咨询与建议

限定检索结果

文献类型

  • 176,544 篇 会议
  • 76,158 篇 期刊文献
  • 1,852 册 图书
  • 3 篇 学位论文

馆藏范围

  • 254,557 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 150,608 篇 工学
    • 101,370 篇 计算机科学与技术...
    • 82,965 篇 软件工程
    • 38,260 篇 信息与通信工程
    • 24,205 篇 控制科学与工程
    • 20,376 篇 电气工程
    • 19,634 篇 电子科学与技术(可...
    • 17,801 篇 生物工程
    • 13,103 篇 生物医学工程(可授...
    • 12,240 篇 光学工程
    • 11,373 篇 机械工程
    • 8,857 篇 化学工程与技术
    • 8,452 篇 仪器科学与技术
    • 8,331 篇 动力工程及工程热...
    • 6,580 篇 材料科学与工程(可...
    • 6,181 篇 网络空间安全
    • 5,937 篇 安全科学与工程
    • 5,683 篇 交通运输工程
  • 83,795 篇 理学
    • 41,660 篇 数学
    • 26,791 篇 物理学
    • 19,865 篇 生物学
    • 13,552 篇 统计学(可授理学、...
    • 9,335 篇 系统科学
    • 9,264 篇 化学
  • 40,238 篇 管理学
    • 24,897 篇 管理科学与工程(可...
    • 17,055 篇 图书情报与档案管...
    • 10,931 篇 工商管理
  • 12,391 篇 医学
    • 10,338 篇 临床医学
    • 9,442 篇 基础医学(可授医学...
    • 5,979 篇 药学(可授医学、理...
  • 6,956 篇 法学
    • 5,608 篇 社会学
  • 4,370 篇 经济学
  • 3,635 篇 农学
  • 2,362 篇 教育学
  • 1,211 篇 文学
  • 582 篇 军事学
  • 394 篇 艺术学
  • 23 篇 哲学
  • 16 篇 历史学

主题

  • 7,345 篇 accuracy
  • 7,127 篇 computer science
  • 6,742 篇 feature extracti...
  • 6,317 篇 deep learning
  • 5,765 篇 computational mo...
  • 5,506 篇 training
  • 5,037 篇 machine learning
  • 3,695 篇 predictive model...
  • 3,694 篇 convolutional ne...
  • 3,688 篇 support vector m...
  • 3,443 篇 optimization
  • 3,349 篇 real-time system...
  • 3,183 篇 internet of thin...
  • 3,154 篇 data mining
  • 2,969 篇 data models
  • 2,862 篇 neural networks
  • 2,694 篇 wireless sensor ...
  • 2,609 篇 artificial intel...
  • 2,512 篇 semantics
  • 2,475 篇 security

机构

  • 2,450 篇 school of comput...
  • 2,154 篇 chitkara univers...
  • 1,511 篇 school of comput...
  • 1,329 篇 school of comput...
  • 1,070 篇 cavendish labora...
  • 1,009 篇 college of compu...
  • 969 篇 department of ph...
  • 965 篇 university of ch...
  • 943 篇 school of comput...
  • 897 篇 department of co...
  • 883 篇 physikalisches i...
  • 877 篇 oliver lodge lab...
  • 817 篇 department of el...
  • 725 篇 college of compu...
  • 650 篇 department of co...
  • 649 篇 department of el...
  • 649 篇 school of comput...
  • 553 篇 infn sezione di ...
  • 531 篇 infn sezione di ...
  • 529 篇 infn laboratori ...

作者

  • 293 篇 niyato dusit
  • 250 篇 barter w.
  • 248 篇 a. gomes
  • 242 篇 s. chen
  • 235 篇 c. alexa
  • 235 篇 j. wang
  • 230 篇 j. m. izen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 boettcher t.
  • 211 篇 brundu d.
  • 210 篇 beiter a.
  • 208 篇 c. amelung
  • 208 篇 bencivenni g.
  • 207 篇 g. bella
  • 206 篇 j. strandberg

