咨询与建议

限定检索结果

文献类型

  • 87,643 篇 会议
  • 38,117 篇 期刊文献
  • 1,293 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,055 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 71,616 篇 工学
    • 45,494 篇 计算机科学与技术...
    • 36,611 篇 软件工程
    • 18,400 篇 信息与通信工程
    • 11,895 篇 控制科学与工程
    • 11,628 篇 电气工程
    • 11,351 篇 电子科学与技术(可...
    • 8,265 篇 生物工程
    • 6,993 篇 生物医学工程(可授...
    • 6,756 篇 光学工程
    • 5,012 篇 机械工程
    • 4,614 篇 化学工程与技术
    • 4,472 篇 仪器科学与技术
    • 4,323 篇 动力工程及工程热...
    • 4,064 篇 材料科学与工程(可...
    • 3,143 篇 网络空间安全
    • 2,931 篇 安全科学与工程
  • 43,067 篇 理学
    • 19,189 篇 数学
    • 16,583 篇 物理学
    • 9,492 篇 生物学
    • 6,260 篇 统计学(可授理学、...
    • 5,165 篇 化学
    • 4,674 篇 系统科学
  • 17,418 篇 管理学
    • 10,947 篇 管理科学与工程(可...
    • 7,212 篇 图书情报与档案管...
    • 5,321 篇 工商管理
  • 7,079 篇 医学
    • 5,848 篇 临床医学
    • 5,257 篇 基础医学(可授医学...
    • 3,277 篇 药学(可授医学、理...
    • 2,979 篇 公共卫生与预防医...
  • 3,443 篇 法学
    • 2,818 篇 社会学
  • 2,212 篇 经济学
  • 1,844 篇 农学
  • 1,131 篇 教育学
  • 555 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 9 篇 历史学

主题

  • 3,665 篇 accuracy
  • 2,963 篇 deep learning
  • 2,841 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,682 篇 machine learning
  • 2,591 篇 computational mo...
  • 2,239 篇 training
  • 1,821 篇 real-time system...
  • 1,809 篇 internet of thin...
  • 1,798 篇 support vector m...
  • 1,710 篇 predictive model...
  • 1,700 篇 convolutional ne...
  • 1,557 篇 artificial intel...
  • 1,405 篇 optimization
  • 1,382 篇 neural networks
  • 1,332 篇 wireless sensor ...
  • 1,235 篇 data mining
  • 1,218 篇 bandwidth
  • 1,200 篇 computer archite...
  • 1,181 篇 security

机构

  • 1,090 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 963 篇 physikalisches i...
  • 958 篇 oliver lodge lab...
  • 765 篇 university of ch...
  • 640 篇 department of el...
  • 630 篇 chitkara univers...
  • 612 篇 infn laboratori ...
  • 607 篇 infn sezione di ...
  • 586 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 547 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 530 篇 department of ph...
  • 526 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 515 篇 imperial college...
  • 511 篇 nikhef national ...
  • 506 篇 stfc rutherford ...

作者

  • 258 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 beiter a.
  • 233 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 g. spigo
  • 216 篇 boettcher t.
  • 214 篇 brundu d.

语言

  • 121,100 篇 英文
  • 4,628 篇 其他
  • 1,346 篇 中文
  • 119 篇 日文
  • 19 篇 法文
  • 14 篇 德文
  • 11 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 荷兰文
  • 6 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127055 条 记 录,以下是121-130 订阅
排序:
Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9367-9392页
作者: KL, Shreya Narasimhan R, Bala Krishnan Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a... 详细信息
来源: 评论
Improving agility in projects using machine learning algorithm
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 85987-86005页
作者: Varun, Janani Karthika, R.A. Department of Computer Science and Engineering Vels Institute of Science Technology and Advanced Studies Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India
All the software products developed will need testing to ensure the quality and accuracy of the product. It makes the life of testers much easier when they can optimize on the effort spent and predict defects for the ... 详细信息
来源: 评论
Efficient multiverse electro search optimization for multi-cloud task scheduling and resource allocation
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Ravi, Rupesh Pillai, Manu J. Department of Computer Science and Engineering TKM Institute of Technology Karuvelil Kerala Kollam691505 India Department of Computer Science and Engineering TKM College of Engineering Karicode Kollam India
Effective task scheduling and resource allocation have become major problems as a result of the fast development of cloud computing as well as the rise of multi-cloud systems. To successfully handle these issues, we p... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
A brief review on Quantum Key Distribution Protocols
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Kumar, Mandeep Mondal, Bhaskar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna800005 India
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin... 详细信息
来源: 评论
Feedback-based trust module for IoT networks using machine learning
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第1期27卷 78-91页
作者: Iqbal, Sania Qureshi, Shaima Department of Computer Science and Engineering National Institute of Technology Jammu & Kashmir Srinagar India
The increasing emergence of IoT in healthcare, industrial automation, manufacturing, infrastructure, business and the home undoubtedly provides more conveniences in different aspects of human life. Any IoT security an... 详细信息
来源: 评论
Model-to-Circuit Cross-Approximation for Printed Machine Learning Classifiers
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2023年 第11期42卷 3532-3544页
作者: Armeniakos, Giorgos Zervakis, Georgios Soudris, Dimitrios Tahoori, Mehdi B. Henkel, Jorg Karlsruhe Institute of Technology Karlsruhe76131 Germany National Technical University of Athens School of Electrical and Computer Engineering Athens15780 Greece University of Patras Computer Engineering and Informatics Department Patras26504 Greece Karlsruhe Institute of Technology Department of Computer Science Karlsruhe76131 Germany
Printed electronics (PEs) promises on-demand fabrication, low nonrecurring engineering costs, and subcent fabrication costs. It also allows for high customization that would be infeasible in silicon, and bespoke archi... 详细信息
来源: 评论
Exploring ensemble optimized voting and stacking classifiers through Cross-validation for early detection of suicidal ideation
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第5-6期47卷 335-349页
作者: Shukla, Shiv Shankar Prasad Singh, Maheshwari Prasad Department of Computer Science Engineering National Institute of Technology Patna Bihar Patna India
Detecting behavioral changes associated with suicidal ideation on social media is essential yet complex. While machine learning and deep learning hold promise in this regard, current studies often lack generalizabilit... 详细信息
来源: 评论
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 665-688页
作者: Raghuvanshi, Devvrat Joshi, Kamaldeep Nandal, Rainu Sehrawat, Harkesh Singh, Surender Singh, Srishti Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut... 详细信息
来源: 评论
Joint V2V Group Association and Transmission Power Control in Federated Vehicular Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18167-18182页
作者: Liu, Su Guan, Peiyuan Li, Yushuai Li, Tianyi Zolfagharian, Zolaikha Yu, Jiong Huang, Tingwen Xinjiang University School of Computer Science and Technology Urumqi830046 China University of Oslo Department of Informatics Oslo0316 Norway Aalborg University Department of Computer Science Aalborg9220 Denmark University of Tehran School of Electrical and Computer Engineering Iran Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
With growing awareness of privacy protection, Federated Learning (FL) in vehicular network scenarios effectively addresses privacy concerns, leading to the development of Federated Vehicular Networks (FVN). In FVN, ve... 详细信息
来源: 评论