咨询与建议

限定检索结果

文献类型

  • 255,419 篇 会议
  • 107,077 篇 期刊文献
  • 2,799 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 365,317 篇 电子文献
  • 11 种 纸本馆藏

日期分布

学科分类号

  • 207,450 篇 工学
    • 129,794 篇 计算机科学与技术...
    • 104,459 篇 软件工程
    • 51,027 篇 信息与通信工程
    • 33,382 篇 控制科学与工程
    • 32,630 篇 电子科学与技术(可...
    • 32,540 篇 电气工程
    • 22,538 篇 生物工程
    • 18,180 篇 生物医学工程(可授...
    • 18,053 篇 光学工程
    • 14,909 篇 机械工程
    • 12,941 篇 化学工程与技术
    • 12,419 篇 仪器科学与技术
    • 11,962 篇 动力工程及工程热...
    • 10,781 篇 材料科学与工程(可...
    • 7,451 篇 安全科学与工程
    • 7,059 篇 网络空间安全
    • 6,798 篇 交通运输工程
  • 121,087 篇 理学
    • 58,162 篇 数学
    • 43,433 篇 物理学
    • 25,642 篇 生物学
    • 18,733 篇 统计学(可授理学、...
    • 13,853 篇 化学
    • 13,698 篇 系统科学
  • 49,895 篇 管理学
    • 31,173 篇 管理科学与工程(可...
    • 20,672 篇 图书情报与档案管...
    • 14,738 篇 工商管理
  • 17,448 篇 医学
    • 14,530 篇 临床医学
    • 12,926 篇 基础医学(可授医学...
    • 8,113 篇 药学(可授医学、理...
  • 9,033 篇 法学
    • 7,436 篇 社会学
  • 5,939 篇 经济学
  • 4,711 篇 农学
  • 3,536 篇 教育学
  • 1,664 篇 文学
  • 848 篇 军事学
  • 455 篇 艺术学
  • 66 篇 哲学
  • 38 篇 历史学

主题

  • 9,983 篇 computer science
  • 8,915 篇 accuracy
  • 7,893 篇 computational mo...
  • 7,738 篇 feature extracti...
  • 7,041 篇 deep learning
  • 6,400 篇 machine learning
  • 6,250 篇 training
  • 4,623 篇 predictive model...
  • 4,593 篇 support vector m...
  • 4,422 篇 optimization
  • 4,224 篇 data mining
  • 4,180 篇 convolutional ne...
  • 4,111 篇 neural networks
  • 4,074 篇 computer archite...
  • 4,063 篇 wireless sensor ...
  • 4,014 篇 real-time system...
  • 3,928 篇 bandwidth
  • 3,773 篇 artificial intel...
  • 3,738 篇 testing
  • 3,701 篇 robustness

机构

  • 3,272 篇 school of electr...
  • 2,249 篇 chitkara univers...
  • 2,022 篇 department of el...
  • 1,741 篇 department of co...
  • 1,269 篇 university of ch...
  • 1,053 篇 cavendish labora...
  • 980 篇 department of ph...
  • 862 篇 oliver lodge lab...
  • 851 篇 physikalisches i...
  • 816 篇 department of el...
  • 713 篇 department of co...
  • 643 篇 department of co...
  • 629 篇 school of comput...
  • 616 篇 school of comput...
  • 571 篇 school of electr...
  • 530 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 503 篇 infn sezione di ...
  • 496 篇 horia hulubei na...
  • 481 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 240 篇 j. wang
  • 237 篇 s. chen
  • 230 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 219 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 c. alexa
  • 213 篇 boettcher t.
  • 211 篇 brundu d.
  • 209 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 193 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg
  • 191 篇 d. calvet

