咨询与建议

限定检索结果

文献类型

  • 6,036 篇 会议
  • 2,551 篇 期刊文献
  • 63 册 图书

馆藏范围

  • 8,650 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,929 篇 工学
    • 3,778 篇 计算机科学与技术...
    • 3,079 篇 软件工程
    • 1,330 篇 信息与通信工程
    • 851 篇 控制科学与工程
    • 656 篇 电气工程
    • 571 篇 生物工程
    • 524 篇 生物医学工程(可授...
    • 504 篇 电子科学与技术(可...
    • 387 篇 光学工程
    • 380 篇 网络空间安全
    • 297 篇 动力工程及工程热...
    • 278 篇 机械工程
    • 278 篇 化学工程与技术
    • 274 篇 安全科学与工程
    • 265 篇 仪器科学与技术
  • 3,092 篇 理学
    • 1,627 篇 数学
    • 856 篇 物理学
    • 681 篇 生物学
    • 592 篇 统计学(可授理学、...
    • 311 篇 化学
    • 311 篇 系统科学
    • 275 篇 地球物理学
  • 1,532 篇 管理学
    • 845 篇 管理科学与工程(可...
    • 752 篇 图书情报与档案管...
    • 431 篇 工商管理
  • 600 篇 医学
    • 470 篇 临床医学
    • 442 篇 基础医学(可授医学...
    • 329 篇 公共卫生与预防医...
    • 254 篇 药学(可授医学、理...
  • 311 篇 法学
    • 257 篇 社会学
  • 174 篇 经济学
  • 166 篇 农学
  • 96 篇 教育学
  • 45 篇 文学
  • 18 篇 军事学
  • 8 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 422 篇 accuracy
  • 329 篇 deep learning
  • 279 篇 machine learning
  • 255 篇 feature extracti...
  • 244 篇 real-time system...
  • 234 篇 computational mo...
  • 207 篇 support vector m...
  • 206 篇 internet of thin...
  • 195 篇 predictive model...
  • 164 篇 computer science
  • 160 篇 convolutional ne...
  • 146 篇 optimization
  • 142 篇 data mining
  • 137 篇 training
  • 134 篇 application soft...
  • 124 篇 galaxies
  • 123 篇 security
  • 113 篇 image segmentati...
  • 113 篇 artificial intel...
  • 110 篇 neural networks

机构

  • 268 篇 department of ph...
  • 264 篇 fermi national a...
  • 262 篇 madrid
  • 225 篇 department of ph...
  • 200 篇 kavli institute ...
  • 185 篇 department of ph...
  • 185 篇 campus uab carre...
  • 174 篇 school of mathem...
  • 169 篇 george p. and cy...
  • 161 篇 school of physic...
  • 153 篇 department of ph...
  • 153 篇 department of ph...
  • 150 篇 departamento de ...
  • 147 篇 sorbonne univers...
  • 141 篇 slac national ac...
  • 140 篇 institució catal...
  • 138 篇 max planck insti...
  • 136 篇 computer science...
  • 136 篇 kavli institute ...
  • 122 篇 santa cruz insti...

作者

  • 260 篇 miquel r.
  • 252 篇 tarle g.
  • 244 篇 smith m.
  • 239 篇 sanchez e.
  • 238 篇 gruendl r.a.
  • 194 篇 carretero j.
  • 190 篇 gruen d.
  • 183 篇 garcía-bellido j...
  • 180 篇 flaugher b.
  • 171 篇 gschwend j.
  • 164 篇 doel p.
  • 160 篇 diehl h.t.
  • 158 篇 james d.j.
  • 157 篇 kuropatkin n.
  • 147 篇 brooks d.
  • 146 篇 suchyta e.
  • 141 篇 da costa l.n.
  • 138 篇 aguena m.
  • 138 篇 marshall j.l.
  • 137 篇 carnero rosell a...

