咨询与建议

限定检索结果

文献类型

  • 88,992 篇 会议
  • 38,397 篇 期刊文献
  • 1,305 册 图书

馆藏范围

  • 128,694 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,757 篇 工学
    • 46,307 篇 计算机科学与技术...
    • 37,027 篇 软件工程
    • 18,655 篇 信息与通信工程
    • 12,150 篇 控制科学与工程
    • 11,749 篇 电气工程
    • 11,460 篇 电子科学与技术(可...
    • 8,305 篇 生物工程
    • 7,083 篇 生物医学工程(可授...
    • 6,854 篇 光学工程
    • 5,088 篇 机械工程
    • 4,644 篇 化学工程与技术
    • 4,525 篇 仪器科学与技术
    • 4,353 篇 动力工程及工程热...
    • 4,096 篇 材料科学与工程(可...
    • 3,249 篇 网络空间安全
    • 2,982 篇 安全科学与工程
  • 43,501 篇 理学
    • 19,370 篇 数学
    • 16,780 篇 物理学
    • 9,542 篇 生物学
    • 6,332 篇 统计学(可授理学、...
    • 5,200 篇 化学
    • 4,693 篇 系统科学
  • 17,652 篇 管理学
    • 11,094 篇 管理科学与工程(可...
    • 7,332 篇 图书情报与档案管...
    • 5,402 篇 工商管理
  • 7,209 篇 医学
    • 5,952 篇 临床医学
    • 5,340 篇 基础医学(可授医学...
    • 3,277 篇 药学(可授医学、理...
    • 3,087 篇 公共卫生与预防医...
  • 3,491 篇 法学
    • 2,855 篇 社会学
  • 2,234 篇 经济学
  • 1,890 篇 农学
  • 1,154 篇 教育学
  • 557 篇 文学
  • 281 篇 军事学
  • 123 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,873 篇 accuracy
  • 3,118 篇 deep learning
  • 2,915 篇 feature extracti...
  • 2,831 篇 computer science
  • 2,718 篇 machine learning
  • 2,661 篇 computational mo...
  • 2,286 篇 training
  • 1,985 篇 real-time system...
  • 1,875 篇 internet of thin...
  • 1,854 篇 support vector m...
  • 1,803 篇 convolutional ne...
  • 1,763 篇 predictive model...
  • 1,626 篇 artificial intel...
  • 1,459 篇 optimization
  • 1,395 篇 neural networks
  • 1,350 篇 wireless sensor ...
  • 1,258 篇 data mining
  • 1,250 篇 security
  • 1,218 篇 bandwidth
  • 1,208 篇 computer archite...

机构

  • 1,088 篇 cavendish labora...
  • 1,018 篇 department of ph...
  • 962 篇 physikalisches i...
  • 953 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 678 篇 chitkara univers...
  • 651 篇 department of el...
  • 610 篇 infn laboratori ...
  • 605 篇 infn sezione di ...
  • 580 篇 infn sezione di ...
  • 563 篇 infn sezione di ...
  • 560 篇 fakultät physik ...
  • 547 篇 school of physic...
  • 539 篇 horia hulubei na...
  • 531 篇 department of ph...
  • 523 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 511 篇 imperial college...
  • 503 篇 nikhef national ...
  • 502 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 252 篇 a. gomes
  • 244 篇 c. alexa
  • 240 篇 j. m. izen
  • 237 篇 j. wang
  • 233 篇 c. amelung
  • 233 篇 blake t.
  • 232 篇 g. bella
  • 232 篇 j. strandberg
  • 231 篇 d. calvet
  • 231 篇 beiter a.
  • 227 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 bowcock t.j.v.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 217 篇 bencivenni g.

