咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,121 篇 期刊文献
  • 1,294 册 图书

馆藏范围

  • 127,735 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,423 篇 工学
    • 45,709 篇 计算机科学与技术...
    • 36,722 篇 软件工程
    • 18,477 篇 信息与通信工程
    • 11,982 篇 控制科学与工程
    • 11,843 篇 电气工程
    • 11,547 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,018 篇 生物医学工程(可授...
    • 6,680 篇 光学工程
    • 5,034 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,472 篇 仪器科学与技术
    • 4,417 篇 材料科学与工程(可...
    • 4,332 篇 动力工程及工程热...
    • 3,181 篇 网络空间安全
    • 2,940 篇 安全科学与工程
  • 43,183 篇 理学
    • 19,300 篇 数学
    • 16,640 篇 物理学
    • 9,498 篇 生物学
    • 6,356 篇 统计学(可授理学、...
    • 5,180 篇 化学
    • 4,677 篇 系统科学
  • 17,494 篇 管理学
    • 11,005 篇 管理科学与工程(可...
    • 7,248 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,074 篇 医学
    • 5,856 篇 临床医学
    • 5,271 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,002 篇 公共卫生与预防医...
  • 3,447 篇 法学
    • 2,823 篇 社会学
  • 2,210 篇 经济学
  • 1,839 篇 农学
  • 1,141 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,792 篇 accuracy
  • 3,039 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,823 篇 computer science
  • 2,694 篇 machine learning
  • 2,653 篇 computational mo...
  • 2,272 篇 training
  • 1,932 篇 real-time system...
  • 1,842 篇 support vector m...
  • 1,837 篇 internet of thin...
  • 1,770 篇 convolutional ne...
  • 1,762 篇 predictive model...
  • 1,584 篇 artificial intel...
  • 1,440 篇 optimization
  • 1,384 篇 neural networks
  • 1,340 篇 wireless sensor ...
  • 1,261 篇 data mining
  • 1,223 篇 security
  • 1,217 篇 bandwidth
  • 1,202 篇 computer archite...

机构

  • 1,087 篇 cavendish labora...
  • 1,020 篇 department of ph...
  • 962 篇 physikalisches i...
  • 950 篇 oliver lodge lab...
  • 765 篇 university of ch...
  • 646 篇 department of el...
  • 635 篇 chitkara univers...
  • 604 篇 infn laboratori ...
  • 603 篇 infn sezione di ...
  • 583 篇 infn sezione di ...
  • 559 篇 infn sezione di ...
  • 549 篇 school of physic...
  • 546 篇 fakultät physik ...
  • 535 篇 horia hulubei na...
  • 526 篇 department of ph...
  • 523 篇 school of physic...
  • 511 篇 imperial college...
  • 510 篇 h.h. wills physi...
  • 502 篇 stfc rutherford ...
  • 501 篇 nikhef national ...

