咨询与建议

限定检索结果

文献类型

  • 55,127 篇 会议
  • 30,036 篇 期刊文献
  • 550 册 图书

馆藏范围

  • 85,713 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 51,401 篇 工学
    • 35,950 篇 计算机科学与技术...
    • 29,534 篇 软件工程
    • 13,212 篇 信息与通信工程
    • 8,628 篇 控制科学与工程
    • 7,008 篇 生物工程
    • 6,802 篇 电气工程
    • 5,867 篇 电子科学与技术(可...
    • 5,866 篇 生物医学工程(可授...
    • 4,348 篇 光学工程
    • 3,454 篇 机械工程
    • 3,116 篇 动力工程及工程热...
    • 3,093 篇 化学工程与技术
    • 2,810 篇 网络空间安全
    • 2,803 篇 仪器科学与技术
    • 2,608 篇 安全科学与工程
    • 2,406 篇 材料科学与工程(可...
  • 30,274 篇 理学
    • 14,020 篇 数学
    • 9,953 篇 物理学
    • 8,133 篇 生物学
    • 4,757 篇 统计学(可授理学、...
    • 3,454 篇 化学
    • 3,128 篇 系统科学
  • 14,505 篇 管理学
    • 9,069 篇 管理科学与工程(可...
    • 6,122 篇 图书情报与档案管...
    • 4,393 篇 工商管理
  • 6,506 篇 医学
    • 5,401 篇 临床医学
    • 4,758 篇 基础医学(可授医学...
    • 2,923 篇 公共卫生与预防医...
    • 2,887 篇 药学(可授医学、理...
  • 2,717 篇 法学
    • 2,219 篇 社会学
  • 1,726 篇 经济学
  • 1,594 篇 农学
  • 1,058 篇 教育学
  • 338 篇 文学
  • 209 篇 军事学
  • 121 篇 艺术学
  • 14 篇 哲学
  • 9 篇 历史学

主题

  • 3,503 篇 accuracy
  • 3,096 篇 deep learning
  • 2,437 篇 feature extracti...
  • 2,389 篇 machine learning
  • 1,914 篇 computational mo...
  • 1,879 篇 real-time system...
  • 1,872 篇 training
  • 1,789 篇 convolutional ne...
  • 1,752 篇 internet of thin...
  • 1,593 篇 support vector m...
  • 1,565 篇 computer science
  • 1,549 篇 educational inst...
  • 1,538 篇 predictive model...
  • 1,136 篇 optimization
  • 1,123 篇 artificial intel...
  • 1,085 篇 security
  • 1,005 篇 data models
  • 920 篇 neural networks
  • 868 篇 data mining
  • 858 篇 cloud computing

机构

  • 1,027 篇 department of ph...
  • 1,011 篇 cavendish labora...
  • 976 篇 physikalisches i...
  • 965 篇 oliver lodge lab...
  • 643 篇 university of ch...
  • 624 篇 infn sezione di ...
  • 606 篇 infn laboratori ...
  • 601 篇 infn sezione di ...
  • 585 篇 fakultät physik ...
  • 572 篇 infn sezione di ...
  • 558 篇 school of physic...
  • 546 篇 imperial college...
  • 539 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 533 篇 school of physic...
  • 517 篇 nikhef national ...
  • 515 篇 h.h. wills physi...
  • 513 篇 stfc rutherford ...
  • 513 篇 school of physic...
  • 501 篇 henryk niewodnic...

作者

  • 268 篇 barter w.
  • 265 篇 a. gomes
  • 243 篇 beiter a.
  • 241 篇 c. alexa
  • 238 篇 j. m. izen
  • 235 篇 s. chen
  • 232 篇 bellee v.
  • 232 篇 blake t.
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 230 篇 d. calvet
  • 230 篇 c. amelung
  • 228 篇 brundu d.
  • 223 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 219 篇 g. spigo
  • 219 篇 borsato m.
  • 218 篇 amato s.
  • 218 篇 bencivenni g.
  • 216 篇 boettcher t.

