咨询与建议

限定检索结果

文献类型

  • 88,090 篇 会议
  • 38,173 篇 期刊文献
  • 1,299 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,564 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,078 篇 工学
    • 45,767 篇 计算机科学与技术...
    • 36,827 篇 软件工程
    • 18,496 篇 信息与通信工程
    • 11,996 篇 控制科学与工程
    • 11,681 篇 电气工程
    • 11,392 篇 电子科学与技术(可...
    • 8,284 篇 生物工程
    • 7,037 篇 生物医学工程(可授...
    • 6,815 篇 光学工程
    • 5,038 篇 机械工程
    • 4,629 篇 化学工程与技术
    • 4,494 篇 仪器科学与技术
    • 4,339 篇 动力工程及工程热...
    • 4,085 篇 材料科学与工程(可...
    • 3,177 篇 网络空间安全
    • 2,949 篇 安全科学与工程
  • 43,255 篇 理学
    • 19,269 篇 数学
    • 16,657 篇 物理学
    • 9,507 篇 生物学
    • 6,299 篇 统计学(可授理学、...
    • 5,176 篇 化学
    • 4,680 篇 系统科学
  • 17,515 篇 管理学
    • 11,018 篇 管理科学与工程(可...
    • 7,247 篇 图书情报与档案管...
    • 5,365 篇 工商管理
  • 7,129 篇 医学
    • 5,903 篇 临床医学
    • 5,301 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,029 篇 公共卫生与预防医...
  • 3,452 篇 法学
    • 2,825 篇 社会学
  • 2,222 篇 经济学
  • 1,855 篇 农学
  • 1,145 篇 教育学
  • 551 篇 文学
  • 279 篇 军事学
  • 121 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,692 篇 accuracy
  • 2,995 篇 deep learning
  • 2,850 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,686 篇 machine learning
  • 2,600 篇 computational mo...
  • 2,243 篇 training
  • 1,853 篇 real-time system...
  • 1,817 篇 internet of thin...
  • 1,807 篇 support vector m...
  • 1,741 篇 convolutional ne...
  • 1,717 篇 predictive model...
  • 1,573 篇 artificial intel...
  • 1,403 篇 optimization
  • 1,381 篇 neural networks
  • 1,332 篇 wireless sensor ...
  • 1,240 篇 data mining
  • 1,217 篇 bandwidth
  • 1,204 篇 computer archite...
  • 1,197 篇 security

机构

  • 1,092 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 963 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 766 篇 university of ch...
  • 645 篇 department of el...
  • 638 篇 chitkara univers...
  • 609 篇 infn laboratori ...
  • 605 篇 infn sezione di ...
  • 584 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 549 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 524 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 513 篇 imperial college...
  • 509 篇 nikhef national ...
  • 504 篇 stfc rutherford ...

作者

  • 256 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 beiter a.
  • 231 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 g. spigo
  • 216 篇 boettcher t.
  • 213 篇 brundu d.

