咨询与建议

限定检索结果

文献类型

  • 34,069 篇 会议
  • 18,146 篇 期刊文献
  • 631 册 图书

馆藏范围

  • 52,846 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32,603 篇 工学
    • 23,655 篇 计算机科学与技术...
    • 18,921 篇 软件工程
    • 9,182 篇 信息与通信工程
    • 5,666 篇 控制科学与工程
    • 4,121 篇 电气工程
    • 3,909 篇 生物工程
    • 3,784 篇 电子科学与技术(可...
    • 2,945 篇 生物医学工程(可授...
    • 2,347 篇 光学工程
    • 2,297 篇 机械工程
    • 1,749 篇 仪器科学与技术
    • 1,739 篇 动力工程及工程热...
    • 1,724 篇 网络空间安全
    • 1,581 篇 安全科学与工程
    • 1,442 篇 化学工程与技术
    • 1,338 篇 交通运输工程
  • 17,401 篇 理学
    • 9,133 篇 数学
    • 4,987 篇 物理学
    • 4,404 篇 生物学
    • 2,956 篇 统计学(可授理学、...
    • 2,057 篇 系统科学
    • 1,611 篇 化学
  • 9,467 篇 管理学
    • 5,966 篇 管理科学与工程(可...
    • 3,880 篇 图书情报与档案管...
    • 2,679 篇 工商管理
  • 3,219 篇 医学
    • 2,665 篇 临床医学
    • 2,350 篇 基础医学(可授医学...
    • 1,483 篇 公共卫生与预防医...
    • 1,380 篇 药学(可授医学、理...
  • 1,635 篇 法学
    • 1,307 篇 社会学
  • 971 篇 经济学
  • 794 篇 农学
  • 626 篇 教育学
  • 289 篇 文学
  • 146 篇 军事学
  • 103 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 1,593 篇 computer science
  • 1,421 篇 deep learning
  • 1,397 篇 accuracy
  • 1,238 篇 machine learning
  • 1,224 篇 feature extracti...
  • 985 篇 computational mo...
  • 882 篇 training
  • 870 篇 internet of thin...
  • 727 篇 support vector m...
  • 719 篇 artificial intel...
  • 701 篇 data mining
  • 626 篇 predictive model...
  • 603 篇 convolutional ne...
  • 582 篇 optimization
  • 568 篇 wireless sensor ...
  • 548 篇 real-time system...
  • 516 篇 cloud computing
  • 514 篇 security
  • 473 篇 information tech...
  • 414 篇 educational inst...

机构

  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 283 篇 faculty of scien...
  • 278 篇 department of co...
  • 275 篇 department of ph...
  • 273 篇 departamento de ...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 255 篇 department of ph...
  • 255 篇 department for p...
  • 248 篇 department of ph...
  • 221 篇 department of ph...
  • 221 篇 department of ph...
  • 216 篇 physics division...
  • 197 篇 department of ph...
  • 162 篇 department of co...
  • 161 篇 department of co...
  • 159 篇 department of co...
  • 156 篇 maharishi school...
  • 154 篇 centre de calcul...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 265 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 261 篇 m. rijssenbeek
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 257 篇 s. jin
  • 255 篇 g. gaudio
  • 248 篇 d. guest
  • 243 篇 y. tayalati
  • 243 篇 s. mohapatra
  • 217 篇 y. nagasaka

