咨询与建议

限定检索结果

文献类型

  • 30,906 篇 会议
  • 4,903 篇 期刊文献
  • 240 册 图书

馆藏范围

  • 36,049 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,431 篇 工学
    • 15,936 篇 计算机科学与技术...
    • 13,377 篇 软件工程
    • 5,880 篇 信息与通信工程
    • 3,577 篇 控制科学与工程
    • 2,834 篇 电子科学与技术(可...
    • 2,809 篇 电气工程
    • 2,357 篇 生物工程
    • 1,923 篇 生物医学工程(可授...
    • 1,574 篇 光学工程
    • 1,462 篇 机械工程
    • 1,310 篇 动力工程及工程热...
    • 1,253 篇 仪器科学与技术
    • 1,142 篇 化学工程与技术
    • 872 篇 安全科学与工程
    • 742 篇 交通运输工程
    • 673 篇 建筑学
  • 11,577 篇 理学
    • 6,210 篇 数学
    • 3,237 篇 物理学
    • 2,581 篇 生物学
    • 2,048 篇 统计学(可授理学、...
    • 1,349 篇 系统科学
    • 1,196 篇 化学
  • 5,729 篇 管理学
    • 3,365 篇 管理科学与工程(可...
    • 2,646 篇 图书情报与档案管...
    • 1,866 篇 工商管理
  • 1,631 篇 医学
    • 1,420 篇 临床医学
    • 1,320 篇 基础医学(可授医学...
    • 872 篇 药学(可授医学、理...
    • 675 篇 公共卫生与预防医...
  • 1,038 篇 法学
    • 832 篇 社会学
  • 671 篇 经济学
  • 495 篇 农学
  • 437 篇 教育学
  • 158 篇 文学
  • 79 篇 军事学
  • 43 篇 艺术学
  • 2 篇 哲学

主题

  • 1,107 篇 accuracy
  • 849 篇 computational mo...
  • 846 篇 feature extracti...
  • 727 篇 deep learning
  • 694 篇 training
  • 688 篇 computer science
  • 534 篇 real-time system...
  • 517 篇 support vector m...
  • 513 篇 machine learning
  • 450 篇 predictive model...
  • 417 篇 internet of thin...
  • 358 篇 data models
  • 352 篇 convolutional ne...
  • 351 篇 computer archite...
  • 337 篇 reliability
  • 314 篇 optimization
  • 286 篇 data mining
  • 276 篇 routing
  • 248 篇 wireless sensor ...
  • 246 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 78 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 60 篇 dept. of informa...
  • 60 篇 dept. of informa...
  • 59 篇 nikhef national ...
  • 56 篇 dept. of compute...
  • 54 篇 dept. of compute...
  • 53 篇 school of automa...
  • 51 篇 dept. of compute...
  • 50 篇 leiden universit...
  • 48 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 44 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 75 篇 coleiro a.
  • 75 篇 gozzini s.r.
  • 71 篇 huang f.
  • 67 篇 dallier r.
  • 57 篇 anguita m.
  • 54 篇 kulikovskiy v.
  • 42 篇 benoit d.m.
  • 42 篇 eddymaoui a.
  • 42 篇 labalme m.
  • 41 篇 gagliardini s.
  • 41 篇 del burgo r.

