咨询与建议

限定检索结果

文献类型

  • 156,024 篇 会议
  • 64,432 篇 期刊文献
  • 1,731 册 图书
  • 2 篇 科技报告

馆藏范围

  • 222,189 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 127,558 篇 工学
    • 80,985 篇 计算机科学与技术...
    • 65,354 篇 软件工程
    • 33,070 篇 信息与通信工程
    • 21,230 篇 控制科学与工程
    • 20,748 篇 电气工程
    • 20,150 篇 电子科学与技术(可...
    • 14,241 篇 生物工程
    • 11,494 篇 生物医学工程(可授...
    • 10,737 篇 光学工程
    • 9,237 篇 机械工程
    • 7,930 篇 动力工程及工程热...
    • 7,755 篇 化学工程与技术
    • 7,707 篇 仪器科学与技术
    • 6,625 篇 材料科学与工程(可...
    • 5,077 篇 网络空间安全
    • 5,034 篇 安全科学与工程
  • 72,755 篇 理学
    • 34,648 篇 数学
    • 25,794 篇 物理学
    • 16,104 篇 生物学
    • 11,157 篇 统计学(可授理学、...
    • 8,545 篇 系统科学
    • 8,223 篇 化学
  • 31,637 篇 管理学
    • 20,018 篇 管理科学与工程(可...
    • 12,876 篇 图书情报与档案管...
    • 9,514 篇 工商管理
  • 11,162 篇 医学
    • 9,323 篇 临床医学
    • 8,385 篇 基础医学(可授医学...
    • 5,297 篇 药学(可授医学、理...
    • 4,643 篇 公共卫生与预防医...
  • 5,923 篇 法学
    • 4,813 篇 社会学
  • 3,882 篇 经济学
  • 2,857 篇 农学
  • 2,186 篇 教育学
  • 1,110 篇 文学
  • 512 篇 军事学
  • 274 篇 艺术学
  • 17 篇 哲学
  • 13 篇 历史学

主题

  • 5,710 篇 accuracy
  • 5,291 篇 computer science
  • 4,914 篇 feature extracti...
  • 4,658 篇 deep learning
  • 4,624 篇 computational mo...
  • 4,216 篇 machine learning
  • 3,820 篇 training
  • 3,014 篇 support vector m...
  • 2,788 篇 optimization
  • 2,782 篇 internet of thin...
  • 2,776 篇 predictive model...
  • 2,650 篇 wireless sensor ...
  • 2,635 篇 real-time system...
  • 2,600 篇 convolutional ne...
  • 2,469 篇 data mining
  • 2,462 篇 neural networks
  • 2,404 篇 bandwidth
  • 2,307 篇 computer archite...
  • 2,290 篇 artificial intel...
  • 2,068 篇 algorithm design...

机构

  • 1,133 篇 department of el...
  • 1,078 篇 cavendish labora...
  • 978 篇 department of ph...
  • 928 篇 physikalisches i...
  • 914 篇 oliver lodge lab...
  • 902 篇 department of co...
  • 832 篇 department of el...
  • 767 篇 university of ch...
  • 742 篇 department of co...
  • 663 篇 department of co...
  • 608 篇 chitkara univers...
  • 592 篇 infn sezione di ...
  • 569 篇 infn laboratori ...
  • 564 篇 infn sezione di ...
  • 536 篇 infn sezione di ...
  • 534 篇 horia hulubei na...
  • 518 篇 school of physic...
  • 518 篇 school of physic...
  • 514 篇 department of ph...
  • 510 篇 h.h. wills physi...

作者

  • 251 篇 a. gomes
  • 250 篇 barter w.
  • 248 篇 j. wang
  • 245 篇 s. chen
  • 242 篇 c. alexa
  • 240 篇 j. m. izen
  • 227 篇 blake t.
  • 225 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 c. amelung
  • 223 篇 d. calvet
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 beiter a.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 211 篇 brundu d.
  • 208 篇 bencivenni g.

