咨询与建议

限定检索结果

文献类型

  • 86,645 篇 会议
  • 45,685 篇 期刊文献
  • 1,264 册 图书

馆藏范围

  • 133,594 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 80,866 篇 工学
    • 58,395 篇 计算机科学与技术...
    • 46,943 篇 软件工程
    • 20,274 篇 信息与通信工程
    • 12,744 篇 控制科学与工程
    • 9,364 篇 电气工程
    • 9,340 篇 生物工程
    • 8,569 篇 电子科学与技术(可...
    • 7,207 篇 生物医学工程(可授...
    • 5,694 篇 光学工程
    • 5,507 篇 机械工程
    • 4,088 篇 仪器科学与技术
    • 4,012 篇 动力工程及工程热...
    • 3,864 篇 化学工程与技术
    • 3,714 篇 网络空间安全
    • 3,360 篇 安全科学与工程
    • 2,855 篇 交通运输工程
  • 45,083 篇 理学
    • 23,020 篇 数学
    • 13,626 篇 物理学
    • 10,702 篇 生物学
    • 7,278 篇 统计学(可授理学、...
    • 4,894 篇 系统科学
    • 4,270 篇 化学
  • 23,615 篇 管理学
    • 14,309 篇 管理科学与工程(可...
    • 10,280 篇 图书情报与档案管...
    • 6,524 篇 工商管理
  • 7,624 篇 医学
    • 6,353 篇 临床医学
    • 5,588 篇 基础医学(可授医学...
    • 3,346 篇 药学(可授医学、理...
    • 3,313 篇 公共卫生与预防医...
  • 4,087 篇 法学
    • 3,302 篇 社会学
  • 2,443 篇 经济学
  • 2,087 篇 农学
  • 1,843 篇 教育学
  • 664 篇 文学
  • 361 篇 军事学
  • 258 篇 艺术学
  • 53 篇 哲学
  • 30 篇 历史学

主题

  • 3,973 篇 computer science
  • 3,718 篇 accuracy
  • 3,385 篇 deep learning
  • 3,333 篇 feature extracti...
  • 2,923 篇 machine learning
  • 2,692 篇 computational mo...
  • 2,513 篇 training
  • 2,301 篇 educational inst...
  • 2,036 篇 internet of thin...
  • 1,969 篇 support vector m...
  • 1,932 篇 data mining
  • 1,775 篇 predictive model...
  • 1,744 篇 artificial intel...
  • 1,716 篇 convolutional ne...
  • 1,642 篇 real-time system...
  • 1,623 篇 optimization
  • 1,446 篇 security
  • 1,429 篇 wireless sensor ...
  • 1,374 篇 data models
  • 1,282 篇 cloud computing

机构

  • 1,108 篇 department of co...
  • 1,017 篇 department of ph...
  • 1,011 篇 cavendish labora...
  • 963 篇 oliver lodge lab...
  • 950 篇 physikalisches i...
  • 789 篇 university of ch...
  • 679 篇 college of compu...
  • 608 篇 infn sezione di ...
  • 587 篇 infn sezione di ...
  • 570 篇 infn laboratori ...
  • 556 篇 department of ph...
  • 543 篇 fakultät physik ...
  • 542 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 536 篇 imperial college...
  • 536 篇 infn sezione di ...
  • 532 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 507 篇 stfc rutherford ...
  • 498 篇 school of physic...

作者

  • 252 篇 barter w.
  • 244 篇 a. gomes
  • 233 篇 s. chen
  • 232 篇 c. alexa
  • 231 篇 j. m. izen
  • 230 篇 beiter a.
  • 229 篇 blake t.
  • 225 篇 bellee v.
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 223 篇 c. amelung
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 216 篇 bay a.

