咨询与建议

限定检索结果

文献类型

  • 29,739 篇 会议
  • 4,566 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 34,540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,441 篇 工学
    • 15,502 篇 计算机科学与技术...
    • 13,025 篇 软件工程
    • 5,722 篇 信息与通信工程
    • 3,398 篇 控制科学与工程
    • 2,640 篇 电子科学与技术(可...
    • 2,584 篇 电气工程
    • 2,296 篇 生物工程
    • 1,847 篇 生物医学工程(可授...
    • 1,505 篇 光学工程
    • 1,328 篇 机械工程
    • 1,194 篇 动力工程及工程热...
    • 1,182 篇 仪器科学与技术
    • 997 篇 化学工程与技术
    • 843 篇 安全科学与工程
    • 709 篇 交通运输工程
  • 10,975 篇 理学
    • 5,955 篇 数学
    • 3,003 篇 物理学
    • 2,513 篇 生物学
    • 1,974 篇 统计学(可授理学、...
    • 1,305 篇 系统科学
    • 1,071 篇 化学
  • 5,527 篇 管理学
    • 3,231 篇 管理科学与工程(可...
    • 2,567 篇 图书情报与档案管...
    • 1,787 篇 工商管理
  • 1,559 篇 医学
    • 1,352 篇 临床医学
    • 1,262 篇 基础医学(可授医学...
    • 828 篇 药学(可授医学、理...
    • 655 篇 公共卫生与预防医...
  • 1,011 篇 法学
    • 811 篇 社会学
  • 632 篇 经济学
    • 632 篇 应用经济学
  • 478 篇 农学
  • 425 篇 教育学
  • 154 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,069 篇 accuracy
  • 824 篇 feature extracti...
  • 822 篇 computational mo...
  • 710 篇 deep learning
  • 675 篇 computer science
  • 661 篇 training
  • 505 篇 support vector m...
  • 504 篇 real-time system...
  • 495 篇 machine learning
  • 426 篇 predictive model...
  • 405 篇 internet of thin...
  • 350 篇 computer archite...
  • 348 篇 convolutional ne...
  • 343 篇 data models
  • 326 篇 reliability
  • 300 篇 optimization
  • 283 篇 data mining
  • 274 篇 routing
  • 252 篇 wireless sensor ...
  • 242 篇 image segmentati...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 79 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 69 篇 dept. of informa...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 65 篇 nikhef national ...
  • 61 篇 dept. of compute...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 51 篇 university würzb...
  • 51 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 80 篇 coleiro a.
  • 79 篇 gozzini s.r.
  • 73 篇 dallier r.
  • 71 篇 huang f.
  • 66 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 32,670 篇 英文
  • 1,463 篇 其他
  • 308 篇 中文
  • 54 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of IBPI and Computer Science and Engineering"
34540 条 记 录,以下是441-450 订阅
排序:
Integration of Swarm Intelligence with KNN for Optimal Nearest Neighbors Value Prediction  9
Integration of Swarm Intelligence with KNN for Optimal Neare...
收藏 引用
9th IEEE International Conference on Electronics, Computing and Communication Technologies, CONECCT 2023
作者: Anchalia, Aniketh Kakati, Anirudh Patil, Ambika Bhavana, B.N. Paudel, Ankit Chaudhari, Shilpa Dept. of Computer Science and Engineering Bengaluru India
K-Nearest Neighbors (KNN), a simple and widely used algorithm, is extremely valuable in the field of machine learning models. Finding an optimal value of the nearest neighbor parameter in the KNN algorithm has been a ... 详细信息
来源: 评论
Advancements in User Security: Enhancing Usability with Graphical Password Authentication  2
Advancements in User Security: Enhancing Usability with Grap...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Harisha Naik, Sandhya Ramesh Vasudeva, Shettigar Sarvani Shrilakshmi, K. Kothwal, Vaishnavi Sahyadri College of Engineering & Management Dept. of Computer Science & Engineering Mangalore Karnataka India
Text-based password authentication is a common method used to verify the identity of users who are trying to access a secure system or service. In order to use this authentication method, the user must input a passwor... 详细信息
来源: 评论
NextGen Dynamic Video Generator using AI  9
NextGen Dynamic Video Generator using AI
收藏 引用
9th IEEE International Conference on Smart Structures and Systems, ICSSS 2023
作者: Anitha, R. Kishore, N. Vijay Anand, M. Dept. of Computer Science and Engineering Chennai India
In an era marked by remarkable technological advancements, the way we create and share information has undergone a profound transformation. This paradigm shift is epitomized by the NextGen Dynamic Video Generator usin... 详细信息
来源: 评论
ML Assisted Web Application Firewall  12
ML Assisted Web Application Firewall
