咨询与建议

限定检索结果

文献类型

  • 34,403 篇 会议
  • 5,316 篇 期刊文献
  • 272 册 图书

馆藏范围

  • 39,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,669 篇 工学
    • 17,660 篇 计算机科学与技术...
    • 14,804 篇 软件工程
    • 6,542 篇 信息与通信工程
    • 3,979 篇 控制科学与工程
    • 3,048 篇 电子科学与技术(可...
    • 2,866 篇 电气工程
    • 2,641 篇 生物工程
    • 2,131 篇 生物医学工程(可授...
    • 1,694 篇 光学工程
    • 1,620 篇 机械工程
    • 1,487 篇 仪器科学与技术
    • 1,369 篇 动力工程及工程热...
    • 1,110 篇 化学工程与技术
    • 984 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 750 篇 网络空间安全
  • 12,355 篇 理学
    • 6,617 篇 数学
    • 3,357 篇 物理学
    • 2,898 篇 生物学
    • 2,198 篇 统计学(可授理学、...
    • 1,536 篇 系统科学
    • 1,190 篇 化学
  • 6,430 篇 管理学
    • 3,831 篇 管理科学与工程(可...
    • 2,915 篇 图书情报与档案管...
    • 2,006 篇 工商管理
  • 1,863 篇 医学
    • 1,594 篇 临床医学
    • 1,481 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 801 篇 公共卫生与预防医...
  • 1,206 篇 法学
    • 979 篇 社会学
  • 735 篇 经济学
  • 569 篇 农学
  • 497 篇 教育学
  • 186 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,290 篇 accuracy
  • 996 篇 feature extracti...
  • 968 篇 computational mo...
  • 871 篇 deep learning
  • 805 篇 training
  • 782 篇 computer science
  • 657 篇 real-time system...
  • 641 篇 machine learning
  • 616 篇 support vector m...
  • 550 篇 predictive model...
  • 497 篇 internet of thin...
  • 470 篇 convolutional ne...
  • 434 篇 data models
  • 382 篇 reliability
  • 356 篇 data mining
  • 340 篇 computer archite...
  • 340 篇 optimization
  • 316 篇 artificial intel...
  • 312 篇 wireless sensor ...
  • 311 篇 routing

