咨询与建议

限定检索结果

文献类型

  • 146,701 篇 会议
  • 69,850 篇 期刊文献
  • 2,030 册 图书
  • 7 篇 专利
  • 5 篇 学位论文

馆藏范围

  • 218,592 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 126,691 篇 工学
    • 87,639 篇 计算机科学与技术...
    • 70,764 篇 软件工程
    • 29,618 篇 信息与通信工程
    • 19,087 篇 控制科学与工程
    • 15,737 篇 电气工程
    • 14,685 篇 电子科学与技术(可...
    • 14,632 篇 生物工程
    • 10,851 篇 生物医学工程(可授...
    • 10,255 篇 光学工程
    • 8,718 篇 机械工程
    • 7,298 篇 化学工程与技术
    • 6,625 篇 仪器科学与技术
    • 6,193 篇 动力工程及工程热...
    • 5,454 篇 材料科学与工程(可...
    • 5,065 篇 网络空间安全
    • 4,682 篇 安全科学与工程
  • 75,080 篇 理学
    • 37,014 篇 数学
    • 25,464 篇 物理学
    • 16,559 篇 生物学
    • 11,807 篇 统计学(可授理学、...
    • 8,102 篇 化学
    • 7,588 篇 系统科学
  • 33,406 篇 管理学
    • 20,179 篇 管理科学与工程(可...
    • 14,704 篇 图书情报与档案管...
    • 9,144 篇 工商管理
  • 10,445 篇 医学
    • 8,710 篇 临床医学
    • 7,839 篇 基础医学(可授医学...
    • 4,877 篇 药学(可授医学、理...
    • 4,345 篇 公共卫生与预防医...
  • 5,927 篇 法学
    • 4,871 篇 社会学
  • 3,577 篇 经济学
  • 3,241 篇 农学
  • 2,210 篇 教育学
  • 958 篇 文学
  • 502 篇 军事学
  • 314 篇 艺术学
  • 72 篇 哲学
  • 39 篇 历史学

主题

  • 8,080 篇 computer science
  • 6,217 篇 accuracy
  • 5,278 篇 feature extracti...
  • 5,168 篇 deep learning
  • 5,081 篇 computational mo...
  • 4,462 篇 training
  • 4,433 篇 machine learning
  • 3,138 篇 predictive model...
  • 3,034 篇 convolutional ne...
  • 2,932 篇 support vector m...
  • 2,866 篇 real-time system...
  • 2,745 篇 data mining
  • 2,716 篇 artificial intel...
  • 2,647 篇 data models
  • 2,501 篇 optimization
  • 2,480 篇 internet of thin...
  • 2,423 篇 neural networks
  • 2,368 篇 semantics
  • 2,274 篇 computer archite...
  • 2,104 篇 security

机构

  • 2,893 篇 school of comput...
  • 2,227 篇 university of ch...
  • 2,166 篇 chitkara univers...
  • 1,361 篇 school of comput...
  • 1,083 篇 cavendish labora...
  • 1,017 篇 department of co...
  • 978 篇 department of ph...
  • 961 篇 institute of com...
  • 914 篇 oliver lodge lab...
  • 914 篇 physikalisches i...
  • 566 篇 infn sezione di ...
  • 546 篇 infn laboratori ...
  • 541 篇 infn sezione di ...
  • 520 篇 horia hulubei na...
  • 508 篇 department of ph...
  • 505 篇 infn sezione di ...
  • 504 篇 school of physic...
  • 501 篇 h.h. wills physi...
  • 498 篇 school of physic...
  • 487 篇 imperial college...

作者

  • 258 篇 j. wang
  • 250 篇 barter w.
  • 241 篇 s. chen
  • 236 篇 a. gomes
  • 227 篇 blake t.
  • 223 篇 c. alexa
  • 221 篇 j. m. izen
  • 221 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 beiter a.
  • 215 篇 borsato m.
  • 215 篇 boettcher t.
  • 213 篇 brundu d.
  • 212 篇 d. calvet
  • 206 篇 bencivenni g.
  • 204 篇 c. amelung
  • 203 篇 g. bella
  • 203 篇 j. strandberg

