a firm is its workforce. They are the ones that bring values both quantitatively and qualitatively. A s... 详细信息
来源: 评论
Effective Deep Learning Techniques for Prediction of Energy Consumption in Smart Buildings  2
Effective Deep Learning Techniques for Prediction of Energy ...
收藏 引用
2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Beura, Sonali Mohanty, Sanjukta Mohapatra, Sunil Kumar Panda, Namita Acharya, Arup Abhinna Computer Science and Engineering Odisha University of Research and Technology Bhubaneswar India Centurion University of Technology and Management Department of Computer Science & Engineering Bhubaneswar India School of Computer Engineering Kiit Deemed to Be University Bhubaneswar India
Energy consumption is an important aspect of the energy management system. Over the past few decades, it has been recorded that there has been a drastic increase in global energy use. As a result, every country develo... 详细信息
来源: 评论
AI-Driven Exploration of Structural Virality and Influencing Elements in Online Information Diffusal  1
AI-Driven Exploration of Structural Virality and Influencing...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Kaur, Ripandeep Sahu, Rakesh Sandhu, Jasminder Kaur Chandigarh University Department of Computer Science & Engineering Punjab Mohali140413 India Galgotias University Department of Computer Science & Engineering Uttar Pradesh Greater Noida203201 India
Structural virality is a measure for how much information spreads across multiple user generations. It is important because it can help us better understand how information spreads online and develop new, useful techn... 详细信息
来源: 评论
Corrections to "Reed Solomon Codes Against Adversarial Insertions and Deletions"
收藏 引用
IEEE Transactions on Information Theory 2025年 第4期71卷 3237-3238页
作者: Con, Roni Shpilka, Amir Tamo, Itzhak Technion – Israel Institute of Technology Department of Computer Science Haifa3200003 Israel Tel Aviv University Blavatnik School of Computer Science Tel Aviv6997801 Israel Tel Aviv University Department of Electrical Engineering-Systems Tel Aviv6997801 Israel
The purpose of this note is to correct an error made by Con et al. (2023), specifically in the proof of Theorem 9. Here we correct the proof but as a consequence we get a slightly weaker result. In Theorem9, we claime...
来源: 评论
Enhanced CNN-SVM Fusion for In-Depth Facial Acne Analysis  3
Enhanced CNN-SVM Fusion for In-Depth Facial Acne Analysis
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Prabha, Chander Monga, Sakshra Srivastava, Prakash Singla, Gagan Saluja, Nitin Kumar, Vinod Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science & Engineering Dehradun India Chandigarh University Department of Computer Science & Engineering Punjab Mohali India
The purpose of this work is to present and access a comprehensive analysis of an advanced facial acne classification method that is focused on machine learning. Hormonal acne, pustules, papules, cysts, blackheads (ope... 详细信息
来源: 评论
ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers
收藏 引用
Materials Today: Proceedings 2023年 80卷 3769-3776页
作者: Gite, Pratik Chouhan, Kuldeep Murali Krishna, K. Kumar Nayak, Chinmaya Soni, Mukesh Shrivastava, Amit Department of Computer Science and Engineering IPSA-IES Indore AB Road MP Indore India Department of Computer Science and Engineering I.T.S Engineering College Greater Noida India Department of Electronics and Communication Engineering Vignan's Institute of Information Technology Duvvada Andhra Pradesh Visakhapatnam India Faculty of Emerging Technology Sri Sri University Odisha751001 India Department of Computer Science & Engineering Jagran Lakecity University Bhopal India Department of Computer Science Engineering Swami Vivekanand College of Engineering Khandwa Road Near Tolnaka Vivekanand Knowledge City Indore India
A key component for preserving a WSN's integrity is designing an intrusion detection system (IDS). This article covers several sorts of security threats that may occur in a WSN. It proposes a detection of maliciou... 详细信息
来源: 评论
List 3-Coloring on Comb-Convex and Caterpillar-Convex Bipartite Graphs  29th
List 3-Coloring on Comb-Convex and Caterpillar-Convex Bipa...
收藏 引用
29th International Computing and Combinatorics Conference, COCOON 2023
作者: Baklan Şen, Banu Yaşar Diner, Öznur Erlebach, Thomas Computer Engineering Department Kadir Has University Istanbul Turkey Department of Computer Science Durham University Durham United Kingdom
Given a graph G= (V, E) and a list of available colors L(v) for each vertex v∈ V, where L(v) ⊆ { 1, 2, …, k}, List k -Coloring refers to the problem of assigning colors to the vertices of G so that each vertex recei... 详细信息
来源: 评论