咨询与建议

限定检索结果

文献类型

  • 20,159 篇 会议
  • 12,996 篇 期刊文献
  • 314 册 图书

馆藏范围

  • 33,469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,684 篇 工学
    • 14,375 篇 计算机科学与技术...
    • 11,923 篇 软件工程
    • 4,782 篇 信息与通信工程
    • 3,243 篇 控制科学与工程
    • 2,688 篇 生物工程
    • 2,666 篇 电气工程
    • 2,169 篇 电子科学与技术(可...
    • 2,043 篇 生物医学工程(可授...
    • 1,745 篇 光学工程
    • 1,356 篇 机械工程
    • 1,241 篇 化学工程与技术
    • 1,180 篇 动力工程及工程热...
    • 1,035 篇 网络空间安全
    • 1,023 篇 仪器科学与技术
    • 953 篇 材料科学与工程(可...
    • 946 篇 安全科学与工程
  • 11,864 篇 理学
    • 5,840 篇 数学
    • 3,837 篇 物理学
    • 2,992 篇 生物学
    • 2,001 篇 统计学(可授理学、...
    • 1,358 篇 化学
    • 1,244 篇 系统科学
  • 5,563 篇 管理学
    • 3,398 篇 管理科学与工程(可...
    • 2,391 篇 图书情报与档案管...
    • 1,504 篇 工商管理
  • 2,201 篇 医学
    • 1,763 篇 临床医学
    • 1,584 篇 基础医学(可授医学...
    • 1,063 篇 公共卫生与预防医...
    • 954 篇 药学(可授医学、理...
  • 1,165 篇 法学
    • 958 篇 社会学
  • 598 篇 经济学
  • 512 篇 农学
  • 373 篇 教育学
  • 205 篇 文学
  • 64 篇 军事学
  • 43 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 1,162 篇 accuracy
  • 1,114 篇 deep learning
  • 734 篇 computational mo...
  • 727 篇 machine learning
  • 692 篇 training
  • 678 篇 feature extracti...
  • 528 篇 real-time system...
  • 525 篇 predictive model...
  • 475 篇 internet of thin...
  • 461 篇 convolutional ne...
  • 438 篇 support vector m...
  • 412 篇 data models
  • 337 篇 semantics
  • 294 篇 computer science
  • 285 篇 reliability
  • 277 篇 optimization
  • 275 篇 artificial intel...
  • 262 篇 scalability
  • 262 篇 neural networks
  • 257 篇 computer archite...

机构

  • 232 篇 school of comput...
  • 197 篇 department of co...
  • 158 篇 university of ch...
  • 151 篇 key laboratory o...
  • 128 篇 university of sc...
  • 122 篇 school of comput...
  • 120 篇 department of co...
  • 118 篇 institute of com...
  • 118 篇 school of comput...
  • 115 篇 school of comput...
  • 111 篇 school of comput...
  • 108 篇 department of co...
  • 106 篇 department of co...
  • 103 篇 school of comput...
  • 101 篇 college of compu...
  • 101 篇 school of comput...
  • 98 篇 school of comput...
  • 93 篇 north-west unive...
  • 91 篇 tianfu cosmic ra...
  • 91 篇 national enginee...

作者

  • 169 篇 niyato dusit
  • 105 篇 bastieri d.
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 chen a.
  • 94 篇 calvo d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 82 篇 zheng wei-shi
  • 81 篇 anjali t.
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 72 篇 li xin
  • 69 篇 li cheng
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 64 篇 liu d.
  • 64 篇 kalekin o.
  • 63 篇 díaz a.f.
  • 62 篇 chen m.j.

