咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,324 篇 期刊文献
  • 1,302 册 图书

馆藏范围

  • 127,946 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,374 篇 工学
    • 45,726 篇 计算机科学与技术...
    • 36,731 篇 软件工程
    • 18,487 篇 信息与通信工程
    • 11,999 篇 控制科学与工程
    • 11,819 篇 电气工程
    • 11,519 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,017 篇 生物医学工程(可授...
    • 6,705 篇 光学工程
    • 5,033 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,475 篇 仪器科学与技术
    • 4,368 篇 材料科学与工程(可...
    • 4,334 篇 动力工程及工程热...
    • 3,190 篇 网络空间安全
    • 2,941 篇 安全科学与工程
  • 43,194 篇 理学
    • 19,293 篇 数学
    • 16,640 篇 物理学
    • 9,502 篇 生物学
    • 6,340 篇 统计学(可授理学、...
    • 5,177 篇 化学
    • 4,677 篇 系统科学
  • 17,504 篇 管理学
    • 11,009 篇 管理科学与工程(可...
    • 7,253 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,083 篇 医学
    • 5,864 篇 临床医学
    • 5,272 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,003 篇 公共卫生与预防医...
  • 3,449 篇 法学
    • 2,824 篇 社会学
  • 2,213 篇 经济学
  • 1,843 篇 农学
  • 1,142 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,790 篇 accuracy
  • 3,041 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,702 篇 machine learning
  • 2,649 篇 computational mo...
  • 2,270 篇 training
  • 1,938 篇 real-time system...
  • 1,851 篇 internet of thin...
  • 1,830 篇 support vector m...
  • 1,766 篇 convolutional ne...
  • 1,756 篇 predictive model...
  • 1,599 篇 artificial intel...
  • 1,441 篇 optimization
  • 1,398 篇 neural networks
  • 1,345 篇 wireless sensor ...
  • 1,253 篇 data mining
  • 1,229 篇 security
  • 1,218 篇 bandwidth
  • 1,213 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 971 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 645 篇 department of el...
  • 639 篇 chitkara univers...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 504 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 beiter a.
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bencivenni g.

