咨询与建议

限定检索结果

文献类型

  • 48,397 篇 会议
  • 24,335 篇 期刊文献
  • 401 册 图书

馆藏范围

  • 73,133 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44,020 篇 工学
    • 30,956 篇 计算机科学与技术...
    • 25,410 篇 软件工程
    • 11,128 篇 信息与通信工程
    • 7,328 篇 控制科学与工程
    • 5,404 篇 电气工程
    • 5,318 篇 生物工程
    • 4,785 篇 电子科学与技术(可...
    • 4,201 篇 生物医学工程(可授...
    • 3,239 篇 机械工程
    • 3,238 篇 光学工程
    • 2,454 篇 动力工程及工程热...
    • 2,448 篇 化学工程与技术
    • 2,435 篇 网络空间安全
    • 2,292 篇 仪器科学与技术
    • 2,005 篇 安全科学与工程
    • 1,768 篇 材料科学与工程(可...
    • 1,761 篇 交通运输工程
  • 24,564 篇 理学
    • 12,023 篇 数学
    • 7,583 篇 物理学
    • 6,092 篇 生物学
    • 3,743 篇 统计学(可授理学、...
    • 2,687 篇 化学
    • 2,459 篇 系统科学
  • 12,906 篇 管理学
    • 8,241 篇 管理科学与工程(可...
    • 5,301 篇 图书情报与档案管...
    • 3,420 篇 工商管理
  • 4,409 篇 医学
    • 3,647 篇 临床医学
    • 3,277 篇 基础医学(可授医学...
    • 1,994 篇 公共卫生与预防医...
    • 1,973 篇 药学(可授医学、理...
  • 2,148 篇 法学
  • 1,344 篇 经济学
  • 1,268 篇 农学
  • 749 篇 教育学
  • 304 篇 文学
  • 208 篇 军事学
  • 138 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 2,762 篇 accuracy
  • 2,398 篇 deep learning
  • 2,225 篇 feature extracti...
  • 1,779 篇 machine learning
  • 1,741 篇 training
  • 1,649 篇 computational mo...
  • 1,578 篇 educational inst...
  • 1,419 篇 real-time system...
  • 1,409 篇 internet of thin...
  • 1,334 篇 convolutional ne...
  • 1,320 篇 predictive model...
  • 1,237 篇 computer science
  • 1,227 篇 support vector m...
  • 1,097 篇 optimization
  • 950 篇 security
  • 936 篇 data models
  • 904 篇 data mining
  • 853 篇 artificial intel...
  • 795 篇 neural networks
  • 789 篇 cloud computing

机构

  • 1,204 篇 college of compu...
  • 1,053 篇 college of compu...
  • 1,035 篇 department of ph...
  • 1,011 篇 cavendish labora...
  • 985 篇 physikalisches i...
  • 976 篇 college of compu...
  • 973 篇 oliver lodge lab...
  • 698 篇 college of compu...
  • 670 篇 university of ch...
  • 620 篇 infn sezione di ...
  • 613 篇 infn laboratori ...
  • 598 篇 infn sezione di ...
  • 590 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 544 篇 horia hulubei na...
  • 540 篇 department of ph...
  • 538 篇 imperial college...
  • 536 篇 school of physic...
  • 518 篇 h.h. wills physi...

作者

  • 278 篇 barter w.
  • 264 篇 a. gomes
  • 252 篇 beiter a.
  • 246 篇 c. alexa
  • 244 篇 j. m. izen
  • 239 篇 bellee v.
  • 237 篇 s. chen
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 235 篇 blake t.
  • 234 篇 brundu d.
  • 227 篇 g. spigo
  • 225 篇 amato s.
  • 225 篇 bencivenni g.
  • 224 篇 betancourt c.
  • 223 篇 bay a.
  • 222 篇 bowcock t.j.v.
  • 222 篇 borsato m.