语言

  • 27,538 篇 英文
  • 5,686 篇 其他
  • 304 篇 中文
  • 6 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing Science and Engineering School Of Computing Science & Engineering"
33469 条 记 录,以下是4271-4280 订阅
排序:
An Innovative Deep Learning-Based Predictive Maintenance Model for Smart Automotive System
An Innovative Deep Learning-Based Predictive Maintenance Mod...
收藏 引用
Multi-Agent Systems for Collaborative Intelligence (ICMSCI), International Conference on
作者: V Indumathi C. AshokKumar Department of Computing Technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India
This research presents an innovative deep learning-based predictive maintenance model designed for smart automotive systems, utilizing the EnsembleAE-Boost (EAE-Boost) algorithm. The primary objective of the proposed ... 详细信息
来源: 评论
Secure Federated Learning with Blockchain and Homomorphic Encryption for Healthcare Data Sharing  23
Secure Federated Learning with Blockchain and Homomorphic En...
收藏 引用
23rd International Conference on Cyberworlds, CW 2024
作者: Firdaus, Muhammad Rhee, Kyung-Hyune Pukyong National University Industrial Science Technology Research Center Korea Republic of Telkom University School of Computing Indonesia Pukyong National University Division of Computer Engineering and AI Korea Republic of
Healthcare data is often fragmented across various institutions due to its highly sensitive and private nature. In this sense, hospitals and clinics maintain electronic health records (EHRs) independently;hence, valua... 详细信息
来源: 评论
SQL Injection Attacks and Prevention  6
SQL Injection Attacks and Prevention
收藏 引用
6th International Conference on Information Systems and Computer Networks, ISCON 2023
作者: Gaur, Kashish Diwakar, Manoj Gaur, Kaamya Singh, Prabhishek Sachdeva, Tanya Pandey, Neeraj Kumar Graphic Era Deemed to Be University Dehradun India Bennett University School of Computer Science Engineering and Technology Greater Noida India Dit University School of Computing Dehradun248009 India
SQL Injection Attacks generally target the information stored in the database. Therefore, it becomes necessary for administrators to have mechanisms installed to detect and prevent them. Several mechanisms have been p... 详细信息
来源: 评论
A Hybrid Unsupervised Clustering-Based Anomaly Detection Method
收藏 引用
Tsinghua science and Technology 2021年 第2期26卷 146-153页
作者: Guo Pu Lijuan Wang Jun Shen Fang Dong School of Cyber Engineering Xidian UniversityXi'an 710126China School of Computing and Information Technology University of WollongongNSW 2522Australia School of Computer Science and Engineering Southeast UniversityNanjing 211189China
In recent years,machine learning-based cyber intrusion detection methods have gained increasing *** number and complexity of new attacks continue to rise;therefore,effective and intelligent solutions are *** machine l... 详细信息
来源: 评论
HHO-ACO hybridized load balancing technique in cloud computing
收藏 引用
International Journal of Information Technology (Singapore) 2023年 第3期15卷 1357-1365页
作者: Sumathi, Muruganandam Vijayaraj, Natarajan Raja, Soosaimarian Peter Rajkamal, Murugesan School of Computing SASTRA Deemed University Tamil Nadu Thanjavur India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala Research and Development Institute of Science and Technology Tamil Nadu Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India IBM Karnataka Bangalore India
Due to on-demand requirement of computing resources, cloud computing (CC) is the widely used technology in data storage, software and platform. CC provides everything as a service to requester. In an Infrastructure as... 详细信息
来源: 评论
Infrastructure Development of Non DHT-Based Pyramid Tree Network Architecture  38th
Infrastructure Development of Non DHT-Based Pyramid Tree Net...
收藏 引用
38th International Conference on Computers and Their Applications, CATA 2023
作者: Roy, Indranil Rahimi, Nick Gupta, Bidyut Debnath, Narayan Department of Computer Science Southeast Missouri State University Cape GirardeauMO United States School of Computing Sciences & Computer Engineering University of Southern Mississippi HattiesburgMS United States School of Computing Southern Illinois University CarbondaleIL United States School of Computing and Information Technology Eastern International University Viet Nam
In this paper, we have considered a recently reported 2-layer non-DHT-based structured P2P network. It is an interest-based system and consists of different clusters such that peers in a given cluster possess instance... 详细信息
来源: 评论
Towards Improving the Anti-attack Capability of the RangeNet++  16th
Towards Improving the Anti-attack Capability of the RangeNet...
收藏 引用
16th Asian Conference on Computer Vision , ACCV 2022
作者: Zhou, Qingguo Lei, Ming Zhi, Peng Zhao, Rui Shen, Jun Yong, Binbin School of Information Science and Engineering Lanzhou University Tianshui South Road 222 Gansu Lanzhou730000 China School of Computing and Information Technology University of Wollongong WollongongNSW Australia
With the possibility of deceiving deep learning models by appropriately modifying images verified, lots of researches on adversarial attacks and adversarial defenses have been carried out in academia. However, there i... 详细信息
来源: 评论
An Effective Method for Distributing Workloads in Smart City using Sensor Networks Enabled by Fog
An Effective Method for Distributing Workloads in Smart City...
收藏 引用
2024 IEEE International Conference on Electronic Systems and Intelligent computing, ICESIC 2024
作者: Nithiyanandam Velvizhi, R. Priyadharshini, S.P. Poongavanam, N. SRM Institute of Science and Technology Kattankulathur Campus Department of Computing Technologies Chengalpattu Kattankulathur India Sathyabama Institute of Science and Technology OMR Department of Computer Science and Engineering Chennai India St' Joseph College of Engineering OMR Department of Artificial Intelligence and Machine Learning Chennai India Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India
By linking sensor nodes to fog nodes in critical locations, the Distributing Workloads in Fog Enabled Smart City (DW-FESC) technique efficiently handles the problem of distribution of workloads in smart cities. To get... 详细信息
来源: 评论
Recognition of De Novo Drug Design for Targeted Chemical Libraries through Optimization Techniques  5
Recognition of De Novo Drug Design for Targeted Chemical Lib...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Balamurugan, K.S. Navaneethakrishnan, Sundara Rajulu Srinivasulu, Senduru Kumutha, D. Surendran, R. Karpaga Vinayaga College of Engineering and Technology Department of Electronics and Communication Engineering Tamil Nadu Chengalpattu India Dhanalakshmi Srinivasan University Department of Computer Science and Engineering Samayapuram Campus Tiruchirappalli Trichy India Sathyabama Institute of science and Technology School of Computing Department of Computer Science and Engineering Chennai600119 India Jeppiaar Institute of Technology Department of Electronics and Communication Engg. Tamilnadu Sriperumbudur India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Chennai602105 India
The process of De Novo drug design involves the integration of artificial intelligence with computational intelligence techniques. The proposed system aims to provide precision therapeutics through the development of ... 详细信息
来源: 评论
An Improved Steganographic Scheme Using the Contour Principle to Ensure the Privacy of Medical Data on Digital Images
收藏 引用
Computer Systems science & engineering 2023年 第8期46卷 1563-1576页
作者: R.Bala Krishnan D.Yuvaraj P.Suthanthira Devi Varghese S.Chooralil N.Rajesh Kumar B.Karthikeyan G.Manikandan srinivasa ramanujan centre sastra deemed universitykumbakonamtamil naduindia department of computer science cihan university–duhokkurdistan regioniraq department of information technology st.joseph’s college of engineeringchennaitamil naduindia department of computer science&engineering rajagiri school of engineering&technologykakkanadkeralaindia school of computing sastra deemed universitythanjavurtamil naduindia
With the improvement of current online communication schemes,it is now possible to successfully distribute and transport secured digital Content via the communication channel at a faster transmission *** steganography... 详细信息
来源: 评论