咨询与建议

限定检索结果

文献类型

  • 300,752 篇 会议
  • 127,809 篇 期刊文献
  • 3,277 册 图书

馆藏范围

  • 431,837 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 248,598 篇 工学
    • 165,409 篇 计算机科学与技术...
    • 133,674 篇 软件工程
    • 59,002 篇 信息与通信工程
    • 39,349 篇 控制科学与工程
    • 34,350 篇 电气工程
    • 32,852 篇 电子科学与技术(可...
    • 28,517 篇 生物工程
    • 22,675 篇 生物医学工程(可授...
    • 19,375 篇 光学工程
    • 16,962 篇 机械工程
    • 14,521 篇 化学工程与技术
    • 13,430 篇 仪器科学与技术
    • 13,260 篇 动力工程及工程热...
    • 11,811 篇 材料科学与工程(可...
    • 9,017 篇 安全科学与工程
    • 8,301 篇 网络空间安全
  • 143,118 篇 理学
    • 71,890 篇 数学
    • 46,680 篇 物理学
    • 32,347 篇 生物学
    • 22,824 篇 统计学(可授理学、...
    • 16,526 篇 系统科学
    • 15,571 篇 化学
  • 62,470 篇 管理学
    • 37,399 篇 管理科学与工程(可...
    • 27,471 篇 图书情报与档案管...
    • 18,719 篇 工商管理
  • 21,572 篇 医学
    • 18,129 篇 临床医学
    • 16,163 篇 基础医学(可授医学...
    • 10,123 篇 药学(可授医学、理...
    • 8,535 篇 公共卫生与预防医...
  • 11,646 篇 法学
    • 9,565 篇 社会学
  • 7,175 篇 经济学
  • 5,678 篇 农学
  • 4,842 篇 教育学
  • 2,026 篇 文学
  • 943 篇 军事学
  • 560 篇 艺术学
  • 102 篇 哲学
  • 57 篇 历史学

主题

  • 21,293 篇 computer science
  • 9,751 篇 accuracy
  • 9,434 篇 computational mo...
  • 8,679 篇 feature extracti...
  • 8,266 篇 deep learning
  • 7,931 篇 machine learning
  • 7,184 篇 training
  • 5,800 篇 data mining
  • 5,537 篇 support vector m...
  • 5,520 篇 computer archite...
  • 5,293 篇 predictive model...
  • 5,193 篇 wireless sensor ...
  • 4,967 篇 optimization
  • 4,909 篇 costs
  • 4,792 篇 testing
  • 4,753 篇 application soft...
  • 4,728 篇 bandwidth
  • 4,712 篇 artificial intel...
  • 4,679 篇 neural networks
  • 4,655 篇 protocols

机构

  • 1,697 篇 department of co...
  • 1,356 篇 department of co...
  • 1,335 篇 department of el...
  • 1,161 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 980 篇 department of ph...
  • 920 篇 department of co...
  • 841 篇 oliver lodge lab...
  • 841 篇 physikalisches i...
  • 824 篇 department of el...
  • 777 篇 university of ch...
  • 638 篇 department of co...
  • 573 篇 department of co...
  • 536 篇 infn laboratori ...
  • 525 篇 infn sezione di ...
  • 522 篇 chitkara univers...
  • 501 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 489 篇 infn sezione di ...
  • 488 篇 department of co...

作者

  • 252 篇 j. wang
  • 250 篇 barter w.
  • 245 篇 s. chen
  • 228 篇 a. gomes
  • 225 篇 blake t.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 215 篇 borsato m.
  • 213 篇 c. alexa
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 206 篇 niyato dusit
  • 203 篇 j. m. izen
  • 200 篇 bencivenni g.
  • 191 篇 c. amelung
  • 191 篇 bay a.
  • 190 篇 g. bella