语言

  • 6,553 篇 英文
  • 2,074 篇 其他
  • 52 篇 中文
  • 5 篇 法文
  • 3 篇 德文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Computer Applications"
8650 条 记 录,以下是4601-4610 订阅
排序:
Secured control systems through integrated IoT devices and control systems
收藏 引用
Measurement: Sensors 2022年 24卷
作者: Rajendran, N. Singh, Rupinder Moudgil, Manu Raj Turukmane, Anil V. Umadevi, M. Glory, K.B. Department of Information Technology B.S.Abdur Rahman Crescent Institute of Science and Technology Chennai India Department of Computer Applications Chitkara University Rajpura140417 India Department of CSE Bhai Gurdas Institute of Engineering and Technology Punjab Sangrur148001 India Department of Computer Science & Engineering VIT- AP University Vijaywada Amaravati India Department of Computer Science Sri Adi Chunchanagiri Women's College Tamilnadu Cumbum India Department of Engineering English Koneru Lakshmaiah Education Foundation Andhra Pradesh State Vaddeswaram522302 India
The Internet of Things (IoT) provides customers with seamless integration and interoperability between gadgets, technologies, or products, and across multiple networks focus on control schemas. Regardless of the integ... 详细信息
来源: 评论
Detecting and Preventing Brute Force Attacks on Mobile Devices Using Advanced Encryption Techniques
Detecting and Preventing Brute Force Attacks on Mobile Devic...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Ramya G Franklin Savinder Kaur Binita Kumari Mohit Gupta Gopalakrishna K Trapty Agarwal Maharishi Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai Tamil Nadu India Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Computer Applications Siksha ‘O’ Anusandhan (Deemed to be University) Bhubaneswar Odisha India Chitkara Centre for Research and Development Chitkara University Baddi Himachal Pradesh India School of Engineering and Technology Electronics and Communication Engineering JAIN (Deemed to be University) Bangalore Karnataka India School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
Brute pressure attacks are a not unusual approach utilized by malicious actors to gain unauthorized rights of entry to touchy records on mobile devices. Those assaults involve trying out multiple combinations of usern... 详细信息
来源: 评论
Augmented 3D ResUNETR: Combining residual learning and transformer encoding with multi-scale feature extraction for 3D medical image segmentation
收藏 引用
Biomedical Signal Processing and Control 2025年 110卷
作者: Anant Kumar Jayswal Sunil Pratap Singh Sneha Mishra Prashant Vats Kamaljit Kaur Anil Kumar Dubey Department of Computer Science and Engineering Amity University Noida UP 201301 India Department of Computer Science and Applications Bharati Vidyapeeth's Institute of Computer Applications and Management New Delhi 110063 India. Department of Computer Science and Engineering Ajay Kumar Garg Engineering College Ghaziabad UP 201015 India Department of Computer Science & Engineering Manipal University Jaipur Jaipur Rajasthan 303007 India Department of Computer Engineering and Technology Guru Nanak Dev University Amritsar Punjab 143005 India Department of Computer Science and Engineering ABES Engineering College Ghaziabad Uttar Pradesh 201009 India
Accurate 3D medical image segmentation is critical for applications such as tumor identification and organ localization. However, widely used models like U-Net and V-Net face significant limitations, including their i...
来源: 评论
Comprehensive analysis on lightweight cryptographic algorithms for low resource devices
收藏 引用
Test Engineering and Management 2019年 第11-12期81卷 3747-3760页
作者: Girija, M. Manickam, P. Ramaswami, M. Department of Computer Science American College Madurai India Department of Computer Science Thiagarajar College Madurai India Department of Computer Applications Madurai Kamaraj University Madurai India
Lightweight cryptography is a prominent research area in network security. It provides high security and is ideal for resource constrained based smart devices in smart environment. Smart gadgets such as RFID, Sensor N... 详细信息
来源: 评论
Anomaly Detection in IoT Data Streams Based on Long Short-Term Memory
Anomaly Detection in IoT Data Streams Based on Long Short-Te...
收藏 引用
Intelligent Algorithms for Computational Intelligence Systems (IACIS), International Conference on
作者: Layth Hussein Mohan M P. Rajeswari D. Gurupandi N. Naga Saranya Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Dept of ISE Nitte Meenakshi Institute of Technology Bangalore India Department of ECE Karpagam Institute of Technology Coimbatore India Department of ECE Panimalar Engineering College Chennai India Department of Computer Applications Saveetha College of Liberal Arts & Science SIMATS Chennai India
Nowadays, the swift growth of Ambient Intelligence (AmI) in Internet of Things (IoT), sensing devices have been generating many data streams in intelligent scenarios. The IoT deployment issues, complexity of systems i... 详细信息
来源: 评论
