咨询与建议

限定检索结果

文献类型

  • 17,367 篇 会议
  • 2,566 篇 期刊文献
  • 143 册 图书

馆藏范围

  • 20,076 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,793 篇 工学
    • 7,972 篇 计算机科学与技术...
    • 6,637 篇 软件工程
    • 3,431 篇 信息与通信工程
    • 2,086 篇 控制科学与工程
    • 1,822 篇 电子科学与技术(可...
    • 1,793 篇 电气工程
    • 1,236 篇 生物工程
    • 1,073 篇 生物医学工程(可授...
    • 906 篇 光学工程
    • 831 篇 机械工程
    • 800 篇 动力工程及工程热...
    • 754 篇 仪器科学与技术
    • 609 篇 化学工程与技术
    • 555 篇 安全科学与工程
    • 488 篇 交通运输工程
    • 419 篇 网络空间安全
  • 5,995 篇 理学
    • 3,040 篇 数学
    • 1,853 篇 物理学
    • 1,361 篇 生物学
    • 1,017 篇 统计学(可授理学、...
    • 704 篇 系统科学
    • 617 篇 化学
  • 2,993 篇 管理学
    • 1,903 篇 管理科学与工程(可...
    • 1,270 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 982 篇 医学
    • 819 篇 临床医学
    • 763 篇 基础医学(可授医学...
    • 467 篇 公共卫生与预防医...
    • 464 篇 药学(可授医学、理...
  • 591 篇 法学
    • 483 篇 社会学
  • 362 篇 经济学
  • 261 篇 农学
  • 210 篇 教育学
  • 107 篇 文学
  • 49 篇 军事学
  • 12 篇 艺术学
  • 1 篇 历史学

主题

  • 715 篇 accuracy
  • 536 篇 deep learning
  • 470 篇 feature extracti...
  • 419 篇 computational mo...
  • 365 篇 real-time system...
  • 358 篇 support vector m...
  • 317 篇 training
  • 310 篇 internet of thin...
  • 285 篇 machine learning
  • 244 篇 predictive model...
  • 231 篇 convolutional ne...
  • 223 篇 optimization
  • 222 篇 reliability
  • 212 篇 computer archite...
  • 209 篇 computer science
  • 186 篇 neural networks
  • 181 篇 wireless communi...
  • 176 篇 routing
  • 174 篇 throughput
  • 171 篇 data mining

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 82 篇 tno technical sc...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 76 篇 université de st...
  • 75 篇 university würzb...
  • 70 篇 university of jo...
  • 66 篇 università di ca...
  • 59 篇 university moham...
  • 58 篇 ncsr demokritos ...
  • 53 篇 leiden universit...
  • 53 篇 university moham...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 chitkara univers...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 82 篇 kalekin o.
  • 82 篇 díaz a.f.
  • 82 篇 boumaaza j.
  • 81 篇 chen a.
  • 81 篇 coleiro a.
  • 81 篇 gozzini s.r.
  • 80 篇 dallier r.
  • 77 篇 anguita m.
  • 75 篇 boettcher m.
  • 75 篇 enzenhöfer a.
  • 71 篇 aly z.
  • 71 篇 celli s.
  • 70 篇 huang f.
  • 66 篇 dornic d.
  • 61 篇 carretero v.

