咨询与建议

限定检索结果

文献类型

  • 7,840 篇 会议
  • 7,268 篇 期刊文献
  • 243 册 图书
  • 2 篇 学位论文

馆藏范围

  • 15,353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,476 篇 工学
    • 7,082 篇 计算机科学与技术...
    • 5,763 篇 软件工程
    • 2,073 篇 信息与通信工程
    • 1,403 篇 控制科学与工程
    • 1,335 篇 生物工程
    • 1,169 篇 生物医学工程(可授...
    • 1,035 篇 电气工程
    • 886 篇 光学工程
    • 764 篇 电子科学与技术(可...
    • 565 篇 机械工程
    • 381 篇 网络空间安全
    • 362 篇 动力工程及工程热...
    • 360 篇 仪器科学与技术
    • 350 篇 化学工程与技术
    • 342 篇 安全科学与工程
    • 296 篇 交通运输工程
  • 5,654 篇 理学
    • 2,740 篇 数学
    • 1,819 篇 物理学
    • 1,549 篇 生物学
    • 874 篇 统计学(可授理学、...
    • 508 篇 系统科学
    • 430 篇 化学
  • 2,701 篇 管理学
    • 1,561 篇 管理科学与工程(可...
    • 1,197 篇 图书情报与档案管...
    • 769 篇 工商管理
  • 1,416 篇 医学
    • 1,189 篇 临床医学
    • 1,007 篇 基础医学(可授医学...
    • 591 篇 药学(可授医学、理...
    • 575 篇 公共卫生与预防医...
  • 493 篇 法学
    • 402 篇 社会学
  • 292 篇 农学
  • 281 篇 经济学
  • 268 篇 教育学
  • 49 篇 文学
  • 34 篇 艺术学
  • 21 篇 军事学
  • 17 篇 哲学
  • 9 篇 历史学

主题

  • 537 篇 deep learning
  • 424 篇 machine learning
  • 308 篇 educational inst...
  • 297 篇 computer science
  • 290 篇 internet of thin...
  • 260 篇 accuracy
  • 254 篇 computational mo...
  • 235 篇 feature extracti...
  • 212 篇 artificial intel...
  • 187 篇 predictive model...
  • 179 篇 real-time system...
  • 163 篇 optimization
  • 159 篇 support vector m...
  • 153 篇 semantics
  • 151 篇 data mining
  • 144 篇 neural networks
  • 142 篇 training
  • 128 篇 computer archite...
  • 126 篇 reinforcement le...
  • 124 篇 covid-19

机构

  • 403 篇 faculty of scien...
  • 403 篇 department for p...
  • 393 篇 department of ph...
  • 383 篇 department of ph...
  • 383 篇 department of ph...
  • 373 篇 kirchhoff-instit...
  • 334 篇 fakultät für phy...
  • 309 篇 institute of phy...
  • 304 篇 department of ph...
  • 293 篇 institute of phy...
  • 277 篇 department of ph...
  • 271 篇 department of ph...
  • 267 篇 instituto de fís...
  • 264 篇 universidade fed...
  • 260 篇 ictp trieste
  • 253 篇 yerevan physics ...
  • 250 篇 department of ph...
  • 248 篇 nikhef national ...
  • 245 篇 graduate school ...
  • 244 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 336 篇 j. m. izen
  • 333 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 328 篇 g. spigo
  • 327 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 301 篇 y. tayalati
  • 296 篇 s. guindon
  • 289 篇 m. klein
  • 284 篇 a. kaczmarska
  • 267 篇 j. schaarschmidt
  • 260 篇 f. pastore
  • 254 篇 n. orlando