语言

  • 32,230 篇 英文
  • 3,318 篇 其他
  • 316 篇 中文
  • 123 篇 日文
  • 71 篇 朝鲜文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. Computer Science and System Engineering"
36049 条 记 录,以下是4561-4570 订阅
排序:
Enhancing Security in Cloud Registration with Multi Dimensional Features Fusion  5
Enhancing Security in Cloud Registration with Multi Dimensio...
收藏 引用
5th International Conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Mutha, Rakhi Reddy Gantla, Harish Pandey, Sunil Kr Sayeed Ahmad, Sayed Ahuja, Vandana Bhattacherjee, Abhishek Mamodiya, Udit Dept. of Information Technology Amity University Rajasthan Jaipur India Department of Computer Science and Engineering Vignan Institute of Technology and Science Hyderabad India Department of Information Technology Institute of Technology & Science Uttar Pradesh Ghaziabad India School of Engineering and Computing De Montfort University Dubai United Arab Emirates Dept. of CSE Swami Vivekanand Institute of Engineering and Technology Punjab Ramnagar India Department of Computer Science Engineering Lovely Professional University Punjab India Poornima University Jaipur India
Data mining uses artificial intelligence and other methods to extract hidden potential information from large data sets, which provides an effective way to obtain valuable knowledge from a large amount of information.... 详细信息
来源: 评论
Robust Phishing URL Classification Using FastText Character Embeddings and Hybrid Deep Learning
Robust Phishing URL Classification Using FastText Character ...
收藏 引用
Robotics, Automation, Artificial-intelligence and Internet-of-Things (RAAICON), 2019 IEEE International Conference on
作者: Abdullah Al-Sakib Zishad Hossain Limon Anamul Sakib Md Nuruzzaman Pranto Md Ariful Islam Shayma Sultana Md. Redwan Ahmed Shafiur Rahman Dept. of Information Technology Westcliff University CA USA Dept. of Computer Science Westcliff University CA USA Dept. of Business Administration International American University CA USA Dept. of Management Information System International American University CA USA Dept. of Computer Science and Engineering East West University Dhaka Bangladesh Dept. of Software Engineering Daffodil International University Dhaka Bangladesh
Phishing attacks are a major cybersecurity threat that resulted in over 1.2 million incidents in the first half of 2020. These attacks caused substantial financial losses and posed risks to individuals and organizatio... 详细信息
来源: 评论
A Feasibility Study of Hybrid Hydrokinetic and Solar Power Generation at Bandarban Hill Tracts for Off-Grid Communities
A Feasibility Study of Hybrid Hydrokinetic and Solar Power G...
收藏 引用
International Conference on Electrical, computer and Communication engineering (ECCE)
作者: Md. Imam Uddin Forkan Md. Kamrul Hasan Md. Tohidul Islam Khan Adnan Sami Sarker Ishraq Samiha Md. Manjurul Gani Dept. of Electrical Electronic Engineering Chittagong University of Engineering and Technology Chattogram Bangladesh Dept. of Computer Science and Engineering Chittagong University of Engineering and Technology Chattogram Bangladesh
Likely two million people in the Chittagong Hill Tracts live without access to digital technology due to an unreliable electricity supply. Efforts to electrify these hill track areas face significant challenges, inclu... 详细信息
来源: 评论
Multi-Point Positional Insertion Tuning for Small Object Detection
arXiv
收藏 引用
arXiv 2024年
作者: Goto, Kanoko Karasawa, Takumi Hirose, Takumi Kawakami, Rei Inoue, Nakamasa Dept. of Computer Science Institute of Science Tokyo Tokyo Japan Dept. of Systems and Control Engineering Institute of Science Tokyo Tokyo Japan
Small object detection aims to localize and classify small objects within images. With recent advances in large-scale vision-language pretraining, finetuning pretrained object detection models has emerged as a promisi... 详细信息
来源: 评论
Big Data Analytics for Proactive Financial Fraud Detection and Prevention
Big Data Analytics for Proactive Financial Fraud Detection a...
收藏 引用
Technology Innovation and Its Applications (ICTIIA), International Conference on
作者: Yehezkeil Hasudungan Fitra Putri Oganda Ora Plane Maria Daeli Raihan Nesti Anggraini Santoso Dept. of Informatics Engineering University of Raharja Tangerang Indonesia Dept. of Information System University of Raharja Tangerang Indonesia Dept. of Digital Business University of Raharja Tangerang Indonesia Dept. of Computer System University of Raharja Tangerang Indonesia
Financial fraud poses a significant challenge to the financial industry, with increasing complexity and scale threatening global economic stability. This paper explores the use of Big Data Analytics for proactive dete... 详细信息
