咨询与建议

限定检索结果

文献类型

  • 278,980 篇 会议
  • 113,923 篇 期刊文献
  • 2,855 册 图书

馆藏范围

  • 395,757 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 228,623 篇 工学
    • 152,200 篇 计算机科学与技术...
    • 123,333 篇 软件工程
    • 55,249 篇 信息与通信工程
    • 36,225 篇 控制科学与工程
    • 31,924 篇 电气工程
    • 30,844 篇 电子科学与技术(可...
    • 26,419 篇 生物工程
    • 20,831 篇 生物医学工程(可授...
    • 18,184 篇 光学工程
    • 15,581 篇 机械工程
    • 13,211 篇 化学工程与技术
    • 12,395 篇 仪器科学与技术
    • 12,305 篇 动力工程及工程热...
    • 10,893 篇 材料科学与工程(可...
    • 8,483 篇 安全科学与工程
    • 7,938 篇 网络空间安全
  • 129,405 篇 理学
    • 64,361 篇 数学
    • 42,386 篇 物理学
    • 29,896 篇 生物学
    • 20,872 篇 统计学(可授理学、...
    • 15,110 篇 系统科学
    • 14,121 篇 化学
  • 57,063 篇 管理学
    • 34,345 篇 管理科学与工程(可...
    • 24,950 篇 图书情报与档案管...
    • 17,032 篇 工商管理
  • 19,722 篇 医学
    • 16,561 篇 临床医学
    • 14,888 篇 基础医学(可授医学...
    • 9,316 篇 药学(可授医学、理...
    • 7,980 篇 公共卫生与预防医...
  • 10,767 篇 法学
    • 8,808 篇 社会学
  • 6,585 篇 经济学
  • 5,245 篇 农学
  • 4,263 篇 教育学
  • 1,890 篇 文学
  • 894 篇 军事学
  • 513 篇 艺术学
  • 77 篇 哲学
  • 46 篇 历史学

主题

  • 20,093 篇 computer science
  • 9,275 篇 accuracy
  • 8,867 篇 computational mo...
  • 8,105 篇 feature extracti...
  • 7,737 篇 deep learning
  • 7,381 篇 machine learning
  • 6,623 篇 training
  • 5,358 篇 data mining
  • 5,239 篇 support vector m...
  • 5,212 篇 computer archite...
  • 5,018 篇 predictive model...
  • 4,956 篇 wireless sensor ...
  • 4,702 篇 costs
  • 4,577 篇 application soft...
  • 4,577 篇 optimization
  • 4,548 篇 bandwidth
  • 4,419 篇 protocols
  • 4,408 篇 testing
  • 4,390 篇 algorithm design...
  • 4,336 篇 real-time system...

机构

  • 1,703 篇 department of co...
  • 1,356 篇 department of co...
  • 1,340 篇 department of el...
  • 1,175 篇 department of el...
  • 1,058 篇 cavendish labora...
  • 972 篇 department of ph...
  • 918 篇 department of co...
  • 843 篇 physikalisches i...
  • 839 篇 oliver lodge lab...
  • 820 篇 department of el...
  • 744 篇 university of ch...
  • 639 篇 department of co...
  • 551 篇 department of co...
  • 532 篇 chitkara univers...
  • 527 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 505 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 486 篇 infn sezione di ...
  • 484 篇 department of co...

