咨询与建议

限定检索结果

文献类型

  • 43,759 篇 会议
  • 21,924 篇 期刊文献
  • 359 册 图书

馆藏范围

  • 66,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,614 篇 工学
    • 27,797 篇 计算机科学与技术...
    • 22,841 篇 软件工程
    • 10,273 篇 信息与通信工程
    • 6,792 篇 控制科学与工程
    • 5,077 篇 电气工程
    • 4,839 篇 生物工程
    • 4,439 篇 电子科学与技术(可...
    • 3,875 篇 生物医学工程(可授...
    • 3,051 篇 光学工程
    • 2,936 篇 机械工程
    • 2,331 篇 动力工程及工程热...
    • 2,288 篇 网络空间安全
    • 2,212 篇 化学工程与技术
    • 2,142 篇 仪器科学与技术
    • 1,871 篇 安全科学与工程
    • 1,625 篇 交通运输工程
    • 1,620 篇 材料科学与工程(可...
  • 22,533 篇 理学
    • 10,842 篇 数学
    • 7,170 篇 物理学
    • 5,578 篇 生物学
    • 3,399 篇 统计学(可授理学、...
    • 2,474 篇 化学
    • 2,251 篇 系统科学
  • 11,685 篇 管理学
    • 7,521 篇 管理科学与工程(可...
    • 4,737 篇 图书情报与档案管...
    • 3,140 篇 工商管理
  • 4,136 篇 医学
    • 3,419 篇 临床医学
    • 3,072 篇 基础医学(可授医学...
    • 1,902 篇 公共卫生与预防医...
    • 1,828 篇 药学(可授医学、理...
  • 1,985 篇 法学
  • 1,250 篇 经济学
  • 1,208 篇 农学
  • 652 篇 教育学
  • 281 篇 文学
  • 192 篇 军事学
  • 125 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 2,536 篇 accuracy
  • 2,222 篇 deep learning
  • 2,006 篇 feature extracti...
  • 1,648 篇 machine learning
  • 1,519 篇 training
  • 1,461 篇 computational mo...
  • 1,376 篇 educational inst...
  • 1,330 篇 internet of thin...
  • 1,313 篇 convolutional ne...
  • 1,301 篇 real-time system...
  • 1,191 篇 predictive model...
  • 1,161 篇 support vector m...
  • 1,128 篇 computer science
  • 972 篇 optimization
  • 853 篇 security
  • 813 篇 data models
  • 784 篇 artificial intel...
  • 775 篇 data mining
  • 740 篇 cloud computing
  • 710 篇 neural networks

机构

  • 1,068 篇 college of compu...
  • 1,028 篇 department of ph...
  • 1,010 篇 cavendish labora...
  • 977 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 802 篇 college of compu...
  • 639 篇 university of ch...
  • 619 篇 infn sezione di ...
  • 611 篇 infn laboratori ...
  • 599 篇 infn sezione di ...
  • 588 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 544 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 536 篇 school of physic...
  • 532 篇 imperial college...
  • 522 篇 nikhef national ...
  • 518 篇 h.h. wills physi...
  • 517 篇 school of physic...

作者

  • 268 篇 barter w.
  • 264 篇 a. gomes
  • 253 篇 beiter a.
  • 247 篇 c. alexa
  • 244 篇 j. m. izen
  • 238 篇 bellee v.
  • 237 篇 s. chen
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 230 篇 brundu d.
  • 229 篇 g. spigo
  • 229 篇 blake t.
  • 226 篇 bowcock t.j.v.
  • 221 篇 f. siegert
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 220 篇 bencivenni g.
  • 219 篇 borsato m.

