咨询与建议

限定检索结果

文献类型

  • 87,582 篇 会议
  • 38,506 篇 期刊文献
  • 1,283 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,373 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,083 篇 工学
    • 45,786 篇 计算机科学与技术...
    • 36,764 篇 软件工程
    • 18,597 篇 信息与通信工程
    • 12,035 篇 控制科学与工程
    • 11,840 篇 电气工程
    • 11,442 篇 电子科学与技术(可...
    • 8,288 篇 生物工程
    • 7,014 篇 生物医学工程(可授...
    • 6,793 篇 光学工程
    • 5,113 篇 机械工程
    • 4,659 篇 化学工程与技术
    • 4,495 篇 仪器科学与技术
    • 4,354 篇 动力工程及工程热...
    • 4,141 篇 材料科学与工程(可...
    • 3,229 篇 网络空间安全
    • 2,950 篇 安全科学与工程
  • 43,357 篇 理学
    • 19,296 篇 数学
    • 16,697 篇 物理学
    • 9,561 篇 生物学
    • 6,300 篇 统计学(可授理学、...
    • 5,231 篇 化学
    • 4,683 篇 系统科学
  • 17,493 篇 管理学
    • 10,984 篇 管理科学与工程(可...
    • 7,255 篇 图书情报与档案管...
    • 5,335 篇 工商管理
  • 7,149 篇 医学
    • 5,879 篇 临床医学
    • 5,295 篇 基础医学(可授医学...
    • 3,286 篇 药学(可授医学、理...
    • 3,014 篇 公共卫生与预防医...
  • 3,451 篇 法学
    • 2,820 篇 社会学
  • 2,219 篇 经济学
  • 1,848 篇 农学
  • 1,137 篇 教育学
  • 555 篇 文学
  • 281 篇 军事学
  • 123 篇 艺术学
  • 14 篇 哲学
  • 9 篇 历史学

主题

  • 3,646 篇 accuracy
  • 2,988 篇 deep learning
  • 2,829 篇 feature extracti...
  • 2,828 篇 computer science
  • 2,707 篇 machine learning
  • 2,586 篇 computational mo...
  • 2,218 篇 training
  • 1,819 篇 internet of thin...
  • 1,802 篇 real-time system...
  • 1,795 篇 support vector m...
  • 1,705 篇 predictive model...
  • 1,690 篇 convolutional ne...
  • 1,563 篇 artificial intel...
  • 1,386 篇 neural networks
  • 1,383 篇 optimization
  • 1,329 篇 wireless sensor ...
  • 1,237 篇 data mining
  • 1,219 篇 bandwidth
  • 1,197 篇 computer archite...
  • 1,186 篇 security

机构

  • 1,093 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 970 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 763 篇 university of ch...
  • 645 篇 department of el...
  • 629 篇 chitkara univers...
  • 620 篇 infn laboratori ...
  • 610 篇 infn sezione di ...
  • 587 篇 infn sezione di ...
  • 572 篇 infn sezione di ...
  • 555 篇 fakultät physik ...
  • 546 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 531 篇 department of ph...
  • 529 篇 school of physic...
  • 517 篇 h.h. wills physi...
  • 516 篇 imperial college...
  • 513 篇 nikhef national ...
  • 507 篇 stfc rutherford ...

作者

  • 259 篇 a. gomes
  • 252 篇 barter w.
  • 247 篇 c. alexa
  • 243 篇 j. m. izen
  • 238 篇 j. wang
  • 237 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 s. chen
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 232 篇 beiter a.
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 g. spigo
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 214 篇 f. siegert