语言

  • 61,609 篇 英文
  • 10,497 篇 其他
  • 1,119 篇 中文
  • 47 篇 日文
  • 14 篇 德文
  • 13 篇 法文
  • 12 篇 斯洛文尼亚文
  • 3 篇 阿拉伯文
  • 3 篇 朝鲜文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
检索条件"机构=College of Software Engineering and College of Computer Science and Technology"
73133 条 记 录,以下是141-150 订阅
排序:
Modeling of Optimal Deep Learning Based Flood Forecasting Model Using Twitter Data
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 1455-1470页
作者: G.Indra N.Duraipandian Department of Computer Science and Engineering RMK College of Engineering and TechnologyChennai601206India Department of Computer Science and Engineering Saveetha Engineering CollegeChennai602106India
Aflood is a significant damaging natural calamity that causes loss of life and *** work on the construction offlood prediction models intended to reduce risks,suggest policies,reduce mortality,and limit property damage c... 详细信息
来源: 评论
From Linguistics to Practice: a Case Study of Offensive Language Taxonomy in Hebrew  8
From Linguistics to Practice: a Case Study of Offensive Lang...
收藏 引用
8th Workshop on Online Abuse and Harms, WOAH 2024 - co-located with NAACL 2024
作者: Liebeskind, Chaya Vanetik, Natalia Litvak, Marina Department of Computer Science Jerusalem College of Technology Jerusalem Israel Department of Software Engineering Shamoon College of Engineering Beer-Sheva Israel
The perception of offensive language varies based on cultural, social, and individual perspectives. With the spread of social media, there has been an increase in offensive content online, necessitating advanced solut... 详细信息
来源: 评论
Qualitative and Quantitative Model Checking Against Recurrent Neural Networks
收藏 引用
Journal of computer science & technology 2024年 第6期39卷 1292-1311页
作者: Zhen Liang Wan-Wei Liu Fu Song Bai Xue Wen-Jing Yang Ji Wang Zheng-Bin Pang Institute for Quantum Information&State Key Laboratory of High Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China College of Computer Science and Technology National University of Defense TechnologyChangsha 410073China School of Information Science and Technology ShanghaiTech UniversityShanghai 201210China Institute of Software Chinese Academy of SciencesBeijing 100190China
Recurrent neural networks (RNNs) have been heavily used in applications relying on sequence data such as time series and natural languages. As a matter of fact, their behaviors lack rigorous quality assurance due to t... 详细信息
来源: 评论
Deep Learning Enabled Social Media Recommendation Based on User Comments
收藏 引用
computer Systems science & engineering 2023年 第2期44卷 1691-1702页
作者: K.Saraswathi V.Mohanraj Y.Suresh J.Senthilkumar Department of Computer Science and Engineering Government College of EngineeringSalem636011India Department of Information Technology Sona College of TechnologySalem636005India
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this R... 详细信息
来源: 评论
An efficient botnet detection approach based on feature learning and classification
收藏 引用
Journal of Control and Decision 2023年 第1期10卷 40-53页
作者: B.Padmavathi B.Muthukumar Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyChennaiIndia Computer Science and Engineering Easwari Engineering CollegeChennaiIndia DMI College of Engineering ChennaiIndia
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced b... 详细信息
来源: 评论
M-Bi-GRU-CNN: a hybrid deep learning model with optimized feature selection for enhanced crop yield prediction
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: J, Madhuri M, Indiramma N, Nagarathna Department of Computer Science and Engineering Bangalore Institute of Technology Karnataka Bengaluru560004 India Department of Computer Science and Engineering BMS College of Engineering Karnataka Bengaluru560019 India
Weather variability significantly impacts crop yield, posing challenges for large-scale agricultural operations. This study introduces a deep learning-based approach to enhance crop yield prediction accuracy. A Multi-... 详细信息
来源: 评论
Topological Evaluation of Certain computer Networks by Contraharmonic-Quadratic Indices
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3795-3810页
作者: Ahmed M.Alghamdi Khalid Hamid Muhammad Waseem Iqbal M.Usman Ashraf Abdullah Alshahrani Adel Alshamrani Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and Engineering at University of JeddahJeddah21493Saudi Arabia
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P... 详细信息
来源: 评论
Utilization of Two Cross Two Switch for Bitonic Sorting Circuit
收藏 引用
Micro and Nanosystems 2025年 第1期17卷 45-57页
作者: Bhattacharjee, Subhasree Sarkar, Soumyadip Das, Kunal Sadhu, Arindam Sarkar, Bikramjit Department of Computer Application Narula Institute of Technology Kolkata India Department of Computer Science Acharya Prafulla Chandra College Kolkata India Department of Electronics & Communication Engineering Greater Kolkata College of Engineering and Management West Bengal India Department of Computer Science & Engineering JIS College of Engineering West Bengal India
Background: The synthesis of reversible logic has gained prominence as a crucial research area, particularly in the context of post-CMOS computing devices, notably quantum computing. Objective: To implement the bitoni... 详细信息
来源: 评论
A hierarchical byzantine fault tolerance consensus protocol for the Internet of Things
收藏 引用
High-Confidence Computing 2024年 第3期4卷 13-24页
作者: Rongxin Guo Zhenping Guo Zerui Lin Wenxian Jiang College of Engineering Huaqiao UniversityQuanzhou 362000China College of Computer Science and Technology Huaqiao UniversityXiamen 361021China
The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence *** solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance(PBFT)in IoT s... 详细信息
来源: 评论
Prediction of Burn-Through Point in Sintering Process Based on Improved Hybrid Optimization Algorithm and TCN-BiGRU-AM  5
Prediction of Burn-Through Point in Sintering Process Based ...
收藏 引用
5th International Conference on Artificial Intelligence and computer engineering, ICAICE 2024
作者: Chen, Jiayin Liao, Liefa Wu, Jiale College of Software Engineering Jiangxi University of Science and Technology Nanchang China College of Software Engineering Jiangxi University of Science and Technology Jiangxi Modern Polytechnic College Nanchang China
Sintering is a crucial upstream process in the steelmaking process, and accurately predicting the burning through point (BTP) is vital for the yield and quality of sintered ore. The rise of artificial intelligence and... 详细信息
来源: 评论