咨询与建议

限定检索结果

文献类型

  • 47,325 篇 会议
  • 8,166 篇 期刊文献
  • 9 篇 科技报告
  • 4 册 图书

馆藏范围

  • 55,504 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35,924 篇 工学
    • 26,339 篇 计算机科学与技术...
    • 22,468 篇 软件工程
    • 8,843 篇 信息与通信工程
    • 5,168 篇 控制科学与工程
    • 3,859 篇 电气工程
    • 3,762 篇 电子科学与技术(可...
    • 3,649 篇 生物工程
    • 3,055 篇 生物医学工程(可授...
    • 2,370 篇 光学工程
    • 2,175 篇 机械工程
    • 1,909 篇 动力工程及工程热...
    • 1,893 篇 仪器科学与技术
    • 1,848 篇 化学工程与技术
    • 1,324 篇 安全科学与工程
    • 1,263 篇 建筑学
    • 1,164 篇 土木工程
    • 1,113 篇 交通运输工程
  • 18,795 篇 理学
    • 10,522 篇 数学
    • 4,939 篇 物理学
    • 4,055 篇 生物学
    • 3,539 篇 统计学(可授理学、...
    • 2,089 篇 系统科学
    • 1,959 篇 化学
  • 9,573 篇 管理学
    • 5,296 篇 管理科学与工程(可...
    • 4,803 篇 图书情报与档案管...
    • 2,994 篇 工商管理
  • 2,466 篇 医学
    • 2,155 篇 临床医学
    • 2,035 篇 基础医学(可授医学...
    • 1,328 篇 药学(可授医学、理...
  • 1,669 篇 法学
    • 1,374 篇 社会学
  • 1,059 篇 经济学
  • 833 篇 农学
  • 799 篇 教育学
  • 223 篇 文学
  • 129 篇 军事学
  • 67 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 1,516 篇 accuracy
  • 1,271 篇 computational mo...
  • 1,249 篇 feature extracti...
  • 1,126 篇 computer science
  • 1,116 篇 training
  • 898 篇 deep learning
  • 883 篇 data mining
  • 871 篇 machine learning
  • 800 篇 data models
  • 779 篇 predictive model...
  • 709 篇 real-time system...
  • 664 篇 support vector m...
  • 554 篇 internet of thin...
  • 523 篇 convolutional ne...
  • 484 篇 computer archite...
  • 443 篇 visualization
  • 432 篇 neural networks
  • 429 篇 reliability
  • 426 篇 semantics
  • 416 篇 optimization

机构

  • 197 篇 department of ph...
  • 193 篇 dept. of physics...
  • 191 篇 dept. of astrono...
  • 191 篇 dept. of physics...
  • 184 篇 iii. physikalisc...
  • 114 篇 dept. of physics...
  • 113 篇 dept. of physics...
  • 92 篇 columbia astroph...
  • 83 篇 institute of inf...
  • 83 篇 dept. of physics...
  • 80 篇 dept. of physics...
  • 79 篇 north-west unive...
  • 78 篇 infn sezione di ...
  • 78 篇 université libre...
  • 77 篇 institut univers...
  • 76 篇 dept. of physics...
  • 76 篇 erlangen centre ...
  • 75 篇 infn sezione di ...
  • 75 篇 département de p...
  • 74 篇 dept. of astrono...

作者

  • 176 篇 haungs a.
  • 174 篇 fürst p.
  • 168 篇 hoshina k.
  • 157 篇 fan k.l.
  • 125 篇 bourbeau e.
  • 117 篇 halve l.
  • 112 篇 huang f.
  • 111 篇 fritz a.
  • 109 篇 gonzalez j.g.
  • 95 篇 chen z.
  • 91 篇 ferrara g.
  • 89 篇 ardid m.
  • 84 篇 calvo d.
  • 81 篇 chen a.
  • 81 篇 de clercq c.
  • 80 篇 alameddine j.m.
  • 80 篇 besson d.z.
  • 79 篇 duvernois m.a.
  • 78 篇 böttcher j.
  • 77 篇 gal t.

