咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,121 篇 期刊文献
  • 1,294 册 图书

馆藏范围

  • 127,735 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,423 篇 工学
    • 45,709 篇 计算机科学与技术...
    • 36,722 篇 软件工程
    • 18,477 篇 信息与通信工程
    • 11,982 篇 控制科学与工程
    • 11,843 篇 电气工程
    • 11,547 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,018 篇 生物医学工程(可授...
    • 6,680 篇 光学工程
    • 5,034 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,472 篇 仪器科学与技术
    • 4,417 篇 材料科学与工程(可...
    • 4,332 篇 动力工程及工程热...
    • 3,181 篇 网络空间安全
    • 2,940 篇 安全科学与工程
  • 43,183 篇 理学
    • 19,300 篇 数学
    • 16,640 篇 物理学
    • 9,498 篇 生物学
    • 6,356 篇 统计学(可授理学、...
    • 5,180 篇 化学
    • 4,677 篇 系统科学
  • 17,494 篇 管理学
    • 11,005 篇 管理科学与工程(可...
    • 7,248 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,074 篇 医学
    • 5,856 篇 临床医学
    • 5,271 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,002 篇 公共卫生与预防医...
  • 3,447 篇 法学
    • 2,823 篇 社会学
  • 2,210 篇 经济学
  • 1,839 篇 农学
  • 1,141 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,792 篇 accuracy
  • 3,039 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,823 篇 computer science
  • 2,694 篇 machine learning
  • 2,653 篇 computational mo...
  • 2,272 篇 training
  • 1,932 篇 real-time system...
  • 1,842 篇 support vector m...
  • 1,837 篇 internet of thin...
  • 1,770 篇 convolutional ne...
  • 1,762 篇 predictive model...
  • 1,584 篇 artificial intel...
  • 1,440 篇 optimization
  • 1,384 篇 neural networks
  • 1,340 篇 wireless sensor ...
  • 1,261 篇 data mining
  • 1,223 篇 security
  • 1,217 篇 bandwidth
  • 1,202 篇 computer archite...

机构

  • 1,087 篇 cavendish labora...
  • 1,020 篇 department of ph...
  • 962 篇 physikalisches i...
  • 950 篇 oliver lodge lab...
  • 765 篇 university of ch...
  • 646 篇 department of el...
  • 635 篇 chitkara univers...
  • 604 篇 infn laboratori ...
  • 603 篇 infn sezione di ...
  • 583 篇 infn sezione di ...
  • 559 篇 infn sezione di ...
  • 549 篇 school of physic...
  • 546 篇 fakultät physik ...
  • 535 篇 horia hulubei na...
  • 526 篇 department of ph...
  • 523 篇 school of physic...
  • 511 篇 imperial college...
  • 510 篇 h.h. wills physi...
  • 502 篇 stfc rutherford ...
  • 501 篇 nikhef national ...

