咨询与建议

限定检索结果

文献类型

  • 43,972 篇 会议
  • 21,960 篇 期刊文献
  • 359 册 图书

馆藏范围

  • 66,291 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,675 篇 工学
    • 27,702 篇 计算机科学与技术...
    • 22,728 篇 软件工程
    • 10,259 篇 信息与通信工程
    • 6,774 篇 控制科学与工程
    • 5,025 篇 电气工程
    • 4,838 篇 生物工程
    • 4,449 篇 电子科学与技术(可...
    • 3,867 篇 生物医学工程(可授...
    • 3,015 篇 光学工程
    • 2,935 篇 机械工程
    • 2,326 篇 动力工程及工程热...
    • 2,292 篇 网络空间安全
    • 2,210 篇 化学工程与技术
    • 2,140 篇 仪器科学与技术
    • 1,865 篇 安全科学与工程
    • 1,642 篇 材料科学与工程(可...
    • 1,620 篇 交通运输工程
  • 22,455 篇 理学
    • 10,802 篇 数学
    • 7,154 篇 物理学
    • 5,572 篇 生物学
    • 3,406 篇 统计学(可授理学、...
    • 2,473 篇 化学
    • 2,249 篇 系统科学
  • 11,656 篇 管理学
    • 7,503 篇 管理科学与工程(可...
    • 4,727 篇 图书情报与档案管...
    • 3,133 篇 工商管理
  • 4,125 篇 医学
    • 3,408 篇 临床医学
    • 3,059 篇 基础医学(可授医学...
    • 1,895 篇 公共卫生与预防医...
    • 1,830 篇 药学(可授医学、理...
  • 1,984 篇 法学
  • 1,251 篇 经济学
  • 1,201 篇 农学
  • 650 篇 教育学
  • 280 篇 文学
  • 191 篇 军事学
  • 124 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 2,623 篇 accuracy
  • 2,262 篇 deep learning
  • 2,040 篇 feature extracti...
  • 1,660 篇 machine learning
  • 1,545 篇 training
  • 1,506 篇 computational mo...
  • 1,376 篇 educational inst...
  • 1,376 篇 real-time system...
  • 1,364 篇 internet of thin...
  • 1,330 篇 convolutional ne...
  • 1,221 篇 predictive model...
  • 1,177 篇 support vector m...
  • 1,126 篇 computer science
  • 999 篇 optimization
  • 881 篇 security
  • 843 篇 data models
  • 807 篇 artificial intel...
  • 775 篇 data mining
  • 756 篇 cloud computing
  • 727 篇 neural networks

机构

  • 1,058 篇 college of compu...
  • 1,033 篇 department of ph...
  • 1,011 篇 cavendish labora...
  • 987 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 791 篇 college of compu...
  • 638 篇 university of ch...
  • 622 篇 infn sezione di ...
  • 617 篇 infn laboratori ...
  • 602 篇 infn sezione di ...
  • 598 篇 fakultät physik ...
  • 568 篇 infn sezione di ...
  • 559 篇 school of physic...
  • 544 篇 horia hulubei na...
  • 539 篇 department of ph...
  • 538 篇 school of physic...
  • 533 篇 imperial college...
  • 518 篇 iccub universita...
  • 517 篇 h.h. wills physi...
  • 517 篇 nikhef national ...

作者

  • 278 篇 barter w.
  • 264 篇 a. gomes
  • 252 篇 beiter a.
  • 246 篇 c. alexa
  • 244 篇 j. m. izen
  • 241 篇 bellee v.
  • 237 篇 s. chen
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 235 篇 brundu d.
  • 235 篇 blake t.
  • 229 篇 g. spigo
  • 227 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 225 篇 bencivenni g.
  • 224 篇 betancourt c.
  • 223 篇 bay a.
  • 222 篇 borsato m.

