咨询与建议

限定检索结果

文献类型

  • 255,459 篇 会议
  • 107,550 篇 期刊文献
  • 2,791 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 365,822 篇 电子文献
  • 11 种 纸本馆藏

日期分布

学科分类号

  • 207,885 篇 工学
    • 130,087 篇 计算机科学与技术...
    • 104,424 篇 软件工程
    • 51,156 篇 信息与通信工程
    • 33,657 篇 控制科学与工程
    • 32,719 篇 电子科学与技术(可...
    • 32,667 篇 电气工程
    • 22,569 篇 生物工程
    • 18,220 篇 生物医学工程(可授...
    • 18,025 篇 光学工程
    • 14,920 篇 机械工程
    • 12,971 篇 化学工程与技术
    • 12,438 篇 仪器科学与技术
    • 11,999 篇 动力工程及工程热...
    • 10,888 篇 材料科学与工程(可...
    • 7,457 篇 安全科学与工程
    • 7,109 篇 网络空间安全
    • 6,817 篇 交通运输工程
  • 121,271 篇 理学
    • 58,182 篇 数学
    • 43,533 篇 物理学
    • 25,664 篇 生物学
    • 18,722 篇 统计学(可授理学、...
    • 13,970 篇 化学
    • 13,702 篇 系统科学
  • 49,909 篇 管理学
    • 31,173 篇 管理科学与工程(可...
    • 20,686 篇 图书情报与档案管...
    • 14,716 篇 工商管理
  • 17,514 篇 医学
    • 14,566 篇 临床医学
    • 12,921 篇 基础医学(可授医学...
    • 8,113 篇 药学(可授医学、理...
  • 9,022 篇 法学
    • 7,425 篇 社会学
  • 5,941 篇 经济学
  • 4,714 篇 农学
  • 3,516 篇 教育学
  • 1,666 篇 文学
  • 847 篇 军事学
  • 455 篇 艺术学
  • 66 篇 哲学
  • 38 篇 历史学

主题

  • 9,984 篇 computer science
  • 8,945 篇 accuracy
  • 7,907 篇 computational mo...
  • 7,758 篇 feature extracti...
  • 7,085 篇 deep learning
  • 6,443 篇 machine learning
  • 6,272 篇 training
  • 4,630 篇 predictive model...
  • 4,590 篇 support vector m...
  • 4,431 篇 optimization
  • 4,226 篇 data mining
  • 4,182 篇 convolutional ne...
  • 4,115 篇 neural networks
  • 4,078 篇 computer archite...
  • 4,069 篇 wireless sensor ...
  • 4,034 篇 real-time system...
  • 3,925 篇 bandwidth
  • 3,794 篇 artificial intel...
  • 3,747 篇 testing
  • 3,709 篇 robustness

