咨询与建议

限定检索结果

文献类型

  • 22,374 篇 会议
  • 3,583 篇 期刊文献
  • 210 册 图书

馆藏范围

  • 26,167 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,013 篇 工学
    • 11,279 篇 计算机科学与技术...
    • 9,442 篇 软件工程
    • 4,331 篇 信息与通信工程
    • 2,540 篇 控制科学与工程
    • 2,175 篇 电子科学与技术(可...
    • 2,157 篇 电气工程
    • 1,538 篇 生物工程
    • 1,320 篇 生物医学工程(可授...
    • 1,135 篇 光学工程
    • 1,033 篇 机械工程
    • 895 篇 仪器科学与技术
    • 863 篇 动力工程及工程热...
    • 743 篇 化学工程与技术
    • 637 篇 安全科学与工程
    • 531 篇 交通运输工程
    • 473 篇 材料科学与工程(可...
  • 8,287 篇 理学
    • 4,554 篇 数学
    • 2,430 篇 物理学
    • 1,705 篇 生物学
    • 1,393 篇 统计学(可授理学、...
    • 932 篇 系统科学
    • 758 篇 化学
  • 4,054 篇 管理学
    • 2,442 篇 管理科学与工程(可...
    • 1,851 篇 图书情报与档案管...
    • 1,286 篇 工商管理
  • 1,077 篇 医学
    • 952 篇 临床医学
    • 886 篇 基础医学(可授医学...
    • 572 篇 药学(可授医学、理...
  • 716 篇 法学
    • 565 篇 社会学
  • 454 篇 经济学
    • 452 篇 应用经济学
  • 354 篇 教育学
  • 326 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 730 篇 accuracy
  • 543 篇 feature extracti...
  • 502 篇 deep learning
  • 493 篇 computational mo...
  • 389 篇 training
  • 385 篇 support vector m...
  • 370 篇 computer science
  • 326 篇 internet of thin...
  • 311 篇 computer archite...
  • 300 篇 real-time system...
  • 289 篇 machine learning
  • 248 篇 predictive model...
  • 229 篇 reliability
  • 226 篇 routing
  • 221 篇 convolutional ne...
  • 217 篇 optimization
  • 206 篇 neural networks
  • 205 篇 data mining
  • 204 篇 throughput
  • 188 篇 image segmentati...

机构

  • 86 篇 dept. of compute...
  • 84 篇 institut univers...
  • 84 篇 université de st...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 80 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 66 篇 university würzb...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 49 篇 university of jo...
  • 48 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...
  • 42 篇 university moham...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 91 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 75 篇 dallier r.
  • 72 篇 anguita m.
  • 61 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 59 篇 boettcher m.
  • 55 篇 celli s.
  • 52 篇 aly z.
  • 48 篇 dornic d.

