咨询与建议

限定检索结果

文献类型

  • 30,446 篇 会议
  • 4,810 篇 期刊文献
  • 239 册 图书

馆藏范围

  • 35,495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,962 篇 工学
    • 15,889 篇 计算机科学与技术...
    • 13,363 篇 软件工程
    • 5,852 篇 信息与通信工程
    • 3,466 篇 控制科学与工程
    • 2,672 篇 电子科学与技术(可...
    • 2,625 篇 电气工程
    • 2,373 篇 生物工程
    • 1,913 篇 生物医学工程(可授...
    • 1,553 篇 光学工程
    • 1,354 篇 机械工程
    • 1,225 篇 动力工程及工程热...
    • 1,208 篇 仪器科学与技术
    • 1,017 篇 化学工程与技术
    • 874 篇 安全科学与工程
    • 743 篇 交通运输工程
  • 11,267 篇 理学
    • 6,105 篇 数学
    • 3,069 篇 物理学
    • 2,601 篇 生物学
    • 2,043 篇 统计学(可授理学、...
    • 1,327 篇 系统科学
    • 1,086 篇 化学
  • 5,695 篇 管理学
    • 3,319 篇 管理科学与工程(可...
    • 2,659 篇 图书情报与档案管...
    • 1,833 篇 工商管理
  • 1,632 篇 医学
    • 1,413 篇 临床医学
    • 1,320 篇 基础医学(可授医学...
    • 864 篇 药学(可授医学、理...
    • 693 篇 公共卫生与预防医...
  • 1,051 篇 法学
    • 846 篇 社会学
  • 652 篇 经济学
    • 652 篇 应用经济学
  • 494 篇 农学
  • 428 篇 教育学
  • 158 篇 文学
  • 79 篇 军事学
  • 39 篇 艺术学
  • 2 篇 哲学

主题

  • 1,140 篇 accuracy
  • 869 篇 computational mo...
  • 862 篇 feature extracti...
  • 740 篇 deep learning
  • 694 篇 training
  • 676 篇 computer science
  • 541 篇 real-time system...
  • 536 篇 machine learning
  • 527 篇 support vector m...
  • 477 篇 predictive model...
  • 420 篇 internet of thin...
  • 375 篇 convolutional ne...
  • 357 篇 data models
  • 348 篇 computer archite...
  • 339 篇 reliability
  • 305 篇 optimization
  • 298 篇 data mining
  • 276 篇 routing
  • 260 篇 wireless sensor ...
  • 249 篇 visualization

