咨询与建议

限定检索结果

文献类型

  • 34,404 篇 会议
  • 5,310 篇 期刊文献
  • 272 册 图书

馆藏范围

  • 39,986 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,661 篇 工学
    • 17,653 篇 计算机科学与技术...
    • 14,807 篇 软件工程
    • 6,532 篇 信息与通信工程
    • 3,971 篇 控制科学与工程
    • 3,044 篇 电子科学与技术(可...
    • 2,862 篇 电气工程
    • 2,641 篇 生物工程
    • 2,130 篇 生物医学工程(可授...
    • 1,695 篇 光学工程
    • 1,622 篇 机械工程
    • 1,487 篇 仪器科学与技术
    • 1,369 篇 动力工程及工程热...
    • 1,109 篇 化学工程与技术
    • 984 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 745 篇 网络空间安全
  • 12,352 篇 理学
    • 6,616 篇 数学
    • 3,354 篇 物理学
    • 2,900 篇 生物学
    • 2,198 篇 统计学(可授理学、...
    • 1,537 篇 系统科学
    • 1,184 篇 化学
  • 6,431 篇 管理学
    • 3,833 篇 管理科学与工程(可...
    • 2,914 篇 图书情报与档案管...
    • 2,008 篇 工商管理
  • 1,863 篇 医学
    • 1,594 篇 临床医学
    • 1,484 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 804 篇 公共卫生与预防医...
  • 1,208 篇 法学
    • 981 篇 社会学
  • 735 篇 经济学
  • 569 篇 农学
  • 496 篇 教育学
  • 186 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,288 篇 accuracy
  • 996 篇 feature extracti...
  • 968 篇 computational mo...
  • 867 篇 deep learning
  • 805 篇 training
  • 782 篇 computer science
  • 657 篇 real-time system...
  • 634 篇 machine learning
  • 617 篇 support vector m...
  • 550 篇 predictive model...
  • 496 篇 internet of thin...
  • 472 篇 convolutional ne...
  • 434 篇 data models
  • 381 篇 reliability
  • 356 篇 data mining
  • 340 篇 computer archite...
  • 340 篇 optimization
  • 315 篇 artificial intel...
  • 312 篇 wireless sensor ...
  • 311 篇 routing

