咨询与建议

限定检索结果

文献类型

  • 98,055 篇 会议
  • 44,720 篇 期刊文献
  • 1,349 册 图书

馆藏范围

  • 144,124 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 83,548 篇 工学
    • 54,641 篇 计算机科学与技术...
    • 44,315 篇 软件工程
    • 20,220 篇 信息与通信工程
    • 13,637 篇 控制科学与工程
    • 11,811 篇 电气工程
    • 10,922 篇 电子科学与技术(可...
    • 9,899 篇 生物工程
    • 7,850 篇 生物医学工程(可授...
    • 7,172 篇 光学工程
    • 6,097 篇 机械工程
    • 5,704 篇 化学工程与技术
    • 4,946 篇 动力工程及工程热...
    • 4,766 篇 材料科学与工程(可...
    • 4,734 篇 仪器科学与技术
    • 3,956 篇 网络空间安全
    • 3,733 篇 安全科学与工程
  • 48,971 篇 理学
    • 22,476 篇 数学
    • 17,121 篇 物理学
    • 11,374 篇 生物学
    • 7,575 篇 统计学(可授理学、...
    • 6,159 篇 化学
    • 5,157 篇 系统科学
  • 22,515 篇 管理学
    • 14,445 篇 管理科学与工程(可...
    • 9,029 篇 图书情报与档案管...
    • 7,041 篇 工商管理
  • 8,094 篇 医学
    • 6,619 篇 临床医学
    • 6,048 篇 基础医学(可授医学...
    • 3,707 篇 药学(可授医学、理...
    • 3,622 篇 公共卫生与预防医...
  • 4,241 篇 法学
    • 3,490 篇 社会学
  • 3,056 篇 经济学
  • 2,591 篇 农学
  • 1,351 篇 教育学
  • 624 篇 文学
  • 328 篇 军事学
  • 164 篇 艺术学
  • 14 篇 哲学
  • 10 篇 历史学

主题

  • 5,141 篇 accuracy
  • 4,133 篇 deep learning
  • 3,697 篇 feature extracti...
  • 3,639 篇 computer science
  • 3,318 篇 computational mo...
  • 3,295 篇 machine learning
  • 3,115 篇 training
  • 2,616 篇 convolutional ne...
  • 2,512 篇 real-time system...
  • 2,398 篇 predictive model...
  • 2,311 篇 support vector m...
  • 2,165 篇 internet of thin...
  • 1,887 篇 artificial intel...
  • 1,800 篇 optimization
  • 1,781 篇 data models
  • 1,575 篇 neural networks
  • 1,550 篇 security
  • 1,534 篇 data mining
  • 1,278 篇 wireless sensor ...
  • 1,210 篇 computer archite...

机构

  • 2,187 篇 chitkara univers...
  • 1,083 篇 cavendish labora...
  • 1,014 篇 department of ph...
  • 1,003 篇 university of ch...
  • 950 篇 physikalisches i...
  • 938 篇 oliver lodge lab...
  • 597 篇 infn sezione di ...
  • 584 篇 infn laboratori ...
  • 575 篇 infn sezione di ...
  • 541 篇 school of physic...
  • 540 篇 infn sezione di ...
  • 534 篇 fakultät physik ...
  • 531 篇 horia hulubei na...
  • 525 篇 department of ph...
  • 521 篇 school of physic...
  • 517 篇 school of comput...
  • 515 篇 imperial college...
  • 508 篇 h.h. wills physi...
  • 496 篇 stfc rutherford ...
  • 492 篇 nikhef national ...

作者

  • 255 篇 barter w.
  • 253 篇 a. gomes
  • 250 篇 j. wang
  • 235 篇 c. alexa
  • 232 篇 j. m. izen
  • 232 篇 blake t.
  • 228 篇 beiter a.
  • 227 篇 bellee v.
  • 226 篇 g. bella
  • 226 篇 j. strandberg
  • 224 篇 c. amelung
  • 223 篇 d. calvet
  • 223 篇 bowcock t.j.v.
  • 223 篇 s. chen
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 217 篇 brundu d.
  • 216 篇 amato s.
  • 214 篇 boettcher t.
  • 210 篇 bencivenni g.

