咨询与建议

限定检索结果

文献类型

  • 147,780 篇 会议
  • 70,680 篇 期刊文献
  • 2,031 册 图书
  • 7 篇 专利
  • 5 篇 学位论文

馆藏范围

  • 220,502 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 128,324 篇 工学
    • 88,779 篇 计算机科学与技术...
    • 71,344 篇 软件工程
    • 29,927 篇 信息与通信工程
    • 19,725 篇 控制科学与工程
    • 15,965 篇 电气工程
    • 14,815 篇 电子科学与技术(可...
    • 14,696 篇 生物工程
    • 10,952 篇 生物医学工程(可授...
    • 10,371 篇 光学工程
    • 8,780 篇 机械工程
    • 7,350 篇 化学工程与技术
    • 6,675 篇 仪器科学与技术
    • 6,238 篇 动力工程及工程热...
    • 5,549 篇 材料科学与工程(可...
    • 5,158 篇 网络空间安全
    • 4,738 篇 安全科学与工程
  • 75,668 篇 理学
    • 37,246 篇 数学
    • 25,674 篇 物理学
    • 16,640 篇 生物学
    • 11,901 篇 统计学(可授理学、...
    • 8,207 篇 化学
    • 7,600 篇 系统科学
  • 33,633 篇 管理学
    • 20,309 篇 管理科学与工程(可...
    • 14,805 篇 图书情报与档案管...
    • 9,209 篇 工商管理
  • 10,596 篇 医学
    • 8,835 篇 临床医学
    • 7,930 篇 基础医学(可授医学...
    • 4,883 篇 药学(可授医学、理...
    • 4,430 篇 公共卫生与预防医...
  • 5,963 篇 法学
    • 4,895 篇 社会学
  • 3,587 篇 经济学
  • 3,269 篇 农学
  • 2,242 篇 教育学
  • 958 篇 文学
  • 504 篇 军事学
  • 313 篇 艺术学
  • 72 篇 哲学
  • 39 篇 历史学

主题

  • 8,085 篇 computer science
  • 6,292 篇 accuracy
  • 5,319 篇 feature extracti...
  • 5,294 篇 deep learning
  • 5,115 篇 computational mo...
  • 4,485 篇 training
  • 4,477 篇 machine learning
  • 3,170 篇 predictive model...
  • 3,113 篇 convolutional ne...
  • 2,947 篇 support vector m...
  • 2,914 篇 real-time system...
  • 2,752 篇 data mining
  • 2,746 篇 artificial intel...
  • 2,662 篇 data models
  • 2,516 篇 optimization
  • 2,492 篇 internet of thin...
  • 2,434 篇 neural networks
  • 2,377 篇 semantics
  • 2,287 篇 computer archite...
  • 2,124 篇 security

机构

  • 2,924 篇 school of comput...
  • 2,263 篇 university of ch...
  • 2,180 篇 chitkara univers...
  • 1,377 篇 school of comput...
  • 1,085 篇 cavendish labora...
  • 1,028 篇 department of co...
  • 979 篇 department of ph...
  • 969 篇 institute of com...
  • 914 篇 oliver lodge lab...
  • 908 篇 physikalisches i...
  • 566 篇 infn sezione di ...
  • 545 篇 infn laboratori ...
  • 541 篇 infn sezione di ...
  • 518 篇 horia hulubei na...
  • 508 篇 department of ph...
  • 504 篇 school of physic...
  • 502 篇 infn sezione di ...
  • 501 篇 h.h. wills physi...
  • 500 篇 school of physic...
  • 487 篇 fakultät physik ...

作者

  • 258 篇 j. wang
  • 250 篇 barter w.
  • 241 篇 s. chen
  • 236 篇 a. gomes
  • 227 篇 blake t.
  • 223 篇 c. alexa
  • 221 篇 j. m. izen
  • 221 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 beiter a.
  • 215 篇 borsato m.
  • 215 篇 boettcher t.
  • 213 篇 brundu d.
  • 212 篇 d. calvet
  • 206 篇 bencivenni g.
  • 203 篇 g. bella
  • 203 篇 j. strandberg
  • 203 篇 c. amelung