语言

  • 118,825 篇 英文
  • 7,382 篇 其他
  • 1,384 篇 中文
  • 119 篇 日文
  • 17 篇 法文
  • 15 篇 德文
  • 14 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute and Department of Computer Engineering and Informatics"
127564 条 记 录,以下是741-750 订阅
排序:
Cross-Layer Distributed Attack Detection Model for the IoT
收藏 引用
International Journal of Ambient Computing and Intelligence 2022年 第1期13卷 1-17页
作者: Ahmed, Hassan I. Nasr, Abdurrahman A. Abdel-Mageid, Salah M. Aslan, Heba K. Informatics Department Electronics Research Institute Cairo Egypt Computer Engineering Faculty of Engineering Al-Azhar University Cairo Egypt Computer Engineering Department College of Computer Science and Engineering Taibah University Saudi Arabia Center of Informatics Science Faculty of Information Technology and Computer Science Nile University Egypt
The security of IoT that is based on layered approaches has shortcomings such as the redundancy, inflexibility, and inefficiently of security solutions. There are many harmful attacks in IoT networks such as DoS and D... 详细信息
来源: 评论
FoodSavior: Distributing Surplus Food to NGOs or Manure Producers Using Internet of Things and Machine Learning  5
FoodSavior: Distributing Surplus Food to NGOs or Manure Prod...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Uke, Shailaja Jadhav, Prithviraj Kakarwal, Urmila Kolawale, Sanika Nikam, Vivek Vishwakarma Institute of Technology Department of Computer Engineering Pune India
By evaluating the quality of leftover food and enabling its best possible redistribution, this research presents a novel approach to addressing food waste in the restaurant sector. The system uses a Flutter an Dart-ba... 详细信息
来源: 评论
EssayDetect at GenAI Detection Task 2: Guardians of Academic Integrity: Multilingual Detection of AI-Generated Essays  1
EssayDetect at GenAI Detection Task 2: Guardians of Academic...
收藏 引用
1st Workshop on GenAI Content Detection, GenAIDetect 2025
作者: Agrahari, Shifali Jayant, Subhashi Kumar, Saurabh Singh, Sanasam Ranbir Department of Computer Science and Engineering Indian Institute of Technology Guwahati India
Detecting AI-generated text in the field of academia is becoming very prominent. This paper presents a solution for Task 2: AI vs. Human - Academic Essay Authenticity Challenge in the COLING 2025 DAIGenC Workshop1. Th... 详细信息
来源: 评论
Automated Building Damage Detection Post Hurricane: Enhancing Accuracy using Hybrid Ensemble Model  5
Automated Building Damage Detection Post Hurricane: Enhancin...
收藏 引用
5th International Conference on Data Intelligence and Cognitive informatics, ICDICI 2024
作者: Kulkarni, Radhika V. Mude, Vedant Nagrale, Rutuj Nirgude, Aarya Nirmal, Tejashri Vishwakarma Institute of Technology Department of Computer Engineering Pune India
One of the most destructive natural disasters, hurricanes destroy a great deal of property, harm people, and disrupt the ecosystem and world economy. Earlier, through ground surveys, the impact of the hurricane was me... 详细信息
来源: 评论
Ethereum-Based Decentralized Crowdfunding Platform  6th
Ethereum-Based Decentralized Crowdfunding Platform
收藏 引用
6th International Conference on Innovative Computing and Communication, ICICC 2023
作者: Jadhav, Swati Patil, Rohit Patil, Saee Patil, Shweta Patil, Varun Department of Computer Engineering Vishwakarma Institute of Technology Pune India
Crowdfunding refers to investments of people in some projects and businesses. Sometimes, it also refers to donations from people for societal goodness. Many online platforms are available that support crowdfunding for... 详细信息
来源: 评论
Using Website Content for Detecting Phishing URLs: A Novel Approach  1
收藏 引用
2nd International Conference on Advances in Data-driven Computing and Intelligent Systems, ADCIS 2023
作者: Ganganwar, Vaishali Hussain, Syed Iarshed Powar, Ankur Gaur, Shushant Kumar, Amit Department of Computer Engineering Army Institute of Technology Pune India
Phishing attacks have become a rampant cybercrime, where hackers use deceptive methods to trick individuals into sharing their personal information. However, with the advent of AI models like ChatGPT, detecting phishi... 详细信息
来源: 评论
Traceability of Counterfeit Product Detection in Supply Chain through Blockchain  15
Traceability of Counterfeit Product Detection in Supply Chai...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Asthagi, Rashmi Kedar, Shardul Khatal, Shruti Khardekar, Sujal Khaple, Siddesh Vishwakarma Institute of Technology Department of Computer Engineering Pune India
In recent years, industries involved in manufacturing products have experienced an increasing reliance on counterfeit items. This phenomenon significantly impacts businesses' sales and profits. To address this cha... 详细信息
来源: 评论
Improved Energy Efficient Divergent Path Routing for Energy-Harvesting Wireless Sensor Networks  9
Improved Energy Efficient Divergent Path Routing for Energy-...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Sivakumar, S. Sabaresan, V. Prakash, S. Om Dharmaraj, T.B. Nehru Institute of Engineering and Technology Department of Computer Science and Engineering India St.Joseph's Institute of Technology Department of Computer Science and Engineering India Ppg Institute of Technology Department of Mechanical Engineering India Ppg Institute of Technology Department of Information Technology India
Since packets are dropped when there is an insufficient connection between each of the sensor nodes in the network, a sensor node in a sensor network is unable to efficiently aggregate the data packets. Since each are... 详细信息
来源: 评论
Bettercall: AI based legal assistant  5
Bettercall: AI based legal assistant
收藏 引用
5th International Conference on Image Processing and Capsule Networks, ICIPCN 2024
作者: Dhore, Manikrao Vimal, Aryan Agrawal, Avish Bajaj, Raghav Barde, Rohan Vishwakarma Institute of Technology Department of Computer Engineering Pune India
This research introduces an AI-based chat-bot designed to enhance access to legal and judicial information in India. The system leverages advanced natural language processing techniques to transform legal texts into v... 详细信息
来源: 评论
AI-Driven Glaucoma Susceptibility Assessment and Lifestyle Guidance  5th
AI-Driven Glaucoma Susceptibility Assessment and Lifestyle G...
收藏 引用
5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024
作者: Talla, Ganesh Venkata Sundar Akhil, Toram Rajeev Thatikonda, Surendra potnuru, Tarun Lalitha, Chirravuri Surya Naga Sai Bonthu, Sridevi Department of Computer Science and Engineering Vishnu Institute of Technology Bhimavaram India
This project addresses the global health challenge posed by glaucoma through the development of an innovative Python-based application. Utilizing advanced machine learning techniques, specifically the VGG16 model with... 详细信息
来源: 评论