语言

  • 121,335 篇 英文
  • 4,708 篇 其他
  • 1,361 篇 中文
  • 119 篇 日文
  • 20 篇 法文
  • 13 篇 德文
  • 11 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 荷兰文
  • 6 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127373 条 记 录,以下是71-80 订阅
排序:
Binary Error-Correcting Codes With Minimal Noiseless Feedback
收藏 引用
IEEE Transactions on Information Theory 2025年 第5期71卷 3424-3446页
作者: Gupta, Meghal Guruswami, Venkatesan Yun Zhang, Rachel Department of Electrical and Computer Engineering BerkeleyCA94720 United States Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science CambridgeMA02139 United States
In the setting of error-correcting codes with feedback, Alice wishes to communicate a k-bit message x to Bob by sending a sequence of bits over a channel while noiselessly receiving feedback from Bob. It has been long... 详细信息
来源: 评论
Extreme learning machine to foretell the deflection in plain cement, steel-reinforced, and bamboo-reinforced concrete beams
收藏 引用
Emerging Materials Research 2025年 第1期14卷 12-27页
作者: Dubey, Saurabh Gupta, Deepak Mallik, Mainak Department of Civil Engineering National Institute of Technology Arunachal Pradesh India Department of Computer Science and Engineering Motilal Nehru National Institute of Technology Allahabad India
In mountainous regions, bamboo has gained popularity as a local reinforcement material for concrete due to its availability and cost-effectiveness. However, the lack of standardized design guidelines complicates the a... 详细信息
来源: 评论
A lightweight identity based mutual authenticated key agreement scheme for telecare medical information system
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Banerjee, Ananya Sahana, Subhas Chandra Department of Computer Science & Engineering National Institute of Technology West Bengal Durgapur713209 India
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ... 详细信息
来源: 评论
HViTML: Hybrid vision transformer with machine learning-based classification model for glaucomatous eye
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Singh, Piyush Bhushan Singh, Pawan Dev, Harsh Batra, Devanshu Chaurasia, Brijesh Kumar Department of Information Technology Pranveer Singh Institute of Technology Uttar Pradesh Kanpur India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Uttar Pradesh Lucknow India Department of Computer Science and Engineering Babu Banarasi Das University Uttar Pradesh Lucknow India Department of Computer Science and Engineering Pranveer Singh Institute of Technology Uttar Pradesh Kanpur India
Glaucoma is currently one of the most significant causes of permanent blindness. Fundus imaging is the most popular glaucoma screening method because of the compromises it has to make in terms of portability, size, an... 详细信息
来源: 评论
MOHSQO: Multi objective harmony search algorithm based QoS optimization in delay tolerant networks
收藏 引用
Multimedia Tools and Applications 2025年 1-26页
作者: Sonkar, Nidhi Pandey, Sudhakar Kumar, Sanjay Department of Computer Science and Engineering National Institute of Technology Warangal Hanamkonda India Department of Information Technology National Institute of Technology Raipur Raipur India
Delay Tolerant Networks (DTNs) have the ability to make communication possible without end-to-end connectivity using store-carry-forward technique. Efficient data dissemination in DTNs is very challenging problem due ... 详细信息
来源: 评论
Universal Polarization for Processes with Memory
收藏 引用
IEEE Transactions on Information Theory 2025年 第3期71卷 1705-1757页
作者: Shuval, Boaz Tal, Ido Technion - Israel Institute of Technology Viterbi Department of Electrical and Computer Engineering Haifa320003 Israel
A transform that is universally polarizing over a set of channels with memory is presented. Memory may be present in both the input to the channel and the channel itself. Both the encoder and the decoder are aware of ... 详细信息
来源: 评论
Comprehensive analysis of various imputation and forecasting models for predicting PM2.5 pollutant in Delhi
收藏 引用
Neural Computing and Applications 2025年 1-18页
作者: Karnati, Hemanth Soma, Anuraag Alam, Adnan Kalaavathi, B. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India Department of IoT School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India
Understanding and predicting air quality is pivotal for public health and environmental management, especially in urban areas like Delhi. This study utilizes a comprehensive dataset from the Central Pollution Control ... 详细信息
来源: 评论
Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9367-9392页
作者: KL, Shreya Narasimhan R, Bala Krishnan Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
A brief review on Quantum Key Distribution Protocols
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Kumar, Mandeep Mondal, Bhaskar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna800005 India
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin... 详细信息
来源: 评论