咨询与建议

限定检索结果

文献类型

  • 300,752 篇 会议
  • 127,809 篇 期刊文献
  • 3,277 册 图书

馆藏范围

  • 431,837 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 248,598 篇 工学
    • 165,409 篇 计算机科学与技术...
    • 133,674 篇 软件工程
    • 59,002 篇 信息与通信工程
    • 39,349 篇 控制科学与工程
    • 34,350 篇 电气工程
    • 32,852 篇 电子科学与技术(可...
    • 28,517 篇 生物工程
    • 22,675 篇 生物医学工程(可授...
    • 19,375 篇 光学工程
    • 16,962 篇 机械工程
    • 14,521 篇 化学工程与技术
    • 13,430 篇 仪器科学与技术
    • 13,260 篇 动力工程及工程热...
    • 11,811 篇 材料科学与工程(可...
    • 9,017 篇 安全科学与工程
    • 8,301 篇 网络空间安全
  • 143,118 篇 理学
    • 71,890 篇 数学
    • 46,680 篇 物理学
    • 32,347 篇 生物学
    • 22,824 篇 统计学(可授理学、...
    • 16,526 篇 系统科学
    • 15,571 篇 化学
  • 62,470 篇 管理学
    • 37,399 篇 管理科学与工程(可...
    • 27,471 篇 图书情报与档案管...
    • 18,719 篇 工商管理
  • 21,572 篇 医学
    • 18,129 篇 临床医学
    • 16,163 篇 基础医学(可授医学...
    • 10,123 篇 药学(可授医学、理...
    • 8,535 篇 公共卫生与预防医...
  • 11,646 篇 法学
    • 9,565 篇 社会学
  • 7,175 篇 经济学
  • 5,678 篇 农学
  • 4,842 篇 教育学
  • 2,026 篇 文学
  • 943 篇 军事学
  • 560 篇 艺术学
  • 102 篇 哲学
  • 57 篇 历史学

主题

  • 21,293 篇 computer science
  • 9,751 篇 accuracy
  • 9,434 篇 computational mo...
  • 8,679 篇 feature extracti...
  • 8,266 篇 deep learning
  • 7,931 篇 machine learning
  • 7,184 篇 training
  • 5,800 篇 data mining
  • 5,537 篇 support vector m...
  • 5,520 篇 computer archite...
  • 5,293 篇 predictive model...
  • 5,193 篇 wireless sensor ...
  • 4,967 篇 optimization
  • 4,909 篇 costs
  • 4,792 篇 testing
  • 4,753 篇 application soft...
  • 4,728 篇 bandwidth
  • 4,712 篇 artificial intel...
  • 4,679 篇 neural networks
  • 4,655 篇 protocols

机构

  • 1,697 篇 department of co...
  • 1,356 篇 department of co...
  • 1,335 篇 department of el...
  • 1,161 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 980 篇 department of ph...
  • 920 篇 department of co...
  • 841 篇 oliver lodge lab...
  • 841 篇 physikalisches i...
  • 824 篇 department of el...
  • 777 篇 university of ch...
  • 638 篇 department of co...
  • 573 篇 department of co...
  • 536 篇 infn laboratori ...
  • 525 篇 infn sezione di ...
  • 522 篇 chitkara univers...
  • 501 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 489 篇 infn sezione di ...
  • 488 篇 department of co...

作者

  • 252 篇 j. wang
  • 250 篇 barter w.
  • 245 篇 s. chen
  • 228 篇 a. gomes
  • 225 篇 blake t.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 215 篇 borsato m.
  • 213 篇 c. alexa
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 206 篇 niyato dusit
  • 203 篇 j. m. izen
  • 200 篇 bencivenni g.
  • 191 篇 c. amelung
  • 191 篇 bay a.
  • 190 篇 g. bella

