咨询与建议

限定检索结果

文献类型

  • 30,445 篇 会议
  • 4,813 篇 期刊文献
  • 239 册 图书

馆藏范围

  • 35,497 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,968 篇 工学
    • 15,895 篇 计算机科学与技术...
    • 13,358 篇 软件工程
    • 5,862 篇 信息与通信工程
    • 3,473 篇 控制科学与工程
    • 2,676 篇 电子科学与技术(可...
    • 2,629 篇 电气工程
    • 2,373 篇 生物工程
    • 1,914 篇 生物医学工程(可授...
    • 1,552 篇 光学工程
    • 1,352 篇 机械工程
    • 1,224 篇 动力工程及工程热...
    • 1,207 篇 仪器科学与技术
    • 1,017 篇 化学工程与技术
    • 874 篇 安全科学与工程
    • 743 篇 交通运输工程
  • 11,270 篇 理学
    • 6,106 篇 数学
    • 3,072 篇 物理学
    • 2,599 篇 生物学
    • 2,043 篇 统计学(可授理学、...
    • 1,327 篇 系统科学
    • 1,091 篇 化学
  • 5,695 篇 管理学
    • 3,317 篇 管理科学与工程(可...
    • 2,661 篇 图书情报与档案管...
    • 1,831 篇 工商管理
  • 1,632 篇 医学
    • 1,413 篇 临床医学
    • 1,317 篇 基础医学(可授医学...
    • 864 篇 药学(可授医学、理...
    • 690 篇 公共卫生与预防医...
  • 1,050 篇 法学
    • 845 篇 社会学
  • 652 篇 经济学
    • 652 篇 应用经济学
  • 494 篇 农学
  • 428 篇 教育学
  • 158 篇 文学
  • 79 篇 军事学
  • 39 篇 艺术学
  • 2 篇 哲学