语言

  • 14,570 篇 英文
  • 733 篇 其他
  • 61 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 日文
  • 2 篇 荷兰文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science College of Computing and Informatics"
15353 条 记 录,以下是4801-4810 订阅
排序:
Detection of anomalies in networks by implementing and analyzing deep learning-based classifiers
Detection of anomalies in networks by implementing and analy...
收藏 引用
International Conference on Communication, computing and Internet of Things (IC3IoT)
作者: Cuddapah Anitha Upendra Singh Aswal M H Chaithra Jyoti Dange Amit Barve Ramya Maranan Department of Computer Science and Engineering School of Computing Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College Tirupati Andhra Pradesh Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Computer Science and Engineering REVA University Bangalore Karnataka India Department of Information Technology Atharva College of Engineering Malad West Mumbai Maharashtra India Department of Computer Science and Engineering Parul Institute of Technology Faculty of Engineering and Technology Parul University P.O.Limda Gujarat India Department of Research and Innovation Saveetha School of Engineering SIMATS Chennai Tamil Nadu India
With the increasing complexity and sophistication of cyber threats, the demand for effective anomaly detection mechanisms in network security has grown substantially. This research focuses on the utilization of deep l... 详细信息
来源: 评论
A Brief Analysis on Efficient Machine Learning Techniques for Intrusion Detection Model to Provide Network Security
A Brief Analysis on Efficient Machine Learning Techniques fo...
收藏 引用
Sustainable computing and Data Communication Systems (ICSCDS), International Conference on
作者: Aswadhati. Sirisha Bulla Premamayudu Department of IT and computer Applications school of computing and informatics Vignan’s Foundation for science Technology & Research Deemed to be university vadlamudi Guntur Andhra pradesh India Department of IT Vignan’s Institute of Information And Technology (Autonomous) Vishakapatnam Andhra Pradesh
An Intrusion Detection System (IDS) is a software used to monitor a single computer or a network of computers to combat network attacks, block access to certain websites, or otherwise the attack on network protocols. ... 详细信息
来源: 评论
Multi-Modal Data Analysis Based Game Player Experience Modeling Using LSTM-DNN
收藏 引用
computers, Materials & Continua 2021年 第9期68卷 4087-4108页
作者: Sehar Shahzad Farooq Mustansar Fiaz Irfan Mehmood Ali Kashif Bashir Raheel Nawaz KyungJoong Kim Soon Ki Jung School of Computer Science and Engineering Kyungpook National UniversityDaeguKorea Faculty of Engineering&Informatics School of MediaDesign and TechnologyUniversity of BradfordBradfordBD71DPUK Department of Computing and Mathematics Manchester Metropolitan UniversityManchesterUK Department of Operations TechnologyEvents and Hospitality ManagementManchester Metropolitan UniversityUK Institute of Integrated Technology Gwangju Institute of Science and TechnologyKorea
Game player modeling is a paradigm of computational models to exploit players’behavior and experience using game and player *** modeling refers to descriptions of players based on frameworks of data derived from the ... 详细信息
来源: 评论
IBATree: A Novel Method for Interpretable Cancer Cell Diagnosis Using Information Bottleneck Attribution
IBATree: A Novel Method for Interpretable Cancer Cell Diagno...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Muhammad Umair Raza Jie Chen Adil Nawaz Faisal Saeed Victor C.M. Leung Jianqiang Li Zhaoxia Wang College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Gastroenterology Shenzhen Children’s Hospital China
Deep Neural Networks (DNNs) have demonstrated remarkable performance in classification and regression tasks on RGB-based pathological inputs. The network’s prediction mechanism must be interpretable to establish trus... 详细信息
来源: 评论
Investigation of DSR protocol performance in Wireless MANET using Correlation Method  1
Investigation of DSR protocol performance in Wireless MANET ...
收藏 引用
1st International Conference on Advances in Computational science and Engineering, ICACSE 2020
作者: Rastogi, Umang Pattanaik, Balachandra Barani Sundaram, B. Mishra, Manish Kumar Thirumoorthy, Dhanabal Department of Computer Science and Engineering Meerut Institute of Engineering and Technology Meerut India Department of Electronics and Communication Engineering Bule Hora University Bule Hora Ethiopia Department of Computer Science Bule Hora University Bule Hora Ethiopia Department of Computer Science University of Gondar Ethiopia College of Informatics Bule Hora University Bule Hora Ethiopia
As we know already MANET means Mobile ad-hoc network that works made by two words Mobile and Ad-hoc Network collection of moving nodes shows mobile and kind of temporarily network which do not have any fixed point or ... 详细信息
