咨询与建议

限定检索结果

文献类型

  • 254,049 篇 会议
  • 106,909 篇 期刊文献
  • 2,783 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 363,763 篇 电子文献
  • 10 种 纸本馆藏

日期分布

学科分类号

  • 206,242 篇 工学
    • 129,030 篇 计算机科学与技术...
    • 103,859 篇 软件工程
    • 50,779 篇 信息与通信工程
    • 33,070 篇 控制科学与工程
    • 32,501 篇 电子科学与技术(可...
    • 32,419 篇 电气工程
    • 22,485 篇 生物工程
    • 18,104 篇 生物医学工程(可授...
    • 17,926 篇 光学工程
    • 14,829 篇 机械工程
    • 12,913 篇 化学工程与技术
    • 12,373 篇 仪器科学与技术
    • 11,943 篇 动力工程及工程热...
    • 10,736 篇 材料科学与工程(可...
    • 7,408 篇 安全科学与工程
    • 6,991 篇 网络空间安全
    • 6,757 篇 交通运输工程
  • 120,638 篇 理学
    • 57,955 篇 数学
    • 43,277 篇 物理学
    • 25,598 篇 生物学
    • 18,629 篇 统计学(可授理学、...
    • 13,835 篇 化学
    • 13,689 篇 系统科学
  • 49,682 篇 管理学
    • 31,042 篇 管理科学与工程(可...
    • 20,587 篇 图书情报与档案管...
    • 14,646 篇 工商管理
  • 17,347 篇 医学
    • 14,422 篇 临床医学
    • 12,826 篇 基础医学(可授医学...
    • 8,114 篇 药学(可授医学、理...
  • 8,992 篇 法学
    • 7,403 篇 社会学
  • 5,925 篇 经济学
  • 4,679 篇 农学
  • 3,485 篇 教育学
  • 1,667 篇 文学
  • 845 篇 军事学
  • 455 篇 艺术学
  • 66 篇 哲学
  • 39 篇 历史学

主题

  • 9,980 篇 computer science
  • 8,764 篇 accuracy
  • 7,823 篇 computational mo...
  • 7,693 篇 feature extracti...
  • 6,916 篇 deep learning
  • 6,390 篇 machine learning
  • 6,229 篇 training
  • 4,559 篇 predictive model...
  • 4,552 篇 support vector m...
  • 4,398 篇 optimization
  • 4,210 篇 data mining
  • 4,105 篇 neural networks
  • 4,072 篇 convolutional ne...
  • 4,062 篇 wireless sensor ...
  • 4,046 篇 computer archite...
  • 3,962 篇 real-time system...
  • 3,917 篇 bandwidth
  • 3,751 篇 artificial intel...
  • 3,732 篇 testing
  • 3,702 篇 costs

机构

  • 3,272 篇 school of electr...
  • 2,236 篇 chitkara univers...
  • 2,013 篇 department of el...
  • 1,725 篇 department of co...
  • 1,252 篇 university of ch...
  • 1,053 篇 cavendish labora...
  • 978 篇 department of ph...
  • 860 篇 oliver lodge lab...
  • 853 篇 physikalisches i...
  • 815 篇 department of el...
  • 720 篇 department of co...
  • 638 篇 department of co...
  • 619 篇 school of comput...
  • 608 篇 school of comput...
  • 569 篇 school of electr...
  • 526 篇 infn sezione di ...
  • 515 篇 infn laboratori ...
  • 505 篇 infn sezione di ...
  • 500 篇 horia hulubei na...
  • 483 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 240 篇 j. wang
  • 237 篇 s. chen
  • 230 篇 a. gomes
  • 223 篇 blake t.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 219 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 c. alexa
  • 213 篇 boettcher t.
  • 211 篇 brundu d.
  • 208 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg
  • 191 篇 bay a.