作者

  • 258 篇 barter w.
  • 257 篇 a. gomes
  • 244 篇 c. alexa
  • 240 篇 j. m. izen
  • 236 篇 beiter a.
  • 235 篇 c. amelung
  • 235 篇 j. wang
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 232 篇 blake t.
  • 231 篇 s. chen
  • 225 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 219 篇 borsato m.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 110,503 篇 英文
  • 15,903 篇 其他
  • 1,428 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127735 条 记 录,以下是4031-4040 订阅
排序:
AI Based Criminal Detection and Recognition System for Public Safety and Security using novel CriminalNet-228  4th
AI Based Criminal Detection and Recognition System for Publi...
收藏 引用
4th International Conference on Frontiers in Computing and Systems, COMSYS 2023
作者: Murthy, Jamuna S. Siddesh, G.M. Department of Computer Science and Engineering Ramiah Institute of Technology Bengaluru India Department of Artificial Intelligence and Data Science Ramiah Institute of Technology Bengaluru India
The recent surge in public space criminal activities underscores the need for an efficient system to promptly detect, recognize, and track criminals. Existing AI-based criminal detection literature, while insightful, ... 详细信息
来源: 评论
A Survey of Integrating Generative Artificial Intelligence and 6G Mobile Services: Architectures, Solutions, Technologies and Outlooks
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年 第3期11卷 1334-1356页
作者: Liu, Yi-Jing Du, Hongyang Xu, Xinyi Zhang, Ruichen Feng, Gang Cao, Bin Niyato, Dusit Kim, Dong In Jamalipour, Abbas Letaief, Khaled B. Tafazolli, Rahim University of Electronic Science and Technology of China National Key Lab on Wireless Communications Chengdu China University of Hong Kong Department of Electrical and Electronic Engineering Pok Fu Lam Hong Kong Nanyang Technological University College of Computing and Data Science Singapore Singapore Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing China Sungkyunkwan University Department of Electrical and Computer Engineering Suwon Korea Republic of University of Sydney School of Electrical and Computer Engineering Sydney Australia Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong University of Surrey Institute for Communication Systems School of Computer Science and Electronic Engineering United Kingdom
Generative artificial intelligence (GenAI) is rapidly driving a new phase of artificial intelligence revolution, marked by various applications such as ChatGPT, Sora and DeepSeek. With powerful capabilities in content... 详细信息
来源: 评论
Research on User Behaviour Prediction in Social Networks Based on Deep Learning Model
Research on User Behaviour Prediction in Social Networks Bas...
收藏 引用
2024 IEEE International Conference on Electronic Systems and Intelligent Computing, ICESIC 2024
作者: Kavitha, G. Veena, K. Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai600 119 India
User interaction and social behaviour are key components in the study of social networks because they help manage and forecast user behaviour on sites like Facebook, Twitter, microblogging, and others. The mobile comm... 详细信息
来源: 评论
Prediction on Soybean Crop Yield Applying Machine Learning Regression  1
Prediction on Soybean Crop Yield Applying Machine Learning R...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Ram, Melam Siva Jayasaikumar, Y. Iniyan, S. SRM Institute of Science and Technology Kattankulathur Department of Computer Science and Engineering Tamil Nadu Chennai India
In modern times, agriculture heavily relies on crop yield prediction systems to provide farmers with various insights into the potential outcomes of their farming practices. The system we developed uses regression to ... 详细信息
来源: 评论
A Review of Fintech Management and Security Development  10
A Review of Fintech Management and Security Development
收藏 引用
10th IEEE Information technology International Seminar, ITIS 2024
作者: Ritonga, Ali Akbar Zuhri Harahap, Syaiful Sooai, Adri Gabriel Nugroho, Aryo Samsir Prasetyo Adi, Puput Dani Universitas Labuhanbatu Faculty of Science and Technology Department of Informatics Management North Sumatera Labuhanbatu Indonesia Universitas Labuhanbatu Faculty of Science and Technology Department of Information System North Sumatera Labuhanbatu Indonesia Universitas Katolik Widya Mandira Faculty of Computer Science Department of Computer Engineering NTT Kupang Indonesia Universitas Narotama Faculty of Computer Science Department of Information System Surabaya Indonesia Universitas Labuhanbatu Faculty of Computer Science Department of Informatics Engineering North Sumatera Labuhanbatu Indonesia Department of Telecommunication Bandung Indonesia
This research focuses on the review of Fintech and its development on the IoT Platform and also the risks that can be posed to the IoT network used. Finance is the most essential side of several other sectors which in... 详细信息
来源: 评论
DNA Transcription and Translation Inspired Deep Features for Classification-Based CBIR  23th
DNA Transcription and Translation Inspired Deep Features fo...
收藏 引用
23rd International Conference on Intelligent Systems Design and Applications, ISDA 2023
作者: Pradhan, Jitesh Pal, Arup Kumar Islam, SK Hafizul Samanta, Debabrata Department of Computer Science and Engineering National Institute of Technology Jharkhand Jamshedpur831014 India Jharkhand Dhanbad826004 India Department of Computer Science and Engineering Indian Institute of Information Technology West Bengal Kalyani741235 India Department of Computing and Information Technologies Rochester Institute of Technology Rochester Kosovo
DNA is a macromolecule that carries the genetic information of nearly all living things on the planet. They not only determine the characteristics and behavior of an organism but also pass the essential features to th... 详细信息
来源: 评论
Information Structures in AC/DC Grids  63
Information Structures in AC/DC Grids
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Taylor, Josh New Jersey Institute of Technology Newark Department of Electrical and Computer Engineering NJ07102 United States
The converters in an AC/DC grid form actuated boundaries between the AC and DC subgrids. In both simple linear and balanced dq-frame models, the states on either side of these boundaries are coupled only by control in... 详细信息
来源: 评论
Bloom’s Taxonomy Based Question Analysis for Personalized Learning  7th
Bloom’s Taxonomy Based Question Analysis for Personalized L...
收藏 引用
7th IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2024
作者: Jeslin Shanthamalar, J. Sheelam, Dinesh Bodla, Shiva Raj Gowri Manohari, V. Nancy Noella, R.S. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Tamil Nadu Chennai600119 India
In the 1950s, Benjamin Bloom and his associates introduced Bloom’s Taxonomy, a foundational framework for categorizing learning objectives and cognitive skills. While question classification typically operates at a f... 详细信息
来源: 评论
Restaurant Recommendation System Based on ML Algorithms and Real-Time Web Scraping
Restaurant Recommendation System Based on ML Algorithms and ...
收藏 引用
2024 International Conference on Big Data Analytics in Bioinformatics, DABCon 2024
作者: Rudrapati, Mahima Varghese, Benetta Paul, Carissa Jeya Sekar, MacHlin Singh, Priyamvada Fr. C. Rodrigues Institute of Technology Department of Computer Engineering Navi Mumbai India
As the restaurant industry expands, the sheer number of dining options makes it increasingly difficult for individuals to find establishments that match their preferences. To address this challenge, we present a perso... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论