咨询与建议

限定检索结果

文献类型

  • 30,898 篇 会议
  • 4,719 篇 期刊文献
  • 247 册 图书

馆藏范围

  • 35,864 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,226 篇 工学
    • 16,162 篇 计算机科学与技术...
    • 13,579 篇 软件工程
    • 5,873 篇 信息与通信工程
    • 3,524 篇 控制科学与工程
    • 2,708 篇 电子科学与技术(可...
    • 2,658 篇 电气工程
    • 2,356 篇 生物工程
    • 1,889 篇 生物医学工程(可授...
    • 1,536 篇 光学工程
    • 1,371 篇 机械工程
    • 1,229 篇 动力工程及工程热...
    • 1,205 篇 仪器科学与技术
    • 1,024 篇 化学工程与技术
    • 866 篇 安全科学与工程
    • 727 篇 交通运输工程
  • 11,359 篇 理学
    • 6,206 篇 数学
    • 3,065 篇 物理学
    • 2,581 篇 生物学
    • 2,049 篇 统计学(可授理学、...
    • 1,357 篇 系统科学
    • 1,092 篇 化学
  • 5,788 篇 管理学
    • 3,371 篇 管理科学与工程(可...
    • 2,701 篇 图书情报与档案管...
    • 1,876 篇 工商管理
  • 1,595 篇 医学
    • 1,387 篇 临床医学
    • 1,293 篇 基础医学(可授医学...
    • 850 篇 药学(可授医学、理...
    • 670 篇 公共卫生与预防医...
  • 1,064 篇 法学
    • 858 篇 社会学
  • 671 篇 经济学
    • 671 篇 应用经济学
  • 488 篇 农学
  • 443 篇 教育学
  • 160 篇 文学
  • 77 篇 军事学
  • 40 篇 艺术学
  • 1 篇 哲学

主题

  • 1,135 篇 accuracy
  • 870 篇 computational mo...
  • 854 篇 feature extracti...
  • 738 篇 deep learning
  • 717 篇 training
  • 687 篇 computer science
  • 555 篇 real-time system...
  • 542 篇 machine learning
  • 521 篇 support vector m...
  • 469 篇 predictive model...
  • 424 篇 internet of thin...
  • 367 篇 data models
  • 358 篇 convolutional ne...
  • 345 篇 computer archite...
  • 339 篇 reliability
  • 322 篇 optimization
  • 302 篇 data mining
  • 278 篇 routing
  • 260 篇 artificial intel...
  • 253 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 64 篇 dept. of informa...
  • 60 篇 dept. of informa...
  • 57 篇 nikhef national ...
  • 56 篇 dept. of compute...
  • 54 篇 dept. of compute...
  • 53 篇 dept. of compute...
  • 52 篇 school of automa...
  • 50 篇 leiden universit...
  • 48 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 44 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 76 篇 boumaaza j.
  • 74 篇 coleiro a.
  • 74 篇 gozzini s.r.
  • 71 篇 huang f.
  • 68 篇 dallier r.
  • 61 篇 anguita m.
  • 54 篇 kulikovskiy v.
  • 42 篇 benoit d.m.
  • 42 篇 eddymaoui a.
  • 42 篇 labalme m.
  • 41 篇 gagliardini s.
  • 41 篇 del burgo r.

