咨询与建议

限定检索结果

文献类型

  • 3,551 篇 会议
  • 2,337 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,931 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,682 篇 工学
    • 2,816 篇 计算机科学与技术...
    • 2,329 篇 软件工程
    • 969 篇 信息与通信工程
    • 549 篇 控制科学与工程
    • 511 篇 电气工程
    • 419 篇 生物工程
    • 331 篇 电子科学与技术(可...
    • 249 篇 网络空间安全
    • 239 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 196 篇 安全科学与工程
    • 181 篇 光学工程
    • 151 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
    • 136 篇 化学工程与技术
    • 127 篇 交通运输工程
  • 1,575 篇 理学
    • 829 篇 数学
    • 452 篇 生物学
    • 325 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 140 篇 化学
  • 966 篇 管理学
    • 611 篇 管理科学与工程(可...
    • 395 篇 图书情报与档案管...
    • 308 篇 工商管理
  • 301 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 220 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 129 篇 应用经济学
  • 58 篇 农学
  • 52 篇 教育学
  • 41 篇 军事学
  • 15 篇 文学
  • 14 篇 艺术学
  • 1 篇 历史学

主题

  • 230 篇 accuracy
  • 199 篇 deep learning
  • 188 篇 security
  • 186 篇 feature extracti...
  • 181 篇 machine learning
  • 160 篇 internet of thin...
  • 159 篇 training
  • 146 篇 computational mo...
  • 127 篇 authentication
  • 118 篇 real-time system...
  • 104 篇 privacy
  • 97 篇 support vector m...
  • 97 篇 protocols
  • 97 篇 cryptography
  • 96 篇 predictive model...
  • 96 篇 blockchain
  • 88 篇 artificial intel...
  • 87 篇 convolutional ne...
  • 81 篇 data models
  • 78 篇 optimization

机构

  • 216 篇 school of cyber ...
  • 172 篇 institute of inf...
  • 69 篇 college of cyber...
  • 60 篇 school of comput...
  • 57 篇 school of cyber ...
  • 55 篇 school of cyber ...
  • 53 篇 school of comput...
  • 51 篇 school of cyber ...
  • 51 篇 school of cyber ...
  • 43 篇 department of me...
  • 43 篇 college of compu...
  • 41 篇 department of co...
  • 39 篇 department of co...
  • 38 篇 department of cy...
  • 38 篇 state key labora...
  • 37 篇 department of co...
  • 34 篇 university of bu...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...

作者

  • 51 篇 choo kim-kwang r...
  • 42 篇 zhou pan
  • 33 篇 das ashok kumar
  • 30 篇 huang qingming
  • 30 篇 cao xiaochun
  • 29 篇 hai jin
  • 26 篇 muhaidat sami
  • 25 篇 mohammad kamrul ...
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 walid el-shafai
  • 19 篇 yang zhiyong
  • 19 篇 wang wei
  • 18 篇 peng hao
  • 18 篇 ashok kumar das
  • 18 篇 hasan mohammad k...
  • 18 篇 naglaa f.soliman
  • 17 篇 han zhu
  • 16 篇 ma jianfeng
  • 16 篇 guo yuanxiong

