咨询与建议

限定检索结果

文献类型

  • 255,818 篇 会议
  • 106,768 篇 期刊文献
  • 2,779 册 图书
  • 5 篇 学位论文

馆藏范围

  • 365,368 篇 电子文献
  • 10 种 纸本馆藏

日期分布

学科分类号

  • 207,726 篇 工学
    • 129,528 篇 计算机科学与技术...
    • 104,107 篇 软件工程
    • 50,912 篇 信息与通信工程
    • 33,306 篇 控制科学与工程
    • 32,968 篇 电子科学与技术(可...
    • 32,849 篇 电气工程
    • 22,520 篇 生物工程
    • 18,149 篇 生物医学工程(可授...
    • 17,686 篇 光学工程
    • 14,885 篇 机械工程
    • 12,933 篇 化学工程与技术
    • 12,364 篇 仪器科学与技术
    • 11,944 篇 动力工程及工程热...
    • 11,491 篇 材料科学与工程(可...
    • 7,433 篇 安全科学与工程
    • 7,066 篇 网络空间安全
    • 6,777 篇 交通运输工程
  • 120,788 篇 理学
    • 58,154 篇 数学
    • 43,367 篇 物理学
    • 25,611 篇 生物学
    • 18,882 篇 统计学(可授理学、...
    • 13,869 篇 化学
    • 13,689 篇 系统科学
  • 49,769 篇 管理学
    • 31,095 篇 管理科学与工程(可...
    • 20,641 篇 图书情报与档案管...
    • 14,691 篇 工商管理
  • 17,332 篇 医学
    • 14,434 篇 临床医学
    • 12,867 篇 基础医学(可授医学...
    • 8,115 篇 药学(可授医学、理...
  • 9,016 篇 法学
    • 7,429 篇 社会学
  • 5,922 篇 经济学
  • 4,672 篇 农学
  • 3,523 篇 教育学
  • 1,661 篇 文学
  • 845 篇 军事学
  • 458 篇 艺术学
  • 66 篇 哲学
  • 38 篇 历史学

主题

  • 9,980 篇 computer science
  • 9,092 篇 accuracy
  • 7,980 篇 computational mo...
  • 7,818 篇 feature extracti...
  • 7,117 篇 deep learning
  • 6,420 篇 machine learning
  • 6,298 篇 training
  • 4,686 篇 predictive model...
  • 4,614 篇 support vector m...
  • 4,468 篇 optimization
  • 4,237 篇 convolutional ne...
  • 4,231 篇 data mining
  • 4,153 篇 neural networks
  • 4,143 篇 real-time system...
  • 4,096 篇 computer archite...
  • 4,081 篇 wireless sensor ...
  • 3,951 篇 bandwidth
  • 3,801 篇 testing
  • 3,798 篇 artificial intel...
  • 3,717 篇 robustness

机构

  • 3,279 篇 school of electr...
  • 2,249 篇 chitkara univers...
  • 2,038 篇 department of el...
  • 1,729 篇 department of co...
  • 1,265 篇 university of ch...
  • 1,052 篇 cavendish labora...
  • 981 篇 department of ph...
  • 859 篇 oliver lodge lab...
  • 851 篇 physikalisches i...
  • 819 篇 department of el...
  • 723 篇 department of co...
  • 640 篇 department of co...
  • 631 篇 school of comput...
  • 613 篇 school of comput...
  • 579 篇 school of electr...
  • 526 篇 infn sezione di ...
  • 510 篇 infn laboratori ...
  • 504 篇 infn sezione di ...
  • 496 篇 horia hulubei na...
  • 482 篇 infn sezione di ...

作者

  • 255 篇 barter w.
  • 238 篇 j. wang
  • 233 篇 s. chen
  • 229 篇 a. gomes
  • 226 篇 blake t.
  • 224 篇 bowcock t.j.v.
  • 221 篇 bellee v.
  • 219 篇 betancourt c.
  • 219 篇 amato s.
  • 217 篇 borsato m.
  • 215 篇 brundu d.
  • 214 篇 c. alexa
  • 213 篇 boettcher t.
  • 209 篇 j. m. izen
  • 207 篇 beiter a.
  • 206 篇 kukreja vinay
  • 202 篇 bencivenni g.
  • 194 篇 g. bella
  • 194 篇 j. strandberg
  • 194 篇 d. calvet

