咨询与建议

限定检索结果

文献类型

  • 29,785 篇 会议
  • 4,562 篇 期刊文献
  • 237 册 图书

馆藏范围

  • 34,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,422 篇 工学
    • 15,483 篇 计算机科学与技术...
    • 13,002 篇 软件工程
    • 5,713 篇 信息与通信工程
    • 3,394 篇 控制科学与工程
    • 2,639 篇 电子科学与技术(可...
    • 2,581 篇 电气工程
    • 2,294 篇 生物工程
    • 1,845 篇 生物医学工程(可授...
    • 1,506 篇 光学工程
    • 1,328 篇 机械工程
    • 1,191 篇 动力工程及工程热...
    • 1,181 篇 仪器科学与技术
    • 995 篇 化学工程与技术
    • 840 篇 安全科学与工程
    • 709 篇 交通运输工程
  • 10,962 篇 理学
    • 5,945 篇 数学
    • 3,000 篇 物理学
    • 2,512 篇 生物学
    • 1,969 篇 统计学(可授理学、...
    • 1,303 篇 系统科学
    • 1,064 篇 化学
  • 5,529 篇 管理学
    • 3,226 篇 管理科学与工程(可...
    • 2,573 篇 图书情报与档案管...
    • 1,786 篇 工商管理
  • 1,559 篇 医学
    • 1,353 篇 临床医学
    • 1,264 篇 基础医学(可授医学...
    • 828 篇 药学(可授医学、理...
    • 657 篇 公共卫生与预防医...
  • 1,010 篇 法学
    • 810 篇 社会学
  • 631 篇 经济学
    • 631 篇 应用经济学
  • 478 篇 农学
  • 425 篇 教育学
  • 154 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,090 篇 accuracy
  • 835 篇 computational mo...
  • 833 篇 feature extracti...
  • 721 篇 deep learning
  • 676 篇 computer science
  • 666 篇 training
  • 520 篇 real-time system...
  • 511 篇 support vector m...
  • 491 篇 machine learning
  • 441 篇 predictive model...
  • 406 篇 internet of thin...
  • 355 篇 computer archite...
  • 351 篇 data models
  • 348 篇 convolutional ne...
  • 329 篇 reliability
  • 301 篇 optimization
  • 285 篇 data mining
  • 274 篇 routing
  • 252 篇 wireless sensor ...
  • 243 篇 image segmentati...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 79 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 70 篇 dept. of informa...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 64 篇 nikhef national ...
  • 61 篇 dept. of compute...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 52 篇 university würzb...
  • 52 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 80 篇 coleiro a.
  • 79 篇 gozzini s.r.
  • 73 篇 dallier r.
  • 71 篇 huang f.
  • 68 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 30,929 篇 英文
  • 3,261 篇 其他
  • 298 篇 中文
  • 54 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of IBPI and Computer Science and Engineering"
34584 条 记 录,以下是911-920 订阅
排序:
Electronic health records protection strategy by using blockchain approach
收藏 引用
Multimedia Tools and Applications 2024年 第39期83卷 86883-86894页
作者: Kathole, Atul B. Patil, Sonali D. Kumbhare, Savita Vhatkar, Kapil Kshirsagar, Aniruddha P. Kimbahune, Vinod V. Computer Engineering Dr. D. Y. Patil Institute of Technology Pune India IT Dept. Pimpri Chinchwad College of Engineering Pune India Computer Science and Engineering Department K.B.P College of Engineering Satara Satara India
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spen... 详细信息
来源: 评论
Towards Robust mmWave-based Human Activity Recognition using Large Simulated Dataset for Model Pretraining
Towards Robust mmWave-based Human Activity Recognition using...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Joshi, Vinay Xu, Shengkai Cao, Qiming Zhu, Yi Wang, Pu Xue, Hongfei Unc Charlotte Dept. of Computer Science Charlotte United States Purdue University Electrical and Computer Engineering West Lafayette United States Wayne State University Dept. of Computer Science Detroit United States
Human activity recognition (HAR) is crucial for real-world applications such as healthcare, surveillance, and smart homes. Among sensing technologies, millimeter wave (mmWave) sensors stand out due to their contactles... 详细信息
来源: 评论
Automating Dermatological Diagnosis - A Comparative Analysis  5
Automating Dermatological Diagnosis - A Comparative Analysis
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Johnson, Aleen Arora, Vishnupriya Aggarwal, Lakshita Goswami, Puneet Srm University Dept. Of Computer Science & Engineering Haryana Sonepat India Srm University Dept. Of Computer Science Haryana Sonepat India
Evolving and adapting healthcare along with growing technology is an urgent need of an hour using machine learning is an addition to classify health data for the large aspect of identifying dermatological illness. Con... 详细信息
来源: 评论
Ethereum Fraud Prevention: A Supervised Learning Approach for Fraudulent Account Recognition  1
Ethereum Fraud Prevention: A Supervised Learning Approach fo...
收藏 引用
1st International Conference on Trends in engineering Systems and Technologies, ICTEST 2024
作者: Dutta, Sourav Sharma, Anjali Rajgor, Jaymin Lovely Professional University Punjab Dept. of Computer Science and Engg. Kolkata India Jss Academy of Technical Education Dept. of Computer Science and Engg. Bangalore India Shan and Anchor Kutchhi Engineering College Dept. of Computer Science and Engg. Mumbai India