作者

  • 250 篇 barter w.
  • 243 篇 j. wang
  • 243 篇 s. chen
  • 228 篇 a. gomes
  • 223 篇 blake t.
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 216 篇 amato s.
  • 215 篇 betancourt c.
  • 214 篇 c. alexa
  • 214 篇 boettcher t.
  • 213 篇 borsato m.
  • 210 篇 j. m. izen
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 202 篇 bencivenni g.
  • 193 篇 bay a.
  • 192 篇 c. amelung
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 371,887 篇 英文
  • 20,130 篇 其他
  • 3,785 篇 中文
  • 220 篇 日文
  • 56 篇 德文
  • 36 篇 法文
  • 34 篇 朝鲜文
  • 24 篇 斯洛文尼亚文
  • 14 篇 西班牙文
  • 7 篇 俄文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Applications and Department of Computer Science & Engineering"
395758 条 记 录,以下是201-210 订阅
排序:
A Hybrid Model for Parameter Tuning using SSO and CNN  3
A Hybrid Model for Parameter Tuning using SSO and CNN
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Patidar, Anil Bandhu, Kailash Chandra Department of Computer Applications Medi-Caps University Indore India Department of Computer Science and Engineering Medi-Caps University Indore India
Social Spider Optimization (SSO) and Particle Swarm Optimization (PSO) algorithms applied to Intrusion Detection Systems (IDS) across small and large datasets. The study aims to evaluate and compare both PSO and SSO a... 详细信息
来源: 评论
Deep learning approaches to address cold start and long tail challenges in recommendation systems: a systematic review
收藏 引用
Multimedia Tools and applications 2025年 第5期84卷 2293-2325页
作者: Jangid, Manisha Kumar, Rakesh Department of Computer Science & Engineering Central University of Haryana Haryana India
Recommendation systems (RS) have become prevalent across different domains including music, e-commerce, e-learning, entertainment, and social media to address the issue of information overload. While traditional RS ap... 详细信息
来源: 评论
Low-light image enhancement using the illumination boost algorithm along with the SKWGIF method
收藏 引用
Multimedia Tools and applications 2025年 第17期84卷 18651-18685页
作者: Radmand, Elnaz Saberi, Erfan Sorkhi, Ali Ghanbari Pirgazi, Jamshid Department of Computer Engineering University of Science and Technology of Mazandaran Behshahr Iran
Low-light image enhancement is highly desirable for outdoor image processing and computer vision applications. Research conducted in recent years has shown that images taken in low-light conditions often pose two main... 详细信息
来源: 评论
An ensemble based approach for violence detection in videos using deep transfer learning
收藏 引用
Multimedia Tools and applications 2025年 第12期84卷 11001-11025页
作者: Kaur, Gurmeet Singh, Sarbjeet Department of Computer Science and Engineering UIET Panjab University Chandigarh India
The detection of violence in videos has become an extremely valuable application in real-life situations, which aim to maintain and protect people’s safety. Despite the complexities inherent in videos and the abrupt ... 详细信息
来源: 评论
Security-Based Hook Curve Master Node Key Authentication (HC-MNKA) Using Shuffle Standard Padding Encryption Crypto Policy (S2PES)
收藏 引用
SN computer science 2024年 第1期5卷 26页
作者: Vijayalakshmi, V. Sharmila, K. Department of Computer Science VISTAS Chennai 600117 India Department of Computer Science and Computer Applications Lakshmi Bangaru Arts and Science College Melmaruvathur 603 319 India
Nowadays, IoT is growing rapidly and is a security concern as there are multiple security policy violations. Furthermore, blockchain development has grown rapidly since Bitcoin first became popular. IoT security issue... 详细信息
来源: 评论
Identification of Human Activity from Video Streaming Smartphone Data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
Implementation of ANN and response surface method for dual-fuel CI engine optimization and prediction using water infusion and biofuel
收藏 引用
Multimedia Tools and applications 2025年 1-43页
作者: Pramanik, Sabyasachi Department of Computer Science & Engineering Haldia Institute of Technology Haldia India
In this study, tests were done to see what would happen if hydrogen (H2) and lemon grass oil (LO) were used for a lone-cylinder compression ignition engine as a partial diesel replacement. After starting the trial wit... 详细信息
来源: 评论
Deep learning approaches and biomarkers in medical diagnosis
收藏 引用
Recent Patents on engineering 2024年 第3期18卷 13-26页
作者: Malik, Pardeep Singh, Sukhdip Computer Science and Engineering Department DCRUST Haryana Sonipat India
The size of the medical information system is growing gradually. Due to this, traditional data analysis for extracting helpful information for any disease has become inefficient in providing accurate real-time valid i... 详细信息
来源: 评论
Deep-BERT:Transfer Learning for Classifying Multilingual Offensive Texts on Social Media
收藏 引用
computer Systems science & engineering 2023年 第2期44卷 1775-1791页
作者: Md.Anwar Hussen Wadud M.F.Mridha Jungpil Shin Kamruddin Nur Aloke Kumar Saha Department of Computer Science and Engineering Bangladesh University of Business and TechnologyDhakaBangladesh School of Computer Science and Engineering University of AizuAizuwakamatsuJapan Department of Computer Science American International University-BangladeshDhakaBangladesh Department of Computer Science and Engineering University of Asia PacificDhakaBangladesh
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni... 详细信息
来源: 评论
Improving social interaction of the visually impaired individuals through conversational assistive technology
收藏 引用
International Journal of Intelligent Computing and Cybernetics 2024年 第1期17卷 126-142页
作者: Komal Ghafoor Tauqir Ahmad Muhammad Aslam Samyan Wahla Department of Computer Science University of Engineering and TechnologyLahorePakistan
Purpose:Assistive technology has been developed to assist the visually impaired individuals in their social *** designed to enhance communication skills,facilitate social engagement and improve the overall quality of ... 详细信息
来源: 评论