咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,324 篇 期刊文献
  • 1,302 册 图书

馆藏范围

  • 127,946 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,374 篇 工学
    • 45,726 篇 计算机科学与技术...
    • 36,731 篇 软件工程
    • 18,487 篇 信息与通信工程
    • 11,999 篇 控制科学与工程
    • 11,819 篇 电气工程
    • 11,519 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,017 篇 生物医学工程(可授...
    • 6,705 篇 光学工程
    • 5,033 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,475 篇 仪器科学与技术
    • 4,368 篇 材料科学与工程(可...
    • 4,334 篇 动力工程及工程热...
    • 3,190 篇 网络空间安全
    • 2,941 篇 安全科学与工程
  • 43,194 篇 理学
    • 19,293 篇 数学
    • 16,640 篇 物理学
    • 9,502 篇 生物学
    • 6,340 篇 统计学(可授理学、...
    • 5,177 篇 化学
    • 4,677 篇 系统科学
  • 17,504 篇 管理学
    • 11,009 篇 管理科学与工程(可...
    • 7,253 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,083 篇 医学
    • 5,864 篇 临床医学
    • 5,272 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,003 篇 公共卫生与预防医...
  • 3,449 篇 法学
    • 2,824 篇 社会学
  • 2,213 篇 经济学
  • 1,843 篇 农学
  • 1,142 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,790 篇 accuracy
  • 3,041 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,702 篇 machine learning
  • 2,649 篇 computational mo...
  • 2,270 篇 training
  • 1,938 篇 real-time system...
  • 1,851 篇 internet of thin...
  • 1,830 篇 support vector m...
  • 1,766 篇 convolutional ne...
  • 1,756 篇 predictive model...
  • 1,599 篇 artificial intel...
  • 1,441 篇 optimization
  • 1,398 篇 neural networks
  • 1,345 篇 wireless sensor ...
  • 1,253 篇 data mining
  • 1,229 篇 security
  • 1,218 篇 bandwidth
  • 1,213 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 971 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 645 篇 department of el...
  • 639 篇 chitkara univers...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 504 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 beiter a.
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bencivenni g.

