咨询与建议

限定检索结果

文献类型

  • 5,899 篇 会议
  • 2,539 篇 期刊文献
  • 62 册 图书

馆藏范围

  • 8,500 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,831 篇 工学
    • 3,684 篇 计算机科学与技术...
    • 3,012 篇 软件工程
    • 1,264 篇 信息与通信工程
    • 784 篇 控制科学与工程
    • 643 篇 电气工程
    • 569 篇 生物工程
    • 513 篇 生物医学工程(可授...
    • 499 篇 电子科学与技术(可...
    • 374 篇 光学工程
    • 361 篇 网络空间安全
    • 289 篇 动力工程及工程热...
    • 275 篇 化学工程与技术
    • 269 篇 机械工程
    • 259 篇 仪器科学与技术
    • 255 篇 安全科学与工程
  • 3,048 篇 理学
    • 1,603 篇 数学
    • 854 篇 物理学
    • 678 篇 生物学
    • 575 篇 统计学(可授理学、...
    • 310 篇 系统科学
    • 309 篇 化学
    • 271 篇 地球物理学
  • 1,496 篇 管理学
    • 814 篇 管理科学与工程(可...
    • 732 篇 图书情报与档案管...
    • 423 篇 工商管理
  • 584 篇 医学
    • 458 篇 临床医学
    • 433 篇 基础医学(可授医学...
    • 315 篇 公共卫生与预防医...
    • 254 篇 药学(可授医学、理...
  • 304 篇 法学
    • 253 篇 社会学
  • 171 篇 经济学
  • 163 篇 农学
  • 93 篇 教育学
  • 45 篇 文学
  • 18 篇 军事学
  • 8 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 404 篇 accuracy
  • 309 篇 deep learning
  • 268 篇 machine learning
  • 246 篇 feature extracti...
  • 234 篇 real-time system...
  • 230 篇 computational mo...
  • 202 篇 support vector m...
  • 201 篇 internet of thin...
  • 190 篇 predictive model...
  • 164 篇 computer science
  • 160 篇 convolutional ne...
  • 142 篇 data mining
  • 138 篇 optimization
  • 136 篇 training
  • 134 篇 application soft...
  • 124 篇 galaxies
  • 118 篇 security
  • 113 篇 artificial intel...
  • 109 篇 image segmentati...
  • 107 篇 neural networks

机构

  • 267 篇 department of ph...
  • 262 篇 fermi national a...
  • 260 篇 madrid
  • 227 篇 department of ph...
  • 202 篇 kavli institute ...
  • 185 篇 department of ph...
  • 184 篇 campus uab carre...
  • 172 篇 school of mathem...
  • 168 篇 george p. and cy...
  • 159 篇 school of physic...
  • 153 篇 department of ph...
  • 152 篇 department of ph...
  • 150 篇 departamento de ...
  • 147 篇 sorbonne univers...
  • 140 篇 institució catal...
  • 139 篇 max planck insti...
  • 139 篇 slac national ac...
  • 134 篇 computer science...
  • 134 篇 kavli institute ...
  • 121 篇 instituto de fis...

作者

  • 258 篇 miquel r.
  • 249 篇 tarle g.
  • 242 篇 smith m.
  • 238 篇 sanchez e.
  • 237 篇 gruendl r.a.
  • 194 篇 carretero j.
  • 190 篇 gruen d.
  • 183 篇 garcía-bellido j...
  • 179 篇 flaugher b.
  • 171 篇 gschwend j.
  • 164 篇 doel p.
  • 159 篇 diehl h.t.
  • 159 篇 james d.j.
  • 158 篇 kuropatkin n.
  • 145 篇 brooks d.
  • 144 篇 suchyta e.
  • 140 篇 da costa l.n.
  • 139 篇 marshall j.l.
  • 138 篇 carnero rosell a...
  • 136 篇 aguena m.

