咨询与建议

限定检索结果

文献类型

  • 275,253 篇 会议
  • 112,435 篇 期刊文献
  • 2,825 册 图书

馆藏范围

  • 390,512 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,730 篇 工学
    • 149,582 篇 计算机科学与技术...
    • 120,996 篇 软件工程
    • 54,342 篇 信息与通信工程
    • 35,728 篇 控制科学与工程
    • 31,928 篇 电气工程
    • 30,747 篇 电子科学与技术(可...
    • 25,989 篇 生物工程
    • 20,462 篇 生物医学工程(可授...
    • 17,657 篇 光学工程
    • 15,393 篇 机械工程
    • 13,037 篇 化学工程与技术
    • 12,145 篇 仪器科学与技术
    • 12,134 篇 动力工程及工程热...
    • 11,396 篇 材料科学与工程(可...
    • 8,308 篇 安全科学与工程
    • 7,753 篇 网络空间安全
  • 126,925 篇 理学
    • 63,184 篇 数学
    • 41,671 篇 物理学
    • 29,381 篇 生物学
    • 20,546 篇 统计学(可授理学、...
    • 14,865 篇 系统科学
    • 13,949 篇 化学
  • 55,947 篇 管理学
    • 33,719 篇 管理科学与工程(可...
    • 24,438 篇 图书情报与档案管...
    • 16,701 篇 工商管理
  • 19,298 篇 医学
    • 16,209 篇 临床医学
    • 14,572 篇 基础医学(可授医学...
    • 9,155 篇 药学(可授医学、理...
    • 7,767 篇 公共卫生与预防医...
  • 10,564 篇 法学
    • 8,647 篇 社会学
  • 6,447 篇 经济学
  • 5,079 篇 农学
  • 4,194 篇 教育学
  • 1,853 篇 文学
  • 874 篇 军事学
  • 509 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 20,001 篇 computer science
  • 9,234 篇 accuracy
  • 8,812 篇 computational mo...
  • 8,018 篇 feature extracti...
  • 7,655 篇 deep learning
  • 7,248 篇 machine learning
  • 6,556 篇 training
  • 5,282 篇 data mining
  • 5,183 篇 computer archite...
  • 5,093 篇 support vector m...
  • 4,972 篇 predictive model...
  • 4,930 篇 wireless sensor ...
  • 4,683 篇 costs
  • 4,560 篇 optimization
  • 4,547 篇 bandwidth
  • 4,479 篇 application soft...
  • 4,394 篇 protocols
  • 4,388 篇 testing
  • 4,361 篇 real-time system...
  • 4,360 篇 algorithm design...

