咨询与建议

限定检索结果

文献类型

  • 77,287 篇 会议
  • 48,647 篇 期刊文献
  • 1,355 册 图书

馆藏范围

  • 127,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77,143 篇 工学
    • 51,781 篇 计算机科学与技术...
    • 42,050 篇 软件工程
    • 18,696 篇 信息与通信工程
    • 12,439 篇 控制科学与工程
    • 10,590 篇 电气工程
    • 9,790 篇 电子科学与技术(可...
    • 9,543 篇 生物工程
    • 7,625 篇 生物医学工程(可授...
    • 6,749 篇 光学工程
    • 5,179 篇 机械工程
    • 4,499 篇 化学工程与技术
    • 4,254 篇 动力工程及工程热...
    • 4,048 篇 仪器科学与技术
    • 3,546 篇 材料科学与工程(可...
    • 3,215 篇 网络空间安全
    • 3,059 篇 安全科学与工程
  • 45,980 篇 理学
    • 22,652 篇 数学
    • 15,102 篇 物理学
    • 10,983 篇 生物学
    • 7,532 篇 统计学(可授理学、...
    • 5,104 篇 化学
    • 4,963 篇 系统科学
  • 20,239 篇 管理学
    • 12,702 篇 管理科学与工程(可...
    • 8,206 篇 图书情报与档案管...
    • 5,990 篇 工商管理
  • 7,868 篇 医学
    • 6,348 篇 临床医学
    • 5,624 篇 基础医学(可授医学...
    • 3,418 篇 药学(可授医学、理...
    • 3,322 篇 公共卫生与预防医...
  • 3,819 篇 法学
    • 3,240 篇 社会学
  • 2,318 篇 经济学
  • 1,722 篇 农学
  • 1,440 篇 教育学
  • 636 篇 文学
  • 255 篇 军事学
  • 175 篇 艺术学
  • 25 篇 哲学
  • 18 篇 历史学

主题

  • 3,539 篇 accuracy
  • 3,317 篇 computer science
  • 3,093 篇 deep learning
  • 2,735 篇 machine learning
  • 2,575 篇 computational mo...
  • 2,551 篇 feature extracti...
  • 2,383 篇 training
  • 1,695 篇 predictive model...
  • 1,644 篇 internet of thin...
  • 1,613 篇 artificial intel...
  • 1,597 篇 real-time system...
  • 1,596 篇 optimization
  • 1,517 篇 convolutional ne...
  • 1,495 篇 support vector m...
  • 1,338 篇 data models
  • 1,141 篇 neural networks
  • 1,140 篇 data mining
  • 1,111 篇 semantics
  • 1,075 篇 wireless sensor ...
  • 1,005 篇 security

机构

  • 1,088 篇 cavendish labora...
  • 1,016 篇 department of ph...
  • 965 篇 physikalisches i...
  • 946 篇 oliver lodge lab...
  • 938 篇 university of ch...
  • 562 篇 fakultät physik ...
  • 546 篇 department of el...
  • 540 篇 school of physic...
  • 539 篇 department of ph...
  • 538 篇 horia hulubei na...
  • 534 篇 imperial college...
  • 533 篇 school of physic...
  • 512 篇 h.h. wills physi...
  • 506 篇 stfc rutherford ...
  • 506 篇 nikhef national ...
  • 492 篇 school of comput...
  • 483 篇 henryk niewodnic...
  • 480 篇 center for high ...
  • 479 篇 school of physic...
  • 475 篇 van swinderen in...

作者

  • 270 篇 a. gomes
  • 255 篇 barter w.
  • 252 篇 c. alexa
  • 252 篇 niyato dusit
  • 251 篇 d. calvet
  • 249 篇 j. m. izen
  • 242 篇 s. chen
  • 241 篇 g. bella
  • 241 篇 j. strandberg
  • 241 篇 c. amelung
  • 233 篇 beiter a.
  • 229 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo
  • 215 篇 brundu d.
  • 215 篇 borsato m.

