咨询与建议

限定检索结果

文献类型

  • 113,818 篇 会议
  • 52,364 篇 期刊文献
  • 1,512 册 图书

馆藏范围

  • 167,694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,670 篇 工学
    • 65,671 篇 计算机科学与技术...
    • 53,181 篇 软件工程
    • 25,404 篇 信息与通信工程
    • 16,349 篇 控制科学与工程
    • 14,492 篇 电气工程
    • 13,814 篇 电子科学与技术(可...
    • 11,796 篇 生物工程
    • 9,390 篇 生物医学工程(可授...
    • 8,407 篇 光学工程
    • 6,948 篇 机械工程
    • 5,944 篇 化学工程与技术
    • 5,839 篇 动力工程及工程热...
    • 5,609 篇 仪器科学与技术
    • 4,932 篇 材料科学与工程(可...
    • 4,510 篇 网络空间安全
    • 4,161 篇 安全科学与工程
  • 56,726 篇 理学
    • 27,071 篇 数学
    • 19,452 篇 物理学
    • 13,389 篇 生物学
    • 8,828 篇 统计学(可授理学、...
    • 6,392 篇 化学
    • 6,322 篇 系统科学
  • 25,902 篇 管理学
    • 16,142 篇 管理科学与工程(可...
    • 10,795 篇 图书情报与档案管...
    • 7,588 篇 工商管理
  • 9,366 篇 医学
    • 7,800 篇 临床医学
    • 7,051 篇 基础医学(可授医学...
    • 4,365 篇 药学(可授医学、理...
    • 4,086 篇 公共卫生与预防医...
  • 4,910 篇 法学
    • 3,999 篇 社会学
  • 3,019 篇 经济学
  • 2,432 篇 农学
  • 1,609 篇 教育学
  • 864 篇 文学
  • 361 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,963 篇 accuracy
  • 4,245 篇 deep learning
  • 3,954 篇 feature extracti...
  • 3,595 篇 machine learning
  • 3,537 篇 computational mo...
  • 3,112 篇 training
  • 2,518 篇 support vector m...
  • 2,403 篇 convolutional ne...
  • 2,365 篇 internet of thin...
  • 2,301 篇 real-time system...
  • 2,299 篇 predictive model...
  • 2,138 篇 optimization
  • 1,960 篇 artificial intel...
  • 1,905 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,690 篇 neural networks
  • 1,608 篇 computer archite...
  • 1,574 篇 security
  • 1,537 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 928 篇 department of co...
  • 840 篇 department of el...
  • 740 篇 university of ch...
  • 680 篇 department of el...
  • 676 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 557 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 211 篇 g. spigo

