咨询与建议

限定检索结果

文献类型

  • 30,328 篇 会议
  • 15,066 篇 期刊文献
  • 430 册 图书

馆藏范围

  • 45,824 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,068 篇 工学
    • 19,575 篇 计算机科学与技术...
    • 15,822 篇 软件工程
    • 6,517 篇 信息与通信工程
    • 4,764 篇 控制科学与工程
    • 3,143 篇 电气工程
    • 3,070 篇 生物工程
    • 2,844 篇 电子科学与技术(可...
    • 2,527 篇 生物医学工程(可授...
    • 2,104 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,538 篇 光学工程
    • 1,419 篇 动力工程及工程热...
    • 1,268 篇 安全科学与工程
    • 1,167 篇 化学工程与技术
    • 1,117 篇 网络空间安全
    • 1,084 篇 交通运输工程
  • 14,735 篇 理学
    • 7,087 篇 数学
    • 4,613 篇 物理学
    • 3,519 篇 生物学
    • 2,317 篇 统计学(可授理学、...
    • 2,002 篇 系统科学
    • 1,293 篇 化学
  • 8,389 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,593 篇 图书情报与档案管...
    • 2,641 篇 工商管理
  • 2,828 篇 医学
    • 2,411 篇 临床医学
    • 2,113 篇 基础医学(可授医学...
    • 1,270 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,436 篇 法学
    • 1,152 篇 社会学
  • 946 篇 经济学
  • 716 篇 农学
  • 714 篇 教育学
  • 224 篇 文学
  • 117 篇 军事学
  • 87 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,104 篇 deep learning
  • 1,085 篇 accuracy
  • 911 篇 machine learning
  • 907 篇 feature extracti...
  • 849 篇 internet of thin...
  • 810 篇 computational mo...
  • 682 篇 training
  • 567 篇 information tech...
  • 561 篇 real-time system...
  • 561 篇 artificial intel...
  • 543 篇 support vector m...
  • 505 篇 data mining
  • 487 篇 security
  • 454 篇 predictive model...
  • 406 篇 monitoring
  • 388 篇 cloud computing
  • 359 篇 optimization
  • 354 篇 reliability
  • 350 篇 data models

机构

  • 297 篇 faculty of scien...
  • 290 篇 department for p...
  • 281 篇 department of ph...
  • 280 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 272 篇 department of ph...
  • 270 篇 department of ph...
  • 253 篇 faculté des scie...
  • 235 篇 department of ph...
  • 232 篇 department of co...
  • 230 篇 department of ph...
  • 218 篇 physics division...
  • 195 篇 cavendish labora...
  • 172 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 school of physic...
  • 168 篇 institute of phy...
  • 162 篇 department of ph...
  • 162 篇 kirchhoff-instit...

作者

  • 276 篇 c. alexa
  • 274 篇 c. amelung
  • 273 篇 j. m. izen
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 255 篇 g. gaudio
  • 253 篇 h. a. gordon
  • 251 篇 a. c. könig
  • 248 篇 y. tayalati
  • 245 篇 s. mohapatra
  • 243 篇 h. sakamoto
  • 235 篇 d. guest
  • 217 篇 y. nagasaka

