咨询与建议

限定检索结果

文献类型

  • 278,980 篇 会议
  • 113,923 篇 期刊文献
  • 2,855 册 图书

馆藏范围

  • 395,757 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 228,623 篇 工学
    • 152,200 篇 计算机科学与技术...
    • 123,333 篇 软件工程
    • 55,249 篇 信息与通信工程
    • 36,225 篇 控制科学与工程
    • 31,924 篇 电气工程
    • 30,844 篇 电子科学与技术(可...
    • 26,419 篇 生物工程
    • 20,831 篇 生物医学工程(可授...
    • 18,184 篇 光学工程
    • 15,581 篇 机械工程
    • 13,211 篇 化学工程与技术
    • 12,395 篇 仪器科学与技术
    • 12,305 篇 动力工程及工程热...
    • 10,893 篇 材料科学与工程(可...
    • 8,483 篇 安全科学与工程
    • 7,938 篇 网络空间安全
  • 129,405 篇 理学
    • 64,361 篇 数学
    • 42,386 篇 物理学
    • 29,896 篇 生物学
    • 20,872 篇 统计学(可授理学、...
    • 15,110 篇 系统科学
    • 14,121 篇 化学
  • 57,063 篇 管理学
    • 34,345 篇 管理科学与工程(可...
    • 24,950 篇 图书情报与档案管...
    • 17,032 篇 工商管理
  • 19,722 篇 医学
    • 16,561 篇 临床医学
    • 14,888 篇 基础医学(可授医学...
    • 9,316 篇 药学(可授医学、理...
    • 7,980 篇 公共卫生与预防医...
  • 10,767 篇 法学
    • 8,808 篇 社会学
  • 6,585 篇 经济学
  • 5,245 篇 农学
  • 4,263 篇 教育学
  • 1,890 篇 文学
  • 894 篇 军事学
  • 513 篇 艺术学
  • 77 篇 哲学
  • 46 篇 历史学

主题

  • 20,093 篇 computer science
  • 9,275 篇 accuracy
  • 8,867 篇 computational mo...
  • 8,105 篇 feature extracti...
  • 7,737 篇 deep learning
  • 7,381 篇 machine learning
  • 6,623 篇 training
  • 5,358 篇 data mining
  • 5,239 篇 support vector m...
  • 5,212 篇 computer archite...
  • 5,018 篇 predictive model...
  • 4,956 篇 wireless sensor ...
  • 4,702 篇 costs
  • 4,577 篇 application soft...
  • 4,577 篇 optimization
  • 4,548 篇 bandwidth
  • 4,419 篇 protocols
  • 4,408 篇 testing
  • 4,390 篇 algorithm design...
  • 4,336 篇 real-time system...

机构

  • 1,703 篇 department of co...
  • 1,356 篇 department of co...
  • 1,340 篇 department of el...
  • 1,175 篇 department of el...
  • 1,058 篇 cavendish labora...
  • 972 篇 department of ph...
  • 918 篇 department of co...
  • 843 篇 physikalisches i...
  • 839 篇 oliver lodge lab...
  • 820 篇 department of el...
  • 744 篇 university of ch...
  • 639 篇 department of co...
  • 551 篇 department of co...
  • 532 篇 chitkara univers...
  • 527 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 505 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 486 篇 infn sezione di ...
  • 484 篇 department of co...

作者

  • 250 篇 barter w.
  • 243 篇 j. wang
  • 243 篇 s. chen
  • 228 篇 a. gomes
  • 223 篇 blake t.
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 216 篇 amato s.
  • 215 篇 betancourt c.
  • 214 篇 c. alexa
  • 214 篇 boettcher t.
  • 213 篇 borsato m.
  • 210 篇 j. m. izen
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 202 篇 bencivenni g.
  • 193 篇 bay a.
  • 192 篇 c. amelung
  • 190 篇 g. bella
  • 190 篇 j. strandberg

语言

  • 371,887 篇 英文
  • 20,130 篇 其他
  • 3,785 篇 中文
  • 220 篇 日文
  • 56 篇 德文
  • 36 篇 法文
  • 34 篇 朝鲜文
  • 24 篇 斯洛文尼亚文
  • 14 篇 西班牙文
  • 7 篇 俄文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Applications and Department of Computer Science & Engineering"
395758 条 记 录,以下是4991-5000 订阅
排序:
HybridViT: An Approach for Alzheimer’s Disease Classification with ADNI Neuroimaging Data
收藏 引用
SN computer science 2025年 第4期6卷 1-18页
作者: Tekumudi, Vivek Sai Surya Chaitanya Ramanathan, Annamalai Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Alzheimer’s disease (AD) is a prevalent neurological disorder characterized by progressive brain cell degeneration and atrophy, leading to a gradual decline in cognitive and functional abilities. Timely diagnosis is ... 详细信息
来源: 评论
Efficient Text Summarization using Natural Language Processing
Efficient Text Summarization using Natural Language Processi...
收藏 引用
2023 International Conference on Data science, Agents and Artificial Intelligence, ICDSAAI 2023
作者: Kumar, S. Anupama Kumar, Y. S Kiran Thejas, P. Rv College of Engineering Department of Master of Computer Applications Bangalore560059 India
In recent years, a huge volume of textual data has been released through social media and various other domains that can be extracted and analyzed to reproduce useful information. The underlying information from the d... 详细信息
来源: 评论
Enhancing Intrusion Detection Capabilities in IoT Technologies through Machine Learning
Enhancing Intrusion Detection Capabilities in IoT Technologi...
收藏 引用
2024 IEEE International Conference on Computing, applications and Systems, COMPAS 2024
作者: Hasan, Imran All Ahhad, Abdullah Md Rakibul Islam, Sk Mim, Marufa Akhter Habibur Rahman, Md Islamic University Department of Computer Science