咨询与建议

限定检索结果

文献类型

  • 147,717 篇 会议
  • 70,365 篇 期刊文献
  • 2,038 册 图书
  • 7 篇 专利
  • 5 篇 学位论文

馆藏范围

  • 220,131 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 127,986 篇 工学
    • 88,499 篇 计算机科学与技术...
    • 71,401 篇 软件工程
    • 29,838 篇 信息与通信工程
    • 19,410 篇 控制科学与工程
    • 15,903 篇 电气工程
    • 14,774 篇 电子科学与技术(可...
    • 14,676 篇 生物工程
    • 10,938 篇 生物医学工程(可授...
    • 10,394 篇 光学工程
    • 8,772 篇 机械工程
    • 7,334 篇 化学工程与技术
    • 6,666 篇 仪器科学与技术
    • 6,221 篇 动力工程及工程热...
    • 5,497 篇 材料科学与工程(可...
    • 5,115 篇 网络空间安全
    • 4,732 篇 安全科学与工程
  • 75,563 篇 理学
    • 37,245 篇 数学
    • 25,619 篇 物理学
    • 16,627 篇 生物学
    • 11,907 篇 统计学(可授理学、...
    • 8,134 篇 化学
    • 7,600 篇 系统科学
  • 33,627 篇 管理学
    • 20,305 篇 管理科学与工程(可...
    • 14,802 篇 图书情报与档案管...
    • 9,224 篇 工商管理
  • 10,559 篇 医学
    • 8,821 篇 临床医学
    • 7,934 篇 基础医学(可授医学...
    • 4,883 篇 药学(可授医学、理...
    • 4,443 篇 公共卫生与预防医...
  • 5,976 篇 法学
    • 4,907 篇 社会学
  • 3,588 篇 经济学
  • 3,269 篇 农学
  • 2,256 篇 教育学
  • 954 篇 文学
  • 504 篇 军事学
  • 315 篇 艺术学
  • 72 篇 哲学
  • 39 篇 历史学

主题

  • 8,084 篇 computer science
  • 6,279 篇 accuracy
  • 5,309 篇 feature extracti...
  • 5,258 篇 deep learning
  • 5,108 篇 computational mo...
  • 4,471 篇 training
  • 4,448 篇 machine learning
  • 3,167 篇 predictive model...
  • 3,105 篇 convolutional ne...
  • 2,947 篇 support vector m...
  • 2,907 篇 real-time system...
  • 2,746 篇 data mining
  • 2,743 篇 artificial intel...
  • 2,660 篇 data models
  • 2,508 篇 optimization
  • 2,491 篇 internet of thin...
  • 2,430 篇 neural networks
  • 2,374 篇 semantics
  • 2,285 篇 computer archite...
  • 2,120 篇 security

机构

  • 2,921 篇 school of comput...
  • 2,261 篇 university of ch...
  • 2,179 篇 chitkara univers...
  • 1,376 篇 school of comput...
  • 1,085 篇 cavendish labora...
  • 1,030 篇 department of co...
  • 981 篇 department of ph...
  • 970 篇 institute of com...
  • 914 篇 oliver lodge lab...
  • 908 篇 physikalisches i...
  • 566 篇 infn sezione di ...
  • 545 篇 infn laboratori ...
  • 541 篇 infn sezione di ...
  • 522 篇 horia hulubei na...
  • 510 篇 department of ph...
  • 504 篇 school of physic...
  • 503 篇 h.h. wills physi...
  • 502 篇 infn sezione di ...
  • 500 篇 school of physic...
  • 487 篇 fakultät physik ...

作者

  • 258 篇 j. wang
  • 250 篇 barter w.
  • 243 篇 s. chen
  • 236 篇 a. gomes
  • 227 篇 blake t.
  • 224 篇 c. alexa
  • 222 篇 j. m. izen
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 215 篇 beiter a.
  • 215 篇 borsato m.
  • 215 篇 boettcher t.
  • 213 篇 brundu d.
  • 212 篇 d. calvet
  • 206 篇 bencivenni g.
  • 204 篇 g. bella
  • 204 篇 c. amelung
  • 203 篇 j. strandberg

