咨询与建议

限定检索结果

文献类型

  • 87,544 篇 会议
  • 37,944 篇 期刊文献
  • 1,293 册 图书
  • 2 篇 科技报告

馆藏范围

  • 126,783 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 71,554 篇 工学
    • 45,468 篇 计算机科学与技术...
    • 36,611 篇 软件工程
    • 18,399 篇 信息与通信工程
    • 11,891 篇 控制科学与工程
    • 11,610 篇 电气工程
    • 11,348 篇 电子科学与技术(可...
    • 8,265 篇 生物工程
    • 6,992 篇 生物医学工程(可授...
    • 6,756 篇 光学工程
    • 5,009 篇 机械工程
    • 4,611 篇 化学工程与技术
    • 4,473 篇 仪器科学与技术
    • 4,317 篇 动力工程及工程热...
    • 4,061 篇 材料科学与工程(可...
    • 3,141 篇 网络空间安全
    • 2,930 篇 安全科学与工程
  • 43,043 篇 理学
    • 19,185 篇 数学
    • 16,577 篇 物理学
    • 9,484 篇 生物学
    • 6,260 篇 统计学(可授理学、...
    • 5,163 篇 化学
    • 4,674 篇 系统科学
  • 17,409 篇 管理学
    • 10,943 篇 管理科学与工程(可...
    • 7,211 篇 图书情报与档案管...
    • 5,321 篇 工商管理
  • 7,065 篇 医学
    • 5,843 篇 临床医学
    • 5,254 篇 基础医学(可授医学...
    • 3,277 篇 药学(可授医学、理...
    • 2,976 篇 公共卫生与预防医...
  • 3,442 篇 法学
    • 2,817 篇 社会学
  • 2,212 篇 经济学
  • 1,836 篇 农学
  • 1,130 篇 教育学
  • 555 篇 文学
  • 280 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 9 篇 历史学

主题

  • 3,640 篇 accuracy
  • 2,944 篇 deep learning
  • 2,826 篇 computer science
  • 2,822 篇 feature extracti...
  • 2,665 篇 machine learning
  • 2,581 篇 computational mo...
  • 2,211 篇 training
  • 1,809 篇 internet of thin...
  • 1,802 篇 real-time system...
  • 1,795 篇 support vector m...
  • 1,697 篇 predictive model...
  • 1,686 篇 convolutional ne...
  • 1,550 篇 artificial intel...
  • 1,382 篇 optimization
  • 1,377 篇 neural networks
  • 1,329 篇 wireless sensor ...
  • 1,233 篇 data mining
  • 1,218 篇 bandwidth
  • 1,197 篇 computer archite...
  • 1,175 篇 security

机构

  • 1,090 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 965 篇 physikalisches i...
  • 958 篇 oliver lodge lab...
  • 763 篇 university of ch...
  • 640 篇 department of el...
  • 627 篇 chitkara univers...
  • 619 篇 infn laboratori ...
  • 608 篇 infn sezione di ...
  • 584 篇 infn sezione di ...
  • 567 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 544 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 530 篇 department of ph...
  • 526 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 515 篇 imperial college...
  • 511 篇 nikhef national ...
  • 506 篇 stfc rutherford ...

作者

  • 259 篇 a. gomes
  • 253 篇 barter w.
  • 247 篇 c. alexa
  • 243 篇 j. m. izen
  • 238 篇 j. wang
  • 237 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 s. chen
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 233 篇 beiter a.
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 g. spigo
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 214 篇 f. siegert

