咨询与建议

限定检索结果

文献类型

  • 87,643 篇 会议
  • 38,117 篇 期刊文献
  • 1,293 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,055 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 71,616 篇 工学
    • 45,494 篇 计算机科学与技术...
    • 36,611 篇 软件工程
    • 18,400 篇 信息与通信工程
    • 11,895 篇 控制科学与工程
    • 11,628 篇 电气工程
    • 11,351 篇 电子科学与技术(可...
    • 8,265 篇 生物工程
    • 6,993 篇 生物医学工程(可授...
    • 6,756 篇 光学工程
    • 5,012 篇 机械工程
    • 4,614 篇 化学工程与技术
    • 4,472 篇 仪器科学与技术
    • 4,323 篇 动力工程及工程热...
    • 4,064 篇 材料科学与工程(可...
    • 3,143 篇 网络空间安全
    • 2,931 篇 安全科学与工程
  • 43,067 篇 理学
    • 19,189 篇 数学
    • 16,583 篇 物理学
    • 9,492 篇 生物学
    • 6,260 篇 统计学(可授理学、...
    • 5,165 篇 化学
    • 4,674 篇 系统科学
  • 17,418 篇 管理学
    • 10,947 篇 管理科学与工程(可...
    • 7,212 篇 图书情报与档案管...
    • 5,321 篇 工商管理
  • 7,079 篇 医学
    • 5,848 篇 临床医学
    • 5,257 篇 基础医学(可授医学...
    • 3,277 篇 药学(可授医学、理...
    • 2,979 篇 公共卫生与预防医...
  • 3,443 篇 法学
    • 2,818 篇 社会学
  • 2,212 篇 经济学
  • 1,844 篇 农学
  • 1,131 篇 教育学
  • 555 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 9 篇 历史学

主题

  • 3,665 篇 accuracy
  • 2,963 篇 deep learning
  • 2,841 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,682 篇 machine learning
  • 2,591 篇 computational mo...
  • 2,239 篇 training
  • 1,821 篇 real-time system...
  • 1,809 篇 internet of thin...
  • 1,798 篇 support vector m...
  • 1,710 篇 predictive model...
  • 1,700 篇 convolutional ne...
  • 1,557 篇 artificial intel...
  • 1,405 篇 optimization
  • 1,382 篇 neural networks
  • 1,332 篇 wireless sensor ...
  • 1,235 篇 data mining
  • 1,218 篇 bandwidth
  • 1,200 篇 computer archite...
  • 1,181 篇 security

机构

  • 1,090 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 963 篇 physikalisches i...
  • 958 篇 oliver lodge lab...
  • 765 篇 university of ch...
  • 640 篇 department of el...
  • 630 篇 chitkara univers...
  • 612 篇 infn laboratori ...
  • 607 篇 infn sezione di ...
  • 586 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 547 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 530 篇 department of ph...
  • 526 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 515 篇 imperial college...
  • 511 篇 nikhef national ...
  • 506 篇 stfc rutherford ...

作者

  • 258 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 beiter a.
  • 233 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 g. spigo
  • 216 篇 boettcher t.
  • 214 篇 brundu d.