语言

  • 342,454 篇 英文
  • 18,282 篇 其他
  • 4,472 篇 中文
  • 278 篇 日文
  • 44 篇 德文
  • 42 篇 朝鲜文
  • 30 篇 法文
  • 21 篇 斯洛文尼亚文
  • 21 篇 土耳其文
  • 13 篇 俄文
  • 7 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 3 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
365319 条 记 录,以下是1431-1440 订阅
排序:
Traffic Sign Recognition System with Hybrid CNN and Random Forest Models for Autonomous Driving Applications  1
Traffic Sign Recognition System with Hybrid CNN and Random F...
收藏 引用
1st International Conference on Software, Systems and Information technology, SSITCON 2024
作者: Vaidya, Akhil Tulsiyan, Darsh Surve, Omkar Sardar Patel Institute of Technology Department of Computer Engineering Mumbai India
Accurate traffic sign recognition is crucial for driver assistance systems, yet challenges persist due to environmental factors and camera distortions. This study introduces a novel framework for real-time traffic sig... 详细信息
来源: 评论
Temporal Intelligence: Recognizing User Activities with Stacked LSTM Networks
Temporal Intelligence: Recognizing User Activities with Sta...
收藏 引用
International Conference on Advanced Communications and Machine Intelligence, MICA 2023
作者: Singh, Vikram Kumar, Sohan Computer Engineering Department National Institute of Technology Kurukshetra136119 India
The advent of sensor data extracted from the smartphone offers opportunities to accurately model the human’s physical activities for context-aware scenarios or maybe for human-centered computing, e.g., human-in-loop,... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
Network Intrusion Detection System for Smart Environments with High performing Novel Feature Selection Approach  2
Network Intrusion Detection System for Smart Environments wi...
收藏 引用
2nd IEEE Global Conference on Communications and Information Technologies, GCCIT 2024
作者: Walling, Supongmen Lodh, Sibesh National Institute of Technology Department of Computer Science and Engineering Dimapur India
The Internet of Things (IoT) has experienced significant growth in data traffic, resulting in increased complexity and dimensionality. Intrusion Detection Systems (IDS) play a vital role in protecting against various ... 详细信息
来源: 评论
Leveraging Linguistically Enhanced Embeddings for Open Information Extraction  30
Leveraging Linguistically Enhanced Embeddings for Open Infor...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Farooqui, Fauzan Jayakumar, Thanmay Mathur, Pulkit Radke, Mansi Department of Computer Science and Engineering Visvesvaraya National Institute of Technology India
Open Information Extraction (OIE) is a structured prediction (SP) task in Natural Language Processing (NLP) that aims to extract structured n-ary tuples - usually subject-relation-object triples - from free text. The ... 详细信息
来源: 评论
A Novel Approach for Detection of Malicious Attack during Post Disaster Using UAV Assisted Delay Tolerant Network  2
A Novel Approach for Detection of Malicious Attack during Po...
收藏 引用
2nd International Conference on Data Science and Information System, ICDSIS 2024
作者: Chakrabarti, Chandrima Narula Institute Of Technology Department Of Computer Science And Engineering Kolkata India
Utilizing delay tolerant networks (DTN) via smartphones is a practical approach, especially when traditional networks are compromised. The use of short-range communication technologies like Bluetooth or WiFi ensures c... 详细信息
来源: 评论
Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL
Journal of ICT Standardization
收藏 引用
Journal of ICT Standardization 2023年 第4期11卷 329-354页
作者: Ulla, Mohammed Mujeer Preethi Khan, Md Sameeruddin Sakkari, Deepak S. School of Computer Science and Engineering Presidency University Karnataka Bangalore India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Computer Science and Engineering Sri Krishna Institute of Technology Bangalore India
Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks ... 详细信息
来源: 评论
An improved evaporation rate water cycle algorithm for energy-efficient routing protocol in WSNs
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2023年 第1期16卷 30-45页
作者: Vimala Dayalan Manikandan Kuppusamy School of Computer Science and Engineering Vellore Institute of TechnologyVelloreIndia
Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance... 详细信息
来源: 评论
AGG: attention-based gated convolutional GAN with prior guidance for image inpainting
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 12589-12604页
作者: Yu, Xiankang Dai, Lei Chen, Zhihua Sheng, Bin Department of Computer Science and Engineering East China University of Science and Technology Shanghai200237 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai200240 China
Image inpainting has made great achievements recently, but it is often tough to generate a semantically consistent image when faced with large missing areas in complex scenes. To address semantic and structural alignm... 详细信息
来源: 评论
Adaptable Machine Learning Methods for a Twitter Followee Recommendation System  2
Adaptable Machine Learning Methods for a Twitter Followee Re...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Yadav, Sandeep Srivastav, Shashank Buddha Institute of Technology Computer Science and Engineering Department Gorakhpur India
Recommender systems for social networking have recently used machine learning (ML) methods. This paper describes a multi-agent system that simulates a Twitter recommender system to give users a list of helpful suggest... 详细信息
来源: 评论