咨询与建议

限定检索结果

文献类型

  • 30,445 篇 会议
  • 4,813 篇 期刊文献
  • 239 册 图书

馆藏范围

  • 35,497 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,968 篇 工学
    • 15,895 篇 计算机科学与技术...
    • 13,358 篇 软件工程
    • 5,862 篇 信息与通信工程
    • 3,473 篇 控制科学与工程
    • 2,676 篇 电子科学与技术(可...
    • 2,629 篇 电气工程
    • 2,373 篇 生物工程
    • 1,914 篇 生物医学工程(可授...
    • 1,552 篇 光学工程
    • 1,352 篇 机械工程
    • 1,224 篇 动力工程及工程热...
    • 1,207 篇 仪器科学与技术
    • 1,017 篇 化学工程与技术
    • 874 篇 安全科学与工程
    • 743 篇 交通运输工程
  • 11,270 篇 理学
    • 6,106 篇 数学
    • 3,072 篇 物理学
    • 2,599 篇 生物学
    • 2,043 篇 统计学(可授理学、...
    • 1,327 篇 系统科学
    • 1,091 篇 化学
  • 5,695 篇 管理学
    • 3,317 篇 管理科学与工程(可...
    • 2,661 篇 图书情报与档案管...
    • 1,831 篇 工商管理
  • 1,632 篇 医学
    • 1,413 篇 临床医学
    • 1,317 篇 基础医学(可授医学...
    • 864 篇 药学(可授医学、理...
    • 690 篇 公共卫生与预防医...
  • 1,050 篇 法学
    • 845 篇 社会学
  • 652 篇 经济学
    • 652 篇 应用经济学
  • 494 篇 农学
  • 428 篇 教育学
  • 158 篇 文学
  • 79 篇 军事学
  • 39 篇 艺术学
  • 2 篇 哲学