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 74 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 63 篇 dept. of informa...
  • 60 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 50 篇 dept. of compute...
  • 48 篇 dept. of compute...
  • 46 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 78 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 76 篇 gozzini s.r.
  • 68 篇 huang f.
  • 68 篇 dallier r.
  • 62 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,514 篇 英文
  • 1,568 篇 其他
  • 309 篇 中文
  • 56 篇 日文
  • 50 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science and Engineering With Data Science"
35495 条 记 录,以下是981-990 订阅
排序:
Securing Medical Records Using Private Blockchain Technology  5
Securing Medical Records Using Private Blockchain Technology
收藏 引用
5th International Conference on Blockchain Computing and Applications, BCCA 2023
作者: Alothman, Basil Alenezi, Mariam Alhamdan, Danah Almutairat, Mariam Almousa, Zahraa Joumaa, Chibli Khan, Murad Kuwait College of Science and Technology Dept. of Computer Science and Engineering Kuwait-City Kuwait
The term 'electronic medical records' (EMRs) refers to information that is highly confidential and saved electronically. This information is associated with the diagnosis and treatment of a patient, and it mus... 详细信息
来源: 评论
Association Rules Mining for a Specific Time Period in a Day in Large Transactional database  2
Association Rules Mining for a Specific Time Period in a Day...
收藏 引用
2nd International Conference on Information and Communication Technology for Sustainable Development, ICICT4SD 2023
作者: Islam, Md. Rabiul Rahman, Mst. Sahela Nayeem, Md. Julker Pundra University of Science and Technology Dept. of Computer Science and Engineering Bogura5800 Bangladesh
Market basket analysis is a trendy topic in the field of data mining. Analyzing the daily transactions, several types of associations were noticed in the transacted item sets. The transactional database used in retail... 详细信息
来源: 评论
Graph Based Keywords Extraction from Crime data  16
Graph Based Keywords Extraction from Crime Data
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Das, Priyanka Munshi, Anuvab Naha, Annwesha Dey, Adrija Chakraborty, Sriparno Dept. of Computer Application and Science Institute of Engineering & Management Kolkata University of Engineering and Management Kolkata India
It takes a lot of work to gather a large amount of data to help in criminal investigation and prevention of crimes. The most effective methods for reporting crimes are insufficient for both civilians and law enforceme... 详细信息
来源: 评论
Enhanced Brain Tumor Segmentation: A Study on the Efficacy of Multi-Model Ensembling Utilizing Diverse Backbones  26
Enhanced Brain Tumor Segmentation: A Study on the Efficacy o...
收藏 引用
26th International Conference on computer and Information Technology, ICCIT 2023
作者: Islam, Md. Hedayatul Hossain, Md. Rakib Akter, Farzana Srizon, Azmain Yakin Hasan, S. M. Mahedy Faruk, Md. Farukuzzaman Islam, Md. Minhazul Dept. of Electronics & Telecommunication Engineering Rajshahi Bangladesh Dept. of Computer Science & Engineering Rajshahi Bangladesh
Gliomas account for approximately 80% of all malignant brain tumors and are associated with the most unfavourable survival rates amongst all brain tumor types. Segmenting these tumors is integral to evaluating their d... 详细信息
来源: 评论
Predictive Analytics in Agriculture: Unraveling the Determinants of Crop Yield with Machine Learning  26
Predictive Analytics in Agriculture: Unraveling the Determin...
收藏 引用
26th International Conference on computer and Information Technology, ICCIT 2023
作者: Sakib, Shadman Hossain, Md. Rakib Hasan, S. M. Mahedy Akter, Farzana Srizon, Azmain Yakin Faruk, Md. Farukuzzaman Basak, Anindya Dept. of Electronics & Telecommunication Engineering Rajshahi Bangladesh Dept. of Computer Science & Engineering Rajshahi Bangladesh
In the context of Bangladesh, the precision in forecasting crop yields has been enhanced significantly through the integrative approach of amalgamating historical data, environmental variables, and cutting-edge techno... 详细信息
来源: 评论
Blockchain Based Secure and Decentralized Smart Licensing of Charging Vehicles for Rajshahi City Corporation  2
Blockchain Based Secure and Decentralized Smart Licensing of...
收藏 引用
2nd International Conference on Information and Communication Technology for Sustainable Development, ICICT4SD 2023
作者: Haque, Momenul Paul, Subrata Kumer Islam, Kamrul Della, Mursheda Nusrat Paul, Rakhi Rani Fahim, Sultan Bangladesh Army University of Engineering and Technology Dept. of Computer Science and Engineering 6431 Bangladesh University of Rajshahi Dept. of Computer Science and Engineering Rajshahi6205 Bangladesh Rabindra Maitree University Dept. of Computer Science and Engineering Kushtia7000 Bangladesh Bangladesh Army University of Engineering and Technology Dept. of Information and Communication Engineering Bangladesh
The adoption of charging vehicles in Rajshahi has emerged as a significant step towards reducing air pollution and promoting a healthy, green city. However, the current centralized licensing system poses challenges su... 详细信息
来源: 评论
A Time-varying Velocity Control Strategy for Balancing Exploration and Exploitation Behaviour of a Binary PSO
A Time-varying Velocity Control Strategy for Balancing Explo...
收藏 引用
2023 International Conference on Next-Generation Computing, IoT and Machine Learning, NCIM 2023
作者: Siddique, Md. Abu Bakkar Islam, Md. Jakirul DUET Gazipur Dept. of Computer Science and Engineering Gazipur Bangladesh
Combinatorial optimization problems (COPs) are NP-hard, and their solution space is discrete, which poses a significant challenge for optimization algorithms. Binary Particle Swarm Optimization (BPSO) is wel-known opt... 详细信息
来源: 评论
Software Code De-Compilation Techniques and Approaches: A Comparative Study  25
Software Code De-Compilation Techniques and Approaches: A Co...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Fawareh, Hamed Al-Smadi, Yazan Hassan, Mohammad Fawareh, Faid AlNoor Elrashidi, Ali Zarqa University Dept. of Software Engineering Jordan Zarqa University Dept. of Computer Science Jordan Zarqa University Dept. Of Mathmitical Science Jordan University of Business and Technology Dept. of Electrical Engineering Jeddah21432 Saudi Arabia
De-compilation is the process of executable files as input where the de-compilation process tries to get away the source code, or the majority of it, if the file's source code is lost or damaged for whatever cause...
来源: 评论
Multi Layered Defense Architecture for DDoS Protection in Private Cloud Environments  2
Multi Layered Defense Architecture for DDoS Protection in Pr...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Singh, Shashwat Sharma, Anubha Soni, Shani Prakash, Ayushi Ajay Kumar Garg Engineering College Dept. of Computer Science and Engineering Uttar Pradesh Ghaziabad India
Private cloud solutions have increasingly been adopted because of the demand from organizations for enhanced data security, control over regulatory compliance, and IT infrastructure has been rising. Although public cl... 详细信息
来源: 评论
Dynamic Landslide Prediction, Monitoring, and Early Warning with Explainable AI: A Comprehensive Approach  3
Dynamic Landslide Prediction, Monitoring, and Early Warning ...
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Binu, Kristin Elizabeth Anoopkumar, Lakshmi Thampi Sunil, Maria Jose, Merin Preetha, K.G. Rajagiri School of Engineering & Technology Dept. of Computer Science and Engineering Rajagiri Valley PO Kochi India
Landslides are a major threat to infrastructure, human lives, and the environment. Therefore, early warning systems and precise forecasting are essential for reducing their effects. This study investigates how to enha... 详细信息
来源: 评论