语言

  • 110,696 篇 英文
  • 15,910 篇 其他
  • 1,439 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127946 条 记 录,以下是3851-3860 订阅
排序:
Achieving Secured Medical Network (SMN) through Stateless Mechanism and SkeyM in Medical-Internet of Things (M-IoT)
收藏 引用
Journal of engineering and Applied Science 2024年 第1期71卷 1-22页
作者: Nithya, S. Palanisamy, SatheeshKumar Nivethitha, T. Department of Computer Science and Engineering Kumaraguru College of Technology Tamil Nadu Coimbatore641049 India Department of Electronics and Communication Engineering BMS Institute of Technology and Management Karnataka Bengaluru560064 India Department of Electronics and Communication Engineering Sri Eshwar College of Engineering Tamil Nadu Coimbatore641202 India
Medical Internet of Things (M-IoT) synchronizes medical devices in a network to provide smart healthcare monitoring to doctors and to provide an interactive model for patients. This embedded networked system gained lo... 详细信息
来源: 评论
An Efficient Approach to Resolve Social Dilemma in P2P Networks  37th
An Efficient Approach to Resolve Social Dilemma in P2P Net...
收藏 引用
37th International Conference on Advanced Information Networking and Applications, AINA 2023
作者: Kishor, Avadh Niyogi, Rajdeep Department of Computer Science and Engineering ABV-Indian Institute of Information Technology and Management Gwalior Gwalior India Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee India
The premise of a peer-to-peer (P2P) system is based on the voluntary contribution of peers. However, an inherent conflict between individual rationality and social welfare engenders a new situation called the free-rid... 详细信息
来源: 评论
Securing the Cyber Supply Chain: A Risk-based Approach to Threat Assessment and Mitigation  4
Securing the Cyber Supply Chain: A Risk-based Approach to Th...
收藏 引用
4th International Conference on Electronics and Sustainable Communication Systems, ICESC 2023
作者: Phani Prathyusha, J.R.V.S.L.P. Esther Jyothi, V. Jhansi, Vadlamudi Sampreeth Chowdary, N. Madhuri, A. Sindhura, S. Velagapudi Ramakrishna Siddhartha Engineering College Department of Computer Applications Vijayawada India P.V.P. Siddhartha Institute of Technology Department of Computer Science and Engineering Vijayawada India Nri Institute of Technology Department of Computer Science and Engineering Agiripalli India
The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due ... 详细信息
来源: 评论
Interactive Learning Environment for Networking Topics based on Augmented Reality
Interactive Learning Environment for Networking Topics based...
收藏 引用
International Conference on computer Vision and Internet of Things 2023, ICCVIoT 2023
作者: Kanimozhi, S. Sairamesh, L. School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering St. Joseph's Institute of Technology Chennai India
Augmented Reality (AR) implemented on mobile devices has emerged as a prominent subject of study within the field of mobile applications and human-machine interaction. The mobile augmented reality (AR) technique integ... 详细信息
来源: 评论
A Paradigm Shift in Ethereum Network Analysis Through Google BigQuery,Portation, and Visualization  6
A Paradigm Shift in Ethereum Network Analysis Through Google...
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and informatics, ESCI 2024
作者: Suresh Kumar, N. Mirdula, S. Singh, Pushpa Gayathri, T. Jayanthi, S. Anandraj, M. School of Computer Science and Engineering Jain Deemed-to-be University Ramanagara India SRM TRP Engineering College Department of Electronic and Communication Engineering Trichy India IILM University Department of Computer Science and Engineering Greater Noida India MVJ College of Engineering Department of Computer Science and Engineering Bangalore India Guru Nanak Institute of Technology Department of Information Technology Ibrahimpatnam India Mahendra College of Engineering Department of Computer Science and Engineering Salem India
The primary objective of this research is to comprehensively explore and analyze the dynamics of the Ethereum network using innovative methodologies and system architectures. The study aims to extract meaningful stati... 详细信息
来源: 评论
Stress Analysis Prediction for Coma Patient Using Machine Learning  5th
Stress Analysis Prediction for Coma Patient Using Machine Le...
收藏 引用
5th International Conference on Data and Information Sciences, ICDIS 2023
作者: Alwin Infant, P. Charulatha, J. Sadhana, G. Ragavendra, K. Computer Science and Engineering Panimalar Engineering College Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India
Today’s working IT professionals frequently struggle with stress issues. The patient is now more likely to experience stress due to changing lifestyle and workplace cultures. Even while many companies and sectors del... 详细信息
来源: 评论
A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第5期4卷 1051-1063页
作者: Sardar, Alamgir Umer, Saiyed Rout, Ranjeet Kumar Khan, Muhammad Khurram Aliah University Department of Computer Science and Engineering Kolkata700156 India National Institute of Technology Department of Computer Science and Engineering Srinagar190006 India King Saud University Center of Excellence in Information Assurance Riyadh11451 Saudi Arabia
The accuracy and security of a biometric system are the two sides of a coin. A biometric system must be simple, flexible, efficient, and secure enough from unauthorized access. Concerning these requirements, this arti... 详细信息
来源: 评论
Job Resumes Recommendation using Integration of Fuzzy Discernibility Matrix Feature Selection and Convolutional Neural Network Multi-label Text Classification
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第13期49卷 49-58页
作者: Hayami, Regiolina Yusoff, Nooraini Daud, Kauthar Mohd Fatma, Yulia Department of Informatics Engineering Faculty Computer Science Universitas Muhammadiyah Riau Indonesia Faculty of Data Science and Computing Universiti Malaysia Kelantan 16100 Malaysia Center for Artificial Intelligence Technology Faculty of Information Science and Technology Universiti Kebangsaan Malaysia 43600 Malaysia
The manual analysis of job resumes poses specific challenges, including the time-intensive process and the high likelihood of human error, emphasizing the need for automation in content-based recommendations. Recent a... 详细信息
来源: 评论
Anomaly Detection in Social Media Texts Using Optimal Convolutional Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 1027-1042页
作者: Swarna Sudha Muppudathi Valarmathi Krishnasamy Department of Computer Science and Engineering Ramco Institute of TechnologyRajapalayam626117India Department of Electronics and Communication Engineering P.S.R.Engineering CollegeSivakasi626140India
Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health ... 详细信息
来源: 评论
Fog Computing in IoT: Architecture and Applications  9
Fog Computing in IoT: Architecture and Applications
收藏 引用
9th International Conference on Science, technology, engineering and Mathematics, ICONSTEM 2024
作者: Agrawal, Anurag Vijay Shashi Gowridurga, A. Suresh Balakrishnan, T. Shaikh, Anwar Ahamed Kalaipriya, V. J. P. Institute of Engineering And Technology Department of Electronics And Communication Engineering Uttar Pradesh Meerut250001 India Ccs University Department of Computer Application Meerut250004 India Velammal Institute of Technology Department of Computer Science And Engineering Tamil Nadu 601204 India Saveetha School of Engineering Saveetha Institute of Medical And Technical Sciences Department of Computer Science And Engineering Tamil Nadu Thandalam602105 India KoneruLakshmaiah Education Foundation Department of Computer Science And Engineering Andhra Pradesh Vaddeswaram522502 India Rmk College of Engineering And Technology Department of Computer Science And Engineering Tamil Nadu Puduvoyal601206 India
This exploration paper explores the paradigm of Fog Computing as a transformative armature in the Internet of effects(IoT) geography. Fog Computing represents a decentralized approach, positioning computing coffers cl... 详细信息
来源: 评论