语言

  • 71,000 篇 英文
  • 14,053 篇 其他
  • 759 篇 中文
  • 44 篇 日文
  • 24 篇 德文
  • 20 篇 法文
  • 18 篇 斯洛文尼亚文
  • 3 篇 阿拉伯文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science & Engineering-Data Science ABES Engineering College"
85713 条 记 录,以下是4711-4720 订阅
排序:
Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
收藏 引用
computer Systems science & engineering 2023年 第9期46卷 3121-3139页
作者: Khaled M.Alalayah Fatma S.Alrayes Jaber S.Alzahrani Khadija M.Alaidarous Ibrahim M.Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim Department of Computer Science College of Science and ArtsSharurahNajran UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial *** Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of... 详细信息
来源: 评论
A structural variation genotyping algorithm enhanced by CNV quantitative transfer
收藏 引用
Frontiers of computer science 2022年 第6期16卷 159-165页
作者: Tian ZHENG Xinyang QIAN Jiayin WANG Department of Computer Science and Technology School of Electronic and Information EngineeringXi’an Jiaotong UniversityXi’an710049China Institute of Data Science and Information Quality Shaanxi Engineering Research Center of Medical and Health Big DataXi’an Jiaotong UniversityXi’an710049China
Genotyping of structural variations considering copy number variations(CNVs)is an infancy and challenging ***,a prevalent form of critical genetic variations that cause abnormal copy numbers of large genomic regions i... 详细信息
来源: 评论
CryptoASCII-ASCII based cryptosystem for cloud data storage
CryptoASCII-ASCII based cryptosystem for cloud data storage
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Pavithra, M. Prakash, M. Vennila, V. Tamil Nadu Komarapalayam India Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Tamil Nadu Kattankulathur India Department of Computer Science and Engineering K. S. R. College of Engineering Tamil Nadu Tiruchengode India
Cloud computing plays a huge role in IT industry, Education sector, government sector, medical field, defense management, Natural disaster control, weather reporting, road traffic maintenances, e-money transaction etc... 详细信息
来源: 评论
Unveiling time utilization in resource constrained environment
Unveiling time utilization in resource constrained environme...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Rahul, Ch. Kousarr, Noushheen Yadav, T. Abhishek Keerthi, Pendam Hariharan, Shanmugasundaram Kukreja, Vinay Vardhaman College of Engineering Department of Computer Science and Engineering Hyderabad India Chitkara University Chitkara University Institute of Engineering and Technology Punjab India
In response to the escalating challenges of resource-constrained environments, this research endeavors to provide a comprehensive analysis of Lightweight Cryptography (LWC). With the increasing prevalence of Internet ... 详细信息
来源: 评论
Unveiling the Nexus of Intelligence: Smart Grids Meter Infrastructure - A Holistic Probe into Security and Privacy Dynamics  7
Unveiling the Nexus of Intelligence: Smart Grids Meter Infra...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Aravind, K. Sangeeta, K. Yadav, Suman Avdhesh Kansal, Lavish Garg, Monica Sirisha, N. New Horizon College of Engineering Department of Electronics and Communication Engineering Bangalore India Institute of Aeronautical Engineering Department of Computer Science and Engineering Telangana Hyderabad India Iilm University Department of Computer Science & Engineering Uttar Pradesh Greater Noida India Lovely Professional University Punjab Phagwara India Lloyd Law College Uttar Pradesh Greater Noida India Mlr Institute of Technology Department of Computer Science and Engineering Telangana Hyderabad India
The conventional methods of power generation, distribution, and transmission are undergoing radical transformations as smart grids take center stage as the subsequent generation of power systems. Smart grids rely on e... 详细信息
来源: 评论
Multitasking Agricultural Robot for Farmer Assistance using Internet of Things  14
Multitasking Agricultural Robot for Farmer Assistance using ...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Saranya, S. Thilak, K. Deepa Kalaiselvi, K. Arthi, K. Kumaresan, K. Department of Electronics and Communication Engineering Easwari Engineering College India Department of Networking and communications SRM Institute of science and Technology Chennai India Department of Computer science and Engineering KSR College of Engineering India
Farming was the fundamental improvement in the climb of inert human development, by which developing of local species made food overabundances that enabled people to live in metropolitan networks. The verifiable setti... 详细信息
来源: 评论
Deepfake Detection System  2
Deepfake Detection System
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Shrivas, Shaswat Rai, Aditya Lakshmi, M. SRM Institute of Science and Technology School of Computing College of Engineering and Technology Department of Data Science and Business Systems Kattankulathur Chennai603203 India
Detecting deepfake content presents a formidable challenge, necessitating advanced methodologies. This paper proposes a holistic strategy employing Facenet-pytorch, MTCNN, and InceptionResnetV1 for robust deepfake det... 详细信息
来源: 评论
Leveraging XGBoost based GBM for Proactive Detection of Man-in-the-Middle Cyber Attacks
Leveraging XGBoost based GBM for Proactive Detection of Man-...
收藏 引用
2024 Asian Conference on Intelligent Technologies, ACOIT 2024
作者: Manjaragi, Shivanand V. Asrani, Deepak Kumar, Arvind Sandesh, R. Maindola, Meenakshi Sai, Aarush Department of Computer Science and Engineering Hirasugar Institute of Technology Karnataka Nidasoshi591236 India Department of Computer Science and Engineering MIET Uttar Pradesh Greater Noida India SCA MRIIRS Haryana Faridabad India Department of Computer Science and Engineering ATME College of Engineering Karnataka Mysuru India Department of Computer Science Engineering Graphic Era Deemed to be University Uttarakhand Dehradun India Department of CSBS Gyan Ganga Institute of Technology and Sciences Madhya Pradesh Jabalpur India
Man-in-the-Middle (MitM) cyber-attacks provide a substantial risk to network security, since they allow hostile individuals to intercept and alter communications between two parties. Conventional detection approaches ... 详细信息
来源: 评论
Real estate price prognostication through machine learning models
Real estate price prognostication through machine learning m...
收藏 引用
2024 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2024
作者: Vestly, Doddamani John Thangallapelly, Neelima Manish, Gandra Sai Hariharan, Shanmugasundaram Kukreja, Vinay Venkateswara Reddy, H. Vardhaman College of Engineering Department of Computer Science and Engineering Hyderabad India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
In the dynamic realm of real estate, house prices became the crucial part to encounter the set of hurdles to make lives better. Through meticulous feature engineering, which includes advanced data cleansing and featur... 详细信息
来源: 评论
Automatic Clustering of User Behaviour Profiles for Web Recommendation System
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3365-3384页
作者: S.Sadesh Osamah Ibrahim Khalaf Mohammad Shorfuzzaman Abdulmajeed Alsufyani K.Sangeetha Mueen Uddin Department of Computer Science and Engineering Velalar College of Engineering and TechnologyErode638012Tamil NaduIndia Al-Nahrain Nanorenewable Energy Research Center Al-Nahrain UniversityBaghdad64074Iraq Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Computer Science and Engineering Kongu Engineering CollegePerundurai638060Tamil NaduIndia School of Digital Science University Brunei DarussalamJln Tungku LinkGadong BE1410Brunei Darussalam
Web usage mining,content mining,and structure mining comprise the web mining ***-Page Recommendation(WPR)development by incor-porating data Mining Techniques(DMT)did not include end-users with improved performance in ... 详细信息
来源: 评论