咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,324 篇 期刊文献
  • 1,302 册 图书

馆藏范围

  • 127,946 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,374 篇 工学
    • 45,726 篇 计算机科学与技术...
    • 36,731 篇 软件工程
    • 18,487 篇 信息与通信工程
    • 11,999 篇 控制科学与工程
    • 11,819 篇 电气工程
    • 11,519 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,017 篇 生物医学工程(可授...
    • 6,705 篇 光学工程
    • 5,033 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,475 篇 仪器科学与技术
    • 4,368 篇 材料科学与工程(可...
    • 4,334 篇 动力工程及工程热...
    • 3,190 篇 网络空间安全
    • 2,941 篇 安全科学与工程
  • 43,194 篇 理学
    • 19,293 篇 数学
    • 16,640 篇 物理学
    • 9,502 篇 生物学
    • 6,340 篇 统计学(可授理学、...
    • 5,177 篇 化学
    • 4,677 篇 系统科学
  • 17,504 篇 管理学
    • 11,009 篇 管理科学与工程(可...
    • 7,253 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,083 篇 医学
    • 5,864 篇 临床医学
    • 5,272 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,003 篇 公共卫生与预防医...
  • 3,449 篇 法学
    • 2,824 篇 社会学
  • 2,213 篇 经济学
  • 1,843 篇 农学
  • 1,142 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,790 篇 accuracy
  • 3,041 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,827 篇 computer science
  • 2,702 篇 machine learning
  • 2,649 篇 computational mo...
  • 2,270 篇 training
  • 1,938 篇 real-time system...
  • 1,851 篇 internet of thin...
  • 1,830 篇 support vector m...
  • 1,766 篇 convolutional ne...
  • 1,756 篇 predictive model...
  • 1,599 篇 artificial intel...
  • 1,441 篇 optimization
  • 1,398 篇 neural networks
  • 1,345 篇 wireless sensor ...
  • 1,253 篇 data mining
  • 1,229 篇 security
  • 1,218 篇 bandwidth
  • 1,213 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 971 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 768 篇 university of ch...
  • 645 篇 department of el...
  • 639 篇 chitkara univers...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 504 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 beiter a.
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 brundu d.
  • 219 篇 bowcock t.j.v.
  • 217 篇 bencivenni g.