机构

  • 3,273 篇 school of electr...
  • 2,250 篇 chitkara univers...
  • 2,022 篇 department of el...
  • 1,739 篇 department of co...
  • 1,270 篇 university of ch...
  • 1,053 篇 cavendish labora...
  • 980 篇 department of ph...
  • 862 篇 oliver lodge lab...
  • 851 篇 physikalisches i...
  • 818 篇 department of el...
  • 714 篇 department of co...
  • 642 篇 department of co...
  • 631 篇 school of comput...
  • 616 篇 school of comput...
  • 569 篇 school of electr...
  • 528 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 503 篇 infn sezione di ...
  • 496 篇 horia hulubei na...
  • 479 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 240 篇 j. wang
  • 237 篇 s. chen
  • 230 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 217 篇 amato s.
  • 215 篇 borsato m.
  • 213 篇 boettcher t.
  • 212 篇 c. alexa
  • 211 篇 brundu d.
  • 207 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 bay a.
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 342,802 篇 英文
  • 18,467 篇 其他
  • 4,465 篇 中文
  • 278 篇 日文
  • 44 篇 德文
  • 42 篇 朝鲜文
  • 30 篇 法文
  • 21 篇 斯洛文尼亚文
  • 21 篇 土耳其文
  • 13 篇 俄文
  • 7 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 3 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
365824 条 记 录,以下是1051-1060 订阅
排序:
RBCA-ETS: enhancing extractive text summarization with contextual embedding and word-level attention
收藏 引用
International Journal of Information technology (Singapore) 2025年 第2期17卷 1127-1135页
作者: Gangundi, Ravindra Sridhar, Rajeswari Department of Computer Science and Engineering National Institute of Technology Tamil Nadu Tiruchirappalli 620015 India
The existing limitations in extractive text summarization encompass challenges related to preserving contextual features, limited feature extraction capabilities, and handling hierarchical and compositional aspects. T... 详细信息
来源: 评论
An Automated Bird Species Classification Using Deep Learning  2
An Automated Bird Species Classification Using Deep Learning
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Saritha, N. Shruthi Department of Computer Science and Engineering Adichuchanagiri Institute of Technology Chikkamagalur India Department of Computer Science and Engineering Navkis College of Engineering Hassan India
Birds are nice-looking from their aesthetic looks and life styles, around 50 billion of birds are living on the earth where some birds are in threat of extinction. For people, distinguishing and classification of bird... 详细信息
来源: 评论
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 评论
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
收藏 引用
International Journal of computers and Applications 2025年 第2期47卷 169-187页
作者: Tahir, Mahjabeen Abdullah, Azizol Izura Udzir, Nur Azhar Kasmiran, Khairul Serdang Malaysia Serdang Malaysia Department of Computer Engineering Sir Syed University of Engineering & Technology Karachi Pakistan
The growing use of the internet has increased the threat of cyberattacks. Anomaly detection systems are vital for protecting networks by spotting irregular activities. Various studies investigated anomaly detection te... 详细信息
来源: 评论
A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12837-12856页
作者: Porwal, Shardha Mittal, Sangeeta Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key... 详细信息
来源: 评论
An Investigation of Frequency-Domain Pruning Algorithms for Accelerating Human Activity Recognition Tasks Based on Sensor Data
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2219-2242页
作者: Jian Su Haijian Shao Xing Deng Yingtao Jiang School of Computer Jiangsu University of Science and TechnologyZhenjiang212003China Department of Electrical and Computer Engineering University of NevadaLas VegasNV 89154USA
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec... 详细信息
来源: 评论
Detection of Neurodegenerative Disorder  8
Detection of Neurodegenerative Disorder
收藏 引用
8th IEEE International Conference on Computing, Communication, Control and Automation, ICCUBEA 2024
作者: Dhumane, Amol Mukherjee, Jasmita Kapadia, Jil Nayak, Aditi Jain, Himanshi Patil, Rahul Symbiosis Institute of Technology Department of Computer Science and Engineering Pune India Pimpri Chinchwad College of Engineering Department of Computer Engineering Pune India
Globally, neurodegenerative diseases like dementia and Alzheimer's represent a major danger to our healthcare system. Clinical evaluations, which may or may not be able to identify the modest cognitive changes tha... 详细信息
来源: 评论
Intelligent System for Detection of Intrusion in Imbalanced Network Traffic  14
Intelligent System for Detection of Intrusion in Imbalanced ...
收藏 引用
14th International Conference on Cloud Computing, Data Science and engineering, Confluence 2024
作者: Bagla, Piyush Mishra, Amit Kumar Pandey, Neeraj Kumar Sharma, Ravi Dumka, Ankur National Institute of Technology Department of Computer Science & Engineering Jalandhar India Graphic Era Hill University Dept. of Computer Science & Engineering Dehradun India Department of Computer Science & Engineering Dehradun India Women Institute of Technology Department of Computer Science & Engineering Uttarakhand Dehradun India
Malicious cyberattacks can frequently hide among enormous amounts of regular data in networks with uneven traffic patterns. The identification of imbalance network traffic is difficult to find and making a challenge i... 详细信息
来源: 评论
Asymmetrical Fault Current Calculation Method and Influencing Factors Analysis of Droop-Controlled Inverters
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第2期10卷 562-573页
作者: Huimin Zhao Zhikang Shuai Jun Ge An Luo Weimin Wu Z.John Shen College of Electrical and Information Engineering Hunan UniversityChangsha 410006China Electrical Engineering Department Shanghai Maritime UniversityShanghai 201306China Department of Electrical and Computer Engineering Ilinois Institute of TechnologyChicagoIL 60616 USA
Since the fault dynamic of droop-controlled inverter is different from synchronous generators (SGs), protection devices may become invalid, and the fault overcurrent may damage power electronic devices and threaten th... 详细信息
来源: 评论
Deep learning based predicting urban traffic congestion with RGB-coded images using GRU-CNN and LSTM
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 86261-86280页
作者: P, Rajesh Azhagiri, M. Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & ampD Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Campus Tamil Nadu Chennai600 089 India
Road traffic management requires the ability to foresee geographical congestion conditions in an urban road traffic network. The proposed investigation is aimed to envisage the presence of blockage in a specific regio... 详细信息
来源: 评论