咨询与建议

限定检索结果

文献类型

  • 285,114 篇 会议
  • 122,435 篇 期刊文献
  • 2,872 册 图书

馆藏范围

  • 410,420 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 238,381 篇 工学
    • 158,187 篇 计算机科学与技术...
    • 128,235 篇 软件工程
    • 56,834 篇 信息与通信工程
    • 37,286 篇 控制科学与工程
    • 33,331 篇 电气工程
    • 31,797 篇 电子科学与技术(可...
    • 27,932 篇 生物工程
    • 21,865 篇 生物医学工程(可授...
    • 18,681 篇 光学工程
    • 16,033 篇 机械工程
    • 13,931 篇 化学工程与技术
    • 12,715 篇 动力工程及工程热...
    • 12,663 篇 仪器科学与技术
    • 12,041 篇 材料科学与工程(可...
    • 8,799 篇 安全科学与工程
    • 8,138 篇 网络空间安全
  • 135,112 篇 理学
    • 67,426 篇 数学
    • 43,926 篇 物理学
    • 31,614 篇 生物学
    • 22,337 篇 统计学(可授理学、...
    • 15,712 篇 系统科学
    • 14,858 篇 化学
  • 59,335 篇 管理学
    • 35,528 篇 管理科学与工程(可...
    • 26,154 篇 图书情报与档案管...
    • 17,689 篇 工商管理
  • 20,828 篇 医学
    • 17,469 篇 临床医学
    • 15,664 篇 基础医学(可授医学...
    • 9,788 篇 药学(可授医学、理...
    • 8,389 篇 公共卫生与预防医...
  • 11,208 篇 法学
    • 9,209 篇 社会学
  • 6,856 篇 经济学
  • 5,382 篇 农学
  • 4,419 篇 教育学
  • 1,910 篇 文学
  • 906 篇 军事学
  • 521 篇 艺术学
  • 79 篇 哲学
  • 48 篇 历史学

主题

  • 20,122 篇 computer science
  • 9,864 篇 accuracy
  • 9,181 篇 computational mo...
  • 8,472 篇 feature extracti...
  • 8,248 篇 deep learning
  • 7,761 篇 machine learning
  • 7,046 篇 training
  • 5,519 篇 data mining
  • 5,389 篇 predictive model...
  • 5,350 篇 support vector m...
  • 5,270 篇 computer archite...
  • 4,966 篇 wireless sensor ...
  • 4,814 篇 costs
  • 4,803 篇 optimization
  • 4,722 篇 real-time system...
  • 4,577 篇 bandwidth
  • 4,496 篇 testing
  • 4,475 篇 application soft...
  • 4,454 篇 protocols
  • 4,444 篇 neural networks

机构

  • 1,724 篇 department of co...
  • 1,381 篇 department of el...
  • 1,377 篇 department of co...
  • 1,174 篇 department of el...
  • 1,054 篇 cavendish labora...
  • 976 篇 department of ph...
  • 931 篇 department of co...
  • 847 篇 physikalisches i...
  • 846 篇 university of ch...
  • 832 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 649 篇 department of co...
  • 580 篇 department of co...
  • 534 篇 infn sezione di ...
  • 532 篇 chitkara univers...
  • 510 篇 infn laboratori ...
  • 502 篇 department of co...
  • 501 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 488 篇 infn sezione di ...

作者

  • 255 篇 barter w.
  • 251 篇 niyato dusit
  • 251 篇 j. wang
  • 250 篇 s. chen
  • 231 篇 a. gomes
  • 228 篇 blake t.
  • 221 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 213 篇 brundu d.
  • 210 篇 boettcher t.
  • 207 篇 beiter a.
  • 205 篇 c. alexa
  • 202 篇 j. m. izen
  • 198 篇 bencivenni g.
  • 191 篇 g. bella
  • 191 篇 c. amelung
  • 191 篇 bay a.

