咨询与建议

限定检索结果

文献类型

  • 285,114 篇 会议
  • 122,435 篇 期刊文献
  • 2,872 册 图书

馆藏范围

  • 410,420 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 238,381 篇 工学
    • 158,187 篇 计算机科学与技术...
    • 128,235 篇 软件工程
    • 56,834 篇 信息与通信工程
    • 37,286 篇 控制科学与工程
    • 33,331 篇 电气工程
    • 31,797 篇 电子科学与技术(可...
    • 27,932 篇 生物工程
    • 21,865 篇 生物医学工程(可授...
    • 18,681 篇 光学工程
    • 16,033 篇 机械工程
    • 13,931 篇 化学工程与技术
    • 12,715 篇 动力工程及工程热...
    • 12,663 篇 仪器科学与技术
    • 12,041 篇 材料科学与工程(可...
    • 8,799 篇 安全科学与工程
    • 8,138 篇 网络空间安全
  • 135,112 篇 理学
    • 67,426 篇 数学
    • 43,926 篇 物理学
    • 31,614 篇 生物学
    • 22,337 篇 统计学(可授理学、...
    • 15,712 篇 系统科学
    • 14,858 篇 化学
  • 59,335 篇 管理学
    • 35,528 篇 管理科学与工程(可...
    • 26,154 篇 图书情报与档案管...
    • 17,689 篇 工商管理
  • 20,828 篇 医学
    • 17,469 篇 临床医学
    • 15,664 篇 基础医学(可授医学...
    • 9,788 篇 药学(可授医学、理...
    • 8,389 篇 公共卫生与预防医...
  • 11,208 篇 法学
    • 9,209 篇 社会学
  • 6,856 篇 经济学
  • 5,382 篇 农学
  • 4,419 篇 教育学
  • 1,910 篇 文学
  • 906 篇 军事学
  • 521 篇 艺术学
  • 79 篇 哲学
  • 48 篇 历史学

主题

  • 20,122 篇 computer science
  • 9,864 篇 accuracy
  • 9,181 篇 computational mo...
  • 8,472 篇 feature extracti...
  • 8,248 篇 deep learning
  • 7,761 篇 machine learning
  • 7,046 篇 training
  • 5,519 篇 data mining
  • 5,389 篇 predictive model...
  • 5,350 篇 support vector m...
  • 5,270 篇 computer archite...
  • 4,966 篇 wireless sensor ...
  • 4,814 篇 costs
  • 4,803 篇 optimization
  • 4,722 篇 real-time system...
  • 4,577 篇 bandwidth
  • 4,496 篇 testing
  • 4,475 篇 application soft...
  • 4,454 篇 protocols
  • 4,444 篇 neural networks

机构

  • 1,724 篇 department of co...
  • 1,381 篇 department of el...
  • 1,377 篇 department of co...
  • 1,174 篇 department of el...
  • 1,054 篇 cavendish labora...
  • 976 篇 department of ph...
  • 931 篇 department of co...
  • 847 篇 physikalisches i...
  • 846 篇 university of ch...
  • 832 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 649 篇 department of co...
  • 580 篇 department of co...
  • 534 篇 infn sezione di ...
  • 532 篇 chitkara univers...
  • 510 篇 infn laboratori ...
  • 502 篇 department of co...
  • 501 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 488 篇 infn sezione di ...

作者

  • 255 篇 barter w.
  • 251 篇 niyato dusit
  • 251 篇 j. wang
  • 250 篇 s. chen
  • 231 篇 a. gomes
  • 228 篇 blake t.
  • 221 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 213 篇 brundu d.
  • 210 篇 boettcher t.
  • 207 篇 beiter a.
  • 205 篇 c. alexa
  • 202 篇 j. m. izen
  • 198 篇 bencivenni g.
  • 191 篇 g. bella
  • 191 篇 c. amelung
  • 191 篇 bay a.