语言

  • 4,927 篇 英文
  • 947 篇 其他
  • 58 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5931 条 记 录,以下是1181-1190 订阅
排序:
Automatic Fish Species Identification Using Convolutional Neural Networks (CNN)
Automatic Fish Species Identification Using Convolutional Ne...
收藏 引用
Sustainable Expert Systems (ICSES), International Conference on
作者: I. Mettildha Mary T. Ragunthar M. Priyadharsini H Shyam Krishnaa M K Sujit Department of Computer Science and Engineering(Cyber Security) Dr.N.G.P Institute of Technology Coimbatore Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Chennai Tamil Nadu India Department of Information Security School of Computer Science and Engineering (SCOPE) Vellore Institute Technology Vellore Tamil Nadu India Siemens Healthineers Bangalore Atheniac Bangalore
Accurate identification of fish species is critical for applications in fisheries management., biodiversity monitoring., and conservation efforts. Conventional manual identification techniques take a lot of time and a... 详细信息
来源: 评论
Detecting Human Eye Blinks through OpenCV
Detecting Human Eye Blinks through OpenCV
收藏 引用
International Conference for Convergence of technology (I2CT)
作者: Kirti Wanjale Araddhana Arvind Deshmukh Jyoti Chetan Vanikar Alpana Prashant Adsul Shailesh P. Bendale Department Of Computer Engineering Vishwakarma Institute of Information Technology Symbiosis Skills and Professional University Pune Pune Maharashtra India Department of Computer Science & Information Technology (Cyber Security) Symbiosis Skill and Professional University Kiwale Pune Department of Computer Engineering Dr. D.Y. Patil College of Engineering and Innovation Affiliated to Savitribai Phule Pune University Department of Computer Engineering NBN Sinhgad School of Engineering Pune
Blink detection, a crucial part of facial movement analysis, is applied in a number of fields, including human-computer interaction, driver monitoring, and healthcare. However, automatic blink recognition presents uni... 详细信息
来源: 评论
A Novel Machine Learning-Based Framework for Predicting Diabetes in Healthcare
A Novel Machine Learning-Based Framework for Predicting Diab...
收藏 引用
2025 International Conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Oliver, A. Sheryl Gupta, Kimmi Singh, Jagendra Agnihotri, Atul Kumar Vasavi, M. Kaur, Gaganjot Srm Institute of Science and Technology Department of Computational Intelligence Chennai India School of Computer Science Engineering & Technology Bennett University Greater Noida India School of Engineering and Technology Chhatrapati Shahu Ji Maharaj University Electronics and Communication Engineering Kanpur India Cvr College of Engineering Department of Et -Cyber Security Hyderabad India Raj Kumar Goel Institute of Technology Department of Computer Science Ghaziabad India
The rise in diabetes is considered the greatest global health issue;thus, the call for early and accurate predictions of the disease is a dire need in the health sector. The detection of the disease in its initial sta... 详细信息
来源: 评论
Analysis of Detection and Recognition of Human Face Using Support Vector Machine  1st
Analysis of Detection and Recognition of Human Face Using Su...
收藏 引用
1st International Conference on Artificial Intelligence of Things, ICAIoT 2023
作者: Hannan, Shaikh Abdul Pushparaj Ashfaque, Mohammed Waseem Lamba, Anil Kumar, Anil Computer Science and Information Technology AlBaha University AlBaha Saudi Arabia Electronics and Communication Engineering National Institute of Technical Teachers Training and Research Chandigarh India Computer Science and I.T. Dr. B.A.M. University Aurangabad India Cyber Security Technology Risk and Resilience Oversight American Express New York United States Government Millennium Polytechnic Himachal Pradesh Chamba India
Recently, Support Vector Machines (SVMs) have been suggested as an additional technique for design identification. In this study, a face detection framework with demeanor recognition utilizing Support Vector Machines ... 详细信息
来源: 评论
An Improved iBAT-COOP Protocol for Cooperative Diversity in FANETs
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 2527-2546页
作者: Shahzad Hameed Qurratul-Ain Minhas Sheeraz Ahmed Shabana Habib Mohammad Kamrul Hasan Muhammad Islam Sheroz Khan Quaid-i-Azam University IslamabadPakistan Iqra National University PeshawarPakistan Network and Communication Technology Lab Center for Cyber SecurityUKMBangiMalaysia Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Electrical Engineering Onaizah College of Engineering&Information TechnologyAl-QassimSaudi Arabia
Flying ad hoc networks(FANETs)present a challenging environment due to the dynamic and highly mobile nature of the *** network topology and uncertain node mobility structure of FANETs do not aim to consider only one p... 详细信息
来源: 评论
A Community Detection Approach for Academic Social Network: The Case of the Cross-Strait Academic Conference Network  3
A Community Detection Approach for Academic Social Network: ...
收藏 引用
3rd International Conference on Electronics, Communications and Information technology, CECIT 2022
作者: Zhang, Xinxin Xu, Li Gao, Min Fan, Jianxi Sun, Hung-Min Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China Fudan University The School of Computer Science Shanghai China Soochow University The School of Computer Science and Technology Suzhou China National Tsing Hua University The Department of Computer Science Hsinchu Taiwan
With the fast development of information networks, academic social network analysis has attracted significant attention, we regard these researchers sharing common interests as a research community. The community has ... 详细信息
来源: 评论
Hybrid Models for Recognizing Indonesian Textual Entailment  7
Hybrid Models for Recognizing Indonesian Textual Entailment
收藏 引用
7th International Conference on Informatics and Computational Sciences, ICICoS 2024
作者: Ahmadian, Hendri Abidin, Taufik Fuadi Riza, Hammam Muchtar, Kahlil Universitas Syiah Kuala Graduate School of Mathematics and Applied Sciences Banda Aceh Indonesia Universitas Syiah Kuala Faculty of Mathematics and Natural Sciences Department of Informatics Banda Aceh Indonesia National Research and Innovation Agency Research Center for Artificial Intelligence and Cyber Security Jakarta Indonesia Universitas Syiah Kuala Faculty of Engineering Department of Electrical and Computer Engineering Banda Aceh Indonesia
A paragraph raises pertinent issues about linguistic disparities in understanding the semantic relationships between sentences within the natural language processing domain (NLP) Addressing this challenge necessitates... 详细信息
来源: 评论
Generalized Simultaneous Perturbation-Based Gradient Search With Reduced Estimator Bias
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Pachalyl, Soumen Bhatnagarz, Shalabh Prashanth, L.A. TCS Research Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India Indian Institute of Science Department of Computer Science and Automation The Robert Bosch Centre for Cyber Physical Systems Bangalore India Indian Institute of Technology Madras Department of Computer Science and Engineering Chennai India
We present a family of generalized simultaneous perturbation-based gradient search (GSPGS) estimators that use noisy function measurements. The number of function measurements required by each estimator is guided by t... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management
A Proposed Approach for Risk Planning and Management
收藏 引用
Information technology (ACIT)
作者: Mohammed N. Al Refai Yazan Al-Smadi Adai Al-Momani Zeyad M. Jamhawi Ahmed Ali Otoom Issa Atoum Ahid Yaseen Jafar Ababneh Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Computer Science Applied Science Private University Amman Jordan Department of Cyber Security Applied Science Private University Amman Jordan Software Engineering Department Faculty of Information Technology Philadelphia University Jordan Department of Cyber Security Zarqa University Zarqa Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Reliability of Multipath Networks with Optimization of the Location of Inter-Path Communication Nodes
Reliability of Multipath Networks with Optimization of the L...
收藏 引用
2023 International Russian Smart Industry Conference, SmartIndustryCon 2023
作者: Bogatyrev, Vladimir A. Tu Le, Anh Abramova, Evgenia A. Saint-Petersburg State University of Aerospace Instrumentation Department Information Systems Security Saint Petersburg Russia University ITMO Faculty of Software Engineering and Computer Technology Saint Peterburg Russia
The article explores the possibility of improving the reliability of a network with multipath routing. A feature of the proposed study is the analysis of the influence of the placement of switching nodes that switch p... 详细信息
来源: 评论