In recent times, blockchain technology, especially Ethereum, has gained tremendous popularity for supporting various financial transactions. Ethereum, the second most prominent cryptocurrency platform after Bitcoin, p... 详细信息
来源: 评论
Cloud Cryptography: Mechanism of Different Encryption Standards  18
Cloud Cryptography: Mechanism of Different Encryption Standa...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Lanke, Ravikumar Md Zubair Rahman, A.M.J. Bhardwaj, Rajat Somashekhara Reddy, D. Jain, Parth Mahesh, T.R. Dept. of Computer Science and Engineering Bangalore India Al-Ameen Engineering College Karundevanpalayam Erode India Aset Amity University Department of Computer Science and Engineering Bengaluru India
The term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. The provision of computing services, including sto... 详细信息
来源: 评论
Federated Learning for Cybersecurity: A Promising Frontier  2
Federated Learning for Cybersecurity: A Promising Frontier
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Ananya, G. Bindu Madhavi, V. Murthy, Monisha Guruprasad, N. Global Academy of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India Buddha Institute of Technology Computer Science and Engineering Uttar Pradesh Gorakhpur India
In today's world, Artificial Intelligence and Machine Learning are transforming many industries, but they rely on huge amounts of data leading to privacy issues. A better alternative is Federated learning. Federat... 详细信息
来源: 评论
JARVIS - Smart AI Support System  3
JARVIS - Smart AI Support System
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Ramya Manaswi, V. Saketh, Meduri Ravi Tejha, Mandumula Sai Karthikeya, Atluri Sai Prakash, Dharani Chandra Alkhayyat, Ahmad Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science Engineering Hyderabad India Gitam University Dept. of Computer Science Engineering with Specialisation of Cybersecurity Hyderabad India K.G Reddy College of Engineering and Technology Dept. of Electronics & Communication Engineering Telangana Hyderabad India College of Technical Engineering The Islamic University Dept. of Computers Techniques Engineering Najaf Iraq
The JARVIS AI Support System represents a remarkable fusion of modern technology, blending a sophisticated GUI design, seamless voice control, and inventive features like the captivating 'Air Canvas' facilitat... 详细信息
来源: 评论
Predicting DDoS Attacks: A Machine Learning Approach using ALDDoS Dataset  15
Predicting DDoS Attacks: A Machine Learning Approach using A...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Shookdeb, Shantanu Muduli, Debendra Bhatta, Sandesh Adhikari, Aayush Sapkota, Aaron Chaturvedi, Prabhat C V Raman Global University Dept. of computer Science and Eng. Bhubaneswar India C V Raman Global University Dept. of computer Science and Engineering Bhubaneswar India
The DDoS attack stands as Distributed Denial of Service attack refers a harmful effort to intercept on the regular traffic of a targeted web service or server. DDoS attack interferes with the normal network flow of th... 详细信息
来源: 评论
Enhanced Classification of Alzheimer's Disease Using Deep Learning and Machine Learning Models with MRI Scans
Enhanced Classification of Alzheimer's Disease Using Deep Le...
收藏 引用
2024 International Conference on Frontiers of Information Technology, FIT 2024
作者: Salahudin, Amna Qadeer, Eeman Ahmed, Ayesha Fahad, Labiba Gillani Dept. of Software Engineering FAST National University of Computer and Emerging Sciences Islamabad Pakistan Dept. of Computer Science FAST National University of Computer and Emerging Sciences Islamabad Pakistan
Alzheimer's disease (AD) is a slowly progressive neurodegenerative disease, which necessitates early and accurate diagnosis for effective management. This research presents a comprehensive approach to the classifi... 详细信息
来源: 评论
A Time-varying Velocity Control Strategy for Balancing Exploration and Exploitation Behaviour of a Binary PSO
A Time-varying Velocity Control Strategy for Balancing Explo...
收藏 引用
2023 International Conference on Next-Generation Computing, IoT and Machine Learning, NCIM 2023
作者: Siddique, Md. Abu Bakkar Islam, Md. Jakirul DUET Gazipur Dept. of Computer Science and Engineering Gazipur Bangladesh
Combinatorial optimization problems (COPs) are NP-hard, and their solution space is discrete, which poses a significant challenge for optimization algorithms. Binary Particle Swarm Optimization (BPSO) is wel-known opt... 详细信息
来源: 评论