语言

  • 361,301 篇 英文
  • 45,395 篇 其他
  • 3,993 篇 中文
  • 220 篇 日文
  • 75 篇 德文
  • 53 篇 法文
  • 44 篇 斯洛文尼亚文
  • 35 篇 朝鲜文
  • 12 篇 西班牙文
  • 11 篇 阿拉伯文
  • 10 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Data Science Engineering"
410421 条 记 录,以下是4901-4910 订阅
排序:
Leveraging K-means clustering for enhanced detection of network traffic attacks  3
Leveraging K-means clustering for enhanced detection of netw...
收藏 引用
3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and its Control, PARC 2024
作者: Dwivedi, Devanshi Bhushan, Aditya Singh, Ashutosh Kumar Snehlata United College of Engineering & Research Department of Computer Science and Engineering Prayagraj India
With the expansion of network traffic and the increasing experiences of cyber threats, the need for flexible as well as systematic network traffic attack detection systems has become foremost. Conventional signature-b... 详细信息
来源: 评论
A Review of the Repercussions of Mobile Phones and the Internet on Education
A Review of the Repercussions of Mobile Phones and the Inter...
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable Technology, ICRISST 2024
作者: Komarasamy, Dinesh Madhuradharani, Madhuradharani Krishnakumar, B. Parthasarathy, Karthikeyan Chinnusamy, Koushalya. K Kongu Engineering College Department of Computer Science and Engineering TamilNadu Perundurai India
Mobile phones and the Internet are the most popular modern technologies for life organization, especially in the field of education. Rapid advancements in mobile technology have made it possible for Internet-based mob... 详细信息
来源: 评论
YOLOV7-BASED HELMET DETECTION SYSTEM FOR TRAFFIC SAFETY  6
YOLOV7-BASED HELMET DETECTION SYSTEM FOR TRAFFIC SAFETY
收藏 引用
6th International Conference on Computational Intelligence and Communication Technologies, CCICT 2024
作者: Malik, Indu Verma, Satish Sachan, Sarthak Rohit Department of Computer Science and Engineering ABES Engineering College UP Ghaziabad India
The current predominant issue in India is the escalating number of traffic accidents, primarily attributed to the burgeoning population. A significant contributing factor to this problem is the widespread disregard fo... 详细信息
来源: 评论
A Real-Time Video Surveillance-Based Framework for Early Plant Disease Detection Using Jetson TX1 and Novel LeafNet-104 Algorithm  4th
A Real-Time Video Surveillance-Based Framework for Early Pla...
收藏 引用
4th International Conference on Frontiers in Computing and Systems, COMSYS 2023
作者: Murthy, Jamuna S. Dhanashekar, K. Siddesh, G.M. Department of Computer Science and Engineering Ramaiah Institute of Technology Bengaluru India Department of Artificial Intelligence and Data Science Ramaiah Institute of Technology Bengaluru India The Ohio State University Columbus United States
The precise and timely identification of plant diseases plays a pivotal role in safeguarding crop health and optimizing agricultural yields. This paper introduces an innovative framework designed for plant disease det... 详细信息
来源: 评论
Implementation of Modified Attribute-Based Encryption in Blockchain for Enhanced Security and Improved Quality of Service  4
Implementation of Modified Attribute-Based Encryption in Blo...
收藏 引用
4th International Conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Belsare, Roshan G. Ambhore, P.B. Government College of Engineering Department of Computer Science and Engineering Maharashtra Amravati India
In recent years, blockchain technology has gained immense popularity due to its decentralized and secure nature. However, traditional blockchain systems still face security challenges in terms of confidentiality, inte... 详细信息
来源: 评论
Allocation of conference hall booking in Android application using cloud
收藏 引用
International Journal of Cloud Computing 2022年 第5-6期11卷 407-414页
作者: Sai Eswar, A. Vijayamanideep, A. Mohana Prasad, K. Prince Mary, S. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
In each school association, there is a constant need of meeting rooms for direct different occasions. It is discovered that there is one gathering hall in each institution, regardless of whether it is a school or univ... 详细信息
来源: 评论
Superior stability of Li5Mg@Cu anodes for lithium metal batteries:Investigating the suppression effects of magnesium on lithium dendrite growth
收藏 引用
材料科学技术(英文版) 2025年 第8期211卷 288-302页
作者: Ruijun Yao Zhuoyu Li Longke Bao Rui Deng Kai Zheng Yiming Hu Jiahui Li Hao Zhang Shaobo Tu Rongpei Shi Junwei Wu Changming Li Xingjun Liu College of Materials Science and Engineering Institute of Materials Genome and Big DataHarbin Institute of Technology(Shenzhen)Shenzhen 518055China Department of Materials Process Engineering Graduate School of EngineeringNagoya UniversityFuro-choChikusa-kuNagoya464-8603Japan School of Physics and Materials Science Nanchang University999 Xuefu RoadHonggutan DistrictNanchang 330031China College of Materials Science and Engineering Institute of Materials Genome and Big DataHarbin Institute of Technology(Shenzhen)Shenzhen 518055China 21C Innovation Laboratory(21C LAB) Contemporary Amperex Technology Ltd.Ningde 352100China Institute for Materials Science and Devices Suzhou University of Science and TechnologySuzhou 215011China
Li metal is widely recognized as the desired anode for next-generation energy storage,Li metal batteries,due to its highest theoretical capacity and lowest ***,it suffers from unstable elec-trochemical behaviors like ... 详细信息
来源: 评论
PVDM-YOLOv8l: a solution for reliable pedestrian and vehicle detection in autonomous vehicles under adverse weather conditions
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Tahir, Noor Ul Ain Zhang, Zuping Asim, Muhammad Iftikhar, Sundas A. Abd El-Latif, Ahmed School of Computer Science and Engineering Central South University Changsha410083 China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia Gianforte School of Computing Montana State University Bozeman59717 United States Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom32511 Egypt
Ensuring the safe navigation of autonomous vehicles in intelligent transportation system depends on their ability to detect pedestrians and vehicles. While transformer-based models for object detection have shown rema... 详细信息
来源: 评论
Leveraging LLM and RAG for Automated Answer Script Evaluation  8
Leveraging LLM and RAG for Automated Answer Script Evaluatio...
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Darshan, Pranav Mandahas, Nihar Pratheek Rao, M.P. Rajesh, Raghuveer Narayanan Deepamala, N. R V College of Engineering Department of Computer Science and Engineering Bengaluru India
In the realm of education, examinations play a very significant role. If writing an exam is considered tedious, the process of evaluating hundreds of answer scripts can be even more daunting. It usually takes weeks to... 详细信息
来源: 评论
Designing Intelligent Intrusion Detection System Using Deep Learning  14
Designing Intelligent Intrusion Detection System Using Deep ...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Wasnik, Priyanka Chavhan, Nekita G H Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India G H Raisoni College of Engineering Department of Data Science IoT and Cyber Security Nagpur India
In order to increase the effectiveness and precision of cyber threat detection in computer networks, deep learning techniques are being applied in the construction of intelligent intrusion detection systems (IDS). The... 详细信息
来源: 评论