咨询与建议

限定检索结果

文献类型

  • 149,501 篇 会议
  • 70,945 篇 期刊文献
  • 2,035 册 图书
  • 7 篇 专利

馆藏范围

  • 222,487 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 129,225 篇 工学
    • 89,504 篇 计算机科学与技术...
    • 71,774 篇 软件工程
    • 30,563 篇 信息与通信工程
    • 20,194 篇 控制科学与工程
    • 16,355 篇 电气工程
    • 14,975 篇 电子科学与技术(可...
    • 14,699 篇 生物工程
    • 10,975 篇 生物医学工程(可授...
    • 10,411 篇 光学工程
    • 8,929 篇 机械工程
    • 7,402 篇 化学工程与技术
    • 6,793 篇 仪器科学与技术
    • 6,374 篇 动力工程及工程热...
    • 5,602 篇 材料科学与工程(可...
    • 5,538 篇 网络空间安全
    • 4,945 篇 安全科学与工程
  • 76,108 篇 理学
    • 37,455 篇 数学
    • 25,835 篇 物理学
    • 16,688 篇 生物学
    • 12,041 篇 统计学(可授理学、...
    • 8,325 篇 化学
    • 7,597 篇 系统科学
  • 34,119 篇 管理学
    • 20,693 篇 管理科学与工程(可...
    • 14,987 篇 图书情报与档案管...
    • 9,256 篇 工商管理
  • 10,821 篇 医学
    • 8,908 篇 临床医学
    • 7,957 篇 基础医学(可授医学...
    • 4,889 篇 药学(可授医学、理...
    • 4,613 篇 公共卫生与预防医...
  • 6,071 篇 法学
    • 5,001 篇 社会学
  • 3,617 篇 经济学
  • 3,293 篇 农学
  • 2,280 篇 教育学
  • 1,006 篇 文学
  • 506 篇 军事学
  • 318 篇 艺术学
  • 72 篇 哲学
  • 40 篇 历史学

主题

  • 8,081 篇 computer science
  • 6,648 篇 accuracy
  • 5,580 篇 deep learning
  • 5,479 篇 feature extracti...
  • 5,251 篇 computational mo...
  • 4,624 篇 machine learning
  • 4,567 篇 training
  • 3,266 篇 predictive model...
  • 3,224 篇 convolutional ne...
  • 3,173 篇 real-time system...
  • 3,014 篇 support vector m...
  • 2,815 篇 artificial intel...
  • 2,772 篇 data mining
  • 2,767 篇 data models
  • 2,617 篇 optimization
  • 2,595 篇 internet of thin...
  • 2,469 篇 neural networks
  • 2,394 篇 semantics
  • 2,311 篇 computer archite...
  • 2,221 篇 security

机构

  • 2,880 篇 school of comput...
  • 2,296 篇 university of ch...
  • 2,259 篇 chitkara univers...
  • 1,383 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,037 篇 department of co...
  • 984 篇 department of ph...
  • 979 篇 institute of com...
  • 917 篇 physikalisches i...
  • 915 篇 oliver lodge lab...
  • 569 篇 infn sezione di ...
  • 553 篇 infn laboratori ...
  • 540 篇 infn sezione di ...
  • 524 篇 horia hulubei na...
  • 511 篇 infn sezione di ...
  • 508 篇 department of ph...
  • 504 篇 h.h. wills physi...
  • 504 篇 school of comput...
  • 503 篇 school of physic...
  • 501 篇 fakultät physik ...

作者

  • 258 篇 barter w.
  • 256 篇 j. wang
  • 239 篇 s. chen
  • 236 篇 a. gomes
  • 233 篇 blake t.
  • 225 篇 c. alexa
  • 224 篇 amato s.
  • 222 篇 j. m. izen
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 218 篇 brundu d.
  • 218 篇 boettcher t.
  • 211 篇 d. calvet
  • 211 篇 bencivenni g.
  • 210 篇 beiter a.
  • 204 篇 g. bella
  • 204 篇 j. strandberg
  • 204 篇 bay a.

