咨询与建议

限定检索结果

文献类型

  • 97,753 篇 会议
  • 44,880 篇 期刊文献
  • 1,358 册 图书
  • 4 篇 科技报告

馆藏范围

  • 143,995 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 83,275 篇 工学
    • 54,773 篇 计算机科学与技术...
    • 44,494 篇 软件工程
    • 20,257 篇 信息与通信工程
    • 13,678 篇 控制科学与工程
    • 11,716 篇 电气工程
    • 10,799 篇 电子科学与技术(可...
    • 9,911 篇 生物工程
    • 7,873 篇 生物医学工程(可授...
    • 7,292 篇 光学工程
    • 6,103 篇 机械工程
    • 5,722 篇 化学工程与技术
    • 4,954 篇 动力工程及工程热...
    • 4,754 篇 仪器科学与技术
    • 4,469 篇 材料科学与工程(可...
    • 3,960 篇 网络空间安全
    • 3,748 篇 安全科学与工程
  • 49,129 篇 理学
    • 22,498 篇 数学
    • 17,154 篇 物理学
    • 11,397 篇 生物学
    • 7,526 篇 统计学(可授理学、...
    • 6,164 篇 化学
    • 5,164 篇 系统科学
  • 22,588 篇 管理学
    • 14,500 篇 管理科学与工程(可...
    • 9,041 篇 图书情报与档案管...
    • 7,070 篇 工商管理
  • 8,145 篇 医学
    • 6,665 篇 临床医学
    • 6,080 篇 基础医学(可授医学...
    • 3,706 篇 药学(可授医学、理...
    • 3,651 篇 公共卫生与预防医...
  • 4,252 篇 法学
    • 3,498 篇 社会学
  • 3,069 篇 经济学
  • 2,609 篇 农学
  • 1,354 篇 教育学
  • 625 篇 文学
  • 329 篇 军事学
  • 161 篇 艺术学
  • 14 篇 哲学
  • 10 篇 历史学

主题

  • 5,014 篇 accuracy
  • 4,072 篇 deep learning
  • 3,642 篇 computer science
  • 3,640 篇 feature extracti...
  • 3,278 篇 machine learning
  • 3,252 篇 computational mo...
  • 3,080 篇 training
  • 2,583 篇 convolutional ne...
  • 2,403 篇 real-time system...
  • 2,357 篇 predictive model...
  • 2,277 篇 support vector m...
  • 2,120 篇 internet of thin...
  • 1,881 篇 artificial intel...
  • 1,756 篇 optimization
  • 1,737 篇 data models
  • 1,574 篇 neural networks
  • 1,523 篇 security
  • 1,521 篇 data mining
  • 1,264 篇 wireless sensor ...
  • 1,210 篇 computer archite...

机构

  • 2,185 篇 chitkara univers...
  • 1,088 篇 cavendish labora...
  • 1,011 篇 department of ph...
  • 1,000 篇 university of ch...
  • 952 篇 oliver lodge lab...
  • 949 篇 physikalisches i...
  • 597 篇 infn sezione di ...
  • 583 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 539 篇 school of physic...
  • 539 篇 infn sezione di ...
  • 537 篇 fakultät physik ...
  • 536 篇 horia hulubei na...
  • 526 篇 department of ph...
  • 520 篇 school of physic...
  • 515 篇 imperial college...
  • 512 篇 h.h. wills physi...
  • 512 篇 school of comput...
  • 498 篇 nikhef national ...
  • 496 篇 stfc rutherford ...

作者

  • 254 篇 a. gomes
  • 252 篇 j. wang
  • 250 篇 barter w.
  • 237 篇 c. alexa
  • 232 篇 j. m. izen
  • 229 篇 c. amelung
  • 228 篇 g. bella
  • 227 篇 j. strandberg
  • 227 篇 d. calvet
  • 227 篇 blake t.
  • 227 篇 s. chen
  • 225 篇 beiter a.
  • 223 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 214 篇 boettcher t.
  • 213 篇 brundu d.
  • 206 篇 bencivenni g.

