咨询与建议

限定检索结果

文献类型

  • 16,204 篇 会议
  • 2,513 篇 期刊文献
  • 147 册 图书

馆藏范围

  • 18,864 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,292 篇 工学
    • 7,620 篇 计算机科学与技术...
    • 6,363 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 1,888 篇 控制科学与工程
    • 1,718 篇 电子科学与技术(可...
    • 1,705 篇 电气工程
    • 1,167 篇 生物工程
    • 1,033 篇 生物医学工程(可授...
    • 885 篇 光学工程
    • 757 篇 机械工程
    • 701 篇 动力工程及工程热...
    • 691 篇 仪器科学与技术
    • 575 篇 化学工程与技术
    • 477 篇 安全科学与工程
    • 421 篇 交通运输工程
    • 377 篇 材料科学与工程(可...
  • 5,819 篇 理学
    • 3,033 篇 数学
    • 1,787 篇 物理学
    • 1,280 篇 生物学
    • 995 篇 统计学(可授理学、...
    • 669 篇 系统科学
    • 579 篇 化学
  • 2,756 篇 管理学
    • 1,699 篇 管理科学与工程(可...
    • 1,212 篇 图书情报与档案管...
    • 891 篇 工商管理
  • 870 篇 医学
    • 764 篇 临床医学
    • 712 篇 基础医学(可授医学...
    • 451 篇 药学(可授医学、理...
    • 367 篇 公共卫生与预防医...
  • 501 篇 法学
    • 399 篇 社会学
  • 328 篇 经济学
  • 239 篇 农学
  • 208 篇 教育学
  • 78 篇 文学
  • 44 篇 军事学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 558 篇 accuracy
  • 410 篇 deep learning
  • 401 篇 feature extracti...
  • 393 篇 computational mo...
  • 292 篇 support vector m...
  • 285 篇 training
  • 279 篇 real-time system...
  • 262 篇 internet of thin...
  • 227 篇 machine learning
  • 220 篇 optimization
  • 219 篇 predictive model...
  • 197 篇 computer science
  • 196 篇 computer archite...
  • 181 篇 reliability
  • 179 篇 convolutional ne...
  • 177 篇 neural networks
  • 176 篇 wireless communi...
  • 170 篇 data mining
  • 162 篇 routing
  • 158 篇 throughput

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 82 篇 national centre ...
  • 82 篇 tno technical sc...
  • 79 篇 infn sezione di ...
  • 79 篇 nikhef national ...
  • 78 篇 university würzb...
  • 78 篇 university of jo...
  • 76 篇 infn sezione di ...
  • 76 篇 université de st...
  • 66 篇 università di ca...
  • 65 篇 ncsr demokritos ...
  • 64 篇 university moham...
  • 54 篇 university moham...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 41 篇 university of gr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 82 篇 kalekin o.
  • 82 篇 díaz a.f.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 81 篇 chen a.
  • 81 篇 gozzini s.r.
  • 81 篇 dallier r.
  • 78 篇 anguita m.
  • 78 篇 enzenhöfer a.
  • 76 篇 boettcher m.
  • 75 篇 celli s.
  • 73 篇 aly z.
  • 72 篇 dornic d.
  • 70 篇 huang f.
  • 69 篇 carretero v.