语言

  • 48,976 篇 英文
  • 3,242 篇 其他
  • 629 篇 中文
  • 44 篇 日文
  • 11 篇 斯洛文尼亚文
  • 7 篇 法文
  • 6 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
检索条件"机构=Department of Computer Science Engineering&Information Technology"
52846 条 记 录,以下是441-450 订阅
排序:
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV's Against DDoS Attacks  18
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Kotha, Aditya Venkanna, U. International Institute of Information Technology Department of Computer Science and Engineering Naya Raipur India National Institute of Technology Department of Computer Science and Engineering Warangal India
Autonomous vehicles (AVs) increasingly rely on vehicle-to-everything (V2X) networks for communication. However, due to the devices' heterogeneity, they are more susceptible to attacks like distributed denial of se... 详细信息
来源: 评论
Adjustable Model Compression Using Multiple Genetic Algorithm
收藏 引用
IEEE Transactions on Multimedia 2023年 25卷 1125-1132页
作者: Ople, Jose Jaena Mari Huang, Tai-Ming Chiu, Ming-Chih Chen, Yi-Ling Hua, Kai-Lung National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan
Generative Adversarial Networks (GAN) is a popular machine learning method that possesses powerful image generation ability, which is useful for different multimedia applications (e.g., photographic filters, image edi... 详细信息
来源: 评论
A dual hashing-based authentication and secure data transmission scheme for vehicular cloud environment using MECC with optimal resource allocation mechanism
收藏 引用
Soft Computing 2024年 第17-18期28卷 10423-10437页
作者: Varalakshmi, J. Dhanasekaran, S. Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil India Department of Information Technology Kalasalingam Academy of Research and Education Krishnankoil India
Vehicle cloud computing (VCC) is a recent area of study that blends vehicular networks with cloud computing, offering networking and sensor capabilities to vehicles for interaction with other vehicles and roadside inf... 详细信息
来源: 评论
PULSE: Progressive Utilization of Log-Structured Techniques to Ease SSD Write Amplification in B-epsilon-tree  25
PULSE: Progressive Utilization of Log-Structured Techniques ...
收藏 引用
30th Asia and South Pacific Design Automation Conference, ASP-DAC 2025
作者: Peng, Huai-De Chen, Yi-Shen Chen, Tseng-Yi Chang, Yuan-Hao Department of Computer Science and Information Engineering National Central University Taiwan Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taiwan Institute of Information Science Academia Sinica Taiwan
During the unprecedented expansion of global data, efficient storage solutions are essential for processing massive datasets stored on modern storage devices. B-epsilon-tree (Bϵ-tree) is one of the most well-known tec... 详细信息
来源: 评论
QR Code-Based Visual Secret Sharing Scheme: A Review
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第4期9卷 2642-2661页
作者: Chu, Shu-Chuan Liu, Tao Pan, Jeng-Shyang Information Engineering College Guangzhou City Construction College Guangzhou510925 China School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Visual secret sharing (VSS) scheme is the technology that divides a secret into shares. The decoding operation on the share is performed to restore the secret image. The quick response (QR) code is an image carrying t... 详细信息
来源: 评论
Predicting and Forecasting Metal Stock Prices Using Machine Learning  6
Predicting and Forecasting Metal Stock Prices Using Machine ...
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Bhavana, Katakam Varma, Indukuri Raghu Rohitha, Kalluri Suryanarayana, G. Anvesh, Kachi Kruthika, Sama Department of Information Technology Hyderabad India Department of Computer Science and Engineering Hyderabad India
Machine Learning algorithms analyze past market data to forecast future trends in metal stock prices. Precise estimation of metal stock values is essential for industry stakeholders, policy makers, and investors. Corr... 详细信息
来源: 评论
Exploring the Potential of Deep Learning Algorithms in Medical Image Processing: A Comprehensive Analysis  5th
Exploring the Potential of Deep Learning Algorithms in Medic...
收藏 引用
5th International Conference on Communication and Intelligent Systems, ICCIS 2023
作者: Pal, Ganesh Prasad Pal, Raju Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India Department of Computer Science and Engineering School of Information and Communication Technology Gautam Buddha University Greater Noida India
In this study, we comprehensively examine the potential of deep learning algorithms in the domain of medical image processing. Through a systematic analysis of existing literature, we explore the applications, methodo... 详细信息
来源: 评论
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第2期11卷 377-390页
作者: Honghao Zhu MengChu Zhou Yu Xie Aiiad Albeshri IEEE School of Computer and Information Engineering Bengbu UniversityBengbu 233030China School of Information and Electronic Engineering Zhejiang Gongshang UniversityHangzhou 310018China Helen and John C.Hartmann the Department of Electrical and Computer EngineeringNew Jersey Institute of TechnologyNewark NJ 07102 USA College of Information Engineering Shanghai Maritime UniversityShanghai 201306China Department of Computer Science King Abdulaziz UniversityJeddah 21481Saudi Arabia
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all... 详细信息
来源: 评论
Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
收藏 引用
Journal of engineering and Applied science 2024年 第1期71卷 8页
作者: Arpitha, T. Chouhan, Dharamendra Shreyas, J. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bengaluru India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine information System (TMIS), designed to streamline patient-doctor int... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论