语言

  • 110,696 篇 英文
  • 15,910 篇 其他
  • 1,439 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127946 条 记 录,以下是3881-3890 订阅
排序:
An effective automatic detection of tooth cavity using machine cum deep learning concepts and ICDAS measurement
收藏 引用
Materials Today: Proceedings 2022年 64卷 542-548页
作者: K S, Jayareka P, Sobiyaa Dr.A.C.Kaladevi Vinodhini.V Suman, Bashetty Department of Computer Science & Engineering Sona College of Technology Tamilnadu Erode India Department of Information Technology Bannari Amman Institute of Technology Tamilnadu Sathyamangalam Erode India Department of Computer Science & Engineering MLR Institute of Technology Telangana Hyderabad India
A full scan x-ray machine scans the mouth and detects the tooth with decay or abnormal tooth is identified using the automatic machine learning algorithm. The machine learning algorithm will detect the defected place ... 详细信息
来源: 评论
Measurement of emissivity with a new grey body and novel IR thermal sensor dubbed TMOS
收藏 引用
红外与毫米波学报 2025年 第1期44卷 17-24页
作者: Moshe Avraham Shlomi Bouscher Jonathan Nemirovsky Yael Nemirovsky Electrical and Computer Engineering Department Technion-Israel Institute of TechnologyHaifaIsrael TODOS-Technologies Airport CityIsrael
The concept of emissivity has been with the scientific and engineering world since Planck formulated his blackbody radiation law more than a century ***,emissivity is an elusive concept even for ex⁃*** is a vague and ... 详细信息
来源: 评论
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM  3rd
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Khaleel, Thura Jabbar Shiltagh, Nadia Adnan Iraqi Commission for Computers and Information/Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Engineering Department College of Engineering University of Baghdad Baghdad Iraq
Protecting software-defined networking (SDN) against cyber-attacks has become crucial in an expanding digital threat environment. Distributed Denial-of-Service (DDoS) attacks are risky since they may seriously interru... 详细信息
来源: 评论
Deep Convolutional Network Based Machine Intelligence Model for Satellite Cloud Image Classification
收藏 引用
Big Data Mining and Analytics 2023年 第1期6卷 32-43页
作者: Kalyan Kumar Jena Sourav Kumar Bhoi Soumya Ranjan Nayak Ranjit Panigrahi Akash Kumar Bhoi Department of Computer Science and Engineering Parala Maharaja Engineering CollegeBerhampur 761003India Amity School of Engineering and Technology Amity UniversityUttar Pradesh 201303India Department of Computer Applications Sikkim Manipal Institute of TechnologySikkim Manipal UniversitySikkim 737102India Directorate of Research Sikkim Manipal UniversityGangtokSikkim 737102India
As a huge number of satellites revolve around the earth,a great probability exists to observe and determine the change phenomena on the earth through the analysis of satellite images on a real-time ***,classifying sat... 详细信息
来源: 评论
Unveiling the Nexus: Exploring the Societal Implications of AI-Driven Cybersecurity and Data Analysis  13
Unveiling the Nexus: Exploring the Societal Implications of ...
收藏 引用
13th International Conference on System Modeling and Advancement in Research Trends, SMART 2024
作者: Arif, Mohd Ahmad, Shahnawaz Nazim, Mohd Ahmad, Javed Onyarin, Ogala Justin Galgotias University Department of Computer Science Engineering and Technology Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Noida Institute of Engineering and Technology Department of Computer Science Greater Noida India University of Delta Pmb Cyber Security Department Delta State Agbor2090 Nigeria
AI when integrated with cybersecurity and data analysis forms a new field that will have great impact on the society. The present research focuses on the social consequences of integrating AI for cybersecurity and big... 详细信息
来源: 评论
Cultivating Cluster Enactment in Wireless Sensor Networks Through Hybrid Metaheuristics Intended for Energy Optimization
收藏 引用
SN computer Science 2025年 第3期6卷 1-12页
作者: Kushwaha, Ajay Goswami, Anjali Sharada, K. Sharma, Manmohan Berar, Gagandeep Edara, Deepak Chowdary Department of Computer Science and Engineering Rungta College of Engineering and Technology R1 CG Bhilai India Department of Mathematics and Statistics College of Science and Theoretical Studies Saudi Electronic University Riyadh 13323 Saudi Arabia Department of Computer Science and Engineering GITAM (Deemed to be University) AP Visakhapatnam India Department of Computer Science and Engineering Manipal University Jaipur Rajasthan Jaipur India Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India Department of CSE Vignan’s Foundation for Science Technology and Research Vadlamudi AP Guntur India
Though traditional search methods shine when faced with local goals and a plethora of decision factors, they could struggle when faced with engineering design limitations. On the other hand, metaheuristic approaches p... 详细信息
来源: 评论
Survey on Cryptoprocessors Advances and Technological Trends  3rd
Survey on Cryptoprocessors Advances and Technological Tren...
收藏 引用
3rd International Conference on Innovations in Computing Research, ICR 2024
作者: Kakoulli, Elena Zacharioudakis, Eleftherios Intelligent Systems Laboratory Department of Computer Science Neapolis University Pafos Paphos Cyprus Electrical Engineering and Computer Engineering and Informatics Cyprus University of Technology Limassol Cyprus National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic Institute Kyiv Ukraine
Cryptoprocessors play a pivotal role in enhancing the security of modern computing systems by accelerating cryptographic operations and fortifying data protection. This survey delves into the world of cryptoprocessors... 详细信息
来源: 评论
Comparative Study of Video Summarization Using Keyframes with State-of-the-Art Techniques  16
Comparative Study of Video Summarization Using Keyframes wit...
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Yeola, Manjusha Barve, Sunita Dr D y Patil Institute of Technology Department of Computer Engineering Pimpri Maharashtra Pune India School of Computer Engineering Mit Academy of Engineering Alandi Maharashtra Pune India
Multimedia data is growing exponentially and a huge quantity of video footage is being posted to the internet. The users waste a lot of time watching the complete film just to find the pertinent content. This concept ... 详细信息
来源: 评论
A Hybrid Relational Approach Toward Stock Price Prediction and Profitability
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第11期5卷 5844-5854页
作者: Patel, Manali Jariwala, Krupa Chattopadhyay, Chiranjoy Sardar Vallabhbhai National Institute of Technology Department of Computer Science and Engineering Surat395007 India FLAME University School of Computing and Data Sciences Pune412115 India
An accurate estimation of future stock prices can help investors maximize their profits. The current advancements in the area of artificial intelligence (AI) have proven prevalent in the financial sector. Besides, sto... 详细信息
来源: 评论
Secure and Optimized Cloud Storage with Privacy Preservation using Improved SHA - 256  2
Secure and Optimized Cloud Storage with Privacy Preservation...
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Joshi, Aditi Devarajan, Ganesh Gopal Karuppiah, Marimuthu Sharma, Yogesh Kumar Department of Computer Science and Engineering SRM Institute of Science and Technology Delhi NCR Campus Uttar Pradesh Ghaziabad201204 India Department of Computer Science and Engineering Faculty of Engineering and Technology SRM Institute of Science and Technology Delhi NCR Campus Uttar Pradesh Ghaziabad201204 India Presidency School of Computer Science and Engineering Presidency University Karnataka Bengaluru560064 India Department of CSE Dewan V S Institute of Technology U.P Meerut India
With the increased reliance of enterprises on cloud storage solutions for data management, maintaining safe and efficient storage while emphasizing privacy protection is crucial. With an emphasis on user privacy, this... 详细信息
来源: 评论