语言

  • 406,087 篇 英文
  • 21,722 篇 其他
  • 4,027 篇 中文
  • 282 篇 日文
  • 67 篇 德文
  • 44 篇 法文
  • 36 篇 朝鲜文
  • 31 篇 斯洛文尼亚文
  • 22 篇 西班牙文
  • 13 篇 俄文
  • 6 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science of the Faculty of Engineering and Computer Science"
431838 条 记 录,以下是4611-4620 订阅
排序:
Qualitative and Quantitative Analysis of Modifications in Playfair Cipher  5th
Qualitative and Quantitative Analysis of Modifications in...
收藏 引用
5th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2023
作者: Ray, Anubhab Singh, Kartikeya Harsh, Aditya Thorat, Shubham Kar, Nirmalya Department of Computer Science and Engineering NIT Agartala Agartala India
Security in digital world has become a paramount issue, even more so in the post pandemic world when the digital footprint of the world has increased. Multiple encryption techniques are used to ensure the same. Certai... 详细信息
来源: 评论
Advancing Crime Analysis and Prediction: A Comprehensive Exploration of Machine Learning Applications in Criminal Justice  2
Advancing Crime Analysis and Prediction: A Comprehensive Exp...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Thoiba Singh, Nongmeikapam Mehra, Muskan Verma, Ishita Singh, Nihal Gandhi, Divyam Ahmad Alladin, Mahid Chandigarh University Department of Computer Science and Engineering Punjab India
The criminal justice system faces the challenge of effectively combating crime while respecting the rights of individuals. In recent years, machine learning has emerged as a powerful tool to assist law enforcement age... 详细信息
来源: 评论
A Comparative Study on Resource Aware Allocation and Loadbalancing Techniques for Cloud Computing  14
A Comparative Study on Resource Aware Allocation and Loadbal...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Kamatar, Malatesh Madhavi, P. Bindhu Department of Computer Science and Engineering PDIT Hosapete India Department of Computer Science and Engineering Oxford CE Bangalore India
Advances in cloud networking, cloud infrastructure, and data processing necessitate resource management flexibility. Fault tolerance systems, which include effective load balancing and migration of applications withou... 详细信息
来源: 评论
A comparative analysis for deep-learning-based approaches for image forgery detection
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2024年 第1期8卷 1-10页
作者: Ch, Ravikumar Radha, Marepalli Mahendar, Maragoni Manasa, Pinnapureddy Department of Artificial Intelligence &Data Science Chaitanya Bharathi Institute of Technology Hyderabad 500075 India Department of Computer Science and Engineering CVR College of Engineering Hyderabad 501510 India Department of Computer Science and Engineering Neil Gogte Institute of Technology Hyderabad 500039 India
The detection of counterfeit photographs is critical in the digital age because of the widespread development of digital media and its significant impact on social networks. The legitimacy of digital content is being ... 详细信息
来源: 评论
Profit Demand Delegated Proof of Stake: Hypothetical Design Concept for Blockchain
Profit Demand Delegated Proof of Stake: Hypothetical Design ...
收藏 引用
2024 IEEE International Conference on Computing, Applications and Systems, COMPAS 2024
作者: Gupta, Udayan Das Haque, Md. Mokammel Reza, Ahmed Wasif Arefin, Mohammad Shamsul Chittagong University of Engineering and Technology Department of Computer Science and Engineering Chittagong Bangladesh Sciences University of Adelaide School of Computer and Mathematical Adelaide Australia East West University Department of Computer Science and Engineering Dhaka Bangladesh
Delegated Proof of Stake (DPoS) is indeed a fascinating consensus algorithm used on various blockchain platforms. It was designed to address some of the scalability and energy consumption issues associated with Proof ... 详细信息
来源: 评论
Analyzing Artificial Intelligence Based Intrusion Detection System in Detecting DDoS Attack  4th
Analyzing Artificial Intelligence Based Intrusion Detection ...
收藏 引用
4th International Conference on Smart IoT Systems: Innovations and Computing, SSIC 2023
作者: Kurra, Sai Suchith Rayana, Likhitha Yoosuf, Mohamed Sirajudeen School of Computer Science and Engineering VIT-AP University Andhra Pradesh Amaravati India Department of Mathematics and Computer Science Modern College of Business and Science Muscat Oman
With the increasing complexity of the cyber-attacks, traditional intrusion systems have become inadequate in effectively detecting and preventing network attacks. Modern machine learning techniques have the capability... 详细信息
来源: 评论
NeuroProbe: A Performance Profiling Feed Forward Neural Network Simulator for Hardware Interaction Analysis
收藏 引用
SN computer science 2025年 第5期6卷 1-22页
作者: Ayyappan, Binu Kumar, G. Santhosh Department of Computer Science Cochin University of Science and Technology Kochi India Department of Artificial Intelligence and Data Science Rajagiri School of Engineering & Technology Kochi India
NeuroProbe is a simple neural network simulator designed by authors specifically for educational purposes focusing on simulating inference phase on a computationally capable embedded hardware, aiming to provide a deep... 详细信息
来源: 评论
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time Threat Detection through Security Event Correlation  4
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time T...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Diakhame, Mouhamadou Lamine Diallo, Cherif Mejri, Mohamed Gaston Berger University Department of Computer Science Saint Louis Senegal Laval University Department of Computer Science & Software Engineering Quebec Canada
The correlation of security alerts is crucial for effective threat detection and mitigation in modern cybersecurity landscapes. With the exponential growth in the volume of generated alerts, there arises an imperative... 详细信息
来源: 评论
Multi-Task Scheduling Method for Information Security of Heterogeneous Big Data Networks Based on Artificial Intelligence Technology  2
Multi-Task Scheduling Method for Information Security of Het...
收藏 引用
2nd IEEE International Conference on Sensors, Electronics and computer engineering, ICSECE 2024
作者: Chen, Yiping Zheng, Yingzi Guangzhou Institute of Science and Technology Department of Computer Science and Engineering Guangzhou510540 China
Multi-task scheduling of heterogeneous big data network information is proposed to improve the optimal configuration and application ability of network big data resources. A multi-task scheduling method of heterogeneo... 详细信息
来源: 评论
Prediction of Heart Disease using Data Mining and Machine Learning
Prediction of Heart Disease using Data Mining and Machine Le...
收藏 引用
2024 International Visualization, Informatics and Technology Conference, IVIT 2024
作者: Waseemullah Manzoor, Saba Baig, Mirza Adnan Ned University of Engineering and Technology Department of Computer Science and Information Technology Karachi Pakistan Iqra University Department of Computer Science Karachi Pakistan
In this new generation, cardiac disease is expanding abruptly. The main reason for spreading this disease is the way of life of human beings, such as poor nutrition, absence of activities, medication, smoking, and so ... 详细信息
来源: 评论