语言

  • 207,810 篇 英文
  • 7,976 篇 其他
  • 2,787 篇 中文
  • 212 篇 日文
  • 23 篇 德文
  • 20 篇 法文
  • 16 篇 朝鲜文
  • 10 篇 俄文
  • 9 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 5 篇 葡萄牙文
  • 4 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
218593 条 记 录,以下是4961-4970 订阅
排序:
Bug Prioritization Using Average One Dependence Estimator
收藏 引用
Intelligent Automation & Soft computing 2023年 第6期36卷 3517-3533页
作者: Kashif Saleem Rashid Naseem Khalil Khan Siraj Muhammad Ikram Syed Jaehyuk Choi Department of IT and Computer Science Institute of Applied Sciences and TechnologyPakAustriaFochhshuleHaripurPakistan Faculty of Computer Sciences and Information Technology Superior UniversityLahore54660Pakistan Department of Computer Science Shaheed Benazir Bhutto UniversitySheringalUpper DirKhyber PakhtunkhwaPakitan School of Computing Gachon University1342Seongnam-daeroSujeong-guSeongnam-si13120Korea
Automation software need to be continuously updated by addressing software bugs contained in their ***,bugs have different levels of importance;hence,it is essential to prioritize bug reports based on their sever-ity ... 详细信息
来源: 评论
Numerical Simulation and Research of Droplet Impact on Wall Based on CUDA and Lattice Boltzmann Method  4
Numerical Simulation and Research of Droplet Impact on Wall ...
收藏 引用
4th International Conference on computers and Artificial Intelligence technology, CAIT 2023
作者: Luo, Dongmei Fan, Chunhao Li, Dongting Peng, Yanhong Tang, Hao Guangdong University of Science and Technology School of Computer Dongguan China Guangzhou Institute of Science and Technology School of Computer Guangzhou China
The droplet impact on the wall is a complex hydrodynamic process. After the droplet impact on the wall, it will undergo morphological changes such as spreading and rebound, which are closely related to the droplet cha... 详细信息
来源: 评论
Understanding the Limitations of Authentication Protocols Employed by Existing Information Security Models for Networked Applications
Understanding the Limitations of Authentication Protocols Em...
收藏 引用
2024 International Conference on Optimization computing and Wireless Communication, ICOCWC 2024
作者: Shree, Ritu Kumar, Vivek Prabhu, A. Vivekananda Global University Department of Computer Science & Application Jaipur India Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
The potential to comfortable systems and networks from unauthorized get right of entry is essential for any virtual community. Authentication protocols are a cornerstone to protecting such structures from malicious ac... 详细信息
来源: 评论
Diabetic Foot Ulcer Detection and Classification using ConvMixer Model  5
Diabetic Foot Ulcer Detection and Classification using ConvM...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Anusha, N. Vidhya, R. Jani Anbarasi, L. Dhanya, D. Pushparani, S. Mohan, Geetha Vellore Institute of Technology School of Computer Science and Engineering Department of IoT Vellore Campus Vellore India Agni College of Technology Department of Information Technology Chennai India Vellore Institute of Technology School of Computer Science and Engineering Chennai India Mar Ephraem College of Engineering and Technology Department of Artificial Intelligence and Data Science Elavuvilai India Meenakshi College of Engineering Department of Cse Chennai India Institute of Applied Technology Computer Science Abu Dhabi United Arab Emirates
Diabetic foot ulcer (DFUs) are a common and significant consequence of diabetes, frequently resulting in severe illness and amputations if not promptly identified and treated. The growing occurrence of DFUs is a subst... 详细信息
来源: 评论
R–attributes based rough graph concepts lattice
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第10期14卷 14309-14319页
作者: Singh, Prem Kumar Department of Computer Science and Engineering Gandhi Institute of Technology and Management–Visakhapatnam Andhra Pradesh Visakhapatnam530045 India
The characterization of some important attributes in a given context is considered as one of the prominent issues for the decision making process. Same time another problem arises approximation of uncertainty and its ... 详细信息
来源: 评论
Chronic Kidney Disease (CKD) Prediction Using Stochastic Deep Radial Basis for Feature Extractiona Residual Neural Network
收藏 引用
SN computer science 2024年 第7期5卷 962页
作者: Jayaprabha, M.S. Vishwa Priya, V. Vels Institute of Science Technology & amp Advanced Studies (VISTAS) Tamil Nadu Chennai India Department of Computer Science Vels Institute of Science Technology & amp Advanced Studies (VISTAS) Tamil Nadu Chennai India
Chronic Kidney Disease (CKD) is an increasingly common health issue, affecting a significant portion of the global population. Accurate prediction of CKD progression is crucial for early intervention and personalized ... 详细信息
来源: 评论
Multi-scale Spectral Mixture Neural Operator
Multi-scale Spectral Mixture Neural Operator
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jing, Fengrui Ding, Hongzhen Song, Tao Qingdao Institute of Software College of Computer Science and Technology Qingdao China
Seeking effective numerical approximations for partial differential equations (PDEs) is a major challenge in modern science and technology. Recently, AI-inspired data-driven solvers, such as neural operators, have ach... 详细信息
来源: 评论
Enhancing the job scheduling procedure to develop an efficient cloud environment using near optimal clustering algorithm
收藏 引用
International Journal of Cloud computing 2023年 第2-4期12卷 134-147页
作者: Suganya, R. Joseph, Niju P. Rajadevi, R. Ramamoorthy, S. Department of Information Technology Sri Krishna College of Technology Tamil Nadu India Bengaluru India Department of Information Technology Kongu Engineering College Perundurai India Department of Computer Science and Engineering SRM Institute of Science and Technology Kanchipuram Tamilnadu Kattankulathur India
In this internet era, cloud computing and there are various problems in the cloud computing, where the consumers as well as the service providers facing in their day to day cloud activities. Job scheduling problem pla... 详细信息
来源: 评论
Unified Security Framework for Cloud Applications with IoT Fusion via Decentralized Blockchain  3
Unified Security Framework for Cloud Applications with IoT F...
收藏 引用
3rd International Conference on Applied Artificial Intelligence and computing, ICAAIC 2024
作者: Mohanraj, B. Kalpana A, M. Priya, M. Abdul Jaleel, D. Karthikeyan A, N. Velusamy, A. Sona College of Technology Department of Information Technology Salem India Government College of Engineering Department of Computer Science Engineering Salem India Knowledge Institute of Technology Department of Information Technology Salem India Madanapalle Institute of Technology & Science Department of Computer Science & Technology Madanapalle India Sri Venkateshwara College of Engineering Department of Cse - Artificial Intelligence Vidyanagar India
Recent advancements in blockchain-based cloud computing highlight its potential in providing robust data security, integrity, and confidentiality. While cloud computing is increasingly utilized for remote resource acc... 详细信息
来源: 评论
An efficient botnet detection approach based on feature learning and classification
收藏 引用
Journal of Control and Decision 2023年 第1期10卷 40-53页
作者: B.Padmavathi B.Muthukumar Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyChennaiIndia Computer Science and Engineering Easwari Engineering CollegeChennaiIndia DMI College of Engineering ChennaiIndia
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced b... 详细信息
来源: 评论