咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,121 篇 期刊文献
  • 1,294 册 图书

馆藏范围

  • 127,735 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,423 篇 工学
    • 45,709 篇 计算机科学与技术...
    • 36,722 篇 软件工程
    • 18,477 篇 信息与通信工程
    • 11,982 篇 控制科学与工程
    • 11,843 篇 电气工程
    • 11,547 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,018 篇 生物医学工程(可授...
    • 6,680 篇 光学工程
    • 5,034 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,472 篇 仪器科学与技术
    • 4,417 篇 材料科学与工程(可...
    • 4,332 篇 动力工程及工程热...
    • 3,181 篇 网络空间安全
    • 2,940 篇 安全科学与工程
  • 43,183 篇 理学
    • 19,300 篇 数学
    • 16,640 篇 物理学
    • 9,498 篇 生物学
    • 6,356 篇 统计学(可授理学、...
    • 5,180 篇 化学
    • 4,677 篇 系统科学
  • 17,494 篇 管理学
    • 11,005 篇 管理科学与工程(可...
    • 7,248 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,074 篇 医学
    • 5,856 篇 临床医学
    • 5,271 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,002 篇 公共卫生与预防医...
  • 3,447 篇 法学
    • 2,823 篇 社会学
  • 2,210 篇 经济学
  • 1,839 篇 农学
  • 1,141 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,792 篇 accuracy
  • 3,039 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,823 篇 computer science
  • 2,694 篇 machine learning
  • 2,653 篇 computational mo...
  • 2,272 篇 training
  • 1,932 篇 real-time system...
  • 1,842 篇 support vector m...
  • 1,837 篇 internet of thin...
  • 1,770 篇 convolutional ne...
  • 1,762 篇 predictive model...
  • 1,584 篇 artificial intel...
  • 1,440 篇 optimization
  • 1,384 篇 neural networks
  • 1,340 篇 wireless sensor ...
  • 1,261 篇 data mining
  • 1,223 篇 security
  • 1,217 篇 bandwidth
  • 1,202 篇 computer archite...

机构

  • 1,087 篇 cavendish labora...
  • 1,020 篇 department of ph...
  • 962 篇 physikalisches i...
  • 950 篇 oliver lodge lab...
  • 765 篇 university of ch...
  • 646 篇 department of el...
  • 635 篇 chitkara univers...
  • 604 篇 infn laboratori ...
  • 603 篇 infn sezione di ...
  • 583 篇 infn sezione di ...
  • 559 篇 infn sezione di ...
  • 549 篇 school of physic...
  • 546 篇 fakultät physik ...
  • 535 篇 horia hulubei na...
  • 526 篇 department of ph...
  • 523 篇 school of physic...
  • 511 篇 imperial college...
  • 510 篇 h.h. wills physi...
  • 502 篇 stfc rutherford ...
  • 501 篇 nikhef national ...