语言

  • 133,130 篇 英文
  • 9,114 篇 其他
  • 1,704 篇 中文
  • 178 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 17 篇 朝鲜文
  • 10 篇 斯洛文尼亚文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Engineering Institute of Technology & Management"
143995 条 记 录,以下是271-280 订阅
排序:
Extreme learning machine to foretell the deflection in plain cement, steel-reinforced, and bamboo-reinforced concrete beams
收藏 引用
Emerging Materials Research 2025年 第1期14卷 12-27页
作者: Dubey, Saurabh Gupta, Deepak Mallik, Mainak Department of Civil Engineering National Institute of Technology Arunachal Pradesh India Department of Computer Science and Engineering Motilal Nehru National Institute of Technology Allahabad India
In mountainous regions, bamboo has gained popularity as a local reinforcement material for concrete due to its availability and cost-effectiveness. However, the lack of standardized design guidelines complicates the a... 详细信息
来源: 评论
Blockchain based Identity Generator and Authenticator  3
Blockchain based Identity Generator and Authenticator
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Akhil, V. Hareesh, R. Yesudas, P.Y. Venugopalan, Anand Meera, K. Menon, Hema P. Sreepathy Institute of Management and Technology Department of Computer Science and Engineering Vavannor Kerala Palakkad India
The market today is flooded with the counterfeit branded products and there is currently no reliable solution to prevent the widespread flow of duplicates. However, blockchain technology offers a potential solution to... 详细信息
来源: 评论
Event management System Using Spatial and Event Attribute Information
收藏 引用
SN computer science 2025年 第3期6卷 1-9页
作者: Setia, Sonia Anjli, Km Bisht, Upasana Jyoti Raj, Dharm Department of Computer Science & Engineering Sharda School of Engineering & Technology Sharda University Uttar Pradesh Greater Noida India Department of Computer Science Institute of Innovation in Technology & Management Delhi Janakpuri India Department of Computer Science and Engineering ITS Engineering College Greater Noida India
The event management mechanism matches messages that have been subscribed to and events that have been published. To identify the subscriptions that correspond to the occurrence inside the category, it must first run ... 详细信息
来源: 评论
Traffic Rerouting Optimization Using Scheduling Algorithms
收藏 引用
SN computer science 2024年 第6期5卷 762页
作者: Garg, Tanya Kaur, Gurjinder Rana, Prashant Singh Department of Computer Science & amp Engineering Sant Longowal Institute of Engineering & amp Technology Computer Science & amp Engineering Department Thapar Institute of Engineering & amp Technology
Traffic rerouting is a technique used to optimize traffic flow and reduce congestion by redirecting vehicles to alternate routes. The work done in this research focuses on a specific case scenario covering a 25 k... 详细信息
来源: 评论
Designing New Blood-Brain Barrier Penetrating Molecules Using Novel Hybridized Gravitational Search Algorithm and Explainable AI
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2127-2138页
作者: Singh, Vishakha Sharma, Ritesh Singh, Sanjay Kumar Indian Institute of Technology BHU Department of Computer Science and Engineering Varanasi221005 India
Artificial intelligence (AI) has emerged as a powerful tool in computational biology, where it is being used to analyze large datasets to detect difficult biological patterns. This has enabled the design of new drug m... 详细信息
来源: 评论
Identification of Human Activity from Video Streaming Smartphone Data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
An empirical evaluation of teaching–learning-based optimization, genetic algorithm and particle swarm optimization
收藏 引用
International Journal of computers and Applications 2023年 第1期45卷 36-50页
作者: Shukla, Alok Kumar Pippal, Sanjeev Kumar Chauhan, Sansar Singh Department of Computer Science and Engineering G.L. Bajaj Institute of Technology & Management Greater Noida India Department of Computer Science & Engineering Galgotias University Greater Noida India
Metaheuristic algorithms have probable to solve global optimization problems in various fields of engineering and industry. To find a global solution by exploring irregular or non-linear surfaces, classical optimizati... 详细信息
来源: 评论
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali Department of Computer Applications Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India Department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex... 详细信息
来源: 评论
Secure SSI framework using the optimized Orkey identity schema
收藏 引用
International Journal of Information technology (Singapore) 2024年 第6期16卷 4007-4014页
作者: Pandu N, K. Kumar, A. Sasi Department of Computer Science and Engineering Srinivas University Institute of Engineering and Technology Srinivas University Department of Computer Science amd Engineering Yenepoya Institute of Technology VTU
In the era of digital transformation and increasing concerns regarding data privacy, the concept of Self-Sovereign Identity (SSI) has attained substantial recognization. SSI offers individuals greater control over the... 详细信息
来源: 评论
Utilization of Two Cross Two Switch for Bitonic Sorting Circuit
收藏 引用
Micro and Nanosystems 2025年 第1期17卷 45-57页
作者: Bhattacharjee, Subhasree Sarkar, Soumyadip Das, Kunal Sadhu, Arindam Sarkar, Bikramjit Department of Computer Application Narula Institute of Technology Kolkata India Department of Computer Science Acharya Prafulla Chandra College Kolkata India Department of Electronics & Communication Engineering Greater Kolkata College of Engineering and Management West Bengal India Department of Computer Science & Engineering JIS College of Engineering West Bengal India
Background: The synthesis of reversible logic has gained prominence as a crucial research area, particularly in the context of post-CMOS computing devices, notably quantum computing. Objective: To implement the bitoni... 详细信息
来源: 评论