语言

  • 242,057 篇 英文
  • 9,016 篇 其他
  • 3,480 篇 中文
  • 207 篇 日文
  • 36 篇 朝鲜文
  • 24 篇 德文
  • 23 篇 法文
  • 16 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Technology"
254557 条 记 录,以下是4891-4900 订阅
排序:
Applications of Clustering in Cognitive Radio Networks  15
Applications of Clustering in Cognitive Radio Networks
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Joykutty, Anu Maria Baranidharan, B. Rajagiri School of Engineering & Technology Department of Computer Science & Engineering Kochi India SRM Institute of Science & Technology Department of Computing Technologies Chennai India
With the use of cognitive radio (CR) technology, wireless devices can utilize licensed spectrum when it is unused by the licensed users. CR was developed as a response to the wireless spectrum shortage issue caused by... 详细信息
来源: 评论
A Three Layer authentication using FEO  4
A Three Layer authentication using FEO
收藏 引用
4th IEEE International Conference on Data engineering and Communication Systems, ICDECS 2024
作者: Hanji, Bhagyashri R Aishwarya, E. Poojitha, B.V. Anushree, H.R. Chinmayi, T.K. Dayananda Sagar Academy of Technology and Management Computer Science and Engineering Bengaluru India
In the contemporary digital landscape, ensuring robust security measures is imperative to safeguard sensitive information and transactions. This work introduces an innovative Three-Level Authentication System that inc... 详细信息
来源: 评论
A Lightweight Security Algorithm for Authenticating Mobile Transactions using Wearable Devices and ECC Based Signcryption  10
A Lightweight Security Algorithm for Authenticating Mobile T...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Harrish, A. David, Shibin Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India
Internet of Things (IoT) devices are intelligent and act as the core component for capturing transactional data, initiating communication with wearable devices. Wearable devices such as smartwatches or smart wristband... 详细信息
来源: 评论
A Multi-Faceted Approach for Underwater Sonar Rock vs Mine Classification Using Machine Techniques  1
A Multi-Faceted Approach for Underwater Sonar Rock vs Mine C...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Sahoo, Sasmita Mohanta, Raj Kumar Pani, Prangya Paramita Mohapatra, Sunil Kumar Chakravarty, Sujata Centurion University of Technology and Management Department of Computer Science & Engineering Bhubaneswar India
A significant challenge of underwater object classification distinguishing sonar rocks from buried mines is crucial in maritime and naval security, as the enemy country has planned explosive mines in the ocean. Furthe... 详细信息
来源: 评论
GDformer: A lightweight decoder for efficient semantic segmentation of remote sensing Urban Scene Imagery  4
GDformer: A lightweight decoder for efficient semantic segme...
收藏 引用
4th International Conference on computer Vision and Data Mining, ICCVDM 2023
作者: Liu, Bing Zhong, Zhaohao School of Computer Science and Engineering Changchun University of Technology Changchun130012 China
Semantic segmentation of remote sensing urban scene imagery is a dense prediction task, which has been applied to the land-cover or land-use category. However, the dimension of remote sensing image is huge, which will... 详细信息
来源: 评论
Systematic evaluation of hybrid steganography approach towards secure communication in IoT  1
Systematic evaluation of hybrid steganography approach towar...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Gayathri, S. Appathurai, K. Sadish Sendil, M. Gowri, S. Surendran, R. Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India Kg College of Arts and Science Department of Computer Technology Coimbatore India Guru Nanak Institute of Technology Department of Emerging Technologies Telegana 501506 India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
The proliferation of real-world internet connectivity has led to a convergence of a large number of people accessing common cloud facilities. While this has facilitated increased data sharing in the cloud, it has also... 详细信息
来源: 评论
Blockchain-Based Federated Learning for IoT Sharing: Incentive Scheme with Reputation Mechanism  5th
Blockchain-Based Federated Learning for IoT Sharing: Incent...
收藏 引用
5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023
作者: Cai, Ting Li, Xiaoli Chen, Wuhui Wei, Zimei Ye, Zhiwei School of Computer Science and Engineering Hubei University of Technology Wuhan430068 China School of Computer Science and Engineering Hubei University of Arts and Science Xiangyang441053 China School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China
Huge amounts of data produced by millions of IoT devices are expected to be shared and leveraged as the cornerstone of real-world IoT applications, such as industrial IoT, smart grid, and intelligent transportation sy... 详细信息
来源: 评论
ProctorXam - Online Exam Proctoring Tool  1
ProctorXam - Online Exam Proctoring Tool
收藏 引用
1st IEEE International Conference on Electronics, Computing, Communication and Control technology, ICECCC 2024
作者: Ashwini, S. Bhuvan Kumar, M.S. Chandra Sai, D. Sathya, V. Atria Institute of Technology Dept. of Computer Science & Engineering Bangalore India
Robust exam monitoring solutions are now essential in light of the most notable Covid-19 outbreak and the increasing inclination towards virtual learning. The automated method for supervising online exams that is sugg... 详细信息
来源: 评论
Financial Zen: Achieving Market Harmony through Reinforcement Learning and Algorithmic Trading  2
Financial Zen: Achieving Market Harmony through Reinforcemen...
收藏 引用
2nd International Conference on Data science and Information System, ICDSIS 2024
作者: Sowmya, M.R. Chhetri, Diwash Khatri Chai, Kumar Rohit Ashraf, Suhail Nitte Meenakshi Institute Of Technology Department Of Computer Science And Engineering Bengaluru India
Algorithmic trading, utilizing reinforcement learning, has attracted significant attention for its adaptability and potential in present financial markets. This research combines Deep Deterministic Policy Gradients (D... 详细信息
来源: 评论
A Comparative Study on the Properties of Carbon Fiber-Reinforced Polymer Composites Developed by Hand Layup and Vacuum Bagging Molding Techniques
收藏 引用
Journal of The Institution of Engineers (India): Series D 2024年 第1期106卷 263-275页
作者: Amar, Thakur Abhinav Kumar, Amit Yadav, D.K. Department of Production and Industrial Engineering Birla Institute of Technology Jharkhand Mesra Ranchi835215 India Department of Mechanical Engineering National Institute of Technology Bihar Patna800005 India Department of Computer Science and Engineering National Institute of Technology Jharkhand Jamshedpur831014 India
The present study addressed the fabrication of carbon fiber-reinforced polymer (CFRP) composites using two different techniques: manual layup and vacuum bagging molding. The purpose was to compare their unique propert... 详细信息
来源: 评论