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Kalariya, Pranav Jethva, Manthan Alginahi, Yasser University of Windsor Electrical and Computer Engineering Dept. Windsor Canada Computer Science Dept. Adrian College MI United States
This study presents the development and implementation of a sophisticated Web Application Firewall (WAF) empowered by machine learning techniques to bolster cybersecurity measures. Traditional WAFs primarily rely on r... 详细信息
来源: 评论
Authentication and Authorization in Zero Trust IoT: A Survey  35
Authentication and Authorization in Zero Trust IoT: A Survey
收藏 引用
35th Irish Systems and Signals Conference, ISSC 2024
作者: James, Meha Newe, Thomas O'Shea, Donna O'Mahony, George D. Munster Technological University Dept. Computer Science Cork Ireland University of Limerick Dept. Electronic and Computer Engineering Limerick Ireland
A critical challenge in implementing Zero trust (ZT) in Internet of Things (IoT) environments is ensuring secure authentication and authorization mechanisms. The work in this article delves into the intricate realm of... 详细信息
来源: 评论
IoT-Enhanced Smart Bulletin Board: A Multi-Functional Connectivity Hub  2
IoT-Enhanced Smart Bulletin Board: A Multi-Functional Connec...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Gundavarapu, Mallikarjuna Rao Swapna, Veerlapalii Reddy, Enugu Sriamsh Kumar, Pindi Praveen Prathapani, Abhinay Shivaji, Kothapally Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science and Engineering Hyderabad India
The problem with traditional notice boards is their static nature, leading to outdated information and manual effort to update. An IoT-based smart notice board solves this by providing real-time updates but requires a... 详细信息
来源: 评论
Comparing Developmental Approaches for Game-Based Learning in Cyber-Security Campaigns  1
Comparing Developmental Approaches for Game-Based Learning i...
收藏 引用
1st IEEE International Conference on Contemporary Computing and Communications, InC4 2023
作者: Sreehari, S. Gokulapriya, R. Dept. of Computer Science and Engineering Bangalore India
Digital game-based learning (DGBL) has been viewed as an effective teaching strategy that encourages students to pick up and learn a subject. This paper explores its viability to help increase the reach and efficiency... 详细信息
来源: 评论
Navigating the Landscape of Intelligent Systems, Smart Technologies, and User-Centric Evolution  2
Navigating the Landscape of Intelligent Systems, Smart Techn...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Komatireddy, Sanjay Reddy Krishna Bhargavi, Y. Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science and Engineering Hyderabad India
Human-computer Interaction (HCI) is a dynamic field pi votal in shaping human-Technology relationships. HCI is a multidisciplinary field, essential in understanding and enhancing the interaction between humans and tec... 详细信息
来源: 评论
Neural Harvest : Advancements in Crop Yield Forecasting  7
Neural Harvest : Advancements in Crop Yield Forecasting
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Seelam, Srinivasa Reddy Thivari, Charitha Sai Parabattina, Bhagath Narendra Kumar, G. Sumanth, K. Lakireddy Bali Reddy College of Engineering Dept. of Computer Science And Engineering Mylavaram India
Crop yield forecasting involves predicting the amount of crops that a farmer can expect from their field. This prediction is based on several factors, including soil type and environmental conditions. It is a crucial ... 详细信息
来源: 评论
A Review on Phishing Threats and Data Securityin Online Trading Systems using Artificial Intelligence Techniques  2
A Review on Phishing Threats and Data Securityin Online Trad...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Murugun, S. Haniah, Sheikh Koti, Shambhavi M. Sahani, Saurav Shekhar, S.N. Dept. of Computer Science and Engineering Sri Venkateshwara College of Engineering Bengaluru562157 India
Phishing threats pose significant risks to online trading systems, threatening the security and integrity of financial transactions. In this paper, we present a comprehensive review of phishing threats and data securi... 详细信息
来源: 评论