语言

  • 120,828 篇 英文
  • 4,628 篇 其他
  • 1,346 篇 中文
  • 119 篇 日文
  • 19 篇 法文
  • 13 篇 德文
  • 11 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 荷兰文
  • 6 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
126783 条 记 录,以下是141-150 订阅
排序:
Convergence of various computer-aided systems for breast tumor diagnosis: a comparative insight
收藏 引用
Multimedia Tools and Applications 2024年 1-48页
作者: Singh, Saket Kumar Patnaik, K. Sridhar Department of Computer Science and Engineering Birla Institute of Technology Mesra Ranchi835215 India
Breast Cancer, with an expected 42,780 deaths in the US alone in 2024, is one of the most prevalent types of cancer. The death toll due to breast cancer would be very high if it were to be totaled up globally. Early d... 详细信息
来源: 评论
Maximizing Emotion Recognition Accuracy with Ensemble Techniques on EEG Signals
收藏 引用
Recent Advances in computer Science and Communications 2024年 第5期17卷 24-36页
作者: Jha, Sonu Kumar Suvvari, Somaraju Kumar, Mukesh Department of Computer Science and Engineering National Institute of Technology Patna Patna800005 India
Background: Emotion is a strong feeling such as love, anger, fear, etc. Emotion can be recognized in two ways, i.e., External expression and Biomedical data-based. Nowadays, various research is occurring on emotion cl... 详细信息
来源: 评论
Distributed computing and shared memory-based utility list buffer miner with parallel frameworks for high utility itemset mining
收藏 引用
International Journal of Business Intelligence and Data Mining 2023年 第2期23卷 125-149页
作者: Atmaja, Eduardus Hardika Sandy Sonawane, Kavita Department of Computer Engineering St. Francis Institute of Technology Mumbai India Department of Informatics Sanata Dharma University Yogyakarta Indonesia
High utility itemset mining (HUIM) is a well-known pattern mining technique. It considers the utility of the items that leads to finding high profit patterns which are more useful for real conditions. Handling large a... 详细信息
来源: 评论
Deep CNNs for glioma grading on conventional MRIs: Performance analysis, challenges, and future directions
收藏 引用
Mathematical Biosciences and engineering 2024年 第4期21卷 5250-5282页
作者: Saluja, Sonam Trivedi, Munesh Chandra Saha, Ashim Department of Computer Science and Engineering National Institute of Technology Agartala Tripura 799046 India
The increasing global incidence of glioma tumors has raised significant healthcare concerns due to their high mortality rates. Traditionally, tumor diagnosis relies on visual analysis of medical imaging and invasive b... 详细信息
来源: 评论
Blockchain based intelligent disbursement in National Scholarship Portal
IET Blockchain
收藏 引用
IET Blockchain 2024年 第4期4卷 407-422页
作者: Samu, Lifna Challissery Khithani, Neelkanth Alve, Kushl Gambhire, Vedang Hande, Atharva Choubey, Shivam Department of Computer Engineering Vivekanand Education Society's Institute of Technology Mumbai India
The National Scholarship Portal in India serves as a one-stop solution for students seeking financial aid for their studies across the country. However, in this digital era, the national-level portal faces challenges ... 详细信息
来源: 评论
Derandomizing Codes for the Adversarial Wiretap Channel of Type II
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4686-4707页
作者: Ruzomberka, Eric Nikbakht, Homa Brinton, Christopher G. Love, David J. Poor, H. Vincent Air Force Institute of Technology Department of Electrical and Computer Engineering United States Princeton University Department of Electrical and Computer Engineering United States Purdue University Elmore Family School of Electrical and Computer Engineering West Lafayette United States
The adversarial wiretap channel of type II (AWTC-II) is a communication channel that can a) read a fraction of the transmitted symbols up to a given bound and b) induce both errors and erasures in a fraction of the sy... 详细信息
来源: 评论
Deep Learning-Based Dual Watermarking for Image Copyright Protection and Authentication
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6134-6145页
作者: Padhi, Sudev Kumar Tiwari, Archana Ali, Sk. Subidh Indian Institute of Technology Bhilai Department of Computer Science and Engineering Durg491002 India
Advancements in digital technologies make it easy to modify the content of digital images. Hence, ensuring digital images' integrity and authenticity is necessary to protect them against various attacks that manip... 详细信息
来源: 评论
Optimized Price Prediction of Cryptocurrencies using Deep Learning on High-Volume Time Series Data  15
Optimized Price Prediction of Cryptocurrencies using Deep Le...
收藏 引用
15th International Conference on Information, Intelligence, Systems and Applications, IISA 2024
作者: Vonitsanos, Gerasimos Kanavos, Andreas Grivokostopoulou, Foteini Sioutas, Spyros University of Patras Computer Engineering and Informatics Department Patras Greece Ionian University Department of Informatics Corfu Greece Computer Technology Institute and Press 'Diophantus' Patras Greece
Statistical models, enhanced by deep learning techniques, have become pivotal in various predictive tasks, including financial forecasting. This paper addresses the challenge of predicting cryptocurrency prices, utili... 详细信息
来源: 评论
A hybrid encryption for secure data deduplication the cloud
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 295-307页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Department of Computer Science and Engineering Cyber Security IIIT Kottayam India Department of Computer Applications National Institute of Technology Tiruchirappalli India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda... 详细信息
来源: 评论
Designing New Blood-Brain Barrier Penetrating Molecules Using Novel Hybridized Gravitational Search Algorithm and Explainable AI
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2127-2138页
作者: Singh, Vishakha Sharma, Ritesh Singh, Sanjay Kumar Indian Institute of Technology BHU Department of Computer Science and Engineering Varanasi221005 India
Artificial intelligence (AI) has emerged as a powerful tool in computational biology, where it is being used to analyze large datasets to detect difficult biological patterns. This has enabled the design of new drug m... 详细信息
来源: 评论