语言

  • 212,097 篇 英文
  • 7,463 篇 其他
  • 2,602 篇 中文
  • 170 篇 日文
  • 24 篇 法文
  • 24 篇 朝鲜文
  • 22 篇 德文
  • 17 篇 斯洛文尼亚文
  • 17 篇 土耳其文
  • 7 篇 荷兰文
  • 3 篇 爱沙尼亚文
  • 2 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
  • 1 篇 泰文
检索条件"机构=Department of Computer and Technology Engineering"
222189 条 记 录,以下是4961-4970 订阅
排序:
Hashing Algorithm for Protecting Credential Information Against Channel Interception and Server-Side Data Leakage  28
Hashing Algorithm for Protecting Credential Information Agai...
收藏 引用
28th International computer Science and engineering Conference, ICSEC 2024
作者: Piyawanno, Kittipon Nuntawisuttiwong, Taweechai King Mongkut's University of Technology Thonburi Department of Computer Engineering Bangkok Thailand
This research proposes a novel algorithm for password hashing, called the Sandwich Hashing algorithm, designed to protect credential information from channel interception as well as server-side data leakage. The algor... 详细信息
来源: 评论
Delineating Indic Transliteration: Developing A Robust Model for Accurate Cross-Script Conversion
Delineating Indic Transliteration: Developing A Robust Model...
收藏 引用
2024 IEEE International Students' Conference on Electrical, Electronics and computer Science, SCEECS 2024
作者: Shukla, Aditya Agrawal, Pragati Jain, Sweta Maulana Azad National Institute of Technology Department of Computer Science & Engineering Bhopal India
The aim of this study was to develop a reliable model of text change between two writing systems. ""(meaning "Hello") can be transliterated into Latin alphabet as "namaste". To achieve th... 详细信息
来源: 评论
The Eye: An AI-Powered Video Streaming Platform to Protect Children from Inappropriate Content  6
The Eye: An AI-Powered Video Streaming Platform to Protect C...
收藏 引用
6th IEEE Novel Intelligent and Leading Emerging Sciences Conference, NILES 2024
作者: El Bakri, Ahmad Yehia, Abdullah Ali, Mariam Osama, Reem Adel, Zeyad Gamal, Othman Saleh, Sherine Nagy Arab Academy for Science Technology and Maritime Transport Computer Engineering Department Alexandria Egypt
The Internet is now a vital part of our daily life including young children who watch their favorite cartoons using different streaming platforms. Unfortunately, these platforms often host content deemed inappropriate... 详细信息
来源: 评论
Tracking Waste Disposal and Generation of Fine to control and promote proper waste segregation
Tracking Waste Disposal and Generation of Fine to control an...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Ashok, K.N. Kavyashree, K.S. Keerthana, S. Nagashree, C.R. Navya, L. S J C Institute of Technology Department of Computer Science and Engineering Chikkaballapur India
The metropolitan cities in India alone produce about 10 million tons of waste. That is, if left untreated, the waste materials will cause several types of pollution which are water, soil and air that destroy our ecosy... 详细信息
来源: 评论
An Efficient Security Solution for IoT and Cloud Security Using Lattice-Based Cryptography
An Efficient Security Solution for IoT and Cloud Security Us...
收藏 引用
2023 International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2023
作者: Bagla, Piyush Sharma, Ravi Mishra, Amit Kumar Tripathi, Neha Dumka, Ankur Pandey, Neeraj Kumar National Institute of Technology Department of Computer Science & Engineering Punjab Jalandhar India Graphic Era Hill University Department of Computer Science & Engineering Dehradun India Department of Computer Science & Engineering Dehradun India Women Institute of Technology Department of Computer Science & Engineering Dehradun India Dehradun India
This study introduces lattice-based cryptography to enhance security in IoT and cloud systems. It focuses on two fundamental challenges in lattice-based encryption. The paper compares the advantages and disadvantages ... 详细信息
来源: 评论
Improving Network Security with Hybrid Model for DDoS Attack Detection  3
Improving Network Security with Hybrid Model for DDoS Attack...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Dandotiya, Monika Singh Makwana, Rajni Ranjan Madhav Institue of Technology & Science Department of Computer Science & Engineering MP Gwalior India
One of the most devastating forms of attack in the modern day is cyber-attacks. DDoS (Distributed Denial of Service) attacks are one kind of cyberattack. It is a kind of cyberattack in which the perpetrator takes over... 详细信息
来源: 评论
Congesting Ethereum after EIP-1559  6
Congesting Ethereum after EIP-1559
收藏 引用
6th IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024
作者: Arshi, Kianoush Goharshady, Amir Kafshdar Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
We provide two novel block congestion attacks on Ethereum that are applicable even in the presence of the EIP-1559 base fee mechanism, which aimed to make such attacks impossible or highly costly. Unlike traditional b... 详细信息
来源: 评论
High-Throughput Independent Component Analysis Processor for Full Duplex Systems
收藏 引用
IEEE Journal on Selected Areas in Communications 2023年 第9期41卷 2821-2832页
作者: Cheng, Jen-Hao Chang, Tien-Min Shen, Chung-An Fouda, Mohammed E. Eltawil, Ahmed M. National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Taipei10607 Taiwan University of California at Irvine Electrical Engineering and Computer Science Department IrvineCA92697 United States King Abdullah University of Science and Technology Electrical and Computer Engineering Program Thuwal23955 Saudi Arabia
This paper presents the algorithm and very-large-scale integration (VLSI) architecture of a high-throughput and highly efficient independent component analysis (ICA) processor for self-interference cancellation (SIC) ... 详细信息
来源: 评论
A Comprehensive Analysis of Machine Learning and Deep Learning Based Product Recommendation System  5th
A Comprehensive Analysis of Machine Learning and Deep Learni...
收藏 引用
5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024
作者: Chakravarthi, GKalyan Kumar, Raghvendra Addagarla, Ssvr Kumar Department of Computer Science and Engineering School of Engineering and Technology GIET University Odisha Gunupur India Nadimpalli Satyanarayana Raju Institute of Technology Visakhapatnam India
Recommender Systems (RS) have been widely applied in various real-time applications to support identifying valuable information. The RS tries to give actual suggestions to every user based on their behavior as well as... 详细信息
来源: 评论
Fake Review Detection and Classification Using Improved Convolutional Neural Network on Amazon Dataset  3
Fake Review Detection and Classification Using Improved Conv...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Sasikala, C. Ramya, S. RajeshKumar, S. Ramachandramoorthy, K.B. VijayaKumar, S. Umapathi, K. Kpr Institute of Engineering and Technology Department of Computer Science and Engineering Coimbatore India
Fake reviews are a growing concern for e-commerce websites and other online platforms. To tackle this issue, researchers have developed an advanced convolutional neural network system that can detect and classify fake... 详细信息
来源: 评论