语言

  • 121,100 篇 英文
  • 4,628 篇 其他
  • 1,346 篇 中文
  • 119 篇 日文
  • 19 篇 法文
  • 14 篇 德文
  • 11 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 荷兰文
  • 6 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127055 条 记 录,以下是4841-4850 订阅
排序:
Secured Storage of Information Using Audio Steganography  7th
Secured Storage of Information Using Audio Steganography
收藏 引用
7th International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2022
作者: Sowmya, M.R. Shreenath, K.N. Shetty, Saritha Shetty, Savitha Wajid, Salman Kantharaj, Yashas Department of Computer Science and Engineering NMIT Yelahanka Bangalore India Department of Computer Science and Engineering Siddaganga Institute of Technology Tumakuru India Department of MCA NMAM Institute of Technology Karkala India Department of CSE NMAM Institute of Technology Karkala India
The use of smartphones and cloud storage has expanded dramatically as technology progresses. The data that are kept and used are now more vulnerable to breaches. Using the Internet services, the end users’ data files... 详细信息
来源: 评论
An In-Depth Study of Handwritten Digit Recognition Methods: An Exploration of Deep Learning and Machine Learning Approaches
An In-Depth Study of Handwritten Digit Recognition Methods: ...
收藏 引用
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2023
作者: Singh, Nongmeikapam Thoiba Tiwary, Priyanshu Chanu, Asem Debala Chandigarh University Department of Computer Science and Engineering Punjab India Indian Institute of Information Technology Department of Computer Science and Engineering Assam Guwahati India
This article explains how deep learning and machine learning techniques are being utilized to replace humans in a variety of activities, like item classification and sound addition. It emphasizes handwritten text reco... 详细信息
来源: 评论
Blockchain-Enabled Secure and Fair Online Lottery Systems Using Smart Contracts
Blockchain-Enabled Secure and Fair Online Lottery Systems Us...
收藏 引用
2024 IEEE Silchar Subsection Annual Conference, SILCON 2024
作者: Datta, Suseta Mondal, Rituparna Roy, Rajdeep Banerjee, Sourav Biswas, Utpal Narula Institute of Technology Department of Computer Application West Bengal Kolkata India Techno India University Department of Computer Applications West Bengal Kolkata India University of Kalyani Department of Computer Science and Engineering West Bengal Kalyani India Kalyani Government Engineering College Department of Computer Science and Engineering West Bengal Kalyani India
In the capricious digital dominion, conventional online lottery systems come across consequential impediment regarding transparency, fairness, and security. This paper presents an inventive solution by merging Blockch... 详细信息
来源: 评论
Modelling of Fuzzy Logic Based System for the Implementation of Model for Healthcare System with Accurate Prediction  4
Modelling of Fuzzy Logic Based System for the Implementation...
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2024
作者: Kumar, Vikram Saini, Dimple Rastogi, Shailesh Raman, Ramakrishnan Verma, Apurv Meenakshi, R. Md Srv Media Pvt. Ltd India India Pune Department of Cse Symbiosis Institute of Business Management Nagpur India Department of Cse India Parul Institute of Technology Parul University Computer Science and Engineering Faculty of Engineering and Technology India Chennai Institute of Technology Computer Science and Engineering India
Budgetary restrictions force healthcare institutions to endure ongoing deterioration, which calls for better building capital deterioration modeling. A more sophisticated predictive model is essential to implementing ... 详细信息
来源: 评论
The EM Algorithm is Adaptively-Optimal for Unbalanced Symmetric Gaussian Mixtures
收藏 引用
Journal of Machine Learning Research 2022年 第1期23卷 1-79页
作者: Weinberger, Nir Bresler, Guy The Viterbi Faculty of Electrical and Computer Engineering Technion|Israel Institute of Technology Haifa3200004 Israel Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology CambridgeMA02139 United States
This paper studies the problem of estimating the means ± θ2 Rd of a symmetric twocomponent Gaussian mixture δN(θ;I) + (1 - δ) N(-θ;I), where the weights δand 1 - δare unequal. Assuming that δis known, we ... 详细信息
来源: 评论
CLAACS-IOD: Certificate-embedded lightweight authentication and access control scheme for Internet of Drones
CLAACS-IOD: Certificate-embedded lightweight authentication ...
收藏 引用
作者: Sadhukhan, Dipanwita Ray, Sangram Dasgupta, Mou Rodrigues, Joel J. P. C. Department of Computer Science and Engineering National Institute of Technology Sikkim Sikkim Ravangla India Department of Computer Application National Institute of Technology Raipur Raipur India Qingdao China Instituto de Telecomunicações Covilhã Portugal
In recent era, the unmanned aerial vehicles (UAVs) commonly known as drones has emerged as a one of the most significant and promising tools which has demonstrated its wide range of implementations variating from comm... 详细信息
来源: 评论
A Neuromorphic Spiking Neural Network Using Time-to-First-Spike Coding Scheme and Analog Computing in Low-Leakage 8T SRAM
收藏 引用
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2024年 第5期32卷 848-859页
作者: Chen, Chao-Yu Dai, Yan-Siou Hong, Hao-Chiao Institute of Electrical and Computer Engineering National Yang Ming Chiao Tung University Hsinchu300093 Taiwan Novatech Microelectronics Corporation Technology Innovation Department Hsinchu300092 Taiwan
This article demonstrates the first functional neuromorphic spiking neural network (SNN) that processes the time-to-first-spike (TTFS) encoded analog spiking signals with the second-order leaky integrate-and-fire (SOL... 详细信息
来源: 评论
PROMO: PROactive MObility-support model for task scheduling in fog computing
收藏 引用
International Journal of computers and Applications 2022年 第11期44卷 1092-1101页
作者: Kaur, Navjeet Kumar, Ashok Kumar, Rajesh Chitkara University Institute of Engineering and Technology Chitkara University Punjab India School of Computer Application Lovely Professional University Phagwara India Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Patiala India
In fog computing, closer proximity of fog devices to the end-user provides several benefits, such as reduced End-to-End (E2E) delay and better Quality of Service (QoS). Although, fog computing gives promising benefits... 详细信息
来源: 评论
A task clustering based QoS aware scheduling algorithm for task execution in cloud-Iot model for education services
收藏 引用
Multimedia Tools and Applications 2023年 第29期82卷 44783-44800页
作者: Chowdhary, Sunil Kumar Rao, A.L.N. Faculty of Computer Science and Engineering Dr. A P J Abdul Kalam Technical University Uttar Pradesh Lucknow India Department of Computer Science and Engineering G.L. Bajaj Institute of Technology and Management Noida India
Some of the conventional approaches to task scheduling are discussed in this section. The scheduling of tasks in the Internet of Things (IoT) application is a complex job in cloud computing due to the heterogeneity ch... 详细信息
来源: 评论
Ransome Ware Detection Using Machine Learning and Deep Learning Models  12th
Ransome Ware Detection Using Machine Learning and Deep Learn...
收藏 引用
12th International Conference on Recent Trends in Computing, ICRTC 2024
作者: Vivek, Vinnakota Sai Lokesh, Vadlamudi Kaushik, Tata Kumaran, U. Umah, B. Devarajan, Gopal Ganesh Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Computer Science and Engineering SRM Institute of Science and Technology Delhi NCR Campus Uttar Pradesh Ghaziabad India
This research addresses the critical challenge of ransomware detection through the use of deep learning and machine learning methods. Because ransomware is a serious threat to cybersecurity, it is imperative that adva... 详细信息
来源: 评论