主题

  • 1,140 篇 accuracy
  • 869 篇 computational mo...
  • 862 篇 feature extracti...
  • 741 篇 deep learning
  • 694 篇 training
  • 676 篇 computer science
  • 543 篇 machine learning
  • 541 篇 real-time system...
  • 527 篇 support vector m...
  • 477 篇 predictive model...
  • 421 篇 internet of thin...
  • 376 篇 convolutional ne...
  • 357 篇 data models
  • 348 篇 computer archite...
  • 340 篇 reliability
  • 305 篇 optimization
  • 298 篇 data mining
  • 276 篇 routing
  • 260 篇 wireless sensor ...
  • 250 篇 artificial intel...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 73 篇 tno technical sc...
  • 66 篇 università di ca...
  • 64 篇 université de st...
  • 63 篇 dept. of informa...
  • 60 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 48 篇 dept. of compute...
  • 47 篇 dept. of compute...
  • 46 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 78 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 75 篇 gozzini s.r.
  • 68 篇 huang f.
  • 67 篇 dallier r.
  • 61 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,524 篇 英文
  • 1,561 篇 其他
  • 309 篇 中文
  • 56 篇 日文
  • 50 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science and Engineering With Data Science"
35497 条 记 录,以下是451-460 订阅
排序:
Analysis of Ensemble Machine Learning Models for Fraud Detection
Analysis of Ensemble Machine Learning Models for Fraud Detec...
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Chaurasia, Siddharth Kesharwani, Satyam Sharma, Shanu Sharma, Swati Chugh, Bharti Kiet Group of Institutions Dept. of Computer Science and Engineering Ghaziabad India
Recent developments in electronic payment and e-commerce have led to a rise in digital fraud cases, including credit card fraud. Within the financial services industry, identifying credit card fraud is still a difficu... 详细信息
来源: 评论
SQL Injection Detection using Machine Learning and Convolutional Neural Networks  5
SQL Injection Detection using Machine Learning and Convoluti...
收藏 引用
5th International Conference on Smart Systems and Inventive Technology, ICSSIT 2023
作者: Misquitta, Jason Asha, S. Dept. of Computer Science and Engineering Chennai India
SQL Injection Attacks are a concern to databasedriven online applications because they can compromise the security and integrity of information in databases. It gives hackers the potential to read, delete, modify or c... 详细信息
来源: 评论
Enhanced Security Measures for Image Privacy: Encryption Perspectives  2
Enhanced Security Measures for Image Privacy: Encryption Per...
收藏 引用
2nd International Conference on Intelligent data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Omshith, R. Balaji, Vemisetti Pavan Rahul, Rayapudi Venkata Kumaran, U. Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
A key technology in information security, picture encryption is intended to safeguard the integrity and confidentiality of digital photographs. Using a variety of cryptographic techniques and algorithms, the original ... 详细信息
来源: 评论
Intelligent Video Surveillance System  4
Intelligent Video Surveillance System
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Aryan, Ansh Singh, Dharya Pratap Kumar, Nitish Amity University Dept. of Computer Science and Engineering Uttar Pradesh India
This research study provides the utilization of an intelligent video surveillance system, a sophisticated technology that integrates video cameras, sensors, and cutting-edge software to monitor and analyze activities ... 详细信息
来源: 评论
Leukaemia: A Comparative Analysis of Deep Learning Models Using ALL dataset  6
Leukaemia: A Comparative Analysis of Deep Learning Models Us...
收藏 引用
6th IEEE International Conference on Recent Advances in Intelligent Computational Systems, RAICS 2024
作者: Sudheer, Rhea Vivek, Rapaka Ramesh, Richa Sarvade, Apoorva Kakarla, Sada Preethi, P. Pes University Dept. of Computer Science and Engineering Karnataka Bangalore India
White blood cells, also known as leukocytes, or WBCs, spread abnormally in the bone marrow and blood, resulting in leukaemia (blood cancer). Leukaemia can be identified by pathologists by examining a patient's blo... 详细信息
来源: 评论
Utilizing Genetic-Neural System Fusion for Advanced Prediction and Classification of Damage Intensity in Road Traffic Accidents  2
Utilizing Genetic-Neural System Fusion for Advanced Predicti...
收藏 引用
2nd International Conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Rahi, Parvez Kang, Sandeep Singh Singh, Ajay Pal Singh, Inderjeet Chandigarh University Dept. of Computer Science & Engineering Punjab Mohali India
This study proposes an analysis and prediction framework for road traffic accidents (RTAs) in the hilly terrain of Himachal Pradesh and several states in, India, integrating machine learning techniques such as neural ... 详细信息
来源: 评论
ConfigMaster: An Interactive Solution for System Management  8
ConfigMaster: An Interactive Solution for System Management
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Ganapathi, Ananya Sivakumar, Parikshith Divya, K.V. Elango, Aditya Gupta, Hardik Amrita School of Computing Dept. of Computer Science Engineering Bengaluru India
The 'ConfigMaster: An interactive solution for system management' is a simple utility written using Bash scripting. It is designed for Unix-like systems. The tool lets users easily configure system settings an... 详细信息
来源: 评论
Text-Based Sentimental Analysis to Understand User Experience Using Machine Learning Approaches  9
Text-Based Sentimental Analysis to Understand User Experienc...
收藏 引用
9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023
作者: Gokulapriya, R. Sambandam, Rakoth Kandan Balamurugan, M. Dept. of Computer Science and Engineering Bengaluru India
data Analysis is turning into a driving force in every industry. It is a process in which data is analyzed in multiple ways to come to certain conclusions for the given situation. Sentiment analysis can be said to be ... 详细信息
来源: 评论
An Advanced computer Vision Model for Aiding Automobile in Traffic Sign Classification  1
An Advanced Computer Vision Model for Aiding Automobile in T...
收藏 引用
1st IEEE International Conference on Computing and data science, ICCDS 2024
作者: Vignesh, Veera Satya Pavan Prajith, Kukkadapu Sai Gokul, Goddati Parthav Adarsh, Cherukuri Rajareddy, Goluguri N. V. GITAM Deemed to be University Dept. of Computer Science & Engineering Visakhapatnam India
Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-... 详细信息
来源: 评论
Blockchain Based Credit System to Increase the Creditability through Carbon Offset Level  5
Blockchain Based Credit System to Increase the Creditability...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Padmavathi, A. Reddy, G. Charan Santhosh, Gauri Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering Chennai India
Our country has relied significantly on agriculture as its main source of income for several decades. The demand for food and crops is growing due to the growing population, which offers the agriculture sector tremend... 详细信息
来源: 评论