语言

  • 55,559 篇 英文
  • 9,854 篇 其他
  • 958 篇 中文
  • 45 篇 日文
  • 14 篇 德文
  • 13 篇 法文
  • 11 篇 斯洛文尼亚文
  • 3 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=College of Computer Science and Technology Engineering"
66291 条 记 录,以下是1011-1020 订阅
排序:
A Novel Clustering & Machine Learning Algorithm for Crime Rate Prediction and Analysis  2
A Novel Clustering & Machine Learning Algorithm for Crime Ra...
收藏 引用
2nd International Conference on Augmented Intelligence and Sustainable Systems, ICAISS 2023
作者: Ramanan, K. Anandakumar, A. Prakash, M. Santhosh Sivaraja, P.M. Maheswari, G. Uma Npr College of Engineering and Technology Department of Computer Science Engineering Tamil Nadu India Amrita College of Engineering Department of Computer Science Engineering Tamil Nadu India Rmk College of Engineering and Technology Department of Computer Science Engineering Tamil Nadu Chennai India
The security implications of gathering and analyzing data on criminal activity in researcher's everyday lives are not well understood. Forecasting and analyzing crime rates involves mining a database of criminal o... 详细信息
来源: 评论
Question Answering FAQ Bot Using Natural Language Processing  11th
Question Answering FAQ Bot Using Natural Language Processing
收藏 引用
11th International Conference on Intelligent Computing and Applications, ICRTC 2023
作者: Vijay, K. Sowmia, K.R. Ravikumar, S. Arockia Raj, Y. Department of Computer Science and Engineering Rajalakshmi Engineering College Chennai India Department of Artificial Intelligence and Machine Learning Rajalakshmi Engineering College Chennai India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Computer Science and Engineering PSNA College of Engineering and Technology Dindigul India
The BOT retorts with the precise results that help the user for the query and also requests them to rate the response to provide better results. The [frequently answered questions] BOT is a program developed through m... 详细信息
来源: 评论
Computational Web Drug Discovery Application forSARS- Cov-2 Disease Using Predictive and Analytical Approach  10
Computational Web Drug Discovery Application forSARS- Cov-2 ...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Hemkiran, S. Kartik, R. Aswath, S. Rathan Kabilan, K. Sudha Sadasivam, G. Psg Institute of Technology and Applied Research Dept. of Computer Science and Engineering Coimbatore India Psg College of Technology Dept. of Computer Science and Engineering Coimbatore India
In response to the urgent need for coronavirus treatments, this research focuses on leveraging bioactivity data collection and processing for efficient drug discovery, employing computational methods to predict potent... 详细信息
来源: 评论
An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption
An Approach for Securing IoT Data using Blockchain and Proxy...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Saradha, M. Keerthivasan, B. Arunachalam, M.P.L. Gnanaprakash, K. Nivitha, K. K. S. Rangasamy College of Technology Computer Science and Engineering Tiruchengode637215 India Vellore Institute of Technology Computer Science and Engineering Vellore632014 India
The development of Internet of Things (IoT) devices has resulted in exponential data generation, creating substantial problems to guaranteeing the security and privacy of sensitive information. Traditional security me... 详细信息
来源: 评论
A Novel Visual Transformer for Long-Distance Pipeline Pattern Recognition in Complex Environment
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2933-2945页
作者: Zhu, Chengyuan Pu, Yanyun Yang, Kaixiang Yang, Qinmin Chen, C.L. Philip Zhejiang University College of Control Science and Engineering Zhejiang Hangzhou310007 China Huzhou Institute of Zhejiang University Zhejiang Huzhou313000 China South China University of Technology College of Computer Science and Engineering Guangdong Guangzhou510006 China
The effective warning of dangerous events along long-distance pipelines is critical to ensure the safety of oil and gas transportation. Distributed optical fiber sensing (DOFS) technology can assist operators to ident... 详细信息
来源: 评论
Enhancing VANET Efficiency with ACRR Technique for Improved Traffic Management and Network Scalability
Enhancing VANET Efficiency with ACRR Technique for Improved ...
收藏 引用
2024 International Conference on science, technology, engineering and Management, ICSTEM 2024
作者: Karthick, K. Talari, Praveen Nishadevi, V. Krishna Prakash, R. Asokan, R. Velusamy, A. Dept. of Computer Science and Engineering Kongunadu College of Engineering and Technology Tamilnadu Trichy India Dept. of Computer Science and Engineering Vignan Bharathi institute of technology Telangana Hyderabad India Dept. of Computer Science and Engineering Mahendra College of Engineering Tamilnadu Salem India Dept. of Information Technology Sona College of Technology Salem India Dept. of Electronics and Communication Engineering Kongunadu College of Engineering and Technology Tamilnadu Trichy India Dept. of Information Technology Sona College of Technology Tamil Nadu Salem India
The role of Vehicular Ad Hoc Networks (VANETs) is crucial in enabling Intelligent Transportation System (ITS) technologies such as safe financial transactions, media applications, and effective traffic control. As tra... 详细信息
来源: 评论
Wireless Sensor Networks: Revolutionizing Explosive Detection  5
Wireless Sensor Networks: Revolutionizing Explosive Detectio...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Sujith Kumar, P.S. Anand, C. Vasuki, N. Ramesh, V. Santhoshkumar, S.P. Sree Buddha College of Engineering Department of Computer Science and Engineering Kerala Alappuzha India Nandha College of Technology Department of Information Technology Erode India Government College of Engineering Department of Computer Science and Engineering Erode India School of Computing Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Avadi India
One of the important technologies for protecting civilian life from terrorist attacks is explosive detection techniques. The global incidence of terrorist activities has been considerably reduced by the development of... 详细信息
来源: 评论
SGTP: A Spatiotemporal Generalized Trajectory Publishing Method With Differential Privacy
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2233-2247页
作者: Qiu, Shuyuan Pi, Dechang Wang, Yanxue Xu, Tongtong College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao266590 China College of Computer and Cyber Security Hebei Normal University Shijiazhuang050024 China
With the rapid development of location-based service technology, the leakage of trajectory privacy has become more and more serious. In order to solve the problems of insufficient privacy protection and low availabili... 详细信息
来源: 评论
Hybrid Teaching Learning Approach for Improving Network Lifetime in Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1975-1992页
作者: P.Baskaran K.Karuppasamy Easwari Engineering College Chennai600089India Computer Science and Engineering RVS College of Engineering&TechnologyCoimbatore641402India
In a wireless sensor network(WSN),data gathering is more effectually done with the clustering *** is a critical strategy for improving energy efficiency and extending the longevity of a *** modeling-based clustering i... 详细信息
来源: 评论
Secure Channel Creation for Task Delivery in Vehicular Cloud Computing to Avoid Denial of Service (DoS)  3
Secure Channel Creation for Task Delivery in Vehicular Cloud...
收藏 引用
3rd International Conference on Automation, Computing and Renewable Systems, ICACRS 2024
作者: Meenambika, A. Pavalarajan, S. Lavanya, N. Anu Jerom, B. Ajith Divya, S. Department of Computer Science and Business Systems PSNA College of Engineering and Technology Dindigul India PSNA College of Engineering and Technology Dindigul India Department of Artificial Intelligence and Data Science PSNA College of Engineering and Technology Dindigul India
Vehicular Cloud Computing (VCC) offers a promising platform for supporting various automotive applications and services. However, its distributed and dynamic nature makes it susceptible to Denial-of-Service (DoS) atta... 详细信息
来源: 评论