咨询与建议

限定检索结果

文献类型

  • 30,832 篇 会议
  • 5,152 篇 期刊文献
  • 250 册 图书

馆藏范围

  • 36,234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,818 篇 工学
    • 15,827 篇 计算机科学与技术...
    • 13,305 篇 软件工程
    • 5,810 篇 信息与通信工程
    • 3,521 篇 控制科学与工程
    • 2,701 篇 电子科学与技术(可...
    • 2,679 篇 电气工程
    • 2,347 篇 生物工程
    • 1,880 篇 生物医学工程(可授...
    • 1,556 篇 光学工程
    • 1,466 篇 机械工程
    • 1,332 篇 动力工程及工程热...
    • 1,270 篇 仪器科学与技术
    • 1,245 篇 化学工程与技术
    • 1,121 篇 建筑学
    • 1,096 篇 土木工程
    • 1,035 篇 安全科学与工程
    • 958 篇 材料科学与工程(可...
  • 11,901 篇 理学
    • 6,331 篇 数学
    • 3,251 篇 物理学
    • 2,605 篇 生物学
    • 2,114 篇 统计学(可授理学、...
    • 1,366 篇 系统科学
    • 1,255 篇 化学
  • 5,796 篇 管理学
    • 3,468 篇 管理科学与工程(可...
    • 2,614 篇 图书情报与档案管...
    • 1,945 篇 工商管理
  • 1,599 篇 医学
    • 1,386 篇 临床医学
    • 1,294 篇 基础医学(可授医学...
    • 840 篇 药学(可授医学、理...
  • 1,054 篇 法学
    • 845 篇 社会学
  • 693 篇 经济学
  • 543 篇 农学
  • 456 篇 教育学
  • 156 篇 文学
  • 78 篇 军事学
  • 43 篇 艺术学
  • 3 篇 哲学

