咨询与建议

限定检索结果

文献类型

  • 88,090 篇 会议
  • 38,173 篇 期刊文献
  • 1,299 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,564 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,078 篇 工学
    • 45,767 篇 计算机科学与技术...
    • 36,827 篇 软件工程
    • 18,496 篇 信息与通信工程
    • 11,996 篇 控制科学与工程
    • 11,681 篇 电气工程
    • 11,392 篇 电子科学与技术(可...
    • 8,284 篇 生物工程
    • 7,037 篇 生物医学工程(可授...
    • 6,815 篇 光学工程
    • 5,038 篇 机械工程
    • 4,629 篇 化学工程与技术
    • 4,494 篇 仪器科学与技术
    • 4,339 篇 动力工程及工程热...
    • 4,085 篇 材料科学与工程(可...
    • 3,177 篇 网络空间安全
    • 2,949 篇 安全科学与工程
  • 43,255 篇 理学
    • 19,269 篇 数学
    • 16,657 篇 物理学
    • 9,507 篇 生物学
    • 6,299 篇 统计学(可授理学、...
    • 5,176 篇 化学
    • 4,680 篇 系统科学
  • 17,515 篇 管理学
    • 11,018 篇 管理科学与工程(可...
    • 7,247 篇 图书情报与档案管...
    • 5,365 篇 工商管理
  • 7,129 篇 医学
    • 5,903 篇 临床医学
    • 5,301 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,029 篇 公共卫生与预防医...
  • 3,452 篇 法学
    • 2,825 篇 社会学
  • 2,222 篇 经济学
  • 1,855 篇 农学
  • 1,145 篇 教育学
  • 551 篇 文学
  • 279 篇 军事学
  • 121 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,692 篇 accuracy
  • 2,995 篇 deep learning
  • 2,850 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,686 篇 machine learning
  • 2,600 篇 computational mo...
  • 2,243 篇 training
  • 1,853 篇 real-time system...
  • 1,817 篇 internet of thin...
  • 1,807 篇 support vector m...
  • 1,741 篇 convolutional ne...
  • 1,717 篇 predictive model...
  • 1,573 篇 artificial intel...
  • 1,403 篇 optimization
  • 1,381 篇 neural networks
  • 1,332 篇 wireless sensor ...
  • 1,240 篇 data mining
  • 1,217 篇 bandwidth
  • 1,204 篇 computer archite...
  • 1,197 篇 security

机构

  • 1,092 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 963 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 766 篇 university of ch...
  • 645 篇 department of el...
  • 638 篇 chitkara univers...
  • 609 篇 infn laboratori ...
  • 605 篇 infn sezione di ...
  • 584 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 549 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 524 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 513 篇 imperial college...
  • 509 篇 nikhef national ...
  • 504 篇 stfc rutherford ...

作者

  • 256 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 beiter a.
  • 231 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 g. spigo
  • 216 篇 boettcher t.
  • 213 篇 brundu d.