语言

  • 155,812 篇 英文
  • 10,056 篇 其他
  • 1,867 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering and Infotmation Technology"
167694 条 记 录,以下是4661-4670 订阅
排序:
Enhanced capsule generative adversarial network with Blockchain fostered Intrusion Detection System for Enhancing Cyber security in Cloud  2
Enhanced capsule generative adversarial network with Blockch...
收藏 引用
2nd International Conference on Smart Technologies and Systems for Next Generation Computing, ICSTSN 2023
作者: Ravi Kanth, R. Prem Jacob, T.P. Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
Cloud computing (CC) is vulnerable to existing information technology attacks, since it extends and utilizes information technology infrastructure, applications and typical operating systems. In this manuscript, an En... 详细信息
来源: 评论
Ethereum DeFi Apps in the Wild: Profiling and Implications
Ethereum DeFi Apps in the Wild: Profiling and Implications
收藏 引用
2023 IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023
作者: Wang, Ziwei Lu, Haotian Wei, Xuetao Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China
Decentralized Finance (DeFi) has been gaining rising importance due to advanced blockchain technology and web3.0. Consequently, many decentralized finance applications (DeFi apps) have emerged, which aim to reconstruc... 详细信息
来源: 评论
Bangla Protest News Categorization Using Deep Learning  26
Bangla Protest News Categorization Using Deep Learning
收藏 引用
26th International Conference on computer and Information technology, ICCIT 2023
作者: Mosleh, Mahir Sayem, Md. Abu Shahidur Rahman, M. Islam, Md Saiful Shahjalal University of Science and Technology Department of Computer Science and Engineering Sylhet Bangladesh
Protests are a vital form of public expression, often reflecting collective dissent towards specific policies or injustices. In recent years, the significance of protests as a medium for public opinion has escalated, ... 详细信息
来源: 评论
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 316-331页
作者: Urmi, Wahida Ferdose Uddin, Mohammed Nasir Uddin, Md Ashraf Talukder, Md. Alamin Hasan, Md. Rahat Paul, Souvik Chanda, Moumita Ayoade, John Khraisat, Ansam Hossen, Rakib Imran, Faisal Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia School of Information Technology Crown Institute of Higher Education 116 Pacific Highway North SydneyNSW2060 Australia Department of Cyber Security Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakoir Gazipur1750 Bangladesh Department of Electrical and Computer Engineering University of Ottawa Canada
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. Cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ... 详细信息
来源: 评论
Transition metal anchored on C_(9)N_(4) as a single-atom catalyst for CO_(2) hydrogenation: A first-principles study
收藏 引用
Chinese Physics B 2022年 第10期31卷 520-528页
作者: Jia-Liang Chen Hui-Jia Hu Shi-Hao Wei Department of Microelectronic Science and Engineering School of Physical Science and TechnologyNingbo UniversityNingbo 315211China Department of Electronic and Information Engineering School of Electrical Engineering and Computer ScienceNingbo UniversityNingbo 315211China
To alleviate the greenhouse effect and maintain the sustainable development, it is of great significance to find an efficient and low-cost catalyst to reduce carbon dioxide(CO_(2)) and generate formic acid(FA). In thi... 详细信息
来源: 评论
An Approach to Detect Cardiomegaly, COVID-19, Pneumonia, Pneumothorax and Tuberculosis from CXR Images Using Ensembles of Deep Learning  26
An Approach to Detect Cardiomegaly, COVID-19, Pneumonia, Pne...
收藏 引用
26th International Conference on computer and Information technology, ICCIT 2023
作者: Muthaki, Tahsina Masuk, Safwan Ibne Maksud, Akila Rafi, Md. Ashfaq Hosain Sakib, Nazmus Ahsanullah University of Science & Technology Department of Computer Science & Engineering Dhaka Bangladesh
Recent advancements in medical image analysis have harnessed the potential of deep learning, especially in diagnosing thoracic ailments using chest X-ray (CXR) images. This study introduces a novel approach to detecti... 详细信息
来源: 评论
Predicting health insurance claim frauds using supervised machine learning technique  8
Predicting health insurance claim frauds using supervised ma...
收藏 引用
8th IEEE International Conference on science, technology, engineering and Mathematics, ICONSTEM 2023
作者: Veena, K. Supriya, S. Deepa, D. Cruz Antony, J. Karpura Dheepan, G.M. Pavan, Ayila Sri Dharma Siva Pagadalahariprasad Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
The healthcare sector is growing quickly, making it a complex system. At the same time, fraud in this sector is becoming a serious issue. Misuse of the medical insurance systems is one of the problems. The automated d... 详细信息
来源: 评论
DoS Attack Detection Based on Deep Factorization Machine in SDN
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1727-1742页
作者: Jing Wang Xiangyu Lei Qisheng Jiang Osama Alfarraj Amr Tolba Gwang-jun Kim School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Engineering Chonnam National UniversityGwangju61186Korea
Software-Defined Network(SDN)decouples the control plane of network devices from the data *** alleviating the problems presented in traditional network architectures,it also brings potential security risks,particularl... 详细信息
来源: 评论
A Novel Approach for Duty Cycle Optimization in Designing Scalable Wireless Sensor Networks  5th
A Novel Approach for Duty Cycle Optimization in Designing Sc...
收藏 引用
5th International Conference on Electrical and Electronics engineering, ICEEE 2024
作者: De, Sudip Kumar Banerjee, Avishek Majumder, Koushik Department of Information Technology Asansol Engineering College WB Asansol India Department of Computer Science and Engineering MAKAUT WB Kolkata India
This paper aims to enhance the efficiency of wireless sensor networks (WSNs) within an area of interest (AOI) by optimizing duty cycles. Focusing on a specific AOI divided into clusters, each with a dynamically select... 详细信息
来源: 评论
A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第5期4卷 1051-1063页
作者: Sardar, Alamgir Umer, Saiyed Rout, Ranjeet Kumar Khan, Muhammad Khurram Aliah University Department of Computer Science and Engineering Kolkata700156 India National Institute of Technology Department of Computer Science and Engineering Srinagar190006 India King Saud University Center of Excellence in Information Assurance Riyadh11451 Saudi Arabia
The accuracy and security of a biometric system are the two sides of a coin. A biometric system must be simple, flexible, efficient, and secure enough from unauthorized access. Concerning these requirements, this arti... 详细信息
来源: 评论