语言

  • 105,470 篇 英文
  • 21,928 篇 其他
  • 1,506 篇 中文
  • 119 篇 日文
  • 26 篇 斯洛文尼亚文
  • 25 篇 法文
  • 24 篇 德文
  • 8 篇 朝鲜文
  • 6 篇 阿拉伯文
  • 6 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
128694 条 记 录,以下是4341-4350 订阅
排序:
Deep Learning Solutions for Identifying and Preventing Web-based Malware  5
Deep Learning Solutions for Identifying and Preventing Web-b...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Prabha, Chander Monga, Sakshra Srivastava, Prakash Saluja, Nitin Kumari, Shalini Wadhawan, Savita Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science & Engineering Dehradun India
Malware that takes advantage of security holes is one type of threat that can affect web-based apps. The above breaches have the potential to seriously impair the privacy, usability, and security of the applications, ... 详细信息
来源: 评论
An Efficient ODR for computer Night Vision Using Multi-Scale Retinex Network-Aided Enhanced Images  4
An Efficient ODR for Computer Night Vision Using Multi-Scale...
收藏 引用
4th International Conference on Power, Energy, Control and Transmission Systems, ICPECTS 2024
作者: Charles Prabu, V. Pandiaraja, P. Sathiyamoorthi, V. Durgadevi, P. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Government Polytechnic College Department of Computer Engineering Baisuhalli Tamilnadu Dharmapuri India Srm Institute of Science and Technology Department of Computer Science and Engineering Vadapalani Campus Tamilnadu Chennai India
In the current scenario, recognizing various objects and tracking their movements in the real-time surveillance footage is the most difficult task. To detect objects, a combination of image processing and computer vis... 详细信息
来源: 评论
Skin cancer detection using deep learning  10
Skin cancer detection using deep learning
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Arun, K.A. Palmer, Matthew Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Karunya Nagar Coimbatore641114 India
Skin cancer is a prevalent and sometimes lethal condition for which early detection is essential to the best course of treatment. Using dermatoscopic images, convolutional neural networks (CNNs) have demonstrated pote... 详细信息
来源: 评论
Scalable Modular Battery Management System Using Model-Based Approach for EV Applications  2
Scalable Modular Battery Management System Using Model-Based...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Kumar, Srinath Jawaharram, Vishnu Ram Balashivakumaran, R. Chandrakala, K.R.M. Vijaya Kumar, S. Sampath Nadar, Kannan Paulish Amrita School of Engineering Department of Electrical and Electronics Engineering Coimbatore India Institute of Technology Jijiga University Department of Electrical and Computer Engineering Ethiopia
The global automotive industry is in the phase where Internal Combustion vehicles are in decline and witnessing a shift towards sustainable development. The major parameter of a successful EV is an efficient battery p... 详细信息
来源: 评论
Enhancing Cloud Computing Security through Deep Learning and Attention Mechanism Intrusion Detection Systems  4
Enhancing Cloud Computing Security through Deep Learning and...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Shukla, Sunil Singh, Jagendra Ramya, T. Rahul, Satyakam Mallick, Arnab Kumar Pandey, Pawan Graphic Era Hill University School of Computing Dehradun India Bennett University School of Computer Science Engineering & Technology Greater Noida India Cvr College of Engineering Department of CSE-DS Hyderabad India Mit Adt University School of Computer Science Engineering Pune India Indian Institute of Technology Madras Department of Computer Science Engineering Chennai India Raj Kumar Goel Institute of Technology Department of Computer Science Ghaziabad India
This research investigates the enhancement of cloud computing security through adaptive neural network intrusion detection systems, employing Deep Belief Networks (DBN) and Attention Mechanism. The study aims to addre... 详细信息
来源: 评论
Genetic-Chicken Swarm Algorithm for Minimizing Energy in Wireless Sensor Network
收藏 引用
computer Systems Science & engineering 2023年 第2期44卷 1451-1466页
作者: A.Jameer Basha S.Aswini S.Aarthini Yunyoung Nam Mohamed Abouhawwash Department of Computer Science and Engineering Hindusthan Institute of TechnologyCoimbatore641032India Department of Computer Science and Engineering Soonchunhyang UniversityAsan31538Korea Department of Mathematics Faculty of ScienceMansoura UniversityMansoura35516Egypt Department of ComputationalMathematics Science and Engineering(CMSE) Michigan State University East LansingMI48824USA.
Wireless Sensor Network(WSN)technology is the real-time applica-tion that is growing rapidly as the result of smart *** power is one of the most significant resources in *** enhancing a power factor,the clustering tech... 详细信息
来源: 评论
Deep Fake Video Detection using Neural Networks  15
Deep Fake Video Detection using Neural Networks
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Das, Ancy Y. Sinchana, G. Sushmitha, C.S. Venkatesh, L. Yasaswvene Department of Computer Science and Engineering BGS Institute of Technology Adichunchanagiri University Karnataka BG Nagara India
As of late, the multiplication of free profound learning programming apparatuses has fundamentally worked with the advancement of practical face trades in recordings, bringing about the development of "DeepFake&q... 详细信息
来源: 评论
Multiple moving object classification and tracking using DenCNN classifier
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第5-6期46卷 11311-11329页
作者: Premanand, V. Arulalan, V. Kumar, Dhananjay School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Chengalpattu District Tamil Nadu Kattankulathur India Department of Information Technology Anna University Madras Institute of Technology Campus Tamil Nadu Chennai India
A Multiple moving object detection, tracking, and counting algorithm is mainly designed exclusively suitable for congested areas. The counting system can alleviate the betrayal performance in the crowded areas. Most o... 详细信息
来源: 评论
Performance Evaluation of Federated Learning in Edge Computing Environment  2
Performance Evaluation of Federated Learning in Edge Computi...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Kotecha, Prajay Dhoka, Tanvi Bhatia, Jitendra Kumhar, Malaram Gupta, Rajesh Tanwar, Sudeep Jadav, Nilesh Kumar Department of Electronics and Communications Institute of Technology Nirma University Ahmedabad India Department of Computer Science and Engineering Institute of Technology Nirma University Ahmedabad India
In the rapidly changing world of new technologies, AI and ML have been delivered to the network's edge, allowing edge devices to compute simple models that can be applied later in practical applications. Edge comp... 详细信息
来源: 评论
Optimized Biometric Key Management System for Enhanced Security  11th
Optimized Biometric Key Management System for Enhanced Secu...
收藏 引用
11th International Conference on Intelligent Computing and Applications, ICRTC 2023
作者: Kaur, Prabhjot Kumar, Nitin School of Computing DIT University Uttarakhand India Department of Computer Science and Engineering National Institute of Technology Uttarakhand India Department of Computer Science and Engineering PEC Deemed to be University Chandigarh India
Biometric cryptosystems are security tools that use an individual’s distinctive physical or behavioral characteristics to secure sensitive data. Any biometric cryptosystem’s effectiveness is dependent on how well th... 详细信息
来源: 评论