来源: 评论
Crowd Safety Sensing (CroSS) for the Post Pandemic Era
Crowd Safety Sensing (CroSS) for the Post Pandemic Era
收藏 引用
2021 IEEE Globecom Workshops, GC Wkshps 2021
作者: Almalki, Khalid J Mohzary, Muhammad Choi, Baek-Young Song, Sejun Chen, Yu School of Computing and Engineering University of Missouri - Kansas City MO United States Dept. of Electrical and Computer Engineering Binghamton University BinghamtonNY United States College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Dept. of Computer Science Jazan University Jazan Saudi Arabia
Due to its long incubation period, aggressive asymptomatic transmission, and new mutations of the virus, COVID-19 is causing multiple pandemic waves worldwide. Despite recent vaccination, social distancing, and social... 详细信息
来源: 评论
Deep Learning vs. Feature Extraction Based Multi-Objective Approach for Sentiment Classification
Deep Learning vs. Feature Extraction Based Multi-Objective A...
收藏 引用
International Conference on computing for Sustainable Global Development (INDIACom)
作者: Jitendra Kumar Chaudhary Muddada Murali Krishna Rohit Kumar Singhal Rajesh Singh R. Suganthi Himanshu Rai Goyal School of Computing Graphic Era Hill University Uttrakhand Computer Science & Engineering Department (SOSO) Sanskriti College of Engineering Puttaparthi Andhra Pradesh Department of Computer Science & Engineering Chandigarh University (CU) Mohali Punjab INDIA Uttaranchal Institute of Technology Uttaranchal University India Dr. NGP Arts and Science College Coimbatore India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India
Sentiment analysis is used for classification and analyzing of text through data and text mining. The expected output is generated using the identification and extraction of the information from the various sources pr... 详细信息
来源: 评论
Factors Affecting Information Assurance for Big Data
Factors Affecting Information Assurance for Big Data
收藏 引用
Software Engineering and Information Technology (ICoSEIT), International Conference on
作者: Rio Guntur Utomo Farashazillah Yahya Fahdah Almarshad Gary B Wills School of Computing Telkom University Bandung Indonesia Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Sabah Malaysia College of Computer Science and Engineering Prince Sattam University Alkharj KSA School of Electronics and Computer Science University of Southampton Southampton United Kingdom
Big Data is a concept used in various sectors today, including the government sector in the Smart Government initiative. With a large amount of structured and unstructured data being managed, information assurance bec... 详细信息
来源: 评论
SurgicalGaussian: Deformable 3D Gaussians for High-Fidelity Surgical Scene Reconstruction
arXiv
收藏 引用
arXiv 2024年
作者: Xie, Weixing Yao, Junfeng Cao, Xianpeng Lin, Qiqin Tang, Zerui Dong, Xiao Guo, Xiaohu Center for Digital Media Computing School of Film School of Informatics Xiamen University Xiamen China National Institute for Data Science in Health and Medicine Xiamen University China Key Laboratory of Digital Protection and Intelligent Processing of Intangible Cultural Heritage of Fujian and Taiwan Ministry of Culture and Tourism China Guangdong Provincial Key Laboratory IRADS Department of Computer Science BNU-HKBU United International College Zhuhai China Department of Computer Science The University of Texas at Dallas Dallas United States
Dynamic reconstruction of deformable tissues in endoscopic video is a key technology for robot-assisted surgery. Recent reconstruction methods based on neural radiance fields (NeRFs) have achieved remarkable results i... 详细信息
来源: 评论
Blockchain Technology for Secure Shared Medical Data  23
Blockchain Technology for Secure Shared Medical Data
收藏 引用
23rd International Arab Conference on Information Technology, ACIT 2022
作者: Mancer, Mhamed Akram, Khelili Mohamed Barka, Ezedin Okba, Kazar Sihem, Slatnia Harous, Saad Athamena, Belkacem Houhamdi, Zina Smart Computer Science Laboratory Department of Computer Science Biskra Algeria University of Mohamed Khider Biskra Algeria Numidia Institute of Technology Algeria Algeria Algeria UAE University Department of Information Systems and Security Al Ain United Arab Emirates Department of Information Systems and Security College of Information Technology United Arab Emirate University United Arab Emirates Department of Computer Science College of Computing and Informat Ics AL Ain United Arab Emirates University of Sharjah AL Ain United Arab Emirates College of Business Al Ain University Al Ain United Arab Emirates University of Al Ain Al Ain United Arab Emirates
A blockchain is a shared database allowing trust to be created between individuals without using intermediaries. The architecture here is decentralized, the data is distributed among the users, and therefore the infor... 详细信息
来源: 评论