咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,324 篇 期刊文献
  • 1,302 册 图书

馆藏范围

  • 127,946 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,374 篇 工学
    • 45,726 篇 计算机科学与技术...
    • 36,731 篇 软件工程
    • 18,487 篇 信息与通信工程
    • 11,999 篇 控制科学与工程
    • 11,819 篇 电气工程
    • 11,519 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,017 篇 生物医学工程(可授...
    • 6,705 篇 光学工程
    • 5,033 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,475 篇 仪器科学与技术
    • 4,368 篇 材料科学与工程(可...
    • 4,334 篇 动力工程及工程热...
    • 3,190 篇 网络空间安全
    • 2,941 篇 安全科学与工程
  • 43,194 篇 理学
    • 19,293 篇 数学
    • 16,640 篇 物理学
    • 9,502 篇 生物学
    • 6,340 篇 统计学(可授理学、...
    • 5,177 篇 化学
    • 4,677 篇 系统科学
  • 17,504 篇 管理学
    • 11,009 篇 管理科学与工程(可...
    • 7,253 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,083 篇 医学
    • 5,864 篇 临床医学
    • 5,272 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,003 篇 公共卫生与预防医...
  • 3,449 篇 法学
    • 2,824 篇 社会学
  • 2,213 篇 经济学
  • 1,843 篇 农学
  • 1,142 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,790 篇 accuracy
  • 3,041 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,702 篇 machine learning
  • 2,649 篇 computational mo...
  • 2,270 篇 training
  • 1,938 篇 real-time system...
  • 1,851 篇 internet of thin...
  • 1,830 篇 support vector m...
  • 1,766 篇 convolutional ne...
  • 1,756 篇 predictive model...
  • 1,599 篇 artificial intel...
  • 1,441 篇 optimization
  • 1,398 篇 neural networks
  • 1,345 篇 wireless sensor ...
  • 1,253 篇 data mining
  • 1,229 篇 security
  • 1,218 篇 bandwidth
  • 1,213 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 971 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 645 篇 department of el...
  • 639 篇 chitkara univers...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 504 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 beiter a.
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bencivenni g.