语言

  • 123,040 篇 英文
  • 19,402 篇 其他
  • 1,750 篇 中文
  • 176 篇 日文
  • 45 篇 德文
  • 44 篇 法文
  • 17 篇 朝鲜文
  • 16 篇 斯洛文尼亚文
  • 3 篇 阿拉伯文
  • 3 篇 荷兰文
  • 3 篇 波兰文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 意大利文
检索条件"机构=Computer Science and Engineering Institute of Technology & Management"
144124 条 记 录,以下是331-340 订阅
排序:
Identification and diagnosis of cervical cancer using a hybrid feature selection approach with the bayesian optimization-based optimized catboost classification algorithm
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3459-3477页
作者: Dhar, Joy Roy, Souvik Computer Science and Engineering Indian Institute of Technology Ropar Punjab Rupnagar140001 India Department of CSE JLD Engineering and Management College West Bengal Baruipur743610 India
Cervical cancer is the most prevailing woman illness globally. Since cervical cancer is a very preventable illness, early diagnosis exhibits the most adaptive plan to lessen its global responsibility. However, because... 详细信息
来源: 评论
Gannet Optimization Algorithm Enhanced by Quasi-Affine Transformation Algorithm and Its Application in 3D Coverage of Wireless Sensor Network
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第1期9卷 69-87页
作者: Peng, Yun-Feng Chu, Shu-Chuan Wang, Ru-Yu Zhao, Jia Pan, Jeng-Shyang School of Computer Science Northeast Electric Power University Jilin132012 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China School of Information Engineering Nanchang Institute of Technology Nanchang330099 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
The gannet optimization algorithm (GOA) is an effective group intelligence algorithm inspired by the foraging behavior of gannets. Despite its merits, considerable potential exists for enhancing its exploration and co... 详细信息
来源: 评论
LesionAid: vision transformers-based skin lesion generation and classification – A practical review
收藏 引用
Multimedia Tools and Applications 2025年 1-22页
作者: K, Mallikharjuna Rao Krishna, Ghanta Sai Supriya, Kundrapu Sorgile, Meetiksha Data Science and Artificial Intelligence International Institute of Information Technology Naya Raipur India Computer Science and Engineering International Institute of Information Technology Naya Raipur India
Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specime... 详细信息
来源: 评论
Cloud-Based AI Solutions for Personal Finance management
Cloud-Based AI Solutions for Personal Finance Management
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Chhabra, Gurpreet Kaur Mishra, Ashutosh Kumar Tyagi, Varsha Mani, Chandra Tyagi, Vani Sagar, Pramod Kumar Management Education and Research Institute Department of Management Delhi India Srm Business School Department of Management UP Lucknow India Raj Kumar Goel Institute of Technology Computer Science & Engineering UP Ghaziabad India Mangalmay Institute of Engineering & Technology Computer Science & Engineering Greater Noida India
Cloud-based AI answers for private finance control are out-of-the-field tools that leverage synthetic intelligence and cloud computing technologies to manage people's money higher. In this article, I have describe... 详细信息
来源: 评论
Building a Robust and Efficient Defensive System Using Hybrid Adversarial Attack
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4470-4478页
作者: Dhanaraj, Rachel Selva Sridevi, M. Goa College of Engineering Computer Engineering Department Goa 403401 India National Institute of Technology Department of Computer Science and Engineering Tiruchirappalli620015 India
Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence ... 详细信息
来源: 评论
Exploring Social Media Chatter during a Rumoring Phenomenon  19
Exploring Social Media Chatter during a Rumoring Phenomenon
收藏 引用
19th International Conference on Ubiquitous Information management and Communication, IMCOM 2025
作者: Pal, Anjan Ghosh, Soumadip Paul, Prithwineel School for Business and Society University of York York United Kingdom Computer Science & Engineering Future Institute of Technology Kolkata India Computer Science & Engineering Institute of Engineering & Management Kolkata India
Online rumors are unverified messages that spread on the Internet. Despite the lack of evidence, such messages spread rapidly as digital wildfires, and even some are reported on news outlets. When rumors receive signi... 详细信息
来源: 评论
Hybrid Prairie Dog and Beluga Whale Optimization Algorithm for Multi-Objective Load Balanced-Task Scheduling in Cloud Computing Environments
收藏 引用
China Communications 2024年 第7期21卷 307-324页
作者: K Ramya Senthilselvi Ayothi Department of Computer Science and Engineering SRM Institute of Science and TechnologyRamapuramChennaiTamil Nadu 600089India
The cloud computing technology is utilized for achieving resource utilization of remotebased virtual computer to facilitate the consumers with rapid and accurate massive data *** utilizes on-demand resource provisioni... 详细信息
来源: 评论
OCRBench: on the hidden mystery of OCR in large multimodal models
收藏 引用
science China(Information sciences) 2024年 第12期67卷 23-35页
作者: Yuliang LIU Zhang LI Mingxin HUANG Biao YANG Wenwen YU Chunyuan LI Xu-Cheng YIN Cheng-Lin LIU Lianwen JIN Xiang BAI School of Artificial Intelligence and Automation Huazhong University of Science and Technology School of Electronic and Information Engineering South China University of Technology Microsoft Research School of Computer & Communication Engineering University of Science and Technology Beijing Institute of Automation Chinese Academy of Sciences School of Software Engineering Huazhong University of Science and Technology
Large models have recently played a dominant role in natural language processing and multimodal vision-language learning. However, their effectiveness in text-related visual tasks remains relatively unexplored. In thi... 详细信息
来源: 评论
Seizure Prediction on EEG Signals using Feature Augmentation based Multi Model Ensemble
收藏 引用
Recent Patents on engineering 2025年 第1期19卷 41-49页
作者: Anandaraj, A. Alphonse, P.J.A. Department of Computer Science and Engineering Sri Eshwar College of Engineering Coimbatore India Department of Computer Applications National Institute of Technology Tamilnadu Tiruchirappalli India
Background: Epilepsy is a neurological disorder that leads to seizures. This occurs due to excessive electrical discharge by the brain cells. An effective seizure prediction model can aid in improving the lifestyle of... 详细信息
来源: 评论
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3003-3031页
作者: Hira Akhtar Butt Khoula Said Al Harthy Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman Department of Computer Science University of Management and TechnologySialkot51040Pakistan Department of Computer Science and Creative Technologies Global College of Engineering and TechnologyMuscat2546Sultanate of Oman Department of Computer Science University of WahWah Cantt47040Pakistan Department of Computer Science and IT University of ChakwalChakwal48800Pakistan
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention... 详细信息
来源: 评论