语言

  • 7,037 篇 英文
  • 1,436 篇 其他
  • 47 篇 中文
  • 3 篇 法文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 意大利文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Computer Applications"
8500 条 记 录,以下是4671-4680 订阅
排序:
A Symmetric Encryption Scheme With Multi User Searchable Options in the Cloud Based applications
A Symmetric Encryption Scheme With Multi User Searchable Opt...
收藏 引用
International Conference on Emerging Research in Electronics, computer science and Technology (ICERECT)
作者: Abhishek Dubey Vijay Kumar Priyank Singhal Savyasachi Atowar ul Islam R Kuppuchamy Department of CSE Chandigarh Engineering College Jhanjeri India Department of CSE JAIN University Bangalore India Department of Computing Sciences & IT Mahaveer University Moradabad India Department of information technology Lalit Narayan Mishra College of Business Management Muzaffarpur Bihar Dept. of Computer Science and Electronics University of Science and Technology Techno City Meghalaya Department of Computer Applications PSNA College of Engineering and Technology Dindigul India
Scientists in academia and business have thoroughly studied Encryption Scheme (SE). Whereas many scientific SE methods provide verifiable confidentiality, in order to attain high performance, they typically reveal cer... 详细信息
来源: 评论
Adaptive DNA Cryptography With Intelligent Machine Learning for Cloud Data Defense
Engineering Reports
收藏 引用
Engineering Reports 2025年 第6期7卷
作者: Animesh Kairi Tapas Bhadra Saroj Kumar Pandey Anurag Sinha Anindya Nag Institute of Engineering and Management Kolkata India Aliah University Kolkata India Department of Computer Engineering & Applications GLA University Mathura India Tech School Computer Science Department ICFAI University Ranchi India Department of Computer Science and Engineering Northern University of Business and Technology Khulna Bangladesh
With the exponential growth of sensitive data generated and stored in cloud environments, traditional cryptographic techniques are increasingly strained in addressing emerging security threats. While DNA cryptography ... 详细信息
来源: 评论
A Novel Transfer Learning Technique for Rice Leaf Disease Detection
A Novel Transfer Learning Technique for Rice Leaf Disease De...
收藏 引用
Advanced Technologies in Intelligent Control, Environment, Computing & Communication Engineering (ICATIECE), International Conference on
作者: Naveen Kumar Nikshepa T Piyush Kumar Pareek Parameshachari B. D Madhumala R B Sowmya S R Department of Computer Applications (BCA) Dr NSAM First Grade College (Affiliated to Bangalore City University) Bengaluru Department of Information Science and Engineering Dayananda Sagar Academy of Technology and Management Bangalore Department of Computer Science & Engineering Nitte Meenakshi Institute of Technology Bengaluru Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru Department of ISE Dayananda Sagar Academy of Technology and Management Bangalore
Image processing has become more sophisticated over the course of the last several years. In this study, we are presenting a model that, based on a convolution network, can identify the status of the rice leaf, namely... 详细信息
来源: 评论
IoT-Based Diagnosis and Recommendation System for Chronic Diseases Using Patient Health Records
IoT-Based Diagnosis and Recommendation System for Chronic Di...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), International Conference on
作者: S. K. UmaMaheswaran Durgaprasad Gangodkar V. Samatha I. S. Chakrapani Dharamvir Dharam Buddhi Department of Mathematics Sri Sai Ram Engineering College Chennai Tamil Nadu India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Computer Applications DKW Govt. College for Women (A) Nellore AP India Dept.of Zoology PRR&VS Govt College AP Dept. of MCA The Oxford College of Engineering Bangalore Uttaranchal Institute of Technology Uttaranchal University
The proliferation of IoT applications, notably in the sphere of health care, has led to discussion of patient health records utilising data gathered from IoT-connected devices. Biological data from patients' medic...
来源: 评论
Enhanced security for the authentication of digital signature from the key generated by the CSTRNG method  3
Enhanced security for the authentication of digital signatur...
收藏 引用
3rd International Conference on Smart Systems and Inventive Technology, ICSSIT 2020
作者: Prasad, B.V.V.S. Mandapati, Sridhar Haritha, B. Begum, Md.Jareena Computer Science Engg. Chebrolu Engineering College Guntur India R. V. R J. C COLLEGE of ENGINEERING Department of Computer Applications Guntur India Computer Science Engg. Bapatla Women's Engineering College Bapatla India