语言

  • 16,565 篇 英文
  • 3,255 篇 其他
  • 194 篇 中文
  • 45 篇 日文
  • 21 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept Computer Engineering and Technology"
20076 条 记 录,以下是4871-4880 订阅
排序:
Ensembling Logistic Regression(Lr) with Smote(Syntheic Minority over Sampling Technic for Credit Card Fraud Detection
Ensembling Logistic Regression(Lr) with Smote(Syntheic Minor...
收藏 引用
2024 International Conference on Communication, Computing and Energy Efficient Technologies, I3CEET 2024
作者: Sneha, Kandi Shareef, Khaja Mohammad Fazil Afzal Sri, Marumanula Bhanu Moses, Kolli Manish Geetha, G. B V Raju Institute of Technology Dept. Computer Science Engineering Narasapur Telangana Medak District502313 India
Due to the exponential rise in electronic transactions, credit card theft is becoming a major concern for both consumers and financial institutions. The goal of this research is to create a sophisticated fraud detecti... 详细信息
来源: 评论
Application to Enhance the Programming Knowledge of Children
Application to Enhance the Programming Knowledge of Children
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Anuga Dissanayake Vishwa Lakpriya Mahendran Sanjeevan Ahamed Fahmi Samanthi E.R. Siriwardana Mihiri Samaraweera Dept. of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka Dept. of Information Technology Sri Lanka Institute of Information Technology Malabe Sri Lanka
This proposal outlines the development of a comprehensive educational platform aimed at bridging the Information technology knowledge gap among Tamil-speaking students in Sri Lanka. The platform is designed to enhance... 详细信息
来源: 评论
A Secure Token-Based Approach for DHCP Client Authentication and Replay Attack Prevention
A Secure Token-Based Approach for DHCP Client Authentication...
收藏 引用
International Conference on computer and Information technology (ICCIT)
作者: Asaduzzaman Jony Muhammad Nazrul Islam Rahat Ahmed Talukder Dept. of Information and Communication Technology Bangladesh University of Professionals (BUP) Dhaka Bangladesh Dept. of Computer Science and Engineering Military Institute of Science and Technology (MIST) Dhaka Bangladesh
Dynamic Host Configuration Protocol (DHCP) plays a crucial role for assigning IP address and other related parameters to clients. Due to lack of client authentication and anti reply mechanism the DHCP protocol is susc... 详细信息
来源: 评论
EAI Endorsed Transactions: AI Research  3
EAI Endorsed Transactions: AI Research
收藏 引用
3rd IEEE International Conference on Interdisciplinary Approaches in technology and Management for Social Innovation, IATMSI 2025
作者: Karad, Sachin Chandravadan Singh, Balpreet Krishna, Gopal Ambhika, C. Yadav, Kanchan Sikarwar, Shailendra Singh Lovely Professional University Dept. of Electronics and Electrical Engineering Punjab India Uttaranchal University Uttaranchal Institute of Technology Dehradun India R.M.D Engineering College Dept. of Aiml Jharkhand India Gla University Dept. of Computer Eng. & Applications Mathura India Jiwaji University Dept. of Cs Gwalior India
This research provides a thorough review of wearable health monitoring devices and explores their potential in managing individual health. The study emphasizes how wearables can assist in early detection of health iss... 详细信息
来源: 评论
Protecting Sensitive Data in the Cloud: A Network Security Approach  15
Protecting Sensitive Data in the Cloud: A Network Security A...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Mohammed, Abdul Sajid Sreeramulu, Madhusudhan Dasari Gopal, Santhosh Kumar Gupta, Ketan Anand Kumar, V. University of the Cumberlands Dept of School of Computer and Information Sciences KY United States American Express Dept of Cyber Security United States Charlotte NC United States University of The Cumberlands Dept. of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Department of Ece Tamil Nadu Coimbatore641202 India
Cloud Computing adoption has increased dramatically over the past few years, making the protection of sensitive data on the cloud a major concern. In this paper network security is presented as an effective way to ens... 详细信息
来源: 评论
NB-IoT Preamble Signal: A Survey  7
NB-IoT Preamble Signal: A Survey
收藏 引用
7th IEEE World Forum on Internet of Things, WF-IoT 2021
作者: DIan, F. John Vahidnia, R. British Columbia Institute of Technology Dept. of Electrical and Computer Engineering Burnaby Canada
The Narrowband Internet of Things (NB-IoT) is a cellular IoT communication technology to address the IoT use cases where the smart devices can establish a connection with the network using Random Access (RA) process. ... 详细信息
来源: 评论
Cryptography and Adversarial Analysis for Cloud Data Security
Cryptography and Adversarial Analysis for Cloud Data Securit...
收藏 引用
Innovative Trends in Information technology (ICITIIT), International Conference on
作者: S. Manjula K. Valarmathi M.Swarna Sudha Dept. of Computer Science and Engineering Ramco Institute of Technology Rajapalayam Tamil Nadu India Dept of Electronics and Communication Engineering P.S.R Engineering College Sivakasi Tamil Nadu India
Cloud computing, a novel paradigm for distributed data processing, has emerged as a transformative technology enabling the storage and retrieval of data over the Internet. The prevalence of Software-as-a-Service has r... 详细信息
来源: 评论
Trustworthy Text-to-Image Diffusion Models: A Timely and Focused Survey
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yi Chen, Zhen Cheng, Chih-Hong Ruan, Wenjie Huang, Xiaowei Zhao, Dezong Flynn, David Khastgir, Siddartha Zhao, Xingyu WMG The University of Warwick United Kingdom The Dept. of Computer Science University of Liverpool United Kingdom The Dept. of Computer Science & Engineering Chalmers University of Technology Sweden The James-Watt Engineering School University of Glasgow United Kingdom
Text-to-Image (T2I) Diffusion Models (DMs) have garnered widespread attention for their impressive advancements in image generation. However, their growing popularity has raised ethical and social concerns related to ... 详细信息
来源: 评论
Semantic-Aided Image Transmission System with Unequal Error Protection for Next-Generation Communication Networks
Semantic-Aided Image Transmission System with Unequal Error ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Nargis Fayaz Aman Shreshtha Smruti Sarangi Ranjan K. Mallik Brejesh Lall Dept. of Electrical Engineering Indian Institute of Technology Delhi New Delhi India Dept. of Computer Science and Engg Indian Institute of Technology Delhi New Delhi India
Semantic communication (SC) aims to convey the meaning of data instead of focusing on its bit-by-bit reconstruction. SC finds applications in beyond 5G and 6G networks for artificial intelligence-empowered multimedia ... 详细信息
来源: 评论
CAs Based Student-Alumni Management System
CAs Based Student-Alumni Management System
收藏 引用
2021 International Conference on Communication, Control and Information Sciences, ICCISc 2021
作者: Nishanth, D.V. Satish Narasimha, Niteesh S. Sandesh, H.J. Bhargavi, K. Siddaganga Institute of Technology Dept. of Computer Science and Engineering TumakuruKarnataka India
Students and alumni management system of any university is a collaborative framework which integrates the knowledge between the students who are pursuing education and the students who have already successfully establ... 详细信息
来源: 评论