语言

  • 204,446 篇 英文
  • 13,221 篇 其他
  • 2,853 篇 中文
  • 212 篇 日文
  • 26 篇 德文
  • 18 篇 法文
  • 16 篇 朝鲜文
  • 15 篇 俄文
  • 12 篇 斯洛文尼亚文
  • 5 篇 葡萄牙文
  • 4 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
220503 条 记 录,以下是4691-4700 订阅
排序:
Prediction of Cyberbullying Attacks on Twitter Data using ANN and NLP  3
Prediction of Cyberbullying Attacks on Twitter Data using AN...
收藏 引用
3rd International Conference for Innovation in technology, INOCON 2024
作者: Nixon, Israel Isravel, Deva Priya Punitha Malar Dhas, Julia Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India
As cyberbullying has become more common, people are becoming more worried about the damage it may do to individuals and communities. This work aims to develop a model for predictive analysis that can scour Twitter dat... 详细信息
来源: 评论
Smart Surveillance Camera Using AI  2
Smart Surveillance Camera Using AI
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Manu, Y.M. Shashikala, S.V. Darshan, N. Dheeraj, A.P. Hemanth, N.J. Gowda, Nishanth B. Computer Science and Engineering BGS Institute of Technology Karnataka BG Nagar India
The Python script recognizes faces in real-time webcam video by using computer vision algorithms. For face detection, facial feature encoding, and face comparison with known faces, it makes use of the Open CV and face... 详细信息
来源: 评论
Evolutionary Optimization for Biometric Feature Identification and Recognition
Evolutionary Optimization for Biometric Feature Identificati...
收藏 引用
2024 International Conference on Advances in computing Research on science Engineering and technology, ACROSET 2024
作者: Verma, Shraddha Bhanodia, Praveen Kumar Sethi, Kamal Kumar Rathore, Narendra Pal Singh Rajput, Shiv Shankar Mahajan, Anita Acropolis Institute of Technology and Research Department of Computer Science and Engineering Indore India
Performance variability is a major difficulty for multimodal biometric systems, affecting their consistency and dependability in person identification. In order to solve this issue, the use of ensemble learning techni... 详细信息
来源: 评论
Predictive Modeling for Thread Optimization in OpenMP-Based Parallelization Using Machine Learning  17
Predictive Modeling for Thread Optimization in OpenMP-Based ...
收藏 引用
17th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip, MCSoC 2024
作者: Yadav, Akash Ahmed, Mushtaq Malaviya National Institute of Technology Department of Computer Science and Engineering Jaipur India
High-performance applications frequently utilize parallelization tools to achieve faster execution times. OpenMP is a prominent library that facilitates the parallelization of sequentially written C code through direc... 详细信息
来源: 评论
Fed-Avis: A Lightweight Federated Learning Assisted Anti-Vehicle Infiltration System  24
Fed-Avis: A Lightweight Federated Learning Assisted Anti-Veh...
收藏 引用
25th International Conference on Distributed computing and Networking, ICDCN 2024
作者: Agrawal, Dewesh Singh, Gurpreet Singh, Harinderjit Singh, Kulvir Jha, Prianshu Patel, Yashwant Singh Computer Science & Engineering Thapar Institute of Engineering & Technology Punjab Patiala India
Vehicle anti-infiltration systems play a crucial role in modern security infrastructure, particularly in military security scenarios where unauthorized access poses a significant threat. However, current vehicle infil... 详细信息
来源: 评论
Attendance Management System using Haar Cascades and MTCNN Algorithm
Attendance Management System using Haar Cascades and MTCNN A...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Sharmila, G. Varalakshmi, I. Kaviya, M. Neha, K. Sherin, M.Juhe Suganya, P. Manakula Vinayagar Institute of Technology Department of Computer Science and Engineering Puducherry India
A cloud-based attendance management system utilizing advanced facial recognition algorithms to enhance efficiency and accuracy in educational environments. By employing the CASIA WebFace dataset, which features a dive... 详细信息
来源: 评论
Innovative Solutions for Sustainable IoT in Smart City Infrastructure  5
Innovative Solutions for Sustainable IoT in Smart City Infra...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Arul, S. Kavitha, P. Kamalakkannan, S. School of Computing Sciences Department of Computer Science Chennai Pallavaram India School of Computing Sciences Department of Computer Applications Chennai Pallavaram India School of Computing Sciences Department of Information Technology Chennai Pallavaram India
Smart cities are being created all over the world to enhance the safety and quality of life for their residents via the use of technology. Video surveillance, which includes placing cameras at key locations across the... 详细信息
来源: 评论
A Dual-Layer Approach: Combining Lightweight and Dynamic RSA for Enhanced Data Security  5
A Dual-Layer Approach: Combining Lightweight and Dynamic RSA...
收藏 引用
5th IEEE International Conference on Communication, computing and Industry 6.0, C2I6 2024
作者: Balaji, R. Sriraam, C. Lionel Donato, L. Ragav, Krithin Kanthimathi, S. Vellore Institute of Technology School of Computer Science and Engineering TamilNadu Chennai India
An important aspect for both individuals and business data is security. Security has been studied extensively by many researchers. Security gaps or threats are ever increasing, and data protection is a primary issue. ... 详细信息
来源: 评论
Bone Tumour Detection and Classification Using Deep Learning Based on Computed Tomography  2
Bone Tumour Detection and Classification Using Deep Learning...
收藏 引用
2nd IEEE International Conference on Networks, Multimedia and Information technology, NMITCON 2024
作者: Rajath, S. Archana, R.A. Shivakumar, Kunaal Mathew, Kevin S Krishna, Mohit Bms Institute of Technology and Management Dept of Computer Science and Engineering Bengaluru India
Bone Tumours may develop in any part of the bone and they usually occur in young adults or adolescents. Diagnosis requires at least a radiologist, surgeon, pathologist, and oncologist. For any suspected bone tumour le... 详细信息
来源: 评论
Machine Learning-Based Fake News Detection System Using Blockchain  8th
Machine Learning-Based Fake News Detection System Using Bloc...
收藏 引用
8th International Conference on Emerging Research in computing, Information, Communication and Applications, ERCICA 2023
作者: Shwetha, A.N. Prabodh, C.P. Department of Computer Science Engineering Siddaganga Institute of Technology Karnataka Tumakuru India
Now a days, news on print and digital media has become very essential for everyone to stay aware with current happenings in the world. The increased amount of IT penetration and digitization has resulted in more numbe... 详细信息
来源: 评论