咨询与建议

限定检索结果

文献类型

  • 76,304 篇 会议
  • 35,323 篇 期刊文献
  • 621 册 图书
  • 2 篇 学位论文

馆藏范围

  • 112,250 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 67,548 篇 工学
    • 47,511 篇 计算机科学与技术...
    • 38,872 篇 软件工程
    • 17,266 篇 信息与通信工程
    • 11,257 篇 控制科学与工程
    • 8,620 篇 生物工程
    • 8,462 篇 电气工程
    • 7,573 篇 电子科学与技术(可...
    • 6,858 篇 生物医学工程(可授...
    • 5,338 篇 光学工程
    • 5,008 篇 机械工程
    • 3,851 篇 化学工程与技术
    • 3,842 篇 动力工程及工程热...
    • 3,664 篇 仪器科学与技术
    • 3,309 篇 网络空间安全
    • 3,147 篇 安全科学与工程
    • 2,854 篇 材料科学与工程(可...
    • 2,716 篇 交通运输工程
  • 37,915 篇 理学
    • 18,394 篇 数学
    • 11,807 篇 物理学
    • 9,825 篇 生物学
    • 5,786 篇 统计学(可授理学、...
    • 4,185 篇 化学
    • 3,982 篇 系统科学
  • 19,255 篇 管理学
    • 12,014 篇 管理科学与工程(可...
    • 8,159 篇 图书情报与档案管...
    • 5,352 篇 工商管理
  • 7,160 篇 医学
    • 5,950 篇 临床医学
    • 5,326 篇 基础医学(可授医学...
    • 3,250 篇 药学(可授医学、理...
    • 3,130 篇 公共卫生与预防医...
  • 3,355 篇 法学
  • 2,112 篇 经济学
  • 2,001 篇 农学
  • 1,404 篇 教育学
  • 447 篇 文学
  • 313 篇 军事学
  • 192 篇 艺术学
  • 16 篇 哲学
  • 10 篇 历史学

主题

  • 3,788 篇 accuracy
  • 3,431 篇 deep learning
  • 3,318 篇 feature extracti...
  • 2,744 篇 machine learning
  • 2,672 篇 educational inst...
  • 2,557 篇 training
  • 2,539 篇 computational mo...
  • 2,436 篇 computer science
  • 2,029 篇 convolutional ne...
  • 1,995 篇 real-time system...
  • 1,948 篇 internet of thin...
  • 1,921 篇 support vector m...
  • 1,872 篇 predictive model...
  • 1,415 篇 optimization
  • 1,381 篇 data models
  • 1,343 篇 data mining
  • 1,342 篇 security
  • 1,213 篇 neural networks
  • 1,194 篇 artificial intel...
  • 1,177 篇 image segmentati...

机构

  • 1,205 篇 college of compu...
  • 1,056 篇 college of compu...
  • 1,027 篇 department of ph...
  • 1,006 篇 cavendish labora...
  • 989 篇 college of compu...
  • 965 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 801 篇 college of compu...
  • 646 篇 university of ch...
  • 613 篇 infn sezione di ...
  • 591 篇 infn sezione di ...
  • 583 篇 infn laboratori ...
  • 562 篇 fakultät physik ...
  • 548 篇 imperial college...
  • 547 篇 infn sezione di ...
  • 546 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 531 篇 school of physic...
  • 518 篇 h.h. wills physi...

作者

  • 262 篇 a. gomes
  • 261 篇 barter w.
  • 247 篇 beiter a.
  • 245 篇 c. alexa
  • 243 篇 j. m. izen
  • 237 篇 s. chen
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 229 篇 blake t.
  • 226 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 g. spigo
  • 220 篇 amato s.
  • 220 篇 bencivenni g.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 bay a.