语言

  • 23,310 篇 英文
  • 2,487 篇 其他
  • 271 篇 中文
  • 80 篇 日文
  • 21 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Technology and Computer Architecture"
26167 条 记 录,以下是41-50 订阅
排序:
Enhancing Data Security in Mobile Traffic Networks Through Reverse Engineering  4
Enhancing Data Security in Mobile Traffic Networks Through R...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Islam, Syed Arif Mohankumar, M. Khatuna Jannat, Umma Karpagam Academy of Higher Education Dept. of Computer Science Coimbatore India Sns College of Technology Dept. of Computer Application Coimbatore India
This research enhances mobile traffic network security using reverse engineering and encryption. It analyzes vulnerabilities in evolving mobile protocols (GSM, 4G, 5G) and applies encryption schemes like AES and RSA t... 详细信息
来源: 评论
Utilising Convolutional Neural Networks for the Automated Detection of Diabetic Retinopathy
Utilising Convolutional Neural Networks for the Automated De...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Lakshmi, R Poornima Shopika, S. Yaazhini, A. Hemalatha, M. Saraswathi, V. Ponnusamy, R. Chennai Institute of Technology Dept. of Computer Science and Engineering Tamil Nadu India Chennai Institute of Technology Dept. of Computer Science and Engineering Tamilnadu Chennai India
Diabetic retinopathy has emerged as one of the leading causes of eye diseases among people suffering from long-term diabetes. Indeed, it raises the risk of being blinded without proper detection and treatment. Convent... 详细信息
来源: 评论
Computational Web Drug Discovery Application forSARS- Cov-2 Disease Using Predictive and Analytical Approach  10
Computational Web Drug Discovery Application forSARS- Cov-2 ...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Hemkiran, S. Kartik, R. Aswath, S. Rathan Kabilan, K. Sudha Sadasivam, G. Psg Institute of Technology and Applied Research Dept. of Computer Science and Engineering Coimbatore India Psg College of Technology Dept. of Computer Science and Engineering Coimbatore India
In response to the urgent need for coronavirus treatments, this research focuses on leveraging bioactivity data collection and processing for efficient drug discovery, employing computational methods to predict potent... 详细信息
来源: 评论
A Review of Disease Detection in Sugarcane Using Machine Learning and Deep Learning Techniques  15
A Review of Disease Detection in Sugarcane Using Machine Lea...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Pavan, Undavalli Chandra Pateriya, R.K. Tomar, Deepak Singh Singh, Surendra Maulana Azad National Institute of Technology Dept. of computer science & engineering Bhopal India National Institute of Technology Dept. of computer science & engineering Uttarakhand India
Agriculture has been an active source of food and economic growth, but it faces significant challenges from diseases and climate change. In Indonesia, sugarcane production is severely impacted by viral infections such... 详细信息
来源: 评论
A DNA-based Authentication System for Securing Cloud Data Storage and Transactions  18
A DNA-based Authentication System for Securing Cloud Data St...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Kumar, Tarun Kumar, Prabhat Namasudra, Suyel National Institute of Technology Dept. of Computer Sc. & Engineering Patna India National Institute of Technology Dept. of Computer Sc. & Engineering Agartala India
Cloud computing has grown rapidly, but data breaches and unauthorized account access remain a persistent threat. Commonly used cryptographic authentication methods rely on mathematically complex but computationally in... 详细信息
来源: 评论
Autonomous Social Amenity, Pothole Detection and Reporting  4
Autonomous Social Amenity, Pothole Detection and Reporting
收藏 引用
4th International Multidisciplinary Information technology and Engineering Conference, IMITEC 2024
作者: Mosela, David Olaifa, Moses Owolawi, Pius Malele, Vusi Tshwane University of Technology Dept. Computer Systems Engineering Tshwane South Africa Tshwane University of Technology Dept. of Computer Systems Engineering Tshwane South Africa
Challenges faced by traffic management in many developing nations across the globe is a result of the poor quality of road infrastructure. Inadequate and defective road infrastructure are major contributors to this ef... 详细信息
来源: 评论
Survival Prediction for Patients with Cirrhosis
Survival Prediction for Patients with Cirrhosis
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Sowmiya, X.L. Sanjana, R. Nishintha, A. Pavithra, S. Kannan, Shree Charan Ponnusamy, R. Chennai Institute of Technology Dept. of Computer Science and Engineering Tamilnadu Chennai India Chennai Institute of Technology Dept. of Computer Science and Engineering Tamil Nadu India
Cirrhosis is one of the major causes of death around the world. Hence, the possibility of survival prediction among patients affected by this disease constitutes the principal factor in properly planning treatment and... 详细信息
来源: 评论
Multi-Layered Approach to IoT Cybersecurity in Smart Cities  3
Multi-Layered Approach to IoT Cybersecurity in Smart Cities
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Benjamine, Daniel Anto Madhavan, K. Pavithra, S. Dept. of Computer Science and Engineering Chennai Institute of Technology Chennai India
Internet of Things (IoT) has been rapidly growing over the past years. There have been many cybersecurity challenges faced by IoT-based smart cities in existing work for the energy, health and transportation sectors. ... 详细信息
来源: 评论
Utilization of Decentralized Finance (DeFi) and Distributed Ledger technology (DLT) in Banking operations
Utilization of Decentralized Finance (DeFi) and Distributed ...
收藏 引用
2024 International Conference on Intelligent Computing and Sustainable Innovations in technology, IC-SIT 2024
作者: Kumar, Ch Sree Singh, Akhilendra Pratap Reddy, K Hemant K National Institute of Technology Meghalaya Dept. of Computer Science Meghalaya India VIT-AP Dept. of Computer Science and Engineering Vijayawada India
Distributed Ledger technology (DLT) is a decentralized database system where transactions are recorded and verified across multiple nodes. Its key features include immutability, time-stamping, and consensus-based vali... 详细信息
来源: 评论
Formal Modeling and Verification of Justification and Finalization of Checkpoints in Ethereum 2.0 Beacon Chain  1
Formal Modeling and Verification of Justification and Finali...
收藏 引用
1st IEEE Karachi Section Humanitarian technology Conference, Khi-HTC 2024
作者: Rashid, Muhammad Rasool, Imran Zafar, Nazir Ahmad Afzaal, Hamra Comsats University Islamabad Dept. of Computer Science Sahiwal Campus Pakistan Information Technology University Dept. of Computer Science Lahore Pakistan
New to the Ethereum platform with version 2.0 is the Beacon chain. Validator status, attestation information, and many more are maintained via the proof-of-stake (PoS) consensus protocol, which is relied upon. The Eth... 详细信息
来源: 评论