来源: 评论
Prediction and Modelling of Suicidal Mental Tendencies
Prediction and Modelling of Suicidal Mental Tendencies
收藏 引用
IEEE Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER)
作者: Sunitha Guruprasad Arnav G Rao Shreeraksha Shivani K Varsha S N Yashoda K Dept. of Computer Science & Engineering St Joseph Engineering College Mangaluru India Visvesvaraya Technological University Belagavi Karnataka India Dept. of Computer Science & Engineering Ramaiah Institute of Technology Bengaluru India
Suicide remains a pressing public health concern worldwide, necessitating effective predictive and preventive strategies. Predicting suicidal tendencies is a complex endeavor, as it involves multifaceted interactions ... 详细信息
来源: 评论
A Machine Learning Method for Detecting Behavior-Based Malware  5
A Machine Learning Method for Detecting Behavior-Based Malwa...
收藏 引用
5th International Conference on Inventive Research in Computing Applications, ICIRCA 2023
作者: Venkatarao, Javvaji Deeban Chakravarthy, V. Ramya, Singaraju Siva Prasad, V. Cherukuvada, Srikanth Soujanya, Annaram Sree Vidyanikethan Engineering College Dept. of Computer Science and Engineering Tirupati517 102 India Srm Institute of Science and Technology Department of Computing Technologies Chennai India School of Computing Srm Institute of Science and Technology Department of Computing Technologies Chennai India Mohan Babu University Dept. of Ai&ml Tirupati India School of Computing Srm Institute of Scienceand Technology Department of Networking and Communications Chennai India Cvr College of Engineering Department of Computer Science and Engineering Telangana India
While malware has posed a danger to businesses for years, advances in malware detection have lagged. Malware can cause damage to a system by starting unneeded services, which increases the system's workload and pr... 详细信息
来源: 评论
Next Sentence Prediction: The Impact of Preprocessing Techniques in Deep Learning  10
Next Sentence Prediction: The Impact of Preprocessing Techni...
收藏 引用
10th International Conference on computer, Control, Informatics and its Applications, IC3INA 2023
作者: Yuyun Latief, Andi Djalal Sampurno, Tri Hazriani Arisha, Andriansyah Oktafiandi Mushaf National Research and Innovation Agency Research Center for Data and Information Science Bandung Indonesia National Research and Innovation Agency Research Center for Data and Information Science Jakarta Indonesia Handayani University Dept. of Computer System Makassar Indonesia Dipa Makassar University Dept. of Informatics Management Makassar Indonesia
Text preprocessing in the field of Natural Language Processing (NLP) plays a crucial role in enhancing the model's ability to understand given tasks. This process helps in avoiding potential errors that could inte... 详细信息
来源: 评论
Blockchain Integration for Robust Intellectual Property Protection in New Product Development (NPD)  3
Blockchain Integration for Robust Intellectual Property Prot...
收藏 引用
3rd International Conference on Electronics and Renewable systems, ICEARS 2025
作者: Chinnasamy, P. Subashini, B. Nijanthan, Nijanthan Madasamy Raja, G. Swetha, Devulapally Sreenivasulu Reddy, L. School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India School of Computing Srmist Department of Data Science and Business Systems Kattankulathur India Paavai Engineering College Tamilnadu Namakkal India Paavai Engineering College Tamilnadu Namakkal India Vaagdevi Engineering College Dept. of Computer Science and Engineering Warangal Dist. Telangana Bolli Kunta506005 India School of Advanced Sciences Kalasalingam Academy of Research and Education Department of Mathematics Tamilnadu Krishnankoil India
The rapid advancement of Blockchain technology has led to its widespread application in several domains of digital activities, such as e-government concerns and monetary security. This article presents a smart contrac... 详细信息
来源: 评论
RL-Driven Fine-Grained Power Gating for Modern Processors Using Multi-Layer Perceptron Models
RL-Driven Fine-Grained Power Gating for Modern Processors Us...
收藏 引用
IEEE International Symposium on Quality Electronic Design
作者: Naman Kalra Jaynarayan T Tudu Dept. of Electrical Engineering Indian Institute of Technology Tirupati India Dept. of Computer Science Engineering Indian Institute of Technology Tirupati India
This paper introduces an RL-driven algorithm for fine-grained power gating of functional units in superscalar processors. The proposed algorithm leverages a Multi-Layer Perceptron (MLP) neural network as a policy mode... 详细信息
来源: 评论