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 69 篇 tno technical sc...
  • 66 篇 università di ca...
  • 62 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 nikhef national ...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 73 篇 coleiro a.
  • 68 篇 huang f.
  • 68 篇 gozzini s.r.
  • 58 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,786 篇 英文
  • 1,737 篇 其他
  • 367 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
39991 条 记 录,以下是151-160 订阅
排序:
DOH Integrator Tool  8
DOH Integrator Tool
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Patil, Chaitra Nagaraja, G.S. Rv College of Engineering Dept of Computer Science and Engineering Bangalore India
The project labelled 'DOH Integrator tool' aims to improve internet privacy and security by implementing the DNS over HTTPS (DoH) protocol. Traditional DNS queries are sent in cleartext, which makes them subje... 详细信息
来源: 评论
Intelligent System for Detection of Intrusion in Imbalanced Network Traffic  14
Intelligent System for Detection of Intrusion in Imbalanced ...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Bagla, Piyush Mishra, Amit Kumar Pandey, Neeraj Kumar Sharma, Ravi Dumka, Ankur National Institute of Technology Department of Computer Science & Engineering Jalandhar India Graphic Era Hill University Dept. of Computer Science & Engineering Dehradun India Department of Computer Science & Engineering Dehradun India Women Institute of Technology Department of Computer Science & Engineering Uttarakhand Dehradun India
Malicious cyberattacks can frequently hide among enormous amounts of regular data in networks with uneven traffic patterns. The identification of imbalance network traffic is difficult to find and making a challenge i... 详细信息
来源: 评论
Care Compass: Monitoring made easy, Care made effective  3
Care Compass: Monitoring made easy, Care made effective
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Manhas, Prabal Chandra, Joydeep Kaur, Ramanjot Sahay, Rashi Chandigarh University Punjab India Chandigarh University Dept.of Computer Science and Engineering Punjab Mohali India Manav Rachna International Institute of Research and Studies Faridabad India
Traditional healthcare focused on hospitals and clinics proved out to be inadequate, especially during the COVID-19 pandemic and various emergency crisis, Care Compass, is an innovative and affordable smart wearable d... 详细信息
来源: 评论
Comparative Analysis of Deep Learning Algorithms for Handwritten Digit Recognition  3
Comparative Analysis of Deep Learning Algorithms for Handwri...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Savaram, Padmaja Bandu, Sasidhar Lakshitha, B. Prince Sattam bin Abdulaziz University Dept.of Computer Science Al-Kharj Saudi Arabia Prince Sattam bin Abdulaziz University Dept. of English Al-Kharj Saudi Arabia Vnrvjiet Jntu Dept. of Computer Science and Engineering Hyderabad India
Handwritten digit recognition presents a considerable challenge in pattern recognition due to the inherent variability in digit size, stroke width, orientation, and margin alignment. The difficulty is further exacerba... 详细信息
来源: 评论
Spider monkey ınspired optimization algorithm based clustering for face recognition
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-13页
作者: Gopal, Veni devi Devi, G. Shree Geetha, Angelina Department of Computer Science and Engineering B S Abdur Rahman Institute of Science & amp Technology Chennai India Department of Computer Science and Engineering Hindustan Institute of Science and Technology Chennai India Dept of Computer Applications BSA Crescent Institute of Science and Technology Chennai India
Face recognition is a fast-growing technology that is widely used in forensics such as criminal identification, secure access, and prison *** contrasts from other classification issues in that there are normally a mor... 详细信息
来源: 评论
An Effective Method to Detect DHCP Starvation Attack using Port Scanning
An Effective Method to Detect DHCP Starvation Attack using P...
收藏 引用
2023 International Conference on Next-Generation Computing, IoT and Machine Learning, NCIM 2023
作者: Jony, Asaduzzaman Miah, Abu Saleh Musa Islam, Muhammad Nazrul Dept. of Computer Science and Engineering Dhaka Bangladesh The University of Aizu Dept. of Computer Science and Engineering Aizuwakamatsu Japan Dept. of Computer Science and Engineering Dhaka Bangladesh
Nowadays, the DHCP starvation attack is a crucial attack that denied the services for the legitimate network user where the attacker mainly occupies all the IP addresses in the DHCP server pool. Most of the existing s... 详细信息
来源: 评论
Classification and Prediction of Alzheimer's Disease using Deep Learning  7
Classification and Prediction of Alzheimer's Disease using D...
收藏 引用
7th International Conference on Intelligent Computing and Control Systems, ICICCS 2023
作者: Brindha, D. Ebenezer, V. Selvaraj, E. Jackson Bevin Geoff, D.M. Dileep, B. Bethina Nambi, M. Thirumalai Dept. of Computer Science and Engineering Coimbatore India Dept. of Computer Science and Engineering Coimbatore India
This study has proposed a novel technique for performing object detection and image classification with a Convolutional Neural Network (CNN) architecture. Nevertheless, employing a 2D CNN architecture to identify a lo... 详细信息
来源: 评论
Chatbot Based on Emotions Using Deep Learning  1
Chatbot Based on Emotions Using Deep Learning
收藏 引用
1st International Conference on Optimization Techniques for Learning, ICOTL 2023
作者: Nirupa, V. Renuka, G.B. Naga Lakshmi, B. Sumanth Kumar, C.P. Rudra Sekhar Reddy, A. Paramesh, J. Dept. of Computer Science & Engineering Madanapalle India Dept. of Computer Science & Engineering Anantapur India
Human emotions are unpredictable as they change very frequently. Human emotions areinvoluntary mental states of feelings and are accompanied by physiological changes. Emotions which can be detected through the facial ... 详细信息
来源: 评论
Detection of Lung Inflammation using Chest X-ray with Deep Learning Algorithm  7
Detection of Lung Inflammation using Chest X-ray with Deep L...
收藏 引用
7th International Conference on Communication and Electronics Systems, ICCES 2022
作者: Singh, K. Purushotham Kumar, B. Niranjan Anil, A. Rajendran, Selvi Dept.of Computer Science and Engineering Chennai India Hindustan Institute of Technology and Science India
Lung Inflammation causes the passing of around 700,000 youngsters consistently and influences 7% of the worldwide populace. Chest X-ray images are principally utilized for the analysis of this infection. Notwithstandi... 详细信息
来源: 评论
Cybersecurity: Threats, Requirements, Deployments, Techniques, System Architecture, and Future Research
Cybersecurity: Threats, Requirements, Deployments, Technique...
收藏 引用
2024 International Conference on Smart Devices, ICSD 2024
作者: Yadav, Ajay Karnatak, Vijay Mishra, Amit Kumar Verma, Shalini Aswal, Pallaw Singh Tripathi, Neha University Institute of Computing Chandigarh University Punjab Mohali India THDC Institute of Hydropower Engineering and Technology Dept. of Computer Science & Engineering Tehri India Graphic Era Hill University Dept. of Computer Science & Engineering Dehradun India Doon Group Of Institution Dept. of Computer Science & Engineering Rishikesh India THDC Institute of Hydropower Engineering and Technology Computer Science and Engineering Tehri India Department of Computer Science & Engineering Dehradun India
Cybersecurity safeguards computer systems, net- works, and digital information from a wide variety of cyber-attacks. Its major purpose is to protect the privacy of users' data and resources while maintaining their... 详细信息
来源: 评论