语言

  • 182,302 篇 英文
  • 37,606 篇 其他
  • 2,917 篇 中文
  • 213 篇 日文
  • 38 篇 德文
  • 31 篇 斯洛文尼亚文
  • 27 篇 法文
  • 17 篇 俄文
  • 16 篇 朝鲜文
  • 5 篇 葡萄牙文
  • 4 篇 西班牙文
  • 3 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 波兰文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
222488 条 记 录,以下是4501-4510 订阅
排序:
A Customizable Virtual Assistant Enhanced with Vision and Speech Capabilities  12th
A Customizable Virtual Assistant Enhanced with Vision and Sp...
收藏 引用
12th International Conference on Recent Trends in computing, ICRTC 2024
作者: Christy Jeba Malar, A. Deva Priya, M. Naveen Kumaran, R. Sanjay Abhishek, J. Bhuvana, S. Karthick, S. Department of Information Technology Sri Krishna College of Technology Tamilnadu Coimbatore India Department of Computer Science and Engineering Karpagam College of Engineering Tamilnadu Coimbatore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India Department of Computer Science and Engineering SRM Institute of Science and Technology Uttar Pradesh Delhi–NCR Campus Ghaziabad India
Recent advancements in Smart Assistants (SAs) as well as home automation have captured the attention of both researchers and consumers. Virtual Assistants (VAs) that are speech-enabled are commonly referred to as smar... 详细信息
来源: 评论
mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
收藏 引用
Journal of Reliable Intelligent Environments 2023年 第3期9卷 333-347页
作者: Prabhakaran, Varun Kulandasamy, Ashokkumar Department of Computer Science and Engineering St.Joseph’s College of Engineering Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st... 详细信息
来源: 评论
Sign-Based Distributed Learning with Byzantine Resilience based on Audit Mechanism
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5774-5788页
作者: Li, Chengxi Xiao, Ming Skoglund, Mikael KTH Royal Institute of Technology Division of Information Science and Engineering School of Electrical Engineering and Computer Science Stockholm 10044 Sweden
In this paper, we study the problem of distributed learning (DL) with devices transmitting sign information of the local gradients to the server under communication constraints, where the devices are susceptible to By... 详细信息
来源: 评论
Integration of smart Sensors and Machine Learning Algorithms for Automated Pest Management  1
Integration of smart Sensors and Machine Learning Algorithms...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Yadav, Krrish Roy, Sritama Vellore Institute of Technology School of Computer Science and Engineering Chennai India Vellore Institute of Technology School of Electronics Engineering Chennai600127 India
This paper presents a new IoT-based approach for agricultural pest control, incorporating machine learning techniques. Traditional pest monitoring methods are labor-intensive and often result in the overuse of pestici... 详细信息
来源: 评论
Momentum-based Single-Node Injection Attack with Neighbor Suppression Loss  5
Momentum-based Single-Node Injection Attack with Neighbor Su...
收藏 引用
5th International Academic Exchange Conference on science and technology Innovation, IAECST 2023
作者: Shan, Zhiqiang Ding, Yuxin Computer Science and Technology Harbin Institute of Technology Shenzhen Guangdong Nanshan China
Graph neural networks have been widely used in various fields, but their security has always been of concern. Graph node injection attacks can efficiently attack and evaluate the robustness of graph neural networks. H... 详细信息
来源: 评论
Pneumonia Detection in Chest X-Rays Using Combined Approach of Deep Learning  2
Pneumonia Detection in Chest X-Rays Using Combined Approach ...
收藏 引用
2nd IEEE International Conference on Networks, Multimedia and Information technology, NMITCON 2024
作者: Aditya Pai, H. Pareek, Piyush Kumar Guruprasad, M.S. Chandrappa, S. Bhargava, Krishna Mit Art Design and Technology University Mit School of Computing Pune India Nitte Meenakshi Institute of Technology Department of Artificial Intelligence and Machine Learning Bengaluru India Department of Computer Science and Engineering Dehradun India School of Computer Science and Engineering Bengaluru India
A respiratory infection like pneumonia faces a serious health challenge across the globe, especially in the poor and underdeveloped countries. The pneumonia is affected by various factors like bacteria or viruses. The... 详细信息
来源: 评论
Assessing Quality of Service Performance in SDN Controllers: POX vs. OpenDaylight  6
Assessing Quality of Service Performance in SDN Controllers:...
收藏 引用
6th International Conference on Advancements in computing, ICAC 2024
作者: Lokuliyana, Shashika Wijesiri, Pipuni Jayakody, Anuradha Abeygunawardhana, Pradeep K.W. Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
This research offers a comparative analysis of Qual-ity of Service (QoS) within Software Defined Networks (SDN) by assessing the POX and OpenDaylight controllers across various network topologies. The results show tha... 详细信息
来源: 评论
Cybersecurity: Threats, Requirements, Deployments, Techniques, System Architecture, and Future Research
Cybersecurity: Threats, Requirements, Deployments, Technique...
收藏 引用
2024 International Conference on Smart Devices, ICSD 2024
作者: Yadav, Ajay Karnatak, Vijay Mishra, Amit Kumar Verma, Shalini Aswal, Pallaw Singh Tripathi, Neha University Institute of Computing Chandigarh University Punjab Mohali India THDC Institute of Hydropower Engineering and Technology Dept. of Computer Science & Engineering Tehri India Graphic Era Hill University Dept. of Computer Science & Engineering Dehradun India Doon Group Of Institution Dept. of Computer Science & Engineering Rishikesh India THDC Institute of Hydropower Engineering and Technology Computer Science and Engineering Tehri India Department of Computer Science & Engineering Dehradun India
Cybersecurity safeguards computer systems, net- works, and digital information from a wide variety of cyber-attacks. Its major purpose is to protect the privacy of users' data and resources while maintaining their... 详细信息
来源: 评论
A comprehensive review and open issues on energy aware resource allocation in cloud
收藏 引用
International Journal of Web Engineering and technology 2023年 第4期17卷 353-371页
作者: Singh, Shubham Singh, Pawan Tanwar, Sudeep Department of Computer Science and Engineering Amity University Uttar Pradesh Lucknow Campus India Department of Computer Science and Engineering Institute of Technology Nirma University India
Cloud computing is an on-demand service resource that includes applications to data centres on a pay-per-use basis. While allocating resources, the node failure causes the cloud service failures. This reduces the qual... 详细信息
来源: 评论
LAME:Layout-Aware Metadata Extraction Approach for Research Articles
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 4019-4037页
作者: Jongyun Choi Hyesoo Kong Hwamook Yoon Heungseon Oh Yuchul Jung Department of Computer Engineering Kumoh National Institute of Technology(KIT)GumiKorea Korea Institute of Science and Technology Information(KISTI) DaejeonKorea School of Computer Science and Engineering Korea University of Technology and Education(KOREATECH)CheonanKorea
The volume of academic literature,such as academic conference papers and journals,has increased rapidly worldwide,and research on metadata extraction is ***,high-performing metadata extraction is still challenging due... 详细信息
来源: 评论