语言

  • 124,103 篇 英文
  • 7,784 篇 其他
  • 1,741 篇 中文
  • 101 篇 日文
  • 22 篇 斯洛文尼亚文
  • 20 篇 德文
  • 13 篇 法文
  • 4 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science/ College of Computer Science and Information Technology"
133594 条 记 录,以下是4671-4680 订阅
排序:
A Design Thinking Approach of Metaheuristic Empowerment for Energy-Efficient and Optimized Routing protocol in IoT-Enabled Wireless Sensor Networks  3
A Design Thinking Approach of Metaheuristic Empowerment for ...
收藏 引用
3rd International Conference on Smart Technologies, Communication and Robotics, STCR 2023
作者: Princy, D. Kalaivani, D. Vijayaraghavan, T. Dr. S N S Rajalakshmi College of Arts and Science Department of Computer Science Coimbatore India Dr. S N S Rajalakshmi College of Arts and Science Department of Computer Technology Coimbatore India Sns College of Technology Computer Science and Engineering Coimbatore India
This research focuses on energy-efficient routing in WSNs within IoT contexts, comparing established protocols like SEP, HEED, TEEN with the proposed SEP-ACO protocol. By strategically selecting cluster heads based on... 详细信息
来源: 评论
Secure Sentinel Leveraging Machine Learning for Fraud Detection in Blockchain Transactions  5
Secure Sentinel Leveraging Machine Learning for Fraud Detect...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Shirley, C.P. Thanga Helina, S. Berin Jeba Jingle, I. Saran, P. Absin, S.J. Karunya Institute of Technology and Sciences Dept. of Computer Science and Engineering Coimbatore India Kpr College of Arts Science and Research Department of Commerce with Computer Application Coimbatore India
Blockchain technology's decentralized and transparent transaction platforms have changed a number of sectors. However, harmful activities like fraud and money laundering are also drawn to blockchain due to its dis... 详细信息
来源: 评论
A Robust Graphical Authentication System for the Shoulder Surfing Attack  3rd
A Robust Graphical Authentication System for the Shoulder Su...
收藏 引用
3rd International Conference on Communication, Networks and Computing, CNC 2022
作者: Varshney, Shailja Kumari, Sonam Agarwal, Anannya Pal, Prashant Department of Computer Science and Engineering ITS Engineering College Greater Noida India Department of Computer Science and Engineering Rajkumar Goel Institute of Technology Ghaziabad India Department of Computer Science and Engineering Birla Institute of Technology Mesra India
The technique of determining whether a user is legitimate or not is known as authentication. It needs a secret field (password) that only the actual user knows. Every security system is created in such a way that it m... 详细信息
来源: 评论
SocialChain: A Decentralized Social Media Platform on the Blockchain  1
收藏 引用
2nd EAI International Conference on Pervasive knowledge and collective intelligence on Web and Social Media, PerSOM 2023
作者: Prashanth, Mallellu Sai Maheswari, V. Uma Aluvalu, Rajinikanth Kantipudi, M. V. V. Prasad Departmentof Computer Science and Engineering Vardhaman College of Engineering Hyderabad India Departmentof Computer Science and Engineering Chaitanya Bharathi Institute of Technology Hyderabad India Departmentof Information Technology Chaitanya Bharathi Institute of Technology Hyderabad India Pune India
The emergence of blockchain technology has paved the way for innovative solutions in various domains, including social media. This research paper presents the design and implementation of "SocialChain," a de... 详细信息
来源: 评论
Innovative Data Encryption Techniques using AI for Wireless Sensor Actuator Network Security  2
Innovative Data Encryption Techniques using AI for Wireless ...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Dharmateja, M. Rama, Prabha K.P. Asha, N. Nithya, P. Lalitha, S. Manojkumar, P. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Arunai Engineering College Department of Computer Science and Engineering Tamil Nadu Tiruvannamalai India Bannari Amman Institute of Technology Department of Electrical and Electronics Engineering Tamil Nadu Sathyamangalam India