语言

  • 118,825 篇 英文
  • 7,382 篇 其他
  • 1,384 篇 中文
  • 119 篇 日文
  • 17 篇 法文
  • 15 篇 德文
  • 14 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute and Department of Computer Engineering and Informatics"
127564 条 记 录,以下是731-740 订阅
排序:
Movie Recommendation Using Web Crawling  2nd
Movie Recommendation Using Web Crawling
收藏 引用
2nd International Conference on Applied Algorithms, ICAA 2025
作者: Raj, Pronit Kumar, Chandrashekhar Shekhar, Harshit Kumar, Amit Paul, Kritibas Jana, Debasish Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India
In today’s digital world, streaming platforms offer a vast array of movies, making it hard for users to find content matching their preferences. This paper explores integrating real-time data from popular movie websi... 详细信息
来源: 评论
A new hybrid MobileNet-MLP model for secured data communication using signature verification and deep learning
收藏 引用
Iran Journal of computer Science 2024年 第1期8卷 233-252页
作者: Pandiyaraju, V. Ganapathy, Sannasi Thangaramya, K. Nahar, R. Raunak Kannan, A. School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department Computer Science and Engineering Education National Institute of Technical Teachers Training and Research (NITTTR) Bhopal India School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Signature verification plays a critical role in various industries, including finance and document authentication. However, traditional verification techniques have limitations, such as a lack of robustness and an ina... 详细信息
来源: 评论
Evaluating CUDA-Aware Approximate Computing Techniques  3
Evaluating CUDA-Aware Approximate Computing Techniques
收藏 引用
3rd International Workshop on Resource AWareness of Systems and Society, RAW 2024
作者: Öz, Işıl Computer Engineering Department Izmir Institute of Technology Izmir Turkey
Approximate computing techniques offer performance improvements by performing inexact computations. Moreover, CUDA programs written to be executed on GPU devices employ specific features to utilize the parallel comput... 详细信息
来源: 评论
Optimizing NOMA Transmissions to Advance Federated Learning in Vehicular Networks
Optimizing NOMA Transmissions to Advance Federated Learning ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Chen, Ziru Ni, Zhou Guan, Peiyuan Wang, Lu Cai, Lin X. Hashemi, Morteza Li, Zongzhi Illinois Institute of Technology Department of Electrical and Computer Engineering Chicago United States University of Kansas Department of Electrical Engineering and Computer Science Lawrence United States University of Oslo Department of Informatics Oslo Norway Illinois Institute of Technology Department of Civil Engineering Chicago United States
Diverse critical data, such as location information and driving patterns, can be collected by IoT devices in vehicular networks to improve driving experiences and road safety. However, drivers are often reluctant to s... 详细信息
来源: 评论
Machine Learning Models for Forest Fire Detection  5
Machine Learning Models for Forest Fire Detection
收藏 引用
5th International Conference on Data Intelligence and Cognitive informatics, ICDICI 2024
作者: Kulkarni, Radhika V. Kamble, Ruchita Joshi, Soham Jaiswal, Priten Jumbad, Varad Vishwakarma Institute of Technology Department of Computer Engineering Pune India
One of the most serious natural disasters endangering forest resources and areas is forest fires. Decreased casualties and enhanced firefighting depend on precise and timely forest fire detection. Due to their relianc... 详细信息
来源: 评论
Self-supervised few-shot medical image segmentation with spatial transformations
收藏 引用
Neural Computing and Applications 2024年 第30期36卷 18675-18691页
作者: Titoriya, Ankit Kumar Singh, Maheshwari Prasad Singh, Amit Kumar Department of Computer Science & amp Engineering National Institute of Technology Patna Ashok Rajpath Bihar Patna800005 India
Deep learning-based segmentation models often struggle to achieve optimal performance when encountering new, unseen semantic classes. Their effectiveness hinges on vast amounts of annotated data and high computational... 详细信息
来源: 评论
Workout Pose Correction System using KNIFT  6
Workout Pose Correction System using KNIFT
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Uke, Shailaja Ghote, Varad Mundhe, Ved Thorat, Shreyas Patil, Ujjwal Vishwakarma Institute of Technology Department of Computer Engineering Pune India
This paper proposes a system to assist users in performing exercise workouts by implementing MediaPipe Keypoint Neural Invariant Feature Transform (KNIFT). Exercise requires proper directions to follow as improper mov... 详细信息
来源: 评论
NRASV: Noise Robust ASV System for Audio Replay Attack Detection  5th
NRASV: Noise Robust ASV System for Audio Replay Attack Detec...
收藏 引用
5th International Conference on Deep Learning, Artificial Intelligence and Robotics, ICDLAIR 2023
作者: Chakravarty, Nidhi Dua, Mohit Department of Computer Engineering National Institute of Technology Kurukshetra India
Recent advancements in researching countermeasure systems against audio replay attacks have notably bolstered the resilience of Automatic Speaker Verification (ASV) Systems. However, current countermeasures face chall... 详细信息
来源: 评论
Blockchain-Driven Academic Learning Record Management in Higher Education: A Comprehensive Review of Methodologies, Applications, Benefits, and Challenges
收藏 引用
SN computer Science 2025年 第5期6卷 1-33页
作者: Chaudhari, Sheetal Shirole, Mahesh Computer Science and Engineering Department Sardar Patel Institute of Technology Andheri Maharashtra Mumbai 400058 India Computer Engineering and Information Technology Department Veermata Jijabai Technological Institute Matunga Maharashtra Mumbai 400031 India
Blockchain technology has the potential to revolutionize the education sector by improving the legitimacy and security of academic procedures. The academic learning record management records the learner’s academic qu... 详细信息
来源: 评论
CamoVeil: Digital Camouflage Pattern Generation System  1
收藏 引用
2nd International Conference on Advances in Data-driven Computing and Intelligent Systems, ADCIS 2023
作者: Ganganwar, Vaishali Rajput, Parshant Bhavana, N. Sinha, Swapnil Vaid, Aashna Department of Computer Engineering Army Institute of Technology Pune India
Camouflage is the art of concealing. It is widely used to conceal your own self and your equipment from the enemy. It had been in nature since before humans, animals have used it to adapt to their surroundings. Camouf... 详细信息
来源: 评论