语言

  • 110,696 篇 英文
  • 15,910 篇 其他
  • 1,439 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute and Department of Computer Engineering and Informatics"
127946 条 记 录,以下是1331-1340 订阅
排序:
Intelligent Secure Authentication of Smart Devices Using Eye Tracking: Design and Implementation  18
Intelligent Secure Authentication of Smart Devices Using Eye...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Upreti, Rohit Garg, Divisha Singh, Harpreet Rana, Prashant Singh Thapar Institute of Engineering & Technology Computer Science Engineering Department Punjab Patiala India
Pattern-based, password-based, and PIN-based authentication techniques are typically the most common among smartphone users. However, according to prior studies these authentication techniques are susceptible to keylo... 详细信息
来源: 评论
DSPWE: distributed sentiment polarized word embedding for voluminous textual data
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第7期14卷 9419-9433页
作者: Dhanani, Jenish Mehta, Rupa Rana, Dipti P. Department of Computer Science and Engineering S. V. National Institute of Technology Surat India
Sentiment analysis provides an insight of the public’s emotions towards governments, organizations, product developers etc. Word embedding is a group of feature learning techniques transferring the raw textual data i... 详细信息
来源: 评论
3D Brain MR Image Segmentation using a Fuzzy Entropy-Based Fuzzy Clustering Algorithm  2
3D Brain MR Image Segmentation using a Fuzzy Entropy-Based F...
收藏 引用
2nd International Conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Ray, Madhumita Sing, Jamuna Kanta Meghnad Saha Institute of Technology Computer Science and Engineering department Kolkata India Jadavpur University Computer Science and Engineering department Kolkata India
This paper presents a fuzzy clustering algorithm by incorporating fuzzy entropy for segmentation of 3D brain magnetic resonance (MR) images. Intensity inhomogeneity (IIH) and noise strongly affect brain MR images beca... 详细信息
来源: 评论
PSO optimised workflow scheduling and VM replacement algorithm using gaming concept in cloud data centre
收藏 引用
International Journal of Cloud Computing 2023年 第6期12卷 586-604页
作者: Narayani, Raman Banu, Wahab Aisha Department of Computer Science and Engineering BSA Crescent Institute of Science and Technology Tamil Nadu Chennai India
The principal features of cloud computing are dynamic resource allocation and its pricing nature. This paper implies an algorithm that provides resources based on the demand to users in the cloud infrastructure as a s... 详细信息
来源: 评论
Blockchain Breakthrough: A Review of its Role in Modern technology  2
Blockchain Breakthrough: A Review of its Role in Modern Tech...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Asthana, Sameer Chaturvedi, Ravi Prakash Mishra, Annu Nayyar, Poorva Shaliyar, Md. Greater Noida Institute of Technology Department of Computer Science and Engineering Greater Noida India Sharda School of Engineering and Technology Department of Computer Science and Applications Greater Noida India Sharda School of Engineering and Technology Department of Computer Science and Engineering Greater Noida India
This article summarizes the Blockchain technology along with the artificial intelligence. The cutting edge technology is described in a elaborated manner along with its advantages, disadvantages and its impact with th... 详细信息
来源: 评论
Secure probe-based latency measurement using NTP and PTP for optimized gateway placement in LoRaWAN
收藏 引用
International Journal of Information technology (Singapore) 2025年 1-10页
作者: Bhatnagar, Kumar Vaibhav Kushwah, Rashmi Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida 201304 India
The paper presents a novel framework for optimizing LoRaWAN gateway placement to enhance network performance and reliability. By integrating Network Time Protocol (NTP) for global synchronization and Precision Time Pr... 详细信息
来源: 评论
Forecasting Diabetes: Leveraging ML for Early Detection and Prevention  8
Forecasting Diabetes: Leveraging ML for Early Detection and ...
收藏 引用
8th IEEE International Conference on Computing, Communication, Control and Automation, ICCUBEA 2024
作者: Shah, Dhwanit Vora, Akshat Joshi, Devam Swain, Debabrata Bhilare, Amol Pandit Deendayal Energy University Computer Science & Engineering Department Gandhinagar India Vishwakarma Institute of Technology Computer Engineering Department Pune India
Diabetes is one of the increasing chronic diseases that must be treated well as soon as it is detected. In today's world, diabetes is the most occurring disease. Diabetes is mainly of two types: Type 1 and Type 2 ... 详细信息
来源: 评论
Rule and Encryption based Secure Routing for Internet of Vehicle Networks  2
Rule and Encryption based Secure Routing for Internet of Veh...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Anand, M. Muthurajkumar, S. Selvi, M. Thangaramya, K. Svn, Santhosh Kumar Kannan, A. Anna University Madras Institute of Technolog Department of Computer Technology Chennai India Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
The Internet of Vehicles (IoV) has become one challenging communication technology in the current internet world. IoV enables real-time data exchange between vehicles, road infrastructures, and mobile communication de... 详细信息
来源: 评论
Cepstral and acoustic ternary pattern based hybrid feature extraction approach for end-to-end bangla speech recognition
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第12期14卷 16903-16919页
作者: Dua, Mohit Akanksha Dua, Shelza Department of Computer Engineering National Institute of Technology Kurukshetra India Department of Electronics Communication and Engineering Punjab Engineering College Chandigarh Chandigarh India
In the last three decades, a lot of work has been done for building Automatic Speech Recognition (ASR) systems for well-established languages such as English, Chinese, etc. However, for implementing a Large Vocabulary... 详细信息
来源: 评论
Small Object Detection & Classification In Cardiac Images For the Improvised Early Diagnosis  4
Small Object Detection & Classification In Cardiac Images Fo...
收藏 引用
4th IEEE Asian Conference on Innovation in technology, ASIANCON 2024
作者: Geethavani, B. Elankavi, R. Latha, M. Swarna Yugandhar, J. Varma, S. Vinay Pavithra, K. Siddharth Institute of Engineering & Technology Department of Computer Science and Engineering Andra Pradesh India
Early diagnosis of cardiac abnormalities plays a crucial role in preventing severe cardiovascular diseases. This paper presents a novel approach for detecting and classifying small objects, such as anomalies, in cardi... 详细信息
来源: 评论