语言

  • 322,257 篇 英文
  • 38,682 篇 其他
  • 4,484 篇 中文
  • 279 篇 日文
  • 56 篇 德文
  • 42 篇 朝鲜文
  • 40 篇 法文
  • 40 篇 斯洛文尼亚文
  • 20 篇 土耳其文
  • 16 篇 俄文
  • 13 篇 阿拉伯文
  • 4 篇 荷兰文
  • 4 篇 葡萄牙文
  • 3 篇 西班牙文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 3 篇 波兰文
  • 2 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
365370 条 记 录,以下是1901-1910 订阅
排序:
Citizen Cane - An Object Detection and Image Description System for the Visually Impaired  3
Citizen Cane - An Object Detection and Image Description Sys...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Navhule, Akarsh Akif Byndoor, Keerthan Mohammed Nayaz, A.N. Shetty, Deepthi Sarojadevi, H. Nitte Meenakshi Institute of Technology Department of Computer Science & Engineering Bengaluru India
Visually impaired persons can use informed visual perception to generate understanding of the environment around them to bridge the gap between them and world. This can be done by helping those individuals to identify... 详细信息
来源: 评论
Rescue me : AI Emergency Response and Disaster Management System  2
Rescue me : AI Emergency Response and Disaster Management Sy...
收藏 引用
2nd International Conference on Artificial Intelligence and Machine Learning Applications, AIMLA 2024
作者: Reddy, Medda Sreeketh Vamsi, Chintala Kathambari, P. Sathyabama Institute of Science and Technology Department of Computer Science & Engineering Chennai India
Rescue Me is an innovative AI-based emergency response and disaster management system that aims to revolutionize the way emergency services handle critical situations. By utilizing advanced artificial intelligence alg... 详细信息
来源: 评论
OCR-Based Extraction of Expiry Dates and Batch Numbers in Medicine Packaging for Error-Free Data Entry  7
OCR-Based Extraction of Expiry Dates and Batch Numbers in Me...
收藏 引用
7th International Conference on Circuit Power and Computing Technologies, ICCPCT 2024
作者: Kavin, S. Shirley, C.P. Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India
To guarantee patient safety and regulatory compliance, healthcare providers must accurately enter batch numbers and expiration dates from drug packaging. But manual entry is prone to mistakes, which could have unfavou... 详细信息
来源: 评论
Patient-Centric Blockchain Model for Healthcare Data Security using Off-Chain IPFS Storage and ZKP
Patient-Centric Blockchain Model for Healthcare Data Securit...
收藏 引用
2024 International Conference on Cybernation and Computation, CYBERCOM 2024
作者: Gautam, Promodani Bala Kritibhushan Department of Computer Engineering National Institute of Technology Kurukshetra Harayana Kurukshetra India
In this work, a patient-centric paradigm utilizing IPFS (InterPlanetary File System) storage, blockchain technology, and Zero-Knowledge Proofs (ZKPs) is proposed for handling healthcare data. Traditional healthcare da... 详细信息
来源: 评论
Enhancing Cybersecurity through Advanced Keylogging Techniques  2
Enhancing Cybersecurity through Advanced Keylogging Techniqu...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Sanjay, K. Ratheesh, J.K. Johin, R.R. Krishnamoorthy, A. Vellore Institute of Technology Department of Computer Science Engineering Tamil Nadu India
As the viruses are increasing efficiently, our project aims to develop a keylogger software. The purpose of this software is to continuously monitor and assess the activities of employees, and to address security conc... 详细信息
来源: 评论
Detection Method for Software Defined Network Intrusion  5
Detection Method for Software Defined Network Intrusion
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Jany Shabu, S.L. Nagarjuna, G.K. Satya Ram, Nandigam Kumar Refonaa, J. Joshila Grace, L.K. Sathyabama Institute of Science & Technology Department of Computer Science and Engineering Chennai India
There is a great deal of interest in using Intrusion Detection Systems (IDSs) as a key component of system defense at the moment. To secure a network IDS analyzing network traffic from a location on the network or com... 详细信息
来源: 评论
Planetary Defense Using Machine Learning Early Warning Systems for Hazardous Asteroids
Planetary Defense Using Machine Learning Early Warning Syste...
收藏 引用
2024 International Conference on Advances in Data engineering and Intelligent Computing Systems, ADICS 2024
作者: Sandeep, Avala Reddy, Panta Jeevan Perkin, T. Madhu Hindustan Institute Of Technology And Science Department Of Computer Science & Engineering Chennai India
Within the dynamic field of planetary defence, machine learning has emerged as a key component that is essential to early warning systems that are tasked with forecasting the orbits and trajectories of potentially dan... 详细信息
来源: 评论
Refined Intrusion Detection Model for Internet of Things Networks
Refined Intrusion Detection Model for Internet of Things Net...
收藏 引用
2024 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, SPICES 2024
作者: Renya Nath, N. Nath, Hiran V. National Institute of Technology Calicut Department of Computer Science and Engineering Kozhikode India
The expansion of the Internet of Things (IoT) has permeated various sectors, facilitating the integration of IP connectivity into many devices. These devices, also known as Internet of Things devices, are vulnerable t... 详细信息
来源: 评论
An English Sentence Dictionary Based Secure Text Steganographic Technique for Message-Data Confidentiality  2nd
An English Sentence Dictionary Based Secure Text Steganograp...
收藏 引用
2nd International Conference on Computing, Communication, and Learning, CoCoLe 2023
作者: Dey, Akash Kumar Behera, Geeta Gayatri Mishra, Alekha Kumar Department of Computer Science and Engineering National Institute of Technology Jamshedpur Jamshedpur India
Steganography is a method for concealing messages in text, audio, images, and videos. This study outlines a text steganography method called Dictionary Based Text Steganography. This technique seeks for sentences to h... 详细信息
来源: 评论
Enhanced Holistically Nested Edge Detection (eHED) Algorithm: A Reliable Edge Detection in Unconstrained Scenarios  5th
Enhanced Holistically Nested Edge Detection (eHED) Algorithm...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Ramalakshmi, S. Vani, V. Department of Computer Science and Engineering National Institute of Technology Puducherry Karaikal India
Understanding scenes, interpreting images, and identifying objects are all areas of computer vision that depend on edge detection. Many edge detection techniques, including traditional edge detection algorithms, have ... 详细信息
来源: 评论