语言

  • 17,740 篇 英文
  • 861 篇 其他
  • 190 篇 中文
  • 51 篇 日文
  • 21 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Engineering and Informatics and Computer Technology"
18864 条 记 录,以下是671-680 订阅
排序:
Smart Roads: U-Turn Accident Prevention System  4
Smart Roads: U-Turn Accident Prevention System
收藏 引用
4th International Conference on Electronics and Sustainable Communication Systems, ICESC 2023
作者: Johnson, Neena Ancy Jenifer, J. Khan, Aanya Jyothi, Akhila Karunya Institute of Technology and Sciences Dept. of Computer Science and Engineering Coimbatore India
When discussing statistics of everyday road accidents in India, a very large contributing factor is accidents in hilly areas due to hairpin bends. These blind turns are highly dangerous and may more often than not res... 详细信息
来源: 评论
Drug Authentication and Counterfeit Drug Detection Using Blockchain  7
Drug Authentication and Counterfeit Drug Detection Using Blo...
收藏 引用
2023 7th International Conference On Computing, Communication, Control And Automation, ICCUBEA 2023
作者: Chandras, Atharva Agrawal, Satyam Chaudhary, Mithil Deshmukh, Anushka Shinde, Shilpa Ramrao Adik Institute of Technology Dept. of Computer Engineering Navi Mumbai India
Drug counterfeiting is a worldwide phenomenon which affects practically every industry involved with the healthcare sector in both developed and developing countries. This widespread smuggling and usage of counterfeit... 详细信息
来源: 评论
Deep Learning with Encoders for Intrusion Detection Systems (IDS)  10
Deep Learning with Encoders for Intrusion Detection Systems ...
收藏 引用
17th INDIACom;2023 10th International Conference on Computing for Sustainable Global Development, INDIACom 2023
作者: Budania, Vijay Ahmed, Mushtaq Verma, Anshita Malaviya National Institute of Technology Dept. of Computer Science and Engineering Jaipur India
An Intrusion Detection System (IDS) is often used to keep safe and efficiently utilise communication network. And generally this is achieved by monitoring the network regularly for possible intrusions. Nowadays in net... 详细信息
来源: 评论
An Incremental Algorithm for (2-ϵ)-Approximate Steiner Tree Requiring O(n) Update Time  11
An Incremental Algorithm for (2-ϵ)-Approximate Steiner Tree...
收藏 引用
11th International Symposium on Computing and Networking, CANDAR 2023
作者: Raikwar, Hemraj Karmakar, Sushanta Indian Institute of Technology Guwahati Dept. of Computer Science and Engineering Guwahati India
Given an undirected connected weighted graph with non-negative edge weights and a subset of vertices called terminals, the goal of the Steiner tree problem is to find a tree that spans the terminals such that the weig... 详细信息
来源: 评论
5G the Missing Piece in Digital Transformation of the Construction Sector  28
5G the Missing Piece in Digital Transformation of the Constr...
收藏 引用
28th International computer Science and engineering Conference, ICSEC 2024
作者: Chnaidini, Shaik Khan, M. Jebran Ullah, Fasee Khan, Arafat Ahmad Prashar, Deepak Gulf American University Dept. of Civil Engineering Fujairah United Arab Emirates Sarhad University of Science and Information Technology Dept of Computing and Information Technology Peshawar Pakistan Uinversiti Teknology Petronas Dept. of Computer and Information Sciences Seri Iskandar Malaysia Khonkaen University Dept. of Computer Science Khon Kaen Thailand Lovely Professional University Dept. of Computer Science and Engineering Punjab India
The 5th generation of wireless technology with a continuum leap rushing towards the future in the world of communication has a puzzle that enables the autonomous machine to work in site making a louder voice that show... 详细信息
来源: 评论
Hate Speech Detection in Indian Languages: A Brief Survey  2
Hate Speech Detection in Indian Languages: A Brief Survey
收藏 引用
2nd IEEE International Conference on Data, Decision and Systems, ICDDS 2023
作者: Rameez Mohammed, A. Madhukumar, S.D. National Institute of Technology Dept. of Computer Science and Engineering Kerala Calicut India
Social media has revolutionized communication and content publishing. Anonymity and mobility afforded by social media is also an effective medium for dissemination of hate messages, which can lead to undesired outcome... 详细信息
来源: 评论
Pseudonymous Decentralised Reputation System  9
Pseudonymous Decentralised Reputation System
收藏 引用
9th International Conference on Smart Computing and Communications, ICSCC 2023
作者: Nalini, N. Kumar, Anshul Sharma, Megha Sil, Aniruddha Khan, Womika Nitte Meenakshi Institute of Technology Dept. of Computer Science & Engineering Bangalore India
In this paper, we propose a novel pseudonymous decentralized reputation system that aims to establish trust within decentralized networks. The system allows users to maintain pseudonymous identities while ensuring the... 详细信息
来源: 评论
An Efficient Deep Learning Technique for Intrusion Detection in Wireless Sensor Network  3
An Efficient Deep Learning Technique for Intrusion Detection...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Kumari, Prity Tiwari, Rakesh Kumar Technocrats Institute of Technology and Science Dept. of Computer Science Engineering Bhopal India
Predicting intrusion detection in a wireless sensor network (WSN) involves using machine learning algorithms to analyze network traffic data and predict whether an intrusion or security breach will occur. The goal of ... 详细信息
来源: 评论
A Cluster-based Virtual Edge Computation Offloading Scheme for MEC-enabled Vehicular Networks  26
A Cluster-based Virtual Edge Computation Offloading Scheme f...
收藏 引用
26th Pan-Hellenic Conference on informatics, PCI 2022
作者: Sotiriadis, Leontios Mamalis, Basilis Pantziou, Grammati University of West Attica Dept. of Informatics and Computer Engineering Greece
Internet of Vehicles (IoV) has received a great deal of attention in recent years from many researchers. Recently, vehicular edge computing has been a new paradigm to support computation-intensive and latency-sensitiv... 详细信息
来源: 评论
Cloud engineering-based on Machine Learning Model for SQL Injection Attack
Cloud Engineering-based on Machine Learning Model for SQL In...
收藏 引用
2023 International Conference on Communication, Circuits, and Systems, IC3S 2023
作者: Singh, Kavita Kokardekar, Sakshi Khonde, Gunjan Dekate, Prajakta Badkas, Nishita Lachure, Sagar Yeshwantrao Chavan College of Engineering Dept. of Computer Technology Mh Nagpur India
The entire IT sector has been altered by Cloud engineering, which is also continually coming up with new, creative solutions to everyday issues. A systematic method for the commoditization, standardization, and govern... 详细信息
来源: 评论