咨询与建议

限定检索结果

文献类型

  • 31,154 篇 会议
  • 4,733 篇 期刊文献
  • 251 册 图书

馆藏范围

  • 36,138 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,440 篇 工学
    • 16,353 篇 计算机科学与技术...
    • 13,679 篇 软件工程
    • 5,970 篇 信息与通信工程
    • 3,653 篇 控制科学与工程
    • 2,739 篇 电子科学与技术(可...
    • 2,706 篇 电气工程
    • 2,361 篇 生物工程
    • 1,906 篇 生物医学工程(可授...
    • 1,550 篇 光学工程
    • 1,398 篇 机械工程
    • 1,260 篇 动力工程及工程热...
    • 1,230 篇 仪器科学与技术
    • 1,039 篇 化学工程与技术
    • 903 篇 安全科学与工程
    • 762 篇 交通运输工程
  • 11,447 篇 理学
    • 6,263 篇 数学
    • 3,082 篇 物理学
    • 2,585 篇 生物学
    • 2,080 篇 统计学(可授理学、...
    • 1,358 篇 系统科学
    • 1,117 篇 化学
  • 5,901 篇 管理学
    • 3,468 篇 管理科学与工程(可...
    • 2,741 篇 图书情报与档案管...
    • 1,888 篇 工商管理
  • 1,646 篇 医学
    • 1,397 篇 临床医学
    • 1,303 篇 基础医学(可授医学...
    • 850 篇 药学(可授医学、理...
    • 719 篇 公共卫生与预防医...
  • 1,099 篇 法学
    • 891 篇 社会学
  • 676 篇 经济学
    • 675 篇 应用经济学
  • 490 篇 农学
  • 451 篇 教育学
  • 187 篇 文学
  • 78 篇 军事学
  • 40 篇 艺术学
  • 1 篇 哲学