Security is the most critical feature of the present e-world. Many applications are based on random number generation. In the present situation, it is very difficult to hide the data. So the key-based encryption proce... 详细信息
来源: 评论
Solution of multi-term fractional order delay differential equations using homotopy analysis method
收藏 引用
AIP Conference Proceedings 2023年 第1期2457卷
作者: Mohammed S. Ismael Fadhel S. Fadhel Ali H. Fayadh Department of Mathematics and Computer Applications College of Science Al-Nahrain University Baghdad Iraq
In this paper, the homotopy analysis method have been utilized for solving non-linear delay differential equations of multi-term fractional order, and the fractional derivative is expressed in the Caputo sense. In thi...
来源: 评论
An AI-based Approach to Train a Language Model on a Wide Range Corpus Using BERT
An AI-based Approach to Train a Language Model on a Wide Ran...
收藏 引用
IEEE Students' Conference on Electrical, Electronics and computer science (SCEECS)
作者: Aryan Bhutda Gopal Sakarkar Nilesh Shelke Ketan Paithankar Riddhi Panchal Symbiosis Institute of Technology Nagpur Campus Symbiosis International Deemed University Pune India Department of Computer Science and Applications Dr. Vishwanath Karad MIT World Peace University Pune India Co-Founder & CTO Konverge.AI Pvt. Ltd. Nagpur M.H India
In 2018, Google developed and released BERT (Bidirectional Encoder Representation from Transformers) for Natural Language Processing (NLP). The English language models in BERT are two. To help close this data gap, a r...
来源: 评论
FEBSRA: Fuzzy Trust Based Energy Aware Balanced Secure Routing Algorithm for Secured Communications in WSNs
Research Square
收藏 引用
Research Square 2021年
作者: Anitha, R. Bapu, B.R. Tapas Kuppusamy, P.G. Partheeban, N. Sasikumar, A.N. Department of Computer Applications S. A. Engineering College India Department of Electronics & Communication Engineering S. A. Engineering College India Computer Science and Engineering Galgotias university India Computer Science and Engineering Panimalar Engineering College Chennai India
Energy efficiency is playing major role in the design of a sensor network for improving the network lifetime and the trust is also important for providing the security to the data communication process. Delay is also ... 详细信息
来源: 评论
Infinite-Q guided modes radiate in the continuum
收藏 引用
Physical Review B 2023年 第11期107卷 115415-115415页
作者: Kaili Sun Heng Wei Weijin Chen Yang Chen Yangjian Cai Cheng-Wei Qiu Zhanghua Han Shandong Provincial Key Laboratory of Optics and Photonic Devices Center of Light Manipulation and Applications School of Physics and Electronics Shandong Normal University Jinan 250358 China Department of Electrical and Computer Engineering National University of Singapore Singapore Singapore 117583 Chinese Academy of Sciences Key Laboratory of Mechanical Behavior and Design of Materials Department of Precision Machinery and Precision Instrumentation University of Science and Technology of China Hefei China
Guided modes in photonic structures, with broadband infinite-quality factors, are inaccessible from the far field due to the momentum mismatch. They become leaky modes in the continuum when the mismatch is compensated... 详细信息
来源: 评论
Optimized Predictive Storage Resource Allocation Through Neural Forecasting for Cloud Environments
Optimized Predictive Storage Resource Allocation Through Neu...
收藏 引用
Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), International Conference on
作者: Sridevi Ponmalar. P Adithya Pothan Raj V S D Sundarsingh Jebaseelan Gayatri Phade V. Srithar Harikrishnan. R Department of Computational Intelligence School of computing Kattankulathur Campus SRM Institute of Science and Technology Chennai Dept. of CSE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Dept of EEE Sathyabama Institute of Science and Technology Chennai 119 Sandip Institute of Technology & Research Centre Nashik Department of Computer Applications PeriyarManiammai Institute of Science & Technology Thanjavur Symbiosis Institute of Technology Pune Campus Symbiosis International Deemed University Pune
The demand for efficient and scalable management of storage resources is growing enormously with the rapid growth in data-intensive applications within the cloud environment. Optimized PSRANF is the state-of-the-art a... 详细信息
来源: 评论