Wireless Sensor Actuator Networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat... 详细信息
来源: 评论
Classification of Downy Mildew Disease in Watermelon Plant Leaf using VGG-16 Convolutional Neural Network  4
Classification of Downy Mildew Disease in Watermelon Plant L...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Khannum, Ayesha Dhanesha, R. Kantharaj, Y. Davangere University Department of Research and studies in Computer Science Davangere India Davangere University Department of studies in Computer Science Davanagere India College of Horticulture Department of Post-harvest Technology Mudigere India
Downy Mildew, caused by Pseudoperonospora cubensis, poses a serious threat to watermelon (Citrullus lanatus) crops, with the potential to drastically reduce yields and cause substantial economic losses in the agricult... 详细信息
来源: 评论
Exploration of Agricultural GDP in Shaoguan City Based on ARIMA Algorithm  24
Exploration of Agricultural GDP in Shaoguan City Based on AR...
收藏 引用
2024 International Conference on Economic Data Analytics and Artificial Intelligence, EDAI 2024
作者: Huang, Jingyi Li, Xiaoqin Qi, Yuhang Jia, Mengyi Luo, Yongbin Zhang, Rong Liu, Lidong Department of Computer Science Guangdong University of Science and Technology Guangdong Dongguan China Department of General Education Guangdong University of Science and Technology Guangdong Dongguan China Art and Design College Department Guangdong University of Science and Technology Guangdong Dongguan China
ARIMA algorithm is a classic statistical method used for time series prediction, which ensures the stationarity of data by analyzing autoregressive and moving average components in historical data, as well as necessar... 详细信息
来源: 评论
Handwritten Chinese Character Regularity Assessment Method Based on Improved Googlenet  5
Handwritten Chinese Character Regularity Assessment Method B...
收藏 引用
5th International Conference on Frontiers technology of information and computer, ICFTIC 2023
作者: Kang, Zhennan Yang, Yong Qu, Fuheng Li, Jinzhuang Changchun University of Science and Technology College of Computer Science and Technology Changchun China College of Software Jilin Electronic Information Vocational and Technical College Jilin China
The standardization assessment of handwritten Chinese characters currently often relies on manual feature extraction, which excessively depends on subjective experience and lacks feature extraction capability. To addr... 详细信息
来源: 评论
Optimal Deep Learning Enabled Communication System for Unmanned Aerial Vehicles
收藏 引用
computer Systems science & Engineering 2023年 第4期45卷 955-969页
作者: Anwer Mustafa Hilal Jaber S.Alzahrani Dalia H.Elkamchouchi Majdy M.Eltahir Ahmed S.Almasoud Abdelwahed Motwakel Abu Sarwar Zamani Ishfaq Yaseen Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh 11671Saudi Arabia Department of Information Systems College of Science&Art at MahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrince Sultan UniversitySaudi Arabia
Recently,unmanned aerial vehicles(UAV)or drones are widely employed for several application areas such as surveillance,disaster management,*** UAVs are limited to energy,efficient coordination between them becomes ess... 详细信息
来源: 评论
Person Re-Identification Algorithm Based On Identity information Matrix  5
Person Re-Identification Algorithm Based On Identity Informa...
收藏 引用
5th International Conference on Artificial Intelligence and Advanced Manufacturing, AIAM 2023
作者: Yan, Yue Yao, Junxiang Zhu, Hao Luo, Yuhui Li, Xiaopan Shen, Yunchen Zhang, Jing Liu, Yinxu Li, Xiangkui College of Physics and Information Engineering Zhaotong University Zhaotong China College of Information Engineering and Automation Kunming University of Science and Technology Kunming China College of Computer Science and Technology Harbin University of Science and Technology Harbin China
In order to overcome the domain shift problem in person re-identifacation algorithms, the paper proposes a person re-identifacation algorithm oriented towards identity information matrix. Firstly, the algorithm traine... 详细信息
来源: 评论