主题

  • 1,156 篇 accuracy
  • 872 篇 feature extracti...
  • 871 篇 computational mo...
  • 780 篇 deep learning
  • 716 篇 training
  • 687 篇 computer science
  • 573 篇 machine learning
  • 572 篇 real-time system...
  • 529 篇 support vector m...
  • 470 篇 predictive model...
  • 428 篇 internet of thin...
  • 381 篇 convolutional ne...
  • 373 篇 data models
  • 355 篇 computer archite...
  • 344 篇 reliability
  • 322 篇 optimization
  • 302 篇 data mining
  • 278 篇 routing
  • 270 篇 artificial intel...
  • 259 篇 wireless sensor ...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 63 篇 dept. of informa...
  • 61 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 45 篇 university würzb...
  • 44 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 78 篇 díaz a.f.
  • 78 篇 boumaaza j.
  • 77 篇 coleiro a.
  • 75 篇 gozzini s.r.
  • 70 篇 dallier r.
  • 69 篇 huang f.
  • 65 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 30,907 篇 英文
  • 4,826 篇 其他
  • 302 篇 中文
  • 57 篇 日文
  • 51 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Software Engineering and Computer Science"
36138 条 记 录,以下是1111-1120 订阅
排序:
Using IOT and WSNs Technology for Monitoring an Aquaponic Greenhouse System  4
Using IOT and WSNs Technology for Monitoring an Aquaponic Gr...
收藏 引用
4th International Conference on Embedded and Distributed Systems, EDiS 2024
作者: Touhami, Achouak Bourouis, Amina Benahmed, Tariq Touhami, Sana Touhami, Nawal Benahmed, Khelifa Ali Kafi university center Dept. Mathematics and Computer Science Tindouf Algeria Tahri Mohammed university Dept. Mathematics and Computer Science Bechar Algeria Ahmed Draria university Dept. Electrical Engineering Adrar Algeria
The increasing population, climate fluctuations, soil erosion, limited water resources, and concerns about food security highlight the need for effective and sustainable approaches to food production. Aquaponics repre... 详细信息
来源: 评论
Electronic health records protection strategy by using blockchain approach
收藏 引用
Multimedia Tools and Applications 2024年 第39期83卷 86883-86894页
作者: Kathole, Atul B. Patil, Sonali D. Kumbhare, Savita Vhatkar, Kapil Kshirsagar, Aniruddha P. Kimbahune, Vinod V. Computer Engineering Dr. D. Y. Patil Institute of Technology Pune India IT Dept. Pimpri Chinchwad College of Engineering Pune India Computer Science and Engineering Department K.B.P College of Engineering Satara Satara India
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spen... 详细信息
来源: 评论
Automating Dermatological Diagnosis - A Comparative Analysis  5
Automating Dermatological Diagnosis - A Comparative Analysis
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Johnson, Aleen Arora, Vishnupriya Aggarwal, Lakshita Goswami, Puneet Srm University Dept. Of Computer Science & Engineering Haryana Sonepat India Srm University Dept. Of Computer Science Haryana Sonepat India
Evolving and adapting healthcare along with growing technology is an urgent need of an hour using machine learning is an addition to classify health data for the large aspect of identifying dermatological illness. Con... 详细信息
来源: 评论
Cloud Cryptography: Mechanism of Different Encryption Standards  18
Cloud Cryptography: Mechanism of Different Encryption Standa...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Lanke, Ravikumar Md Zubair Rahman, A.M.J. Bhardwaj, Rajat Somashekhara Reddy, D. Jain, Parth Mahesh, T.R. Dept. of Computer Science and Engineering Bangalore India Al-Ameen Engineering College Karundevanpalayam Erode India Aset Amity University Department of Computer Science and Engineering Bengaluru India
The term 'cloud cryptography' describes the application of cryptographic methods and protocols to protect communications and data in cloud computing settings. The provision of computing services, including sto... 详细信息
来源: 评论
Federated Learning for Cybersecurity: A Promising Frontier  2
Federated Learning for Cybersecurity: A Promising Frontier
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Ananya, G. Bindu Madhavi, V. Murthy, Monisha Guruprasad, N. Global Academy of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India Buddha Institute of Technology Computer Science and Engineering Uttar Pradesh Gorakhpur India
In today's world, Artificial Intelligence and Machine Learning are transforming many industries, but they rely on huge amounts of data leading to privacy issues. A better alternative is Federated learning. Federat... 详细信息
来源: 评论
JARVIS - Smart AI Support System  3
JARVIS - Smart AI Support System
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Ramya Manaswi, V. Saketh, Meduri Ravi Tejha, Mandumula Sai Karthikeya, Atluri Sai Prakash, Dharani Chandra Alkhayyat, Ahmad Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science Engineering Hyderabad India Gitam University Dept. of Computer Science Engineering with Specialisation of Cybersecurity Hyderabad India K.G Reddy College of Engineering and Technology Dept. of Electronics & Communication Engineering Telangana Hyderabad India College of Technical Engineering The Islamic University Dept. of Computers Techniques Engineering Najaf Iraq
The JARVIS AI Support System represents a remarkable fusion of modern technology, blending a sophisticated GUI design, seamless voice control, and inventive features like the captivating 'Air Canvas' facilitat... 详细信息
来源: 评论
Ethereum Fraud Prevention: A Supervised Learning Approach for Fraudulent Account Recognition  1
Ethereum Fraud Prevention: A Supervised Learning Approach fo...
收藏 引用
1st International Conference on Trends in engineering Systems and Technologies, ICTEST 2024
作者: Dutta, Sourav Sharma, Anjali Rajgor, Jaymin Lovely Professional University Punjab Dept. of Computer Science and Engg. Kolkata India Jss Academy of Technical Education Dept. of Computer Science and Engg. Bangalore India Shan and Anchor Kutchhi Engineering College Dept. of Computer Science and Engg. Mumbai India
In recent times, blockchain technology, especially Ethereum, has gained tremendous popularity for supporting various financial transactions. Ethereum, the second most prominent cryptocurrency platform after Bitcoin, p... 详细信息
来源: 评论
Predicting DDoS Attacks: A Machine Learning Approach using ALDDoS Dataset  15
Predicting DDoS Attacks: A Machine Learning Approach using A...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Shookdeb, Shantanu Muduli, Debendra Bhatta, Sandesh Adhikari, Aayush Sapkota, Aaron Chaturvedi, Prabhat C V Raman Global University Dept. of computer Science and Eng. Bhubaneswar India C V Raman Global University Dept. of computer Science and Engineering Bhubaneswar India
The DDoS attack stands as Distributed Denial of Service attack refers a harmful effort to intercept on the regular traffic of a targeted web service or server. DDoS attack interferes with the normal network flow of th... 详细信息
来源: 评论
EXTRACTING EXPLOITS AND ATTACK VECTORS FROM CYBERSECURITY NEWS USING NLP
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2022年 第2期84卷 63-78页
作者: Sandescu, Cristian Dinisor, Alexandra Vladescu, Cristina-Veronica Grigorescu, Octavian Corlatescu, Dragos Dascalu, Mihai Rughinis, Razvan Dept. of Software Development CODA Intelligence SRL Romania Dept. of Informatics Technical University of Munich Germany Dept. of Computer Science University POLITEHNICA of Bucharest Romania
Cybersecurity has an immense impact on society as it enables the digital protection of individuals and enterprises against an increasing number of online threats. Moreover, the rate at which attackers discover and exp... 详细信息
来源: 评论
Heuristic approaches for hiding sensitive frequent itemsets in uncertain databases  5
Heuristic approaches for hiding sensitive frequent itemsets ...
收藏 引用
5th International Conference on Pattern Analysis and Intelligent Systems, PAIS 2023
作者: Lefkir, Mira Nouioua, Farid Fournier-Viger, Phillipe University Mohamed El Bachir El Ibrahimi of Bordj Bou Arreridj BBA Dept. of Computer Science Algeria Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Pattern mining is a core objective within data mining, involving the detection of frequent itemsets (collections of values) within databases. This process serves to extract valuable insights from the data, facilitatin... 详细信息
来源: 评论