咨询与建议

限定检索结果

文献类型

  • 113,837 篇 会议
  • 52,630 篇 期刊文献
  • 1,508 册 图书

馆藏范围

  • 167,975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,918 篇 工学
    • 65,838 篇 计算机科学与技术...
    • 53,181 篇 软件工程
    • 25,490 篇 信息与通信工程
    • 16,485 篇 控制科学与工程
    • 14,558 篇 电气工程
    • 13,860 篇 电子科学与技术(可...
    • 11,815 篇 生物工程
    • 9,404 篇 生物医学工程(可授...
    • 8,394 篇 光学工程
    • 6,951 篇 机械工程
    • 5,963 篇 化学工程与技术
    • 5,857 篇 动力工程及工程热...
    • 5,618 篇 仪器科学与技术
    • 4,986 篇 材料科学与工程(可...
    • 4,535 篇 网络空间安全
    • 4,167 篇 安全科学与工程
  • 56,808 篇 理学
    • 27,083 篇 数学
    • 19,484 篇 物理学
    • 13,405 篇 生物学
    • 8,823 篇 统计学(可授理学、...
    • 6,446 篇 化学
    • 6,325 篇 系统科学
  • 25,913 篇 管理学
    • 16,141 篇 管理科学与工程(可...
    • 10,802 篇 图书情报与档案管...
    • 7,579 篇 工商管理
  • 9,392 篇 医学
    • 7,812 篇 临床医学
    • 7,050 篇 基础医学(可授医学...
    • 4,364 篇 药学(可授医学、理...
    • 4,080 篇 公共卫生与预防医...
  • 4,903 篇 法学
    • 3,991 篇 社会学
  • 3,020 篇 经济学
  • 2,435 篇 农学
  • 1,600 篇 教育学
  • 867 篇 文学
  • 360 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,974 篇 accuracy
  • 4,270 篇 deep learning
  • 3,962 篇 feature extracti...
  • 3,618 篇 machine learning
  • 3,540 篇 computational mo...
  • 3,123 篇 training
  • 2,519 篇 support vector m...
  • 2,411 篇 convolutional ne...
  • 2,370 篇 internet of thin...
  • 2,308 篇 real-time system...
  • 2,305 篇 predictive model...
  • 2,145 篇 optimization
  • 1,973 篇 artificial intel...
  • 1,906 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,691 篇 neural networks
  • 1,613 篇 computer archite...
  • 1,588 篇 security
  • 1,547 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 926 篇 department of co...
  • 842 篇 department of el...
  • 741 篇 university of ch...
  • 679 篇 department of el...
  • 675 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 232 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 156,021 篇 英文
  • 10,140 篇 其他
  • 1,863 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering and Infotmation Technology"
167975 条 记 录,以下是4991-5000 订阅
排序:
Real-time Obesity and Heart Disease Monitoring with IoT and Deep Learning
Real-time Obesity and Heart Disease Monitoring with IoT and ...
收藏 引用
2024 International Conference on Smart Devices, ICSD 2024
作者: Singh, Jagendra Govindaraju, P. Kumar, Vinish Yamsani, Nagendar Umamaheswari, J. Munagala, Madhu Bennett University School of Computer Science Engineering & Technology Greater Noida India K S R Institute for Engineering and Technology Department of Electronics and Communication Engineering Tiruchengode India Raj Kumar Goel Institute of Technology Department of Computer Science Engineering Ghaziabad India SR University School of Computer Science and Artificial Intelligence Warangal India Brainware University Department of Computer Science Kolkata India Koneru Lakshmaiah Education Foundation Department of of English Vaddeswaram India
The accelerating spread of junk food consumption is progressively putting the younger generations at risk of obesity. The concept of health prioritization is deeply rooted in the development of nurturing and general w... 详细信息
来源: 评论
RUL Estimation for Power Electronic Devices Using RNNs
RUL Estimation for Power Electronic Devices Using RNNs
收藏 引用
2024 Prognostics and System Health Management Conference, PHM 2024
作者: Cai, Congrui Lu, Zhonghai School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Embedded Systems Master Program Sweden School of Electrical Engineering and Computer Science Department of Electrical Engineering KTH Royal Institute of Technology Sweden
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ... 详细信息
来源: 评论
Deep Neural Networks for Detecting Insider Threats and Social engineering Attacks  4
Deep Neural Networks for Detecting Insider Threats and Socia...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Zewdie, Marshet Girma, Anteneh Sitote, Tilahun Melak Science and Technology University Department of Computer Science & Engineering Adama Adama Ethiopia WashingtonDC United States
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational data, systems, computers, and networks from unauthorized access. However, the incressing prevalence of insider threats and so... 详细信息
来源: 评论
Vision-Based Hand Gesture Recognition System for Assistive Communication Using Neural Networks and GSM Integration  2
Vision-Based Hand Gesture Recognition System for Assistive C...
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Singhal, Pooja Verma, Sonia Gupta, Ritu Kumar, Rishi Arya, Rajneesh Kumar Department of Computer Science ABES Engineering College Uttar Pradesh Ghaziabad India Department of Computer Science Bhagwan Parshuram of Institute and Technology GGSIPU Delhi India Dehradun India
This paper explores the application of vision-based hand gesture recognition in addressing communication challenges faced by deaf and dumb individuals within the realm of human-computer interaction (HCI). Highlighting... 详细信息