主题

  • 1,076 篇 accuracy
  • 829 篇 feature extracti...
  • 828 篇 computational mo...
  • 714 篇 deep learning
  • 676 篇 computer science
  • 671 篇 training
  • 513 篇 real-time system...
  • 508 篇 support vector m...
  • 503 篇 machine learning
  • 442 篇 predictive model...
  • 409 篇 internet of thin...
  • 355 篇 convolutional ne...
  • 349 篇 data models
  • 339 篇 computer archite...
  • 329 篇 reliability
  • 312 篇 optimization
  • 282 篇 data mining
  • 277 篇 routing
  • 254 篇 wireless sensor ...
  • 249 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 tno technical sc...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 62 篇 dept. of informa...
  • 60 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 48 篇 dept. of compute...
  • 48 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 44 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 80 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 69 篇 huang f.
  • 66 篇 dallier r.
  • 60 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 34,205 篇 英文
  • 1,546 篇 其他
  • 331 篇 中文
  • 104 篇 日文
  • 46 篇 朝鲜文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Civil Engineering and Computer Science Engineering"
36234 条 记 录,以下是351-360 订阅
排序:
Proposal of Healthcare System for Pathological Symptom Detection Employing Voice Analysis
Proposal of Healthcare System for Pathological Symptom Detec...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Liu, Chenyang Liu, Jiang Shimamoto, Shigeru Dept. Computer Science and Communications Engineering Graduate school of Fundamental Science and Engineering Waseda University Tokyo Japan
Mobile healthcare has attracted significant attention in recent years as people have become more health-conscious. Furthermore, there is an increasing demand for non-contact and non-invasive diagnostic methods to redu... 详细信息
来源: 评论
Parametric Cyber Defense: A Sophisticated Machine Learning Architecture for Advanced Intrusion Detection and Threat Classification  5
Parametric Cyber Defense: A Sophisticated Machine Learning A...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Lakshmi, S. Maalan, M.R. Kishore Kumar, R. St. Joseph's College of Engineering Dept. of Computer Science Engineering Chennai India
In contemporary network environments, effective countermeasures against cybersecurity threats require highly effective Intrusion Detection Systems (IDS). This paper proposes an advanced methodology to enhance IDS by e... 详细信息
来源: 评论
A Survey on Blockchain-Based Certificate Authentication System: From Traditional to Digital  4
A Survey on Blockchain-Based Certificate Authentication Syst...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Saraswathi, R Vijaya Vasavi Swathi, Meda Venkata Punwatkar, Sakshi Manoj Konduru, Shreya Sami, Mohammed Abdul Vnr Vignana Jyothi Institute of Engineering and Technology Dept. Of Computer Science and Engineering Hyderabad India
This research study pertains to the essential problems of certificate authentication within academic organizations. It concentrates on the major issues of forgery and inefficiencies as well as administrative bottlenec... 详细信息
来源: 评论
Cardiac Disease Diagnosis from Echocardiogram using Random Forest Classifier  5
Cardiac Disease Diagnosis from Echocardiogram using Random F...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Shruthi, T. Srimathi, P. Janani, S. St. Joseph's College of Engineering Dept. of Computer Science Engineering Chennai India
Cardiovascular diseases (CVDs) represent a leading global health issue, necessitating early detection and accurate diagnosis for effective treatment. Electrocardiography (ECG) serves as an essential tool that provides... 详细信息
来源: 评论
Prediction Model for Suicidal Behavior Disorder Risk Analysis by Correlating Cyber and Real World Data  4
Prediction Model for Suicidal Behavior Disorder Risk Analysi...
收藏 引用
4th IEEE International Conference on Emerging Techniques in Computational Intelligence, ICETCI 2024
作者: Neelakantam, Gone Ecole Centrale School of Engineering Mahindra University Dept. Computer Science and Engineering Hyderabad India
In the era of internet of things (IoT), people are attentive to express their non verbal behavior on cyber world such as social media by using smart phone, laptop or tablet. People are more active in sharing their dai... 详细信息
来源: 评论
A Mobile Application for the Crowdsensing of Road Pavements Conditions  22
A Mobile Application for the Crowdsensing of Road Pavements ...
收藏 引用
22nd IEEE Consumer Communications and Networking Conference, CCNC 2025
作者: Delnevo, Giovanni Bartolucci, Nicola Mirri, Silvia Salomoni, Paola Prandi, Catia University of Bologna Dept. of Computer Science and Engineering Italy University of Bologna Bachelor Degree in Computer Science and Engineering Italy
Urban environments face significant challenges due to deteriorating road pavements, affecting all transportation modes' safety and comfort. Traditional methods of road assessment are costly and infrequent, but adv... 详细信息
来源: 评论
'Vulnerabilities in Smart Contracts: A Detailed Survey of Detection and Mitigation Methodologies'
'Vulnerabilities in Smart Contracts: A Detailed Survey of De...
收藏 引用
2024 IEEE International Conference on Emerging Technologies in computer science for Interdisciplinary Applications, ICETCS 2024
作者: Kumar, Nayantara K Honnungar, Niranjan V Sharwari Prakash, M. Lohith, J.J. B.M.S. College of Engineering Dept. of Computer Science and Engineering Bangalore India
In the ever-changing world of blockchain technology, the emergence of smart contracts has completely transformed the way agreements are executed, offering the potential for automation and trust in decentralized system... 详细信息
来源: 评论
PhishGuard: A Convolutional Neural Network-Based Model for Detecting Phishing URLs with Explainability Analysis  3
PhishGuard: A Convolutional Neural Network-Based Model for D...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Islam, Md Robiul Islam, Md Mahamodul Afrin, Mst. Suraiya Antara, Anika Tabassum, Nujhat Amin, Al Uttara University Dept. of Computer Science and Engineering Dhaka Bangladesh University of Oslo Dept. of Informatics Oslo Norway Dept. of Building Engineering and Construction Management Khulna Bangladesh BRAC University Dept. of Electrical and Electronics Engineering Dhaka Bangladesh North South University Dept. of Electrical and Computer Engineering Dhaka Bangladesh Dept. of Computer Science American International Dhaka Bangladesh
Cybersecurity is one of the global issues because of the extensive dependence on cyber systems of individuals, industries, and organizations. Among the cyber attacks, phishing is increasing tremendously and affecting ... 详细信息
来源: 评论
Evaluating the Performance of Machine Learning Models in Handwritten Signature Verification
Evaluating the Performance of Machine Learning Models in Han...
收藏 引用
2024 Asia Pacific Conference on Innovation in Technology, APCIT 2024
作者: Akter, Tahmina Akter, Mst. Sharmin Mahmud, Tanjim Chakma, Rishita Hossain, Mohammad Shahadat Andersson, Karl Port City International University Dept. of Computer Science and Engineering Chittagong Bangladesh Rangamati Science and Technology University Dept. of Computer Science and Engineering Rangamati4500 Bangladesh University of Chittagong Dept. of Computer Science and Engineering Chittagong4331 Bangladesh Luleå University of Technology Cybersecurity Laboratory Luleå97187 Sweden
Handwritten signatures remain a widely used method for personal authentication in various official documents, including bank checks and legal papers. The verification process is often labor-intensive and time-consumin... 详细信息
来源: 评论
Predictive Modeling of Cryptocurrency Prices Using Machine Learning Algorithms  15
Predictive Modeling of Cryptocurrency Prices Using Machine L...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Mahmud, Tanjim Akter, Tahmina Chakma, Rishita Barua, Tikle Hossain, Mohammad Shahadat Andersson, Karl Dept. of Computer Science and Engineering Rangamati Science and Technology University Rangamati4500 Bangladesh Dept. of Computer Science and Engineering Port City International University Chittagong Bangladesh Dept. of Computer Science and Engineering University of Chittagong Chittagong4331 Bangladesh Cybersecurity Laboratory Luleå University of Technology Luleå97187 Sweden
Cryptocurrencies, such as Bitcoin, Binance, Ethereum, FTX, and XRP, are decentralized digital assets known for their volatile nature and potential as investment instruments. Accurate price prediction is crucial for in... 详细信息
来源: 评论