机构

  • 1,721 篇 department of co...
  • 1,374 篇 department of el...
  • 1,372 篇 department of co...
  • 1,174 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 977 篇 department of ph...
  • 877 篇 department of co...
  • 857 篇 physikalisches i...
  • 846 篇 oliver lodge lab...
  • 814 篇 department of el...
  • 753 篇 university of ch...
  • 641 篇 department of co...
  • 553 篇 department of co...
  • 546 篇 infn sezione di ...
  • 521 篇 chitkara univers...
  • 518 篇 infn laboratori ...
  • 514 篇 infn sezione di ...
  • 501 篇 horia hulubei na...
  • 498 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 258 篇 barter w.
  • 254 篇 s. chen
  • 253 篇 j. wang
  • 240 篇 a. gomes
  • 233 篇 blake t.
  • 223 篇 amato s.
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 221 篇 c. alexa
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 216 篇 j. m. izen
  • 214 篇 brundu d.
  • 209 篇 bencivenni g.
  • 207 篇 beiter a.
  • 200 篇 bay a.
  • 193 篇 c. amelung
  • 192 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 345,194 篇 英文
  • 41,695 篇 其他
  • 3,849 篇 中文
  • 220 篇 日文
  • 70 篇 德文
  • 48 篇 法文
  • 42 篇 斯洛文尼亚文
  • 34 篇 朝鲜文
  • 12 篇 西班牙文
  • 11 篇 阿拉伯文
  • 9 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=The Department of Computer Science and Computer Engineering"
390513 条 记 录,以下是4861-4870 订阅
排序:
A Multi-Functional Web Tool for Comprehensive Threat Detection Through IP Address Analysis
A Multi-Functional Web Tool for Comprehensive Threat Detecti...
收藏 引用
2024 IEEE Conference on engineering Informatics, ICEI 2024
作者: Tanan, Cebajel Kulkarni, Sameer G. Das, Tamal Hanawal, Manjesh K. Indian Institute of Technology Computer Science and Engineering Department Dharwad India
In recent years, the advances in digitalisation have also adversely contributed to the significant rise in cybercrimes. Hence, building the threat intelligence to shield against rising cybercrimes has become a fundame... 详细信息
来源: 评论
Lightweight Privacy Preserving Framework at Edge Layer in IoT  1
收藏 引用
10th International Conference on Frontiers of Intelligent Computing: Theory and Applications, FICTA 2022
作者: Agrawal, Kavita Chittineni, Suresh Reddy, P. V. G. D. Prasad Subhadra, K. Diaz, Elizabeth D. Department of Computer Science and Engineering Chaitanya Bharathi Institute of Technology Hyderabad India Department of Computer Science and Engineering GITAM Deemed to be University Vishakhapatnam India Department of Computer Science and Systems Engineering Andhra University Vishakhapatnam India Department of Computer Science and Engineering University of Texas Arlington United States
The Internet of Things is helping us to make our lives comfortable. IoT devices used here are resource-constrained in terms of memory and CPU as well as they lack basic security design. When everyone is using IoT, the... 详细信息
来源: 评论
Evidence Collection Application  5
Evidence Collection Application
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Segaran, Lisshutharan Elamin, Yousif Siddhartha, V.Ganesh Kallo, Amlan Mangalam Rajkumar, K. Department Of Computer Science & Engineering Bangalore India
The objective is to create an application that makes it easier for citizens to expose Bribery. The program is based on the idea that any electronic device can be utilized to acquire evidence, such as cell phones, tabl... 详细信息
来源: 评论
An Investigation of Task Offloading Latency in Edge-Cloud Environment Using Machine Learning Techniques  9
An Investigation of Task Offloading Latency in Edge-Cloud En...
收藏 引用
9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023
作者: Joel Hebrew, P. Prem Kumar, S. Naveen Raj, R. Kumar, N. Department of Computer Science and Engineering Chennai India
The volume of information produced by Internet of Things (IoT) gadgets has significantly expanded along with how many of these gadgets are connected to the Internet. Now a day's Edge-Cloud computing has a major ro... 详细信息
来源: 评论
A Lightweight Deep Leakage Prevention Model with Mixing Multi-gradients  2nd
A Lightweight Deep Leakage Prevention Model with Mixing Mul...
收藏 引用
2nd International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Hsiao, Wei-Chun Wang, Chih-Hung Department of Computer Science and Information Engineering National Chiayi University Chiayi Taiwan
In deep learning model, the training procedure can obtain appropriate weights by leveraging the information of gradient descent. However, the gradients between the weights may leak the original neural network training... 详细信息
来源: 评论
Identifying Authentic Reviews on Amazon Dataset using Transformer-Based Models
Identifying Authentic Reviews on Amazon Dataset using Transf...
收藏 引用
2024 International Conference on IT and Industrial Technologies, ICIT 2024
作者: Azam, Hadiqa Chaudhry, Hassan Nazeer Majid, Muhammad Computer Department University of Engineering and Technology Taxila Pakistan Computer Science Department Barani Institute of Information Technology Rawalpindi Pakistan
Reviews and ratings significantly impact businesses, either boosting their reputation or harming competitors. To manipulate these outcomes, some businesses falsify product reviews. This paper introduces a transformer-... 详细信息
来源: 评论
The Performance Optimization of Harnessing Green Information Technology for Energy Harvesting  2
The Performance Optimization of Harnessing Green Information...
收藏 引用
2nd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Babu, S. Anantha Shashikala, H.K. Department of Computer Science and Engineering Bangalore India
Green IT (information technology) can ultimately change how we think about energy harvesting. We can develop novel approaches to capture energy from renewable sources, such as sunlight and wind, by utilizing the power... 详细信息
来源: 评论
Real-Time Sound Detection of Rose-Ringed Parakeet Using LSTM Network with MFCC and Mel Spectrogram
Real-Time Sound Detection of Rose-Ringed Parakeet Using LSTM...
收藏 引用
2023 Annual International Conference on Emerging Research Areas: International Conference on Intelligent Systems, AICERA/ICIS 2023
作者: Jose, Theresa Mayan, J. Albert Department of Computer Science and Engineering Chennai India
Nowadays, machine learning, deep learning, and artificial intelligence are essential in identifying bird presence in rice fields and other agricultural applications. Automated identification techniques make it easier ... 详细信息
来源: 评论
Pro Tech: A project management system  4th
Pro Tech: A project management system
收藏 引用
4th International Conference on Computational Methods in science and Technology, ICCMST 2024
作者: Teotia, Satwik Prajapati, Rahul Maurya, Deepak Kumar Gupta, Prahlad Yadav, Jay Singh Department of Computer Science AKTU University ABES Engineering College Ghaziabad India
The modern-day educational landscape demands progressive answers to enhance challenge control practices amongst university students. In reaction to this want, the principal project, "Pro Tech" introduces an ... 详细信息
来源: 评论
AI Based Touchless Attendance System  1
AI Based Touchless Attendance System
收藏 引用
1st International Conference on computer science and Emerging Technologies, CSET 2023
作者: Kumar, Vinay Madan, Deepanshu Srivastava, Prakash Indu, Km Department of Computer Science and Engineering Dehradun India
Attendance system has always been an important part of an organization as it is used to track the attendance of employees and students daily. The process of taking attendance has evolved from manual methods to utilizi... 详细信息
来源: 评论