主题

  • 1,140 篇 accuracy
  • 869 篇 computational mo...
  • 862 篇 feature extracti...
  • 741 篇 deep learning
  • 694 篇 training
  • 676 篇 computer science
  • 543 篇 machine learning
  • 541 篇 real-time system...
  • 527 篇 support vector m...
  • 477 篇 predictive model...
  • 421 篇 internet of thin...
  • 376 篇 convolutional ne...
  • 357 篇 data models
  • 348 篇 computer archite...
  • 340 篇 reliability
  • 305 篇 optimization
  • 298 篇 data mining
  • 276 篇 routing
  • 260 篇 wireless sensor ...
  • 250 篇 artificial intel...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 73 篇 tno technical sc...
  • 66 篇 università di ca...
  • 64 篇 université de st...
  • 63 篇 dept. of informa...
  • 60 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 48 篇 dept. of compute...
  • 47 篇 dept. of compute...
  • 46 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 78 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 75 篇 gozzini s.r.
  • 68 篇 huang f.
  • 67 篇 dallier r.
  • 61 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,524 篇 英文
  • 1,561 篇 其他
  • 309 篇 中文
  • 56 篇 日文
  • 50 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science and Engineering With Data Science"
35497 条 记 录,以下是591-600 订阅
排序:
Analysing Breast Cancer Classification Using Explainable Artificial Intelligence  12
Analysing Breast Cancer Classification Using Explainable Art...
收藏 引用
12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Fardeen, Kazi Bhaduri, Harshadeep Hazra, Soham Mondal, Praloy Manna, Sarbajit Si, Tapas Dept. of Computer Science & Electronics Ramakrishna Mission Vidyamandira Belur Math West Bengal Howrah711202 India Dept. of Computer Science & Engineering University of Engineering & Management Rajasthan Jaipur India
Worldwide, breast cancer is becoming the most serious illness that affects women. It is believed that early diagnosis and treatment of breast cancer can increase survival rates and decrease the need for surgery. Machi... 详细信息
来源: 评论
Routing and Charge Planning Strategies for Ridesharing EV Fleets  11
Routing and Charge Planning Strategies for Ridesharing EV Fl...
收藏 引用
11th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2025
作者: Singh, Ashutosh Gupta, Arobinda Dept. of Computer Science & Engineering Indian Institute of Technology KharagpurWB-721302 India
Ridesharing systems have become an important part of urban transportation. At the same time, electric vehicle (EV) adoption is also growing at a fast pace as an eco-friendly and sustainable transportation option. To o... 详细信息
来源: 评论
The Effects of Selected Preferred Music on Perceived Emotions through Audiovisual Stimuli  9
The Effects of Selected Preferred Music on Perceived Emotion...
收藏 引用
9th IEEE/ACIS International Conference on Big data, Cloud Computing, and data science, BCD 2024
作者: Thaiwong, Thunrada Fukumoto, Makoto Graduate School of Computer Science and Engineering Fukuoka Institute of Technology Fukuoka Japan Fukuoka Institute of Technology Dept. of Computer Science and Engineering Fukuoka Japan
Music surrounds us, and there is no denying that music in visual media can shape and evoke emotions. Yet, understanding how musical preference influences emotions through audio and visual stimuli remains an important ... 详细信息
来源: 评论
Machine Learning Techniques for Identifying Child Abusive Texts in Online Platforms  15
Machine Learning Techniques for Identifying Child Abusive Te...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Mahmud, Tanjim Akter, Tahmina Uddin, Mohammad Kamal Aziz, Mohammad Tarek Hossain, Mohammad Shahadat Andersson, Karl Rangamati Science and Technology University Department of Computer Science and Engineering Rangamati4500 Bangladesh Port City International University Dept. of Computer Science and Engineering Chittagong Bangladesh Chittagong University of Engineering & Technology Department of Computer Science and Engineering Chittagong Bangladesh University of Chittagong Dept. of Computer Science and Engineering Chittagong4331 Bangladesh Luleå University of Technology Cybersecurity Laboratory Luleå97187 Sweden
This study addresses the critical issue of child abuse in digital communications by developing advanced machine learning and deep learning models for detecting child abusive texts in the Bengali language on online pla... 详细信息
来源: 评论
AI-Powered DeepFake Defense  3
AI-Powered DeepFake Defense
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Chaitra, M. Kushal, B. Likhitha, H. Priyanka, H.R. Bnm Institute of Technology Affiliated to Vtu Dept. of Computer Science and Engineering Bengaluru India
Deepfake technology, known for its ability to produce convincingly face-swapped videos, presents significant risks to privacy, security, and public trust. Misuse of this technology for spreading misinformation, defama... 详细信息
来源: 评论
Designing a Secure Audio / Text Based Captcha Using Neural Network  13
Designing a Secure Audio / Text Based Captcha Using Neural N...
收藏 引用
13th International Conference on Cloud Computing, data science and engineering, Confluence 2023
作者: Pai, H. Aditya Anandkumar, M. Prasad, M.S. Guru Agarwal, Jyoti Christa, Sharon Dept. of Computer Science and Engineering Dehradun India Dept. of Computer Application Dehradun India
A CAPTCHA is used to reduce the misuse in the case of rising automated bots or software systems and also to avoid any corruption of the web services. The Captcha is used as solving a turing test problem by the users, ... 详细信息
来源: 评论
Dynamic Charging on the Go: Optimizing Mobile Charging Stations for Electric Vehicle Infrastructure  11
Dynamic Charging on the Go: Optimizing Mobile Charging Stati...
收藏 引用
11th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2025
作者: Jain, Suhas Gupta, Arobinda Dept. of Computer Science & Engineering Indian Institute of Technology WB Kharagpur721302 India
With the growing adoption of electric vehicles (EVs) as an eco-friendly and sustainable means of transportation, availability of adequate EV charging infrastructure has become very important. While fixed charging stat... 详细信息
来源: 评论
A User-manageable Credential System based on Blockchain
收藏 引用
Transactions of the Korean Institute of Electrical Engineers 2022年 第1期71卷 210-217页
作者: Hong, Seongho Kim, Heeyoul Dept. of Computer Science Engineering Kyonggi University Korea Republic of
Credentials are one of the most important things to prove oneself in modern society. As the world goes digital, credentials change its form from paper to digital. However, digital data are easy to be forged and to be ... 详细信息
来源: 评论
Alpha-x Framework for Assessing Network Robustness in Nakagami-m Fading and Co-Channel Interference Environments  3
Alpha-x Framework for Assessing Network Robustness in Nakaga...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Upadhyay, Deepak Siwach, Karan Dhondiyal, Shiv Ashish Upadhyay, Abhay Gupta, Mridul Sharma, Kunj Bihari Graphic Era Hill University Dept. of Computer Science and Engineering Dehradun India G.L. Bajaj Institute of Technology and Management Dept. of Computer Science and Engineering Greater Noida India Graphic Era deemed to be University Dept. of Computer Science and Engineering Dehradun India Graphic Era deemed to be University Dept. of Electronics and Communication Engineering Dehradun India
This article explores how the Alpha-x framework can improve network robustness under Nakagami-m fading and co-channel interference (CI), The study evaluates network performance using key metrics such as outage probabi... 详细信息
来源: 评论
Malware Detection across Clusters
Malware Detection across Clusters
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Manjushree, C.V. Nandakumar, A.N. Vemana Institute of Technology Dept. of Information Science & Engineering India City Engineering College Dept. of Computer Science & Engineering India
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba... 详细信息
来源: 评论