作者

  • 258 篇 barter w.
  • 257 篇 a. gomes
  • 244 篇 c. alexa
  • 240 篇 j. m. izen
  • 236 篇 beiter a.
  • 235 篇 c. amelung
  • 235 篇 j. wang
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 232 篇 blake t.
  • 231 篇 s. chen
  • 225 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 219 篇 borsato m.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 110,503 篇 英文
  • 15,903 篇 其他
  • 1,428 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127735 条 记 录,以下是681-690 订阅
排序:
Deep Learning Based Approaches for Handling New User Cold Start Problem
Deep Learning Based Approaches for Handling New User Cold St...
收藏 引用
International Conference on Systems, Control and Automation, ICSCA 2023
作者: Teja, Pulakala Verma, Vijay Department of Computer Engineering National Institute of Technology Haryana Kurukshetra India
The excess growth of digital information on the Internet and the excessive use by many users have created an issue of information over-load, where the data remains unfiltered and uncategorized. Many large corporations... 详细信息
来源: 评论
Kavach - An Investigation tool for Cryptocurrency Forensics  4
Kavach - An Investigation tool for Cryptocurrency Forensics
收藏 引用
4th IEEE Asian Conference on Innovation in technology, ASIANCON 2024
作者: Shinde, Sandeep Chordia, Sankalp Nilesh Vishwakarma Institute of Technology Department of Computer Engineering Pune India
The expansion of decentralized cryptocurrencies poses notable complexities for law enforcement in terms of detecting unlawful behaviors, as well as in the identification of individuals and the retrieval of transaction... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
A Knowledge Discovery Framework for Maritime Intelligence on Dark Vessels  17
A Knowledge Discovery Framework for Maritime Intelligence on...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Jayaswal, Bharat Ghosh, Soumya K. Indian Institute of Technology Department of Computer Science and Engineering Kharagpur India
Maritime Intelligence is essential for safeguarding maritime interests of coastal nations. Traditionally, vessel movements are tracked using self-reported positions via Automatic Identification System (AIS) transponde... 详细信息
来源: 评论
Learning Non-cooperative Driving Practices and its Impact on Road Traffic Dynamics  17
Learning Non-cooperative Driving Practices and its Impact on...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Osho Chakraborty, Suchetana Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India
Cooperative driving that prioritizes global safety and efficiency over self-interest is crucial in ensuring smooth traffic flow and enhanced road safety. However, experiencing noncooperative driving is common under he... 详细信息
来源: 评论
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted Smart Slide Supervision  17
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Mondal, Susmita Zingre, Sameeran Ravishankar Chakraborty, Suchetana Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India
In corporate settings, conferences, or classrooms, an orator relies on manual slide transitions, which can disrupt their presentation flow. Presentation devices can be inaccessible due to the physical limitations of i... 详细信息
来源: 评论
An Empirical Evaluation of Design Smells and Code Smells Over Multiple Versions of Software Evolution  5th
An Empirical Evaluation of Design Smells and Code Smells Ove...
收藏 引用
5th International Conference on Computing, Communications, and Cyber Security, IC4S 2023
作者: Sharma, Kapil Chhabra, Jitender Kumar Computer Engineering Department National Institute of Technology Kurukshetra India
Software code smells serve as indicators of potential flaws in code design. It signifies that the code has not been created while following the design principles. Code smells do not mean the software system is faulty,... 详细信息
来源: 评论
Hyperbilirubinemia or jaundice detection using CNN in machine learning  1st
Hyperbilirubinemia or jaundice detection using CNN in machin...
收藏 引用
1st International Conference on Applications of AI in 5G and IOT, ICAAI5GI 2024
作者: Gupta, Priyanka Upasna Rai, Vishal Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad India
Jaundice, also called congenital hyperbilirubinemia, is a common condition caused by alterations in an infant’s red blood cell metabolism within the initial week of life. There are many symptoms associated with this ... 详细信息
来源: 评论
Illicit Events Evaluation on the Dark Web Using NSGA-2 Algorithms Based on Energy Consumption
收藏 引用
Informatica (Slovenia) 2024年 第18期48卷 77-96页
作者: Rawat, Romil Rajavat, Anand Department of Computer Science Engineering Shri Vaishnav Institute of Information Technology Shri Vaishnav Vidyapeeth Vishwavidyalaya Indore India
The proposed work objective is to adopt the non-dominated sorting genetic algorithm II (NSGA-II), a type of MOEA (multi-objective evolutionary algorithms), to reduce the dimensionality and identify the most relevant f... 详细信息
来源: 评论
Simulating Application Driven Mobile D2D underlay Networks using Gym API  17
Simulating Application Driven Mobile D2D underlay Networks u...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Batabyal, Suvadip National Institute of Technology Department of Computer Science & Engineering Durgapur India
Device-to-device (D2D) communication underlay cellular network improves spectral efficiency by reusing cellular resources over short and low-power links between the devices. For this, the D2D paradigm is considered to... 详细信息
来源: 评论