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 69 篇 tno technical sc...
  • 66 篇 università di ca...
  • 63 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 52 篇 nikhef national ...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 75 篇 coleiro a.
  • 69 篇 gozzini s.r.
  • 68 篇 huang f.
  • 59 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,771 篇 英文
  • 1,746 篇 其他
  • 367 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
39986 条 记 录,以下是4631-4640 订阅
排序:
Anomaly-Based Intrusion Detection System in WSN using DNN Algorithm  1
Anomaly-Based Intrusion Detection System in WSN using DNN Al...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Al-Fuhaidi, Belal Farae, Zainab Al-Sorori, Wedad Maqtary, Naseebah Al-Ashmoery, Yahya Al-Fuhaidy, Farouk Al-Taweel, Sadik Faculty of Computing and IT University of Science and Technology Sana’a Yemen Department of IT Al-Razi University Sana’a Yemen Dept. Mathematics & Computer Faculty of Science Sana’a University Sana’a Yemen Department of Electrical Engineering Faculty of Engineering Ibb University Ibb Yemen
Intrusion detection systems (IDSs) are a necessary principle in WSN security, which can successfully prevent various hackers' and intruders' attempts to hack the network. In this research, we address the probl... 详细信息
来源: 评论
IoT-Enabled Real Time Intravenous Monitoring and Alert System for Healthcare Management
IoT-Enabled Real Time Intravenous Monitoring and Alert Syste...
收藏 引用
Advanced Computing Technologies (ICoACT), International Conference on
作者: P Pabitha J Selvakumar Dept. of Computer Technology Anna University MIT Campus Chennai India Dept. of Computer and Science Engineering Sri Ramakrishna Engineering College Coimbatore India
This paper presents the design and implementation of a Smart-drip Infusion Monitoring System incorporating various sensors and IoT technologies. The system aims to enhance intravenous infusion monitoring by providing ... 详细信息
来源: 评论
Detection of Brain Tumor Using CNN and CNN-SVM  3
Detection of Brain Tumor Using CNN and CNN-SVM
收藏 引用
3rd International Conference for Emerging Technology, INCET 2022
作者: Duvvuri, Kavya Kanisettypalli, Harshitha Jayan, Sarada Amrita School of Engineering Dept. of Computer Science Engineering Bengaluru India Amrita School of Engineering Dept. of Mathematics Bengaluru India
Brain tumor is a type of cancerous growth that may occur in the brain. Early diagnosis of the disease is crucial for proper treatment. Diagnosis of brain tumors is usually done using images obtained through magnetic r... 详细信息
来源: 评论
Registered-backoff-time (RBT) based channel access with grouping control for the trigger RAW mode of IEEE 802.11ah IoT Network
收藏 引用
computer Networks 2024年 242卷
作者: Huang, Chung-Ming Hsieh, Chia-Han Dept. of Computer Science Information Engineering National Cheng Kung University Tainan Taiwan
This work proposes the Trigger RAW -centric Registered Backoff Time (RBT) -based channel access with the Grouping Control (TRC-RBT-GC) method to tackle the load balance problem in the IEEE 802.11ah network for Interne... 详细信息
来源: 评论
An Efficient Approach to Deal with Cyber Bullying using Machine Learning: A Systematic Review  2
An Efficient Approach to Deal with Cyber Bullying using Mach...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Naveen Kumar, M.R. Vishwachetan, D. Mushtaq Ahmed, D.M. Dayananda, K.J. Manasa, K.J. Nanda, K.V. Vidyavardhaka College of Engineering Information Science and Engineering Mysuru India Ramaiah Institute of Technology Information Science and Engineering Bengaluru India Gsss Ssfgc Dept. of Computer Application Mysuru India MUSoE Dept. of Aiml Manasagangothri Mysuru India Sri Siddhartha Institute of Technology Compter Application Tumkur India
The prominence of social media platforms like Facebook, WhatsApp, and Instagram have given rise to Cyber crime, notably in the form of Cyber bullying. This unique manifestation of harassment involves individuals explo... 详细信息
来源: 评论
An Intelligent Forecasting Classification Model for Traffic Analysis using Machine Learning Techniques
An Intelligent Forecasting Classification Model for Traffic ...
收藏 引用
Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), International Conference on
作者: Bodla Kishor Rajesh Tiwari Raj Kumar Patra Latika Pinjakar Mahesh Singh Dept. of Computer Science and Engineering CMR Engineering College Hyderabad India Dept. of Computer Science and Engineering CMR Technical Campus Hyderabad India Dept. of Computer Science and Engineering Symbiosis Institute of Technology Nagpur India Dept. of EEE Shri Shankaracharya Technical Campus Bhilai Durg India
In addition to taking care of the normal citizens, Road Traffic protection is also one of the main issue for corporations governing the transportation. We use data mining techniques to get the hidden matter from the d...
来源: 评论
Bi-LSTM-RF based Hybrid Deep Learning Approach to Identify Level of Depression from Bengali Facebook Status
Bi-LSTM-RF based Hybrid Deep Learning Approach to Identify L...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Steve Austin Shah Nawaz Haider Rajib Shil Nisrat Sharmin Lija Kazi Rifah Noor Dept. of Computer Science & Engineering University of Science and Technology Chittagong Chittagong Bangladesh
Depression is a worldwide epidemic and is of special concern due to its impact on mental health and the need for comprehensive studies for better detection and treatment. As the severity of depression grows among the ... 详细信息
来源: 评论
Boosted Hybrid Privacy Preserving Data Mining (BHPPDM) Technique to Increase Privacy and Accuracy  3
Boosted Hybrid Privacy Preserving Data Mining (BHPPDM) Techn...
收藏 引用
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023
作者: Prasanthi, Kundeti Naga Chandra Sekhara Rao, M.V.P. Pallapothu, Seshu Babu Lakireddy Balireddy College of Engineering Department of Computer Science and Engineering Mylavaram India Rvr and Jc College of Engineering Dept. of Cse Chowdavaram India Kakaraprthi Bhavanarayana College Dept. of Mathematics Vijayawada India
In the current scenario, large volumes of data are generated by different organizations. Data Mining (DM) applications provide suitable patterns that lead to business growth, improved health care and improved services... 详细信息
来源: 评论
Enhancing Automatic Evaluation Systems for Descriptive Answers Using BERT: Addressing Context and Coherence Challenges
Enhancing Automatic Evaluation Systems for Descriptive Answe...
收藏 引用
International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES)
作者: Sagarika Dash Dhawaleswara Rao CH Rudra Kalyan Nayak M.V.B.T. Santhi Dept. of Computer Science Engineering Centurion Univrsity of Technology and Management Odisha India Dept. of Computer Science Engineering VIT Bhopal Univrsity Sehore Madhya Pradesh India Dept. of Computer Science Engineering Koneru Lakshmalah Education Foundation Vaddeswaram Andhra Pradesh India
This study explores the application of advanced Natural Language Processing (NLP) techniques, specifically leveraging BERT-based models, for evaluating semantic similarity between text inputs. The methodology involves... 详细信息
来源: 评论
Beyond Copy Paste: Plagiarism Detection using Machine Learning
Beyond Copy Paste: Plagiarism Detection using Machine Learni...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: Akula Vasuteja Alavalapalli Vasanth Reddy A. Pravin Dept. of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Since plagiarism is a major problem in both academic and professional settings, it is crucial to create effective plagiarism detection methods. Accuracy evaluation for classical models such as SVM, Naive Bayes, and Ra... 详细信息
来源: 评论