作者

  • 258 篇 barter w.
  • 257 篇 a. gomes
  • 244 篇 c. alexa
  • 240 篇 j. m. izen
  • 236 篇 beiter a.
  • 235 篇 c. amelung
  • 235 篇 j. wang
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 232 篇 blake t.
  • 231 篇 s. chen
  • 225 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 219 篇 borsato m.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 110,503 篇 英文
  • 15,903 篇 其他
  • 1,428 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Technology Institute and Department of Computer Engineering and Informatics"
127735 条 记 录,以下是971-980 订阅
排序:
Enhancing intrusion detection in IIoT: optimized CNN model with multi-class SMOTE balancing
收藏 引用
Neural Computing and Applications 2024年 第24期36卷 14643-14659页
作者: Eid, Abdulrahman Mahmoud Soudan, Bassel Nassif, Ali Bou Injadat, MohammadNoor Department of Computer Engineering College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Department of Data Science and AI Faculty of Information Technology Zarqa University Zarqa Jordan
This work introduces an intrusion detection system (IDS) tailored for industrial internet of things (IIoT) environments based on an optimized convolutional neural network (CNN) model. The model is trained on a dataset... 详细信息
来源: 评论
A Hybrid Natural Language Processing (HNLP) for Model Transformation  5
A Hybrid Natural Language Processing (HNLP) for Model Transf...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Madhavi, Banka Chaithanya, T. Rama Babu, S. Giri Pace Institute of Technology Sciences Department of Computer Science & Engineering AP Ongole India Pace Institute of Technology Sciences Department of Computer Science & Engineering AP Ongole India
Model-to-model transformations involve converting one type of the model into another. This can be used in many ways for various reasons, considering model performance with particular deployment platforms. This paper i... 详细信息
来源: 评论
Detecting Communities Using Network Embedding and Graph Clustering Approach  6th
Detecting Communities Using Network Embedding and Graph Clus...
收藏 引用
6th International Conference on Soft Computing and Signal Processing, ICSCSP 2023
作者: Bhattacharya, Riju Nagwani, Naresh Kumar Tripathi, Sarsij Department of Computer Science and Engineering National Institute of Technology Raipur Raipur India Department of Computer Science and Engineering Motilal Nehru National Institute of Technology Allahabad Allahabad India
Complex network community structure has been shown effective in many fields, including biology, social media, health, and more. Researchers have explored many different techniques for studying complex networks and dis... 详细信息
来源: 评论
Analyzing Sentiments: A Comprehensive Study of Roberta-Based Sentiment Analysis on Twitters  4
Analyzing Sentiments: A Comprehensive Study of Roberta-Based...
收藏 引用
4th International Conference on Advancement in Electronics and Communication engineering, AECE 2024
作者: Krishnamoorthy, A. Sundhar, K.A. Naveen Kumar, V. Karthik, V. Vellore Institute of Technology School of Computer Science & Engineering Tamil Nadu India Vellore Institute of Technology Department of Computer Science Engineering Tamil Nadu India
Social media platforms have become essential avenues for individuals to express opinions and emotions across diverse topics such as products, events, and policies, using both text and emojis. Understanding these senti... 详细信息
来源: 评论
Adversarial Robustness in DeepFake Detection: Enhancing Model Resilience with Defensive Strategies  4
Adversarial Robustness in DeepFake Detection: Enhancing Mode...
收藏 引用
4th International Conference on Intelligent Cybernetics technology and Applications, ICICyTA 2024
作者: Pallavi, N. Pallavi, T.P. Bylaiah, Sushma Goutam, R. M S Ramaiah Institute of Technology Department of Computer Science and Engineering Karnataka India Karnataka India Atria Institute of Technology Department of Computer Science and Engineering Karnataka India
Detection of DeepFakes presents formidable challenges primarily due to adversarial attacks that can dramatically reduce model accuracy. Current detection models are reasonably effective in real scenarios;however, thes... 详细信息
来源: 评论
Deep Learning Based Automated Lip Reading for Deaf  3
Deep Learning Based Automated Lip Reading for Deaf
收藏 引用
3rd International Conference for Advancement in technology, ICONAT 2024
作者: Prathyakshini Prathwini Pratheeksha Hegde, N. Vaishali Rashmi, N. Kumar, Archana Praveen NMAM Institute of Technology Department of Information Science and Engineering Karkala Nitte India NMAM Institute of Technology Department of Master of Computer Applications Karkala Nitte India NMAM Institute of Technology Department of Computer Science and Engineering Karkala Nitte India Manipal Academy of Education Manipal Institute of Technology Department of Computer Science and Engineering India
Speech recognition systems play an integral role in numerous applications, from virtual assistants to accessibility tools. This paper offers a new viewpoint to speech recognition utilizing computer vision and deep lea... 详细信息
来源: 评论
Multilevel Thresholding-based Medical Image Segmentation using Hybrid Particle Cuckoo Swarm Optimization
收藏 引用
Recent Advances in computer Science and Communications 2024年 第5期17卷 12-23页
作者: Kumar, Dharmendra Solanki, Anil Kumar Ahlawat, Anil Kumar Department of Computer Science & Engineering KIET Group of Institutions NCR Delhi Ghaziabad India Department of Computer Science & Engineering Bundelkhand Institute of Engineering and Technology Jhansi India Affiliated to Dr. APJ Abdul Kalam Technical University Lucknow India
Background: The most important aspect of medical image processing and analysis is image segmentation. Fundamentally, the outcomes of segmentation have an impact on all subsequent image testing methods, including objec... 详细信息
来源: 评论
Vulnerability Analysis on Third Party Application  2
Vulnerability Analysis on Third Party Application
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Supreetha, H.H. Rajani Suma, H.C. Divya, K.P. Suhasini Computer Science Engineering Department Acharya Institute of Technology bangalore India Electronics Engineering Department BGSIT Institute of Technology BG Nagar India Computer Science Engineering Department Maharaja Institute of Technology Mysore India Electronics Engineering Department Bangalore Institute of Technology Bangalore India
Road traffic has been an open challenge in a highly-populated area in the world. India is one of them where traffic management is a crucial problem to solve. Road traffic congestion, traffic rule violation, road accid... 详细信息
来源: 评论
Kookaburra Optimization Algorithm and Feature Aggregated Region based Differential network for Colon Cancer Detection from Histopathological Images  8
Kookaburra Optimization Algorithm and Feature Aggregated Reg...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Gowthamy, J. Ramesh, S.S. Subashka Rm Institute of Science and Technology Amapuram Department of Computer Science and Engineering Chennai India Srm Institute of Science and Technology Ramapuram Department of Computer Science and Engineering Chennai India
Colon cancer is a significant health concern, ranking as the third leading cause of cancer-related deaths in men and the second in women. Early detection is crucial in reducing the incidence and mortality rates associ... 详细信息
来源: 评论
Improved Software Fault Prediction Model Based on Optimal Features Set and Threshold Values Using Metaheuristic Approach
收藏 引用
SN computer Science 2023年 第6期4卷 1-12页
作者: Singh, Manpreet Chhabra, Jitender Kumar Computer Engineering Department National Institute of Technology Kurukshetra India
Software fault prediction models are very important to prioritize software classes for effective testing and efficient use of resources so that the testing process’s time, effort, and cost can be reduced. Fault predi... 详细信息
来源: 评论