来源: 评论
Code word Based Bi-Server Authentication and Key Exchange Encryption Technique  1
Code word Based Bi-Server Authentication and Key Exchange En...
收藏 引用
1st International Conference on Optimization Techniques for Learning, ICOTL 2023
作者: Thangarasan, T. Karthikeyan, V. Arunkumar, G. Arul Prakash, A. Keerthana, R. Gouthami, Kamsala Madanapalle Institute of Technology & Science Department of Computer Science & Engineering AndhraPradesh Madanapalle India Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Department of Computer Science & Engineering Tamilnadu Chennai India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Tamilandu Chennai India K.S.R.College of Engineering Department of Computer Science and Engineering Tamilnadu Tiruchengode India
The data transfer and communication happening between the client and server or the source to destination should be made in some secure way. It must be protected and authenticated. the passwords related to that all wil... 详细信息
来源: 评论
Enhancing digital security using Signa-Deep for online signature verification and identity authentication
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2024年 第2期8卷 58-69页
作者: Ch, Ravikumar Sridevi, Mulagundla Ramchander, M. Ramesh, Vankudoth Kumar, Vadapally Praveen Department of Artificial Intelligence &Data Science Chaitanya Bharathi Institute of Technology Hyderabad 500075 India Department of Computer Science and Engineering CVR College of Engineering Hyderabad 501510 India Department of Computer Applications Chaitanya Bharathi Institute of Technology Hyderabad 500075 India Department of Emerging Technologies CVR College of Engineering Hyderabad 500039 India
In the contemporary digital realm, the utilization of online services has surged, facilitated by the seamless integration of deep learning technology, which is paramount in applications demanding precision and efficie... 详细信息
来源: 评论
Improving Security and Performance of Databases Through Single Cache System  4
Improving Security and Performance of Databases Through Sing...
收藏 引用
4th International Conference on Blockchain technology and Information Security, ICBCTIS 2024
作者: Ul Haq, Ikram Khan, Salabat Khan, Mansoor Tamsal, Saher School of Computer Science and Technology Southwest University of Science and Technology Mianyang China School of Computer and Information Engineering Qilu Institute of Technology Jinan China School of Intelligent Manufacturing and Control Engineering Qilu Institute of Technology Jinan China University of Agriculture Department of Computer Science Faisalabad Pakistan
In today's world, connectivity and performance-driven technology are rapidly advancing each year, and new platforms and mechanisms are being utilized to enhance the security and performance of databases and cloud ... 详细信息
来源: 评论
Optimizing Vanet Communications: A Bibliometric Analysis of Energy-Efficient Strategies with Deep Learning
Optimizing Vanet Communications: A Bibliometric Analysis of ...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Suganya, R. Prakash, B. Srm Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Kattankulathur India Srm Institute of Science and Technology Department of Computing Technologies Tamilnadu Kattankulathur India
Vehicular Ad Hoc Networks (VANETs) are important for intelligent transportation systems, permitting vehicles to communicate with one another and nearby infrastructure in order to enhance road safety, traffic managemen... 详细信息
来源: 评论
Empowering Biomedical Named Entity Recognition Through Multi-Tagger Collaboration  27
Empowering Biomedical Named Entity Recognition Through Multi...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zhao, Jin Xie, Jian Zhu, Tinghui Guo, Qian Li, Zhixu Xiao, Yanghua Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China Department of Computer Science and Engineering East China University of Science and Technology China
Biomedical Named Entity Recognition (BioNER) plays a crucial role in automatically identifying specific categories of entities from biomedical texts. Currently, region-based methods have shown promising performance in... 详细信息
来源: 评论
Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 4713-4733页
作者: Muhammad Bilal Sandile C.Showngwe Abid Bashir Yazeed Y.Ghadi College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Department of Mathematical Statistics and Actuarial Science Faculty of Natural and Agricultural SciencesUniversity of the Free StateBloemfontein9301South Africa Department of Computer Science National Textile UniversityFaisalabad38000Pakistan Department of Computer Science/Software Engineering Al Ain UniversityAbu DhabiUAE
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on... 详细信息
来源: 评论