语言

  • 40,466 篇 英文
  • 4,887 篇 其他
  • 471 篇 中文
  • 62 篇 日文
  • 19 篇 德文
  • 17 篇 法文
  • 14 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45824 条 记 录,以下是1741-1750 订阅
排序:
Smart bird identification system based on a hybrid approach: Petri nets, convolutional neural and deep residual networks
收藏 引用
Multimedia Tools and Applications 2024年 第12期83卷 34795-34823页
作者: Chang, Jen-Chun Chen, Si-Ann Shen, Victor R. L. Department of Computer Science and Information Engineering National Taipei University 151 University Rd. Sanxia District New Taipei City237 Taiwan Department of Information Management Chaoyang University of Technology Taichung City Taiwan
Currently, most people mind the environmental ecology and animal protection. To maintain the ecology of wild animals, the relevant associations have been established. Taiwan is well known for a rich variety of bird sp... 详细信息
来源: 评论
Usefulness of Honeypots Towards Data Security: A systematic Literature Review
Usefulness of Honeypots Towards Data Security: A Systematic ...
收藏 引用
2023 International Workshop on Artificial Intelligence and Image Processing, IWAIIP 2023
作者: Silaen, Kalpin Erlangga Meyliana, Meyliana Warnars, Harco Leslie Hendric Spits Prabowo, Harjanto Hidayanto, Achmad Nizar Anggreainy, Maria Susan Bina Nusantara University Binus Graduate Program - Computer Science Computer Science Department Jakarta Indonesia Bina Nusantara University School of Information Systems Information Systems Department Jakarta Indonesia Universitas Indonesia Faculty of Computer Science Department of Information System Depok Indonesia
The increasing data volume given by the exponential growth of digital devices, cloud platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This makes the search for innovative defe... 详细信息
来源: 评论
Security in the Age of Deepfakes: Detecting Manipulated Media with Neural Networks  1
收藏 引用
8th International Conference on information system Design and Intelligent Applications, ISDIA 2024
作者: Phatale, Utkarsh Limkar, Suresh Department of Computer Engineering AISSMS Institute of Information Technology Maharashtra Pune India Department of Computer Science and Engineering Central University of Jammu Jammu and Kashmir India
The proliferation of deep fake technology presents a substantial peril to both individuals and society, underscoring the urgent requirement for the development of effective deep fake detection techniques. This study i... 详细信息
来源: 评论
Predicting Gold Prices with Rolling Average Representation and Machine Learning  1
Predicting Gold Prices with Rolling Average Representation a...
收藏 引用
1st International Conference on Innovative Engineering sciences and Technological Research, ICIESTR 2024
作者: Kannan, Rajkumar Andres, Frederic Muthu, Kalaiarasi Sonai Anutariya, Chutiporn Department of Computer Science Tiruchirappalli India National Institute of Informtics Digital Content and Media Science Tokyo Japan Multimedia University Faculty of Information Science and Technology Malaysia Asian Institute of Technology School of Engineering and Technology Pathum Thani Thailand
Price prediction and forecasting have been important topics that have been long studied in the financial world. Commodity price prediction is one such highly popular application in stock markets across the world. Amon... 详细信息
来源: 评论
Eco-Detect: A Sustainable Solution to Advanced Waste Sorting using AI and IoT  4
Eco-Detect: A Sustainable Solution to Advanced Waste Sorting...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent information systems, ICUIS 2024
作者: Nandini Prasad, K.S. Manjula, G. Aishwarya, K.J. Chetankumar Prakash, K. N. Bhanu Chandan, V Sai Dayananda Sagar Academy of Technology and Management Department of Information Science and Engineering India Dayananda Sagar Academy of Technology and Management Department of Computer Science and Design India Dayananda Sagar Academy of Technology and Management Department of Information Science and Engineering Bangalore India
The traditional waste management system, prevalent in many regions, relies heavily on manual sorting processes carried out by human workers. These processes are often labor- intensive and time-consuming, leading to in... 详细信息
来源: 评论
TensorFlow vs Theano: Issues and Challenges for Natural Language Processing  3
TensorFlow vs Theano: Issues and Challenges for Natural Lang...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Dhasmana, Gulshan Praveen Gujjar, J. Guru Prasad, M.S. Devadas, Raghavendra M Hiremani, Vani Divya Shree, N. Department of Computer Science and Engg. Dehradun India Faculty of Management Studies Bengaluru India Manipal Institue of Technology Department of Information Technology Bengaluru India University Symbiosis Institute of Technology Pune India Reva University School of Computing & Information Technology Bengaluru India
ensorFlow and Theano were popular deep learning frameworks for building and training neural networks, including image classification and NLP models. TensorFlow's evolution from a static graph-based approach to inc... 详细信息
来源: 评论
IoT-Aided Charity-Redistribution of Excess Food  2
IoT-Aided Charity-Redistribution of Excess Food
收藏 引用
2nd International Conference on Emerging Trends in information technology and Engineering, ic-ETITE 2024
作者: Yogananth, V.S. Balasubramani, M. Vellore Institute of Technology Department of Computer Applications Tamil Nadu Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
The utilization of the Internet of Things (IOT) has shown significant potential in various aspects of daily life, yet its application in addressing social issues remains underdeveloped. India, with a substantial numbe... 详细信息
来源: 评论
Binary and Multi-Class Classification on the IoT-23 Dataset
Binary and Multi-Class Classification on the IoT-23 Dataset
收藏 引用
2023 Advances in science and Engineering technology International Conferences, ASET 2023
作者: Ahli, Alia Raza, Ayesha Akpinar, Kevser Ovaz Akpinar, Mustafa Rochester Institute of Technology Computing Security Department Dubai United Arab Emirates Higher Colleges of Technology Faculty of Computer Information System Sharjah United Arab Emirates
In the recent years, Internet of Things (IoT) technology has become widespread and is commonly used by organizations for many different purposes. With the increase in the demand for this technology, new security chall... 详细信息
来源: 评论
Forecasting the Impact of Deep Learning on Data science Practices: A Comprehensive Analysis  15
Forecasting the Impact of Deep Learning on Data Science Prac...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Acharjya, Kalyan Devaraj Verma, C. Umamaheswari, B. Shelke, Priya M. Kumar, Mukesh Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Ramnagar District562112 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Computer Science and Engineering Chennai127 India Vishwakarma Institute of Technology Department of Information Technology Pune India Vivekananda Global University Department of Mechanical Engineering Jaipur India
It comprehensively discusses the effect of deep mastering on data technology practices. Deep studying has advanced to become a powerful tool for information mining, pattern recognition, and feature engineering. It is ... 详细信息
来源: 评论
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2637-2664页
作者: Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug School of Computer Science and Engineering Central South UniversityChangsha410083China EIAS LAB College of Computer and Information Sciencesand Center of Excellence in Quantum and Intelligent ComputingPrince Sultan UniversityRiyadh11586Saudi Arabia Gianforte School of Computing Montana State UniversityBozemanMT 59717USA Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... 详细信息
来源: 评论