语言

  • 53,592 篇 英文
  • 1,230 篇 其他
  • 441 篇 中文
  • 149 篇 日文
  • 89 篇 朝鲜文
  • 5 篇 德文
  • 3 篇 法文
  • 2 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Data Science Dept. of Computer Science and Engineering"
55504 条 记 录,以下是4911-4920 订阅
排序:
Denial of Service (DoS) Attacks in SDN-Based VANETs: A Study
Denial of Service (DoS) Attacks in SDN-Based VANETs: A Study
收藏 引用
International Conference on Parallel Distributed and Grid Computing (PDGC)
作者: Jyotsana Sardana Sunil Kumar Dharminder Kumar Kamlesh Dutta Dept. of Computer Science & Engg Guru Jambeshwar University of Science and Technology Hisar Haryana India Dept. of AI & Data Science Guru Jambeshwar University of Science and Technology Hisar Haryana India Dept. of Computer Science & Engg Gurugram University Gurugram Haryana India Dept. of Computer Science & Engg National Institute of Technology Hamirpur H.P India
Vehicular ad hoc networks (VANETs) play a vital role in ensuring the success of Intelligent transport systems (ITS), but the architecture of VANETs is vulnerable to several security attacks. There are also some challe... 详细信息
来源: 评论
Detection of Web-Attack using DistilBERT, RNN, and LSTM  11
Detection of Web-Attack using DistilBERT, RNN, and LSTM
收藏 引用
11th International Symposium on Digital Forensics and Security, ISDFS 2023
作者: Bokolo, Biodoumoye George Chen, Lei Liu, Qingzhong Sam Houston State University Dept. of Computer Science HuntsvilleTX United States Georgia Southern University Dept. of Info Technology StatesboroGA United States
The rise in usage of the Internet has tremendously helped those who use web applications. Web-based applications are becoming more susceptible to numerous security risks and network vulnerabilities as online attacks c... 详细信息
来源: 评论
Cybersecurity Threat Detection Using Deep Learning and Anomaly Detection Techniques
Cybersecurity Threat Detection Using Deep Learning and Anoma...
收藏 引用
Knowledge engineering and Communication Systems (ICKECS), International Conference on
作者: T. Rajendran N Mohamed Imtiaz K Jagadeesh Balaji Sampathkumar Department of Computer Science and Engineering Rajalakshmi Institute of Technology Chennai India Dept. of Information Science and Engineering Nagarjuna College of Engineering and Technology Bangalore India Dept. of Computer Science and Engineering Sri Venkateswaraa College of Technology Chennai India Dept. of Computer Science and Engineering Akshaya College of Engineering and Technology Coimbatore India
Through the use of combined deep learning and anomaly detection approaches, this research investigates the area of cybersecurity threat detection. The study proves the framework’s extraordinary success in recognizing... 详细信息
来源: 评论
Integration of weighted majority voting in machine learning algorithms to enhance pine tree crown mapping on UAV imagery
Integration of weighted majority voting in machine learning ...
收藏 引用
2024 Symposium on Beyond the Canopy: Technologies and Applications of Remote Sensing
作者: Hosingholizade, Ali Erfanifard, Yousef Alavipanah, Seyed Kazem Pirasteh, Saied Garcia Millan, Virginia Dept. of Remote Sensing and GIS Faculty of Geography University of Tehran Tehran Iran Institute of Artificial Intelligence School of Mechanical and Electrical Engineering Shaoxing University China Department of Geotechnics and Geomatics Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai602105 India Dept. of Computer Science and Programming Languages School of Computer Science and Enginering University of Málaga Málaga Spain
The shape and area of the crown of each tree are among the most influential parameters for identifying and controlling the processes of photosynthesis, respiration, transpiration and its management. In such a way that... 详细信息
来源: 评论
Analyzing Cyberbullying Word Distribution Across Social Media to Develop Lexicon Dictionary
Analyzing Cyberbullying Word Distribution Across Social Medi...
收藏 引用
Network, Multimedia and Information Technology (NMITCON) International Conference on
作者: V Sahana K M Anil Kumar Dept. of Information Science and Engineering JSS Academy of Technical Education Bengaluru India Dept. of Computer Science and Engineering JSS Science and Technology University Mysuru India
Social media platforms have become essential tools for communication, collaboration, and exchanging information, ideas, and knowledge among users worldwide. Despite their benefits, the anonymity offered by these platf... 详细信息
来源: 评论
Info-ExtNet: An Information Extraction framework from Noisy Structured Documents
Info-ExtNet: An Information Extraction framework from Noisy ...
收藏 引用
Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE Conference on
作者: Sk Shamim Aktar Debapriya Banik Dept. of Computer Science & Engineering ICFAI University Tripura Agartala India
The exponential growth of digital data necessitates efficient and accurate information extraction (IE) from structured documents. Traditional rule-based systems, limited by domain-specific constraints, struggle with s... 详细信息
来源: 评论
Integrating Deep Learning Techniques for Enhanced Cyclone Prediction and its Impact on Air Quality Index Utilizing Satellite Imagery
Integrating Deep Learning Techniques for Enhanced Cyclone Pr...
收藏 引用
Students Conference on engineering and Systems (SCES)
作者: Sushruth Vijayakumar Sonakshi Jamadhiar Srujan M Raj Vishnudeep MR Saritha K Dept. of Computer Science Engineering PES University Bengaluru India
Tropical cyclones (TCs greatly impact ecosystems and weather patterns, often leading to catastrophic outcomes this research explores dynamic relationship between the Air Quality Index (AQI) and Tropical Cyclones (TCs)... 详细信息
来源: 评论
An Approach for XAI Visualizations for Explainability of Alzheimer’s Detection
An Approach for XAI Visualizations for Explainability of Alz...
收藏 引用
International Conference on Networking, Embedded and Wireless Systems (ICNEWS)
作者: Shraddha Khanapur Chirag B Bharadwaj Raghav Bhardwaj Jyothi S Nayak Dept. of Computer Science and Engineering BMS College of Engineering Bengaluru India
In the field of medical image analysis, the integration of machine learning (ML) models has significantly enhanced the process of identifying and diagnosing Alzheimer’s disease. However, the opacity of these models, ... 详细信息
来源: 评论
Gaze Detection and Text Extraction from Images using CNN with DBSCAN-based Filter Design
Gaze Detection and Text Extraction from Images using CNN wit...
收藏 引用
International Conference on Advanced computer Control, ICACC
作者: Jithin Jose Ajeesh Ramanujan Dept. Of Computer Science And Engineering College Of Engineering Trivandrum Trivandrum India
Gaze detection and text extraction are pivotal technologies in the domain of human-computer interaction and computer vision, enabling applications such as assistive technologies, user interface optimization, and autom... 详细信息
来源: 评论
Flood Prediction System with Voting Classifier
Flood Prediction System with Voting Classifier
收藏 引用
Device Intelligence, Computing and Communication Technologies, (DICCT), International Conference on
作者: Akshitha K M. Vijay Anand Dept. of Computer Science and Engineering Saveetha Engineering College Chennai India
Flood prediction plays a vital role in reducing the influence of natural disasters among the communities and the infrastructure. This paper presents a machine learning approach for flood prediction using a voting clas... 详细信息
来源: 评论