语言

  • 347,776 篇 英文
  • 11,485 篇 其他
  • 4,380 篇 中文
  • 278 篇 日文
  • 41 篇 朝鲜文
  • 38 篇 德文
  • 28 篇 法文
  • 21 篇 土耳其文
  • 17 篇 斯洛文尼亚文
  • 7 篇 荷兰文
  • 3 篇 阿拉伯文
  • 3 篇 爱沙尼亚文
  • 3 篇 葡萄牙文
  • 3 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
363765 条 记 录,以下是381-390 订阅
排序:
Fuzzy modelling techniques for improving multi-label classification of software bugs
收藏 引用
International Journal of Innovative Computing and Applications 2023年 第3期14卷 141-154页
作者: Panda, Rama Ranjan Nagwani, Naresh Kumar Department of Computer Science and Engineering National Institute of Technology Chhattisgarh Raipur India
Software bug repositories stores a wealth of information related to the problems that occurred during the software development. Today’s software development is a modular approach, with multiple developers working in ... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of Information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
Statistical methods for feature selection: unlocking the key to improved accuracy
收藏 引用
International Journal of computers and Applications 2023年 第6期45卷 433-443页
作者: Thiyam, Bidyapati Dey, Shouvik Department of Computer Science and Engineering National Institute of Technology Nagaland Dimapur India
The ever-growing amount of data generated by modern networks poses significant challenges for intrusion detection systems (IDS) in effectively analyzing and classifying security risks. Therefore, it is crucial to iden... 详细信息
来源: 评论
Sensitive information leakage analysis of database code by abstract interpretation
收藏 引用
International Journal of Security and Networks 2023年 第2期18卷 91-105页
作者: Jana, Angshuman Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India
An information system stores outside data in the backend database to process them efficiently and protects sensitive data from illegitimate flow or unauthorised users. However, most information systems are made in suc... 详细信息
来源: 评论
Deep Learning System and It’s Automatic Testing: An Approach
收藏 引用
Annals of Data Science 2023年 第4期10卷 1019-1033页
作者: Khan, Rijwan Department of Computer Science and Engineering ABES Institute of Technology UP Ghaziabad India
The process of testing conventional programs is quite easy as compared to the programs using Deep Learning approach. The term Deep learning (DL) is used for a novel programming approach that is highly data centric and... 详细信息
来源: 评论
Energy efficient quantum-informed ant colony optimization algorithms for industrial internet of things
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第3期5卷 1077-1086页
作者: Jannu, Srikanth Dara, Suresh Thuppari, Chaitanya Vidyarthi, Ankit Ghosh, Debjani Tiwari, Prayag Muhammad, Ghulam Department of Computer Science and Engineering Vaagdevi Engineering College Singaram506005 India School of Technology Woxsen University HyderabadTS 502 345 India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Noida201309 India Department of Computer Science and Engineering Bennett University Greater Noida201309 India School of Information Technology Halmstad University Halmstad301 18 Sweden Department of Computer Engineering College of Computer and Information Sciences King Saud University Riyadh11451 Saudi Arabia
One of themost prominent research areas in information technology is the Internet of Things (IoT) as its applications are widely used, such as structural monitoring, health care management systems, agriculture and bat... 详细信息
来源: 评论
Identifying Cancer Disease Using Softmax-Feed Forward Recurrent Neural Classification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 1137-1149页
作者: P.Saranya P.Asha Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyChennaiIndia
In today’s growing modern world environment,as human food activities are changing,it is affecting human health,thus leading to diseases like *** is a complex disease with many subtypes that affect human health withou... 详细信息
来源: 评论
A Network Model to Study the Underlying Characteristics of Phishing Sites
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第1期6卷 46-49页
作者: Gayen, Avijit Santra, Sukriti Dey, Ayush Jana, Angshuman Indian Institute of Information Technology Guwahati Department of Computer Science and Engineering Guwahati781015 India Swami Vivekanda University Department of Computer Science and Engineering Kolkata700121 India Techno India University Department of Computer Science and Engineering Kolkata700091 India
In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into... 详细信息
来源: 评论
YOLOv5-based weapon detection systems with data augmentation
收藏 引用
International Journal of computers and Applications 2023年 第4期45卷 288-296页
作者: Sumi, Lucy Dey, Shouvik Department of Computer Science and Engineering National Institute of Technology Nagaland Chumukedima India
Closed-Circuit Television (CCTV) cameras in public places have become more prominent with the rising firearm-related criminal activities, such as robberies, open firing, threats at gunpoint, etc. Early detection of fi... 详细信息
来源: 评论
Deep learning based RAGAE-SVM for Chronic kidney disease diagnosis on internet of health things platform
收藏 引用
Multimedia Tools and Applications 2024年 1-39页
作者: Kandukuri, Prabhakar Abdul, Ashu Kumar, Kuchipudi Prasanth Sreenivas, Velagapudi Ramesh, G. Gundu, Venkateswarlu Department of Artificial Intelligence and Machine Learning Chaitanya Bharathi Institute of Technology Telangana Hyderabad500075 India Department of Computer Science and Engineering SRM University Andhra PradeshNeerukonda Mangalagiri 522503 India Department of Computer Science & amp Engineering Koneru Lakshmaiah Education Foundation Andhra PradeshVaddeswaram 522302 India Department of Computer Science and Engineering SRK Institute of Technology Andhra Pradesh Vijayawada521108 India Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and Technology TelanganaBachupally Hyderabad500090 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra PradeshVaddeswaram 522302 India
Chronic kidney disease (CKD) is a prominent disease that causes loss of functionality in the kidney. Doctors can now more easily gather patient health status data due to the growth of the Internet of Health Things (Io... 详细信息
来源: 评论