咨询与建议

限定检索结果

文献类型

  • 77,923 篇 会议
  • 48,719 篇 期刊文献
  • 1,360 册 图书

馆藏范围

  • 128,002 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77,844 篇 工学
    • 52,234 篇 计算机科学与技术...
    • 42,400 篇 软件工程
    • 18,826 篇 信息与通信工程
    • 12,618 篇 控制科学与工程
    • 10,623 篇 电气工程
    • 9,840 篇 电子科学与技术(可...
    • 9,569 篇 生物工程
    • 7,695 篇 生物医学工程(可授...
    • 6,846 篇 光学工程
    • 5,203 篇 机械工程
    • 4,520 篇 化学工程与技术
    • 4,256 篇 动力工程及工程热...
    • 4,077 篇 仪器科学与技术
    • 3,563 篇 材料科学与工程(可...
    • 3,243 篇 网络空间安全
    • 3,086 篇 安全科学与工程
  • 46,253 篇 理学
    • 22,773 篇 数学
    • 15,208 篇 物理学
    • 11,008 篇 生物学
    • 7,587 篇 统计学(可授理学、...
    • 5,131 篇 化学
    • 4,972 篇 系统科学
  • 20,356 篇 管理学
    • 12,778 篇 管理科学与工程(可...
    • 8,251 篇 图书情报与档案管...
    • 6,040 篇 工商管理
  • 7,927 篇 医学
    • 6,423 篇 临床医学
    • 5,681 篇 基础医学(可授医学...
    • 3,416 篇 药学(可授医学、理...
    • 3,387 篇 公共卫生与预防医...
  • 3,843 篇 法学
    • 3,258 篇 社会学
  • 2,325 篇 经济学
  • 1,732 篇 农学
  • 1,469 篇 教育学
  • 635 篇 文学
  • 257 篇 军事学
  • 177 篇 艺术学
  • 25 篇 哲学
  • 18 篇 历史学

主题

  • 3,554 篇 accuracy
  • 3,318 篇 computer science
  • 3,123 篇 deep learning
  • 2,736 篇 machine learning
  • 2,592 篇 computational mo...
  • 2,558 篇 feature extracti...
  • 2,369 篇 training
  • 1,700 篇 predictive model...
  • 1,641 篇 internet of thin...
  • 1,626 篇 artificial intel...
  • 1,610 篇 real-time system...
  • 1,605 篇 optimization
  • 1,543 篇 convolutional ne...
  • 1,503 篇 support vector m...
  • 1,343 篇 data models
  • 1,152 篇 data mining
  • 1,136 篇 neural networks
  • 1,112 篇 semantics
  • 1,074 篇 wireless sensor ...
  • 1,013 篇 security

机构

  • 1,090 篇 cavendish labora...
  • 1,018 篇 department of ph...
  • 965 篇 physikalisches i...
  • 951 篇 university of ch...
  • 948 篇 oliver lodge lab...
  • 562 篇 fakultät physik ...
  • 551 篇 department of el...
  • 540 篇 school of physic...
  • 539 篇 department of ph...
  • 538 篇 horia hulubei na...
  • 532 篇 imperial college...
  • 529 篇 school of physic...
  • 512 篇 h.h. wills physi...
  • 504 篇 stfc rutherford ...
  • 504 篇 nikhef national ...
  • 496 篇 school of comput...
  • 483 篇 henryk niewodnic...
  • 478 篇 center for high ...
  • 477 篇 school of physic...
  • 475 篇 van swinderen in...

作者

  • 268 篇 a. gomes
  • 260 篇 niyato dusit
  • 254 篇 barter w.
  • 251 篇 c. alexa
  • 250 篇 d. calvet
  • 248 篇 j. m. izen
  • 242 篇 s. chen
  • 240 篇 c. amelung
  • 239 篇 g. bella
  • 239 篇 j. strandberg
  • 232 篇 beiter a.
  • 229 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 216 篇 boettcher t.
  • 215 篇 brundu d.
  • 215 篇 borsato m.
  • 214 篇 g. spigo