语言

  • 361,301 篇 英文
  • 45,395 篇 其他
  • 3,993 篇 中文
  • 220 篇 日文
  • 75 篇 德文
  • 53 篇 法文
  • 44 篇 斯洛文尼亚文
  • 35 篇 朝鲜文
  • 12 篇 西班牙文
  • 11 篇 阿拉伯文
  • 10 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Data Science Engineering"
410421 条 记 录,以下是4911-4920 订阅
排序:
A Review Paper on Designing Intelligent Intrusion Detection System Using Deep Learning  11
A Review Paper on Designing Intelligent Intrusion Detection ...
收藏 引用
11th International Conference on Emerging Trends in engineering and Technology - Signal and Information Processing, ICETET - SIP 2023
作者: Wasnik, Priyanka Chavhan, Nekita G H Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India G H Raisoni College of Engineering IoT and Cyber Security Department of Data Science Nagpur India
Machine learning techniques have been have proven to be more effective than conventional extensively used in the creation of intrusion detection systems (IDS) that can swiftly and automatically identify and classify c... 详细信息
来源: 评论
Spectral-Spatial Feature Extraction for Multi-Change Detection in Bi-Temporal Hyperspectral Images  6
Spectral-Spatial Feature Extraction for Multi-Change Detecti...
收藏 引用
6th International Conference on Electrical engineering and Information and Communication Technology, ICEEICT 2024
作者: Afjal, Masud Ibn Islam Mondal, Md. Nazrul Al Mamun, Md. Rajshahi University of Engineering and Technology Department of Computer Science and Engineering Rajshahi Bangladesh
Change detection (CD) is a critical task that involves assessing alterations between bi-temporal images. Hyperspectral images (HSIs), renowned for their extensive spectral information, excel in capturing subtle change... 详细信息
来源: 评论
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
Implementation of Enhanced Iris Recognition for Secure Biometric Authentication using Machine Learning  1
Implementation of Enhanced Iris Recognition for Secure Biome...
收藏 引用
1st International Conference on Trends in engineering Systems and Technologies, ICTEST 2024
作者: Duraisamy, Premkumar Rupasri, K.S. Sri K, Rekha Thanishka, T.S. Kpr Institute of Engineering and Technology Department of Computer Science and Engineering Coimbatore India
Developing effective strategies to address significant variations in segmented iris image quality is crucial for accurate iris recognition from remotely acquired facial or eye images. These variations are closely link... 详细信息
来源: 评论
Exploring Transformer and Recurrent Neural Models for Sentiment Analysis of Mobile App Reviews  2
Exploring Transformer and Recurrent Neural Models for Sentim...
收藏 引用
2nd International Conference on Information and Communication Technology, ICICT 2024
作者: Roy, George Tonmoy Biswas, Dipannita Department of Computer Science and Engineering Khulna University of Engineering and Technology Khulna Bangladesh
Sentiment analysis is one of the important aspects of discovering user opinions and enhancing the quality of products like mobile applications. This study assesses the effectiveness of six prominent Natural Language P... 详细信息
来源: 评论
Youth Unemployment Mitigation: Leveraging Machine Learning and Exploratory data Analysis for Evidence-Driven Strategies
Youth Unemployment Mitigation: Leveraging Machine Learning a...
收藏 引用
2023 IEEE Conference on engineering Informatics, EI 2023
作者: Aarthi, S. Dharmita, A. Pragathi, G. Elakkiya, S. Srm Institute of Science and Technology Dept. of Computer Science Engineering Chennai India Srm Institute of Science and Technology Dept. Computer Science Engineering Specialization with Big Data Analytics Chennai India
Youth unemployment represents an urgent global socioeconomic challenge. This study combines machine learning and exploratory data analysis to understand and solve this problem comprehensively. Traditional approaches o... 详细信息
来源: 评论
A Robust Convolutional Neural Network Architecture for Automated Pneumonia Detection from Chest X-ray Images  3
A Robust Convolutional Neural Network Architecture for Autom...
收藏 引用
3rd International Conference for Advancement in Technology, ICONAT 2024
作者: Babu, Tina Naik, Pramod Kumar Nair, Rekha R Pallavi, K. Alliance University Alliance School of Advanced Computing Department of Computer Science and Engineering Bengaluru India Dayananda Sagar University Department of Computer Science and Engineering Bengaluru India
Pneumonia is a significant global health concern, especially for vulnerable populations such as children under five. Timely and accurate diagnosis is critical for effective treatment and improved patient outcomes. Thi... 详细信息
来源: 评论
Multiscript Handwriting Recognition Using RNN Transformer Architecture  1
收藏 引用
8th International Conference on data Management, Analytics and Innovation, ICDMAI 2024
作者: Rahul Chiranjeevi, V. Murali Krishna, G. Rubesh, S. Department of Computer Science and Engineering Rajalakshmi Engineering College Thandalam Chennai India
Multiscript handwriting recognition is used to recognize handwritten text from multiple scripts. It is a challenging task because each script has its own unique characteristics like writing direction, their character ... 详细信息
来源: 评论
Identification of Paddy Disease Using Image Processing  2
Identification of Paddy Disease Using Image Processing
收藏 引用
2nd International Conference on Intelligent data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Soorji Martina, K. Shobana, M. Sneha, S. Shaini, Vellanki Sreemathy, J. Sri Eshwar College of Engineering Department of Computer Science and Engineering Coimbatore India
Rice is cultivated almost allover the world. In spite of the usage of several pesticides, a variety of diseases and pests reduce rice yield. Pesticide use reduces crop quality while increasing crop production. Thus, o... 详细信息
来源: 评论
Improved Hashing Algorithm for data Integrity and Security  3
Improved Hashing Algorithm for Data Integrity and Security
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Dhole, Sheetal S. Chatur, P.N. Deorankar, A.V. Waghmare, K. Government College of Engineering Department of Computer Science & Engineering Maharashtra Amravati India
This study introduces an improved hash method aimed at enhancing data integrity and security in applications requiring a 256-bit hash code. The suggested hash algorithm is build based on the MD5 and SHA-256, the sugge... 详细信息
来源: 评论