QoE-Based Resource Allocation in Wireless Networks: An Analysis
QoE-Based Resource Allocation in Wireless Networks: An Analy...
收藏 引用
Automation and Computation (AUTOCOM), International Conference on
作者: Trapty Agarwal Madhur Grover Madhusmita Sahu Varun Ojha Sunil. MP M. Saravanan Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Computer Applications Siksha ‘O’ Anusandhan (Deemed to be University) Bhubaneswar Odisha India Chitkara Centre for Research and Development Chitkara University Baddi Himachal Pradesh India School of Engineering and Technology Electronics and Communication Engineering JAIN (Deemed to be University) Bangalore Karnataka India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai Tamil Nadu India
Wireless networks are developing quickly and can avoid providing an increasing number of services such as video streaming, online games, or real-time communication. However, the quality of experience when accessing co... 详细信息
来源: 评论
AI-Enhanced Cybersecurity for Intelligent Systems (IS) Towards Criminals
AI-Enhanced Cybersecurity for Intelligent Systems (IS) Towar...
收藏 引用
Communication, Computing and Energy Efficient Technologies (I3CEET), International Conference on
作者: Kumaran U S.Padmanaban Rakesh Kumar Ramy Riad Al-Fatlawy Manpreet Kaur Sukanya Konatam Department of CSE Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Science and Humanities Karpagam Institute of Technology Coimbatore Department of Computer Engineering and Applications GLA University Mathura India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computers Techniques Engineering College of Technical Engineering The Islamic University of Al Diwaniyah Al Diwaniyah Iraq Department of Computer Application Chandigarh Engineering College Chandigarh Group of Colleges Mohali Punjab India The University of Texas Austin Texas USA
One of the strongest examples for this scenario is artificial intelligence (AI) in which AI interacts between individuals and their environment. Artificial intelligence powering smart homes is also still young, but it... 详细信息
来源: 评论
A Routing Optimization in Wireless Sensor Networks Based on Reverse Elite Sparrow Search Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第4期6卷 763-775页
作者: Ning, Chun-Yuan Liao, Lyu-Chao Nguyen, Trong-The Huang, Kuan-Chun Pan, Jeng-Shyang Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China Multimedia Communications Lab University of Information Technology VNU-HCM Viet Nam Department of Industrial and Systems Engineering Chung Yuan Christian University Taoyuan320314 Taiwan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
This study suggests a solution to the routing optimization insufficiency based on the reverse elite sparrow search algorithm (RESSA) for energy balancing and network lifetime prolonging in wireless sensor networks (WS... 详细信息
来源: 评论
A Survey on Hardware Prefetching in Shared-Memory Multiprocessors
A Survey on Hardware Prefetching in Shared-Memory Multiproce...
收藏 引用
East-West Design & Test Symposium (EWDTS)
作者: Shuaibu Musa Adam Usman Ibrahim Musa Kamran Siddique Jie Zhang Jingchen Wang Danny Hughes Ka Lok Man imec-DistriNet KU Leuven Belgium School of Computer Applications Lovely Professional University Punjab India Department of Computer Science and Engineering University of Alaska Anchorage Anchorage AK USA School of Advanced Technology Xi'an Jiaotong-Liverpool University Suzhou China Kazimieras Simonavičius University Lithuania Faculty of Informatics Vytautas Magnus University Lithuania
Memory latency presents a significant obstruction to computer performance. To hide the memory latency, prefetching mechanism is used to retrieve data from the memory before the processor requests it, anticipating near...
来源: 评论
Data Optimization in Cloud-IOT Environment with Enhanced SVM Technique  4
Data Optimization in Cloud-IOT Environment with Enhanced SVM...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Pal, Souvik Jhanjhi, N.Z. Akila, D. Masud, Mehedi Muzzaffar, Saira Kumar, Gaurav Verma, Rajan Saveetha College of Liberal Arts and Sciences Saveetha Institute of Medical & Technical Sciences Dept. of Management IS Chennai602105 India Sister Nivedita University Department of CS and Engineering Kolkata700156 India School of CS SCS Taylor's University Subang Jaya47500 Malaysia Saveetha College of Liberal Arts & Sciences SIMATS Deemed University Dept. of Computer Applications Chennai602105 India Taif University Department of Computer Science Saudi Arabia College of CS & IT King Faisal University Saudi Arabia Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR Institute of Technology and Sciences Andhra Pradesh Guntur India Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India
The number of people using smart devices is growing exponentially, and this is resulting in a rise in the volume of data being generated from different smart devices. This data is different from big data in terms of a... 详细信息
来源: 评论