语言

  • 120,308 篇 英文
  • 5,761 篇 其他
  • 1,164 篇 中文
  • 122 篇 日文
  • 20 篇 德文
  • 15 篇 法文
  • 10 篇 朝鲜文
  • 6 篇 荷兰文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 2 篇 俄文
检索条件"机构=Department of Computer Science and Engineering School of Computing"
127289 条 记 录,以下是4961-4970 订阅
排序:
Blockchain - A Deployment Mechanism for IoT Based Security  1
Blockchain - A Deployment Mechanism for IoT Based Security
收藏 引用
1st International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2023
作者: Kant, Ravi Sharma, Shashank Vikas, Vikas Chaudhary, Sachin Jain, Animesh Kumar Sharma, Kewal Krishan Iimt Engineering College Computer Science and Engineering Department Meerut India Iimt University School of Computer Science & Applications Meerut India
Implementation of IoT domain invites tremendous attacking opportunities which demands end to - end security mechanism. Applications related to the domain of IoT varies from critical applications to normal business-ori... 详细信息
来源: 评论
Cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify Cyber Hazards
Cyber Threat Intelligence (CTI): An Analysis on the Use of A...
收藏 引用
International Conference on Recent Developments in Cyber Security, ReDCySec 2023
作者: Kant, Neelima Amrita Department of Computer Science and Engineering School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida201306 India Department of Computer Science and Engineering School of Engineering and Technology Center for Cyber Security and Cryptology Sharda University Uttar Pradesh Greater Noida201306 India
Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for cybersecurity specialists to keep track of every action taking place on the netw... 详细信息
来源: 评论
Lettuce Crop Yield Prediction Analysis using Random Forest Regression Machine Learning Model in Aeroponics System  2
Lettuce Crop Yield Prediction Analysis using Random Forest R...
收藏 引用
2nd International Conference on Augmented Intelligence and Sustainable Systems, ICAISS 2023
作者: Rajendiran, Gowtham Rethnaraj, Jebakumar Srm Institute of Science and Technology School of Computing College of Engineering and Technology Department of Computing Technologies Tamil Nadu Chengalpattu India
Aeroponics is a type of soilless agriculture where plants are grown in a misted environment without the use of the soil. The process of yield prediction in aeroponics system for the lettuce crop is one of the key chal... 详细信息
来源: 评论
IoT-Based Water Quality Monitoring and Detection System  1
收藏 引用
2nd International Conference on Emerging Trends in Expert Applications and Security, ICETEAS 2023
作者: Kanchana, M. Gopirajan, P.V. Sureshkumar, K. Sudharsanan, R. Suganthi, N. Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur Chennai603203 India Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Kattankulathur Campus Chennai603203 India Department of Information Technology Saveetha Engineering College Chennai602105 India Department of Information Technology SRM Institute of Science and Technology Ramapuram Chennai600089 India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai600089 India
This paper suggests Internet of things (IoT) and Arduino-based tele-water quality monitoring systems integrated with the web application. The most critical component of the Wireless Sensor Network includes a microcont... 详细信息
来源: 评论
The Low-Attenuation Endfire Leaky-Wave State on an Optically Transparent Lossy Film
收藏 引用
engineering 2024年 第12期43卷 72-80页
作者: Ziheng Zhou Yongjian Zhang Yilin Zheng Ke Chen Yueming Gao Yuehe Ge Yue Li Yijun Feng Zhizhang(David)Chen College of Physics and Information Engineering Fuzhou UniversityFuzhou 350108China Department of Electronic Engineering Tsinghua UniversityBeijing 100084China School of Electronic and Information Engineering Soochow UniversitySoochow 215006China School of Electronic Science and Engineering Nanjing UniversityNanjing 210023China Department of Electrical and Computer Engineering Dalhousie UniversityHalifaxNS B3H 4R2Canada
The development of high-performance optically transparent radio frequency(RF)radiators is limited by the intrinsic loss issue of transparent conductive films(TCFs).Instead of pursuing expensive endeavors to improve th... 详细信息