语言

  • 110,696 篇 英文
  • 15,910 篇 其他
  • 1,439 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute and Department of Computer Engineering and Informatics"
127946 条 记 录,以下是1301-1310 订阅
排序:
Bridging the Bandwidth Gap: A Mixed Band Telephonic Urdu ASR Approach with Domain Adaptation for Banking Applications  1
Bridging the Bandwidth Gap: A Mixed Band Telephonic Urdu ASR...
收藏 引用
1st Workshop on Challenges in Processing South Asian Languages, CHiPSAL 2025, co-located with the 31st International Conference on Computational Linguistics, COLING 2025
作者: Khalid, Ayesha Adeeba, Farah Sehar, Najm Ul Hussain, Sarmad Center for Language Engineering Al-Khawarizmi Institute of Computer Science University of Engineering and Technology Lahore Pakistan Department of Computer Science University of Engineering and Technology New Campus Pakistan
The accuracy of Automatic Speech Recognition (ASR) systems is influenced by the quality and context of speech signals, particularly in telephonic environments prone to errors like channel drops and noise, leading to h... 详细信息
来源: 评论
Investigation of sustainable strategies with metaheuristic algorithm on surface roughness, cutting temperature, and chip morphology during machining of Ti6Al4V alloy
收藏 引用
International Journal of Machining and Machinability of Materials 2024年 第3期26卷 223-243页
作者: Misra, Sutanu Kumar, Yogesh Paul, Goutam Pradhan, Buddhadeb Department of Mechanical Engineering University of Engineering and Management Kolkata India Department of Mechanical Engineering National Institute of Technology Patna Bihar Patna India Department of Computer Science and Engineering University of Engineering and Management Kolkata India
This research work explores the effects of dry, liquid N2-based cryogenic cooling and cryogenic plus MQL hybrid strategy on surface roughness, rake surface temperature, principal cutting-edge temperature, auxiliary cu... 详细信息
来源: 评论
R3N2 : a novel approach for review based custom star rating using recurrent neural network
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 9089-9097页
作者: Kumar, Krishan Department of Computer Science and Engineering National Institute of Technology Uttarakhand Garhwal Uttarakhand Srinagar246174 India
Online shopping is growing in popularity as internet services are used more frequently. Many consumers consider online shopping due to the comfort, ease of access, and variety of products offered. However, this wide v... 详细信息
来源: 评论
A Contemporary Framework for Detection of Phishing Website for Cyber Societal Safety
收藏 引用
SN computer Science 2025年 第4期6卷 1-10页
作者: Lakshmi, B.N. Dhanalakshmi, B.K. Reddy, K. Tharun Department of Computer Science Engineering BMS Institute of Technology and Management Karnataka Yelahanka Bangalore 560064 India
In today’s digital age, phishing is a significant threat. It is a clever approach in which propagation of a website is done, and customers are enticed to a false website where customers are asked to enter critical pe... 详细信息
来源: 评论
A Comprehensive Analysis of Human Action Recognition for Noisy Videos Using CNN and LSTM
A Comprehensive Analysis of Human Action Recognition for Noi...
收藏 引用
2024 IEEE International Conference on Innovation and Novelty in engineering and technology, INNOVA 2024
作者: Suma, S. Patel, Punyaban Tiwari, Rajesh Gundu, Lavanya Devi, Guntoju Kalpana Raju, K. Srujan Department of Computer Science and Engineering CMR Technical Campus Telangana Hyderabad India Department of Computer Science and Engineering CMR College of Engineering & Technology Hyderabad India Department of Computer Science and Engineering CMR Engineering College Hyderabad India Department of Computer Science and Engineering CMR Institute of Technology Telangana Hyderabad India
Human action identification has advanced significantly as a result of the development of deep learning algorithms. Convolutional Neural Networks (CNNs) are known for their adeptness at extracting crucial information w... 详细信息
来源: 评论
Latest Innovations in Intelligent Network-on-Chip Architectures: A Systematic Review  17
Latest Innovations in Intelligent Network-on-Chip Architectu...
收藏 引用
17th IEEE/ACM International Workshop on Network on Chip Architectures, NoCArc 2024
作者: Kakoulli, Elena Neapolis University Pafos Intelligent Systems Laboratory Department of Computer Science Pafos Cyprus Cyprus University of Technology Electrical Engineering and Computer Engineering and Informatics Limassol Cyprus
This review investigates the latest advancements in intelligent Network-on-Chip (NoC) architectures, focusing on innovations from 2022 to 2024. The integration of Artificial Intelligence (AI) and Machine Learning (ML)... 详细信息
来源: 评论
Evaluating the Effectiveness of Collaborative Filtering Similarity Measures: A Comprehensive Review  2
Evaluating the Effectiveness of Collaborative Filtering Simi...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Chowdhury, Pradipto Sinha, Bam Bahadur Department of Computer Science and Engineering Kalinga Institute of Industrial Technology Orissa 751024 India Department of Computer Science and Engineering Indian Institute of Information Technology Ranchi Jharkhand834010 India
Recommendation systems play a pivotal role in assisting users in fnding items, services, or products that align with their preferences. These systems typically rely on personal parameters, user reviews, or a combinati... 详细信息
来源: 评论
DSF-GAM: a location inference model in social network Twitter
收藏 引用
International Journal of computers and Applications 2025年 第2期47卷 141-161页
作者: Paul, Amit Changder, Narayan Dutta, Animesh Department of Computer Science and Engineering National Institute of Technology West Bengal Durgapur India TCG CREST Research and Education in Science and Technology West Bengal Kolkata India
Analyzing the social interactions and texts on Twitter can provide valuable insights into users' behavior, opinions, and even their geographical locations. Location inference of users within a social network finds... 详细信息
来源: 评论
Multi-agent QoS-aware autonomic resource provisioning framework for elastic BPM in containerized multi-cloud environment
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12895-12920页
作者: Saif, Mufeed Ahmed Naji Niranjan, S.K. Murshed, Belal Abdullah Hezam Al-ariki, Hasib Daowd Esmail Abdulwahab, Hudhaifa Mohammed Department of Computer Applications Sri Jayachamarajendra College of Engineering VTU Mysore India Department of Studies in Computer Science University of Mysore Karnataka Mysore India Department of Computer Science College of Eng. &IT University of Amran Amran Yemen Department of Information Technology Faculty of Engineering and Information Technology Al-ata’a University for Science and Technology Taiz Yemen Department of Computer Networks Engineering and Technologies Sana’a Community College Sana’a Yemen Department of Computer Application Ramaiah Institute of Technology VTU Bangalore India
Cloud computing enables businesses to improve their market competitiveness, enabling instant and easy access to a pool of virtualized and distributed resources such as virtual machines (VM) and containers for executin... 详细信息
来源: 评论
A Two-Pronged Approach to Security of Discrete-Event Systems
收藏 引用
Journal of Systems Science & Complexity 2025年 第1期38卷 178-209页
作者: MATSUI Shoma RUDIE Karen CAI Kai Department of Electrical and Computer Engineering&the Ingenuity Labs Research Institute Queen's UniversityKingston K7L 3N6Canada Department of Core Informatics Osaka Metropolitan UniversityOsaka 545-0051Japan
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ... 详细信息
来源: 评论