语言

  • 103,233 篇 英文
  • 7,620 篇 其他
  • 1,448 篇 中文
  • 60 篇 日文
  • 12 篇 德文
  • 9 篇 法文
  • 9 篇 斯洛文尼亚文
  • 4 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering ABES Engineering College"
112250 条 记 录,以下是601-610 订阅
排序:
Improvisation of Node Mobility Using Cluster Routing-based Group Adaptive in MANET
收藏 引用
computer Systems science & engineering 2023年 第3期44卷 2619-2636页
作者: J.Shanthini P.Punitha S.Karthik Department of Computer Science&Engineering Dr.N.G.P.Institute of EngineeringCoimbatoreTamilnaduIndia Department of Computer Science&Engineering SNS College of TechnologyCoimbatoreTamilnaduIndia
In today's Internet routing infrastructure,designers have addressed scal-ing concerns in routing constrained multiobjective optimization problems examining latency and mobility concerns as a secondary *** tactical... 详细信息
来源: 评论
Detecting Evolving Fake News in Social Media by Leveraging Heterogeneous Deep Learning Model  2
Detecting Evolving Fake News in Social Media by Leveraging H...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Brinda, B.M. Rajan, C. Geetha, K. Computer Science and Engineering Paavai College of Engineering Namakkal India Information Technology KSR College of Technology Thiruchengode India Computer Science and Engineering Excel Engineering College Komarapalayam India
A recent study revealed that fake articles spread considerably faster than factual content on Twitter, specifically at a 70% higher rate of retweets and reaching the first 1,500 users six times faster. This highlights... 详细信息
来源: 评论
PSO-DBNet for Peak-to-Average Power Ratio Reduction Using Deep Belief Network
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1483-1493页
作者: A.Jameer Basha M.Ramya Devi S.Lokesh P.Sivaranjani D.Mansoor Hussain Venkat Padhy Department of Computer Science and Engineering Hindusthan Institute of TechnologyCoimbatore641032India Department of Computer Science and Engineering Hindusthan College of Engineering and TechnologyCoimbatore641032India Department of Electronics and Communication Engineering Kongu Engineering CollegeErode638060India Department of Computer Science and Engineering Sri Krishna College of Engineering and TechnologyCoimbatore641008India School of Computing Science&Engineering VIT Bhopal UniversityBhopal466114India
Data transmission through a wireless network has faced various signal problems in the past *** orthogonal frequency division multiplexing(OFDM)technique is widely accepted in multiple data transfer patterns at various... 详细信息
来源: 评论
Enabling Technology Integrated Learning for Autistic Children Using Augmented Reality Based Cognitive Rehabilitation
收藏 引用
SN computer science 2024年 第1期5卷 151页
作者: Abdullah, A. Sheik Karthikeyan, J. Gomathi, V. Parkavi, R. Rajarajeswari, P. School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering National Engineering College Kovilpatti India Department of Information Technology Thiagarajar College of Engineering Madurai India
Augmented reality (AR)-based rehabilitation is an excellent teaching tool (ICT tool) for simulating daily activities for autistic children. Children with autism may become more mentally capable with this type of AR-ba... 详细信息
来源: 评论
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i... 详细信息
来源: 评论
Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security
收藏 引用
computer Systems science & engineering 2023年 第7期46卷 951-960页
作者: S.Prince Chelladurai T.Rajagopalan Department of Computer Science and Engineering University College of EngineeringVillupuramKakupppam605103India Department of Science and Humanities University of College of EngineeringAriyalurKavanur621705India
Cloud computing offers numerous web-based *** adoption of many Cloud applications has been hindered by concerns about data security and *** service providers’access to private information raises more security *** add... 详细信息
来源: 评论
Exploring and Analyzing the Different Models of Video Object Detection
Exploring and Analyzing the Different Models of Video Object...
收藏 引用
Emerging Innovations and Advanced Computing (INNOCOMP), International Conference on
作者: Malvika Gupta Pragati Kumari Vikash Gautam Vatan Kumar Computer Science and Engineering ABES Engineering College Ghaziabad India
Video object detection aims to identify the objects that appear in the frame of video *** challenges in video object detection include the degradation of video frames caused by fast motion,occlusion,scale variations,a... 详细信息
来源: 评论
Deep learning based video surveillance for predicting vehicle density in real time scenario
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第4期14卷 4371-4383页
作者: Priyanka, G. Senthil Kumar, J. Veena, S.T. Department of Computer Science and Engineering Mepco Schlenk Engineering College Sivakasi India Department of Electronics and Communication Engineering Mepco Schlenk Engineering College Sivakasi India
Video surveillance systems are often used for traffic monitoring and to characterize traffic load. However, most of the surveillance videos are low frame rated and extracting the right motion feature from them is a ch... 详细信息
来源: 评论
Extracting Abstractive Summaries Through Generative AI Models
Extracting Abstractive Summaries Through Generative AI Model...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Rimsha Khan Shanu Sharma Divya Upadhyay Dept of Computer Science & Engineering ABES Engineering College Ghaziabad India
Text summarization is an advanced domain in the natural language processing (NLP) field, to shorten a large amount of text into meaningful condensed summaries to get more enhanced information. While generating summari... 详细信息
来源: 评论
Fraud Detection in Banking using the Kaggle Credit Card Dataset and XGBoost Model  5
Fraud Detection in Banking using the Kaggle Credit Card Data...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Ango, Rithika Masih, Raj Kumar Reddy, C Kishor Kumar Shuaib, Mohammed Monika Singh, T. Alam, Shadab Stanley College of Engineering & Technology for Women Department of Computer Science and Engineering Hyderabad India Jazan University College of Engineering and Computer Science Department of Computer Science Jazan Saudi Arabia
The threat posed by credit card fraud, and by extension, online banking, continues to grow with the convenience brought forth by online banking services. Many financial institutions and customers stand at great risk b... 详细信息
来源: 评论