语言

  • 204,383 篇 英文
  • 12,902 篇 其他
  • 2,854 篇 中文
  • 212 篇 日文
  • 27 篇 德文
  • 18 篇 法文
  • 16 篇 朝鲜文
  • 15 篇 俄文
  • 12 篇 斯洛文尼亚文
  • 5 篇 葡萄牙文
  • 4 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
220132 条 记 录,以下是4521-4530 订阅
排序:
Exploring the Performance of You only Look Once Model for Object Detection in VQA Images
Exploring the Performance of You only Look Once Model for Ob...
收藏 引用
2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Applications, ICAIQSA 2024
作者: Asudani, Deepak Suresh Nagwani, Naresh Kumar Singh, Pradeep National Institute of Technology Department of Computer Science and Engineering Chhattisgarh Raipur India
Identifying objects is among the most crucial and complex problems in computer vision. The effectiveness of object detection tasks has significantly increased due to advancements in deep learning architectures. Object... 详细信息
来源: 评论
Parameter sensitivity analysis of the myocardial cell models in ischemia and screening of drug targets
Parameter sensitivity analysis of the myocardial cell models...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Liu, Jun Liang, Cuiping Wang, Kuanquan School of Computer Science and Technology Harbin China Beijing Institute of Computer Technology and Application Beijing China
Previous studies have shown that coronary artery occlusion can cause myocardial ischemia, which can induce ventricular tachycardia or fibrillation. According to the time sequence, myocardial ischemia can be divided in... 详细信息
来源: 评论
DynaCache: A Checkpoint Aware Reconfigurable Cache for Intermittently Powered computing Systems  32
DynaCache: A Checkpoint Aware Reconfigurable Cache for Inter...
收藏 引用
32nd IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2024
作者: Mahanta, Rishabh Kapoor, Hemangee K. Indian Institute of Technology Dept. of Computer Science and Engineering Guwahati India
Energy harvesting devices are rapidly evolving to rival battery-backed technologies. Batteries have a shorter life- time and need maintenance compared to capacitors. Moreover, the usage of batteries comes with undenia... 详细信息
来源: 评论
E-Evaluation Based Authentication for Virtual Discussion on an Online Platform  2
E-Evaluation Based Authentication for Virtual Discussion on ...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Rajkumar, K. Arikumar, K.S. Ragupathi, T. School of Computing Srm Institute of Science and Technology Department of Data Science and Business Systems Tamil Nadu Kattankulathur India
The main aim of this work is to develop an Online Discussion platform for users. The platforms will become more mature while having more users. In the paper, a sophisticated strategy is suggested to tackle a critical ... 详细信息
来源: 评论
An EDGE based end-2-end system architecture for retail stores
收藏 引用
International Journal of Information technology (Singapore) 2024年 1-29页
作者: Sundaresan, Vijay Anand Chandrapragasam, Tharini Rajaganesh, Thivish Naran Vimal, Pranhav Vadivelu, Manjula B.S.A Crescent Institute of Science and Technology Vandalur India School of Electrical and Communication Sciences B.S.A Crescent Institute of Science and Technology Vandalur India New York University NY United States Vellore Institute of Technology Vellore India School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Retailers need real-time insights to know customer behavior and preferences to enhance operations efficiency and administrative cost reduction. There is a need to interconnect various legacy devices within the retail ... 详细信息
来源: 评论
Distributed Denial of Service (DDOS) Attack Detection Using Classification Algorithm
Distributed Denial of Service (DDOS) Attack Detection Using ...
收藏 引用
2024 International Conference on Advances in Data Engineering and Intelligent computing Systems, ADICS 2024
作者: Haribalaji, S. Ranjana, P. Hindustan Institute Of Technology And Science Department Of Computer Science And Engineering Tamil Nadu Chennai India
Strong and flexible detection systems are vital to protect network infrastructures from Distributed Denial of Service (DDoS) attacks, which are becoming more common and sophisticated. To detect DDoS attacks, this stud... 详细信息
来源: 评论
Tackling Food Wastage and Hunger: Feed the Needy  15
Tackling Food Wastage and Hunger: Feed the Needy
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Arakala, Rishitha Abbadasari, Shravani Begari, Rajeshwari Banoth, Sonabai Bhaskara Rao, P. B V Raju Institute of Technology Computer Science and Engineering Telangana India
In response to the substantial wastage of food globally, this initiative proposes a solution called 'Feed the Needy.' This charitable application streamlines the redistribution of excess food from various even... 详细信息
来源: 评论
LiDAR 3D object detection based on improved PillarNet  9
LiDAR 3D object detection based on improved PillarNet
收藏 引用
9th International Conference on Intelligent Informatics and BioMedical sciences, ICIIBMS 2024
作者: Huang, Xinde Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China
To address the limitations of current methods in detecting small objects, such as pedestrians and cyclists, within autonomous driving scenarios, we propose a novel 3D object detection algorithm based on an improved Pi... 详细信息
来源: 评论
mVulPreter: A Multi-Granularity Vulnerability Detection System With Interpretations
收藏 引用
IEEE Transactions on Dependable and Secure computing 2022年 1-12页
作者: Zou, Deqing Hu, Yutao Li, Wenke Wu, Yueming Zhao, Haojun Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Computer Science and Engineering Nanyang Technological University Singapore National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to the powerful automatic feature extraction, deep learning-based vulnerability detection methods have evolved significantly in recent years. However, almost all current work focuses on detecting vulnerabilities a... 详细信息
来源: 评论
Comprehensive Data Analysis of Bacillus Thuringiensis Cry Gene  10
Comprehensive Data Analysis of Bacillus Thuringiensis Cry Ge...
收藏 引用
10th International Conference on Advanced computing and Communication Systems, ICACCS 2024
作者: Evangeline, M. Sharon Thankappan, Sugitha Raimond, Kumudha Karunya Institute of Technology and Sciences Computer Science and Engineering Coimbatore641114 India
Crop pest damage accrues to fifty per cent loss in yield which leads to severe monetary losses and an overall rise in farming costs. Understanding the complex processes by which the host plants acquire resistance to i... 详细信息
来源: 评论