来源: 评论
Lip Synchronization Model For Sinhala Language Using Machine Learning  4
Lip Synchronization Model For Sinhala Language Using Machine...
收藏 引用
4th International Conference on Advanced Research in computing, ICARC 2024
作者: Ranaweera, Dilani Weerasinghe, Ruwan Dinalankara, Randima Univeristy of Colombo School of Computing University of Colombo Colombo Sri Lanka University of Sri Jayewardenepura Faculty of Engineering Department of Computer Engineering Colombo Sri Lanka
Realistic lip-synchronized animations can be produced by the appropriately timed voice and lip motions of the cartoon character. This process is called as 'lip synchronization'. Building a talking face for lan... 详细信息
来源: 评论
Security Challenges in Natural Language Processing Models
Security Challenges in Natural Language Processing Models
收藏 引用
2023 Conference on Empirical Methods in Natural Language Processing, EMNLP 2023
作者: Xu, Qiongkai He, Xuanli School of Computing and Information System The University of Melbourne Australia Department of Computer Science University College London United Kingdom School of Computing FSE Macquarie University Australia
Large-scale natural language processing models have been developed and integrated into numerous applications, given the advantage of their remarkable performance. Nonetheless, the security concerns associated with the... 详细信息
来源: 评论
Groundwater Level Forecasting using Spatio-temporal Graph Convolutional Networks (GCNs) and XGBoost  6
Groundwater Level Forecasting using Spatio-temporal Graph Co...
收藏 引用
6th International Conference on Mobile computing and Sustainable Informatics, ICMCSI 2025
作者: Naga Satish, G. Jadala, Vijaya Chandra Sravani, Kolisetti Giridhara Allam, Sangeetha Shanmuga Sundari, M. Thada, Jyothirmai BVRIT HYDERABAD College of Engineering for Women Hyderabad India Department of Computer Science and Artificial Intelligence School of Computer Science and Artificial Intelligence SR University Warangal506371 India Department of AIML Gokaraju Rangaraju Institute of Engineering And Technology Hyderabad India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
This research analyzes groundwater levels across multiple districts using data from over 100 observation wells in each district. To capture seasonal variations and predict groundwater behavior, this research has devel... 详细信息
来源: 评论
Animal Collision Detection in Real Time to Prevent Accident using KNN Classifier in comparison with Stochastic Gradient Descent  6
Animal Collision Detection in Real Time to Prevent Accident ...
收藏 引用
6th International Conference on Contemporary computing and Informatics, IC3I 2023
作者: Asritha, K Renu Soundari, A. Gnana Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
This project aims to assess and improve the detection of animal collisions in real-world situations. Materials and Methods: To forecast animal collision detection in real time and avert accidents, KNN and stochastic g... 详细信息
来源: 评论
Securing IoT Systems with AI-Infused Software and Virtual Replica Models  2
Securing IoT Systems with AI-Infused Software and Virtual Re...
收藏 引用
2nd IEEE International Conference on Integrated Intelligence and Communication Systems, ICIICS 2024
作者: Supriya, K. Sangeetha Jeno Lovesum, S.P. Arora, Renuka Bhatia, Rishu Yadwad, Sunita Natrayan, L. Department of Computer Science & Engineering Christ University Bengaluru India Department of Computer Science & Engineering Jagannath University NCR Bahadurgarh India Department of Electronics and Communication Engineering Ganga Institute of Technology and Management Jhajjar India Department of Computer Science and Engineering Faculty of Engineering and Technology Parul institute of Engineering and Technology Parul University Vadodara India Department of Mechanical Engineering Saveetha School of Engineering SIMATS Chennai India
The proliferation of Internet of Things (IoT) devices has introduced significant security challenges due to the increased attack surface and the inherent vulnerabilities of interconnected systems. This paper proposes ... 详细信息
来源: 评论