语言

  • 117,577 篇 英文
  • 9,166 篇 其他
  • 1,202 篇 中文
  • 122 篇 日文
  • 23 篇 德文
  • 13 篇 法文
  • 10 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 4 篇 西班牙文
  • 3 篇 荷兰文
  • 3 篇 俄文
检索条件"机构=Department of Computer Science and Engineering School of Computing"
128002 条 记 录,以下是961-970 订阅
排序:
Deep Learning-Powered Camouflaged Object Recognition Model  2
Deep Learning-Powered Camouflaged Object Recognition Model
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Tomar, Riya Chauhan, Naman Chauhan, Chhavi Tomar, Yash Singh, Soumyendra Chauhan, Nishant Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India University of Petroleum and Energy Studies School of Computer Science Dehradun India Cmr University Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Mathematics Chennai India Amity School of Engineering and Technology Amity University Department of Computer Science and Engineering Noida India
This research paper delves into the intersection of advanced technology and military strategies, specifically focusing on the imperative task of camouflaged object detection within the Indian Paramilitary forces. Leve... 详细信息
来源: 评论
Energy efficient resource utilization and load balancing in virtual machines using prediction algorithms
收藏 引用
International Journal of Cognitive computing in engineering 2023年 第1期4卷 127-134页
作者: Udayasankaran, P. Thangaraj, S. John Justin Department of Computer Science and Engineering Saveetha School of Engineering Chennai Tamilnadu India
In recent years due to increase in the number of customers and organizations utilize cloud applications for personal and professionalization become greater. As a result of this increase in utilizing the Cloud services... 详细信息
来源: 评论
Enhanced Botnet Attack Detection using Machine Learning and Neural Networks  7
Enhanced Botnet Attack Detection using Machine Learning and ...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Dharaneish, V.C. Rajakrishnan, Sandeep Sudhay, S. Senthil Kumar, T. Siddhesh, T.S. Vajipayajula, Sulakshan Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Coimbatore India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bengaluru India Ibm India Pvt Ltd Ibm Security Bengaluru India
In an era characterized by pervasive interconnectivity, Internet of Things (IoT) devices have revolutionized automation, facilitating seamless data exchange. However, this technological leap has triggered heightened c... 详细信息
来源: 评论
Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification
收藏 引用
Intelligent Automation & Soft computing 2023年 第1期35卷 297-320页
作者: Rasha Almarshdi Laila Nassef Etimad Fadel Nahed Alowidi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science Faculty of Computer Science and EngineeringUniversity of HailHailSaudi Arabia
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe... 详细信息
来源: 评论
Optimizing DDoS Attack Detection Using Machine Learning  2
Optimizing DDoS Attack Detection Using Machine Learning
收藏 引用
2nd International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Aggarwal, Saransh Behera, Bhagrajyoti Singh, Murari Kumar Sharma, Ajeet Kumar School of Computing Science and Engineering Sharda University Greater Noida India School of Computer Science and Engineering Sharda University Greater Noida India
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and ... 详细信息
来源: 评论
Fake News Detection on Social Media Using Ensemble Methods
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4525-4549页
作者: Muhammad Ali Ilyas Abdul Rehman Assad Abbas Dongsun Kim Muhammad Tahir Naseem Nasro Min Allah Department of Computer Science COMSATS UniversityIslamabad45550Pakistan School of Computer Science and Engineering Kyungpook National UniversityDaegu41566Republic of Korea Department of Computer Science and Engineering Korea UniversitySeoul02841Republic of Korea Department of Electronic Engineering Yeungnam UniversityGyeongsan-si38541Republic of Korea Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam34223Saudi Arabia
In an era dominated by information dissemination through various channels like newspapers,social media,radio,and television,the surge in content production,especially on social platforms,has amplified the challenge of... 详细信息
来源: 评论
Prediction of Lumpy Virus Skin Disease Using Artificial Intelligence  1
收藏 引用
5th International Conference on Data and Information sciences, ICDIS 2023
作者: Kholiya, Pankaj Singh Kriti Mishra, Amit Kumar School of Computing DIT University Dehradun India Department of Computer Science and Engineering Jain University Bengaluru India
Lumpy skin disease (LSD) is a skin infection caused by the lumpy skin disease virus, which belongs to the genus of Capripoxviruses. The disease transmitted by arthropod vectors has high morbidity and low mortality rat... 详细信息
来源: 评论
Systematic Review of Emerging Deep Learning approaches for Crop Diseases detection  7
Systematic Review of Emerging Deep Learning approaches for C...
收藏 引用
7th International Conference on Circuit Power and computing Technologies, ICCPCT 2024
作者: Vasuki Rohinidevi, V. Deeban Chakravarthy, V. Deepak, S. Prem Kumar SRM Institute of Science and Technology School of Computing Department of Computing Technologies Chennai India B V Raju Institute of Technology Department of Computer Science and Engineering Narsapur India
Deep learning, a branch of artificial intelligence, has drawn interest from the academic and corporate realms, especially in areas like speech and image analysis, video processing, and natural language processing. Its... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
science China(Information sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
Real-Time Threat Management using Deep Q-Learning and Mininet  3
Real-Time Threat Management using Deep Q-Learning and Minine...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Sivakumar, Amrutha Bhavya Reddy, G. Bhanot, Shreya Rajagopal, Shinu M. Prashanth, B.N. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Mechanical Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru India
The research combines Deep Q-Learning(DQN) with a Mininet-based network simulation and Scapy intrusions detection system (IDS) for malicious traffic prioritizing. The RL agent continuously learns to act based on real-... 详细信息
来源: 评论