语言

  • 32,095 篇 英文
  • 3,365 篇 其他
  • 300 篇 中文
  • 57 篇 日文
  • 51 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=dept. Computer Science and Software Engineering"
35864 条 记 录,以下是641-650 订阅
排序:
AI-Powered DeepFake Defense  3
AI-Powered DeepFake Defense
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Chaitra, M. Kushal, B. Likhitha, H. Priyanka, H.R. Bnm Institute of Technology Affiliated to Vtu Dept. of Computer Science and Engineering Bengaluru India
Deepfake technology, known for its ability to produce convincingly face-swapped videos, presents significant risks to privacy, security, and public trust. Misuse of this technology for spreading misinformation, defama... 详细信息
来源: 评论
Breast Cancer Detection with Machine Learning-A Review  2
Breast Cancer Detection with Machine Learning-A Review
收藏 引用
2nd International Conference on Sustainable Computing and Data Communication Systems, ICSCDS 2023
作者: Meghana, Karnam Nandal, Neha Tanwar, Rohit Goel, Lipika Chhabra, Gunjan Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science and Engineering Hyderabad India University of Petroleum and Energy Studies Dept. of Computer Science and Engineering Dehradun India Graphic Era Hill University Dept. of Computer Science and Engineering Dehradun India
Malignancy in the breast is a significant public health concern, where timely identification is essential for effective treatment. Machine Learning (ML) and Deep Learning (DL) algorithms are potential tools for prompt... 详细信息
来源: 评论
Reconsider Time Series Analysis for Insider Threat Detection
Reconsider Time Series Analysis for Insider Threat Detection
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Chen, Chia-Cheng Pao, Hsing-Kuo National Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti... 详细信息
来源: 评论
Securing of Cloud Storage Data Using Hybrid AES-ECC Cryptographic Approach
收藏 引用
Journal of Mobile Multimedia 2023年 第2期19卷 363-388页
作者: Kumar, Sunil Kumar, Dilip Dept. of Computer Science and Engineering National Institute of Technology Jamshedpur India
Internet has revolutionized the world in a way no one could have ever imagined. It paved the way for various different technologies, that have transformed the world exceptionally. Internet enabled cloud technology whi... 详细信息
来源: 评论
Facial Emotional Recognition Using Convolutional Neural Network  2
Facial Emotional Recognition Using Convolutional Neural Netw...
收藏 引用
2nd International Conference for Innovation in Technology, INOCON 2023
作者: Raj, Deepak Wassay, Md. Abdul Chandigarh University Dept. of Computer Science Mohali India Chandigarh University Dept. of Computer Science Engineering Mohali India
The face of a person is his identity. Most of his emotions, issues can be derived from his face. Face is the window to the soul which was said by famous French doctor Duchenne de Boulogne. He used several techniques t... 详细信息
来源: 评论
Decentralized Finance and Cross-Chain Interoperable Automated Market Maker - Using BlockChain  2
Decentralized Finance and Cross-Chain Interoperable Automate...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Sarumathi, S. Saxena, Apoorv Raj Saxena, Yash Raj Sana, Mehreen S. Md Verma, Saritha Roy, Sneha Hkbk College of Engineering Dept. of Computer Science Engineering Bangalore India ClayStack Bangalore India
Decentralized Finance (DeFi) represents an alternative paradigm in financial infrastructure, operating a top the Ethereum Blockchain. DeFi leverages Automated Market Makers (AMMs) to facilitate the exchange of coins/t... 详细信息
来源: 评论
Distinguish between Obese and Normal Body Types Through Gait Analysis Using Classification Models  6
Distinguish between Obese and Normal Body Types Through Gait...
收藏 引用
6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024
作者: Yi, Jae-Sik Han, Ji Hun Kim, Min Jeong Hong, Youn-Sik Incheon National University Dept. of Computer Science and Engineering Incheon Korea Republic of
For gait analysis, an IMU sensor was mounted on the knee and gait related data was collected. Various gait parameters such as gait time, stance swing ratio, heel strike, and toe off can be extracted from the dataset. ... 详细信息
来源: 评论
Dynamic Charging on the Go: Optimizing Mobile Charging Stations for Electric Vehicle Infrastructure  11
Dynamic Charging on the Go: Optimizing Mobile Charging Stati...
收藏 引用
11th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS 2025
作者: Jain, Suhas Gupta, Arobinda Dept. of Computer Science & Engineering Indian Institute of Technology WB Kharagpur721302 India
With the growing adoption of electric vehicles (EVs) as an eco-friendly and sustainable means of transportation, availability of adequate EV charging infrastructure has become very important. While fixed charging stat... 详细信息
来源: 评论
Arrhythmia Classification Using Graph Neural Networks Based on Correlation Matrix
Arrhythmia Classification Using Graph Neural Networks Based ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Han, Seungwoo Tokyo University of Agriculture and Technology Dept. of Electrical Engineering and Computer Science Japan
With the advancements in graph neural network (GNN), there has been increasing interest in applying GNN to electrocardiogram (ECG) analysis. In this study, we generated an adjacency matrix using correlation matrix of ... 详细信息
来源: 评论
Elastic Blockchain Security Solution for Edge Computing Supporting Mobile IoT Devices
Elastic Blockchain Security Solution for Edge Computing Supp...
收藏 引用
2024 International Conference on Electrical and computer engineering Researches, ICECER 2024
作者: Almubark, Hameed Jedidi, Ahmed Al-Raweshidy, Hamed S. Brunel University London Dept. of Computer Science United Kingdom Ahlia University Dept. of Computer Engineering Manama Bahrain Brunel University of London Dept. of Electronic and Electrical Engineering United Kingdom
When integrated, blockchain technology and cloud computing (EC) may improve security and protect data. However, when data is sent to EC, the Internet of Things (IoT) device layer cannot guarantee data security. As a r... 详细信息
来源: 评论