语言

  • 406,087 篇 英文
  • 21,722 篇 其他
  • 4,027 篇 中文
  • 282 篇 日文
  • 67 篇 德文
  • 44 篇 法文
  • 36 篇 朝鲜文
  • 31 篇 斯洛文尼亚文
  • 22 篇 西班牙文
  • 13 篇 俄文
  • 6 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science of the Faculty of Engineering and Computer Science"
431838 条 记 录,以下是4741-4750 订阅
排序:
ELM based Ensemble of Classifiers for BGP Security against Network Anomalies  11
ELM based Ensemble of Classifiers for BGP Security against N...
收藏 引用
11th International Symposium on Electronic Systems Devices and Computing, ESDC 2023
作者: Deo Verma, Rahul Chandra Govil, Mahesh Kumar Keserwani, Pankaj National Institute of Technology Department of Computer Science and Engineering Sikkim India MNITJaipur Department of Computer Science and Engineering India
The Border Gateway Protocol (BGP) is an essential element of the Internet infrastructure, playing a crucial role in ensuring global connectivity and stability for smooth communication. Numerous techniques are created ... 详细信息
来源: 评论
Improving the Efficiency of Smart Grid Scheduling: A Linear Regression Model with Meta Job Information  2
Improving the Efficiency of Smart Grid Scheduling: A Linear ...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia College Of Information Technology University Of Petra Department Of Computer Science Amman Jordan German Jordianian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
In order to forecast the run time of the jobs that were submitted, this research provides two linear regression prediction models that include continuous and categorical factors. A continuous predictor is built using ... 详细信息
来源: 评论
Integrating Brainwave Analysis and Facial Detection for Enhanced Security in Transactional Systems  8
Integrating Brainwave Analysis and Facial Detection for Enha...
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Talasila, Smeeth Vadlamudi, Gnana Abhinay Vadlamudi, Anvitha School of Computer Science and Engineering Plano West Senior High School TX United States Department of Computer Science and Engineering New York United States School of Computer Science and Engineering Vit Ap University Amaravati India
This paper proposes an innovative user authentication system tailored for high-value asset transactions, leveraging advancements in brainwave analysis and emotional state detection. Traditional authentication methods ... 详细信息
来源: 评论
Generating Time-Series Data Using Generative Adversarial Networks for Mobility Demand Prediction
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5507-5525页
作者: Subhajit Chatterjee Yung-Cheol Byun Department of Computer Engineering Jeju National UniversityJeju-si63243Korea Department of Computer Engineering Major of Electronic EngineeringJeju National UniversityInstitute of Information Science&TechnologyJeju63243Korea
The increasing penetration rate of electric kickboard vehicles has been popularized and promoted primarily because of its clean and efficient *** kickboards are gradually growing in popularity in tourist and education... 详细信息
来源: 评论
Weed Classification Using Particle Swarm Optimization and Deep Learning Models
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 913-927页
作者: M.Manikandakumar P.Karthikeyan Department of Computer Science and Engineering Thiagarajar College of EngineeringTamil NaduIndia Department of Information Technology Thiagarajar College of EngineeringTamil NaduIndia
Weed is a plant that grows along with nearly allfield crops,including rice,wheat,cotton,millets and sugar cane,affecting crop yield and *** and accurate identification of all types of weeds is a challenging task for f... 详细信息
来源: 评论
Intelligent Aquila Optimization Algorithm-Based Node Localization Scheme for Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 141-152页
作者: Nidhi Agarwal M.Gokilavani S.Nagarajan S.Saranya Hadeel Alsolai Sami Dhahbi Amira Sayed Abdelaziz Department of Information Technology KIET Group of InstitutionsDelhi201206India Department of Computer Science and Engineering Indira Gandhi Delhi Technical University for WomenNew DelhiDelhi110006India Department of Computer Science and Engineering KL UniversityVaddeswaramAndhra Pradesh522502India Department of Electronics&Communication Engineering Saveetha Engineering CollegeChennai602105India Department of Computer Science and Engineering K.Ramakrishnan College of EngineeringTiruchirapalli621112India Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt
In recent times,wireless sensor network(WSN)finds their suitability in several application areas,ranging from military to commercial *** nodes in WSN are placed arbitrarily in the target field,node localization(NL)bec... 详细信息
来源: 评论
Design of Multiple Share Creation with Optimal Signcryption based Secure Biometric Authentication System for Cloud Environment
收藏 引用
International Journal of computers and Applications 2022年 第11期44卷 1047-1055页
作者: Prabhu, D. Vijay Bhanu, S. Suthir, S. Department of Computer Science and Engineering Annamalai University Chidambaram India Research Supervisor & Associate Professor Department of Computer Science and Engineering Annamalai University Chidambaram India Department of Computer Science and Engineering Annamalai University Chidambaram India
Biometric authentication plays a vital role in the cloud computing (CC) environment to accomplish security and privacy. Several kinds of biometrics are used for the authentication process, particularly, the fingerprin... 详细信息
来源: 评论
Analyzing processing time and load factor: 5-node mix network with ElGamal encryption and XOR shuffling
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第7期16卷 4589-4597页
作者: Naikoo, Fayaz Ahmad Ahmad, Khaleel Ahmad, Khairol Amali Bin Department of Computer Science and Information Technology Maulana Azad National Urdu University Faculty of Engineering National Defence University of Malaysia
To provide anonymous communication, this paper proposes the implementation of a 5-node mix network using ElGamal encryption and XOR Shuffling. An algorithm for a 5-node mix network with XOR shuffling has been presente... 详细信息
来源: 评论
Polynomial sharings on two secrets: Buy one, get one free
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024年 第3期2024卷 671-706页
作者: Arnold, Paula Berndt, Sebastian Eisenbarth, Thomas Orlt, Maximilian Institute for IT security University of Lübeck Lübeck Germany Department of Electrical Engineering and Computer Science Technische Hochschule Lübeck Lübeck Germany Department of Computer Science TU Darmstadt Darmstadt Germany University of Lübeck Germany
While passive side-channel attacks and active fault attacks have been studied intensively in the last few decades, strong attackers combining these attacks have only been studied relatively recently. Due to its simpli... 详细信息
来源: 评论
Ensemble Technique for Imputing Missing Values in MAR Missingness  6
Ensemble Technique for Imputing Missing Values in MAR Missin...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Tiwaskar, Shweta Rashid, Mamoon Gokhale, Prasad Vishwakarma University Faculty of Science and Technology Department of Computer Engineering Pune India
Missing data is a widespread problem across many research fields, and it can have a major impact on the precision of statistical analyses. Imputation is one method for handling missing data, in which missing values ar... 详细信息
来源: 评论