语言

  • 60,414 篇 英文
  • 4,695 篇 其他
  • 950 篇 中文
  • 45 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 5 篇 斯洛文尼亚文
  • 2 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=College of Computer Science and Technology Engineering"
66042 条 记 录,以下是811-820 订阅
排序:
Spectral Data Classification for Supply Chain Management  5
Spectral Data Classification for Supply Chain Management
收藏 引用
5th International Conference on Inventive Research in Computing Applications, ICIRCA 2023
作者: Ananthi, P. Sangavi, N. Ashish, G. Jabeen Begum, S. Mahalakhsmi, V. Kongu Engineering College Computer Science and Design Erode India Bannari Amman Institute of Technology Computer Science and Engineering Erode India Sengunthar College of Engineering Information Technology Thriuchangode India Velalar College of Engineering and Technology Computer Science and Engineering Erode India
Supply chain management plays a pivotal role in business operations, specifically with regard to the distribution network and ensuring the pristine condition of delivered products. Damages that may occur during shippi... 详细信息
来源: 评论
Robust Technique for Detecting and Blocking of VPN over Networks  9
Robust Technique for Detecting and Blocking of VPN over Netw...
收藏 引用
9th International Conference on science, technology, engineering and Mathematics, ICONSTEM 2024
作者: Vijaya, G. Dhiyanesh, M.S. Hashmi, M.D. Junaith Rehaan, K. Kavennesh, B.V. Sri Krishna College of Engineering And Technology Computer Science And Engineering Tamil Nadu Coimbatore India
In computer networks, data and information may be exchanged between linked devices through network communication. Networks are the backbone of the digital world, allowing data to be sent between computers, servers, an... 详细信息
来源: 评论
Clustered Wireless Sensor Network in Precision Agriculture via Graph Theory
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 1435-1449页
作者: L.R.Bindu P.Titus D.Dhanya Department of Science and Humanities Mar Ephraem College of Engineering and TechnologyTamil Nadu629171India. Department of Science and Humanities University College of Engineering NagercoilAnna University Constituent CollegeKonamNagercoil629004India Department of Computer Science and Engineering Mar Ephraem College of Engineering and TechnologyTamil Nadu629171India
Food security and sustainable development is making a mandatory move in the entire human *** attainment of this goal requires man to strive for a highly advanced state in thefield of agriculture so that he can produce ... 详细信息
来源: 评论
Automated Handwritten Letter Recognition using Optimized Deep Learning Model
Automated Handwritten Letter Recognition using Optimized Dee...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Indira, C.K. Gayathrilahari, N. Jyoshna, J. Jyothi, A. Sruthi, M. Siri Chandhana Saranya, D. Venkata G Pullaiah College of Engineering and Technology Computer Science and Engineering Andhra Pradesh Kurnool India
Forensic evidence, bank signature validation, and postal code recognition are just a few of the growing number of applications for handwritten charm recognition technology. The prevalence of numerous mysterious handwr... 详细信息
来源: 评论
Intelligent Blockchain: Use of Blockchain and Machine Learning Algorithm for Smart Contract and Smart Bidding  3rd
Intelligent Blockchain: Use of Blockchain and Machine Learni...
收藏 引用
3rd International Conference on Machine Learning, Internet of Things and Big Data, ICMIB 2023
作者: Rout, Jyotiranjan Pani, Susmita Mishra, Sibashis Panda, Bhagyashree Kar, Satya Swaroop Paramanik, Sanjay Department of Computer Science and Engineering Balasore College of Engineering and Technology Sergarh Odisha Balasore India
With the growth of population, there is an increase in demand in food, as well as growth in agribusiness and hence, an increase in contract farming. Contract farming provides the farmers with the benefits such as enha... 详细信息
来源: 评论
A Proactive Method Using Machine Learning Models to Detect Phishing Attacks in Thread Sharing Network  10
A Proactive Method Using Machine Learning Models to Detect P...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Ajay Kumar, K.V. Deepalakshmi, R. Balasubramaniyamoorthy, P.S. Murugan, K.R. Senthil Velammal College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Madurai India
Phishing attacks present an enduring and pervasive threat in the digital realm, with cybercriminals continuously devising innovative techniques to deceive users and compromise sensitive information. This paper focuses... 详细信息
来源: 评论
OAAFormer:Robust and Efficient Point Cloud Registration Through Overlapping-Aware Attention in Transformer
收藏 引用
Journal of computer science & technology 2024年 第4期39卷 755-770页
作者: Jun-Jie Gao Qiu-Jie Dong Rui-An Wang Shuang-Min Chen Shi-Qing Xin Chang-He Tu Wenping Wang School of Computer Science and Technology Shandong UniversityQingdao 266237China School of Information and Technology Qingdao University of Science and TechnologyQingdao 266061China College of Engineering Texas A&M UniversityTexasTX 77843U.S.A.
In the domain of point cloud registration,the coarse-to-fine feature matching paradigm has received significant attention due to its impressive *** paradigm involves a two-step process:first,the extraction of multilev... 详细信息
来源: 评论
X-OODM:Leveraging Explainable Object-Oriented Design Methodology for Multi-Domain Sentiment Analysis
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4977-4994页
作者: Abqa Javed Muhammad Shoaib Abdul Jaleel Mohamed Deriche Sharjeel Nawaz Department of Computer Science University of Engineering and TechnologyLahore54890Pakistan Department of Computer Science(RCET Campus GRW)University of Engineering and TechnologyLahore52250Pakistan Artificial Intelligence Centre(AIRC) Ajman UniversityAjman346United Arab Emirates Smith School of Business University of MarylandCollege ParkMD 20742-5151USA
Incorporation of explainability features in the decision-making web-based systems is considered a primary concern to enhance accountability,transparency,and trust in the ***-domain Sentiment Analysis is a significant ... 详细信息
来源: 评论
Machine Learning for Air Quality Prediction: Random Forest Classifier  4
Machine Learning for Air Quality Prediction: Random Forest C...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Vaishnavi, Kasula Sreya, Gummalla Reddy, Kishor Kumar Anisha, P.R. Stanley College of Engineering and Technology for Women Department of Computer Science and Engineering Telangana Hyderabad India
Air Pollution is the contamination of air due to the presence of substances in the atmosphere that are major issue to human life as well as to the other living organisms. Air quality is the result of the composite int... 详细信息
来源: 评论
JPEG Reversible Data Hiding via Block Sorting Optimization and Dynamic Iterative Histogram Modification
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3729-3743页
作者: Li, Fengyong Wang, Qiankuan Cheng, Hang Zhang, Xinpeng Qin, Chuan Shanghai University of Electric Power College of Computer Science and Technology Shanghai201306 China Fuzhou University School of Mathematics and Statistics Fuzhou Fujian350108 China Fudan University School of Computer Science Shanghai200433 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China
JPEG reversible data hiding (RDH) refers to covert communication technology to accurately extract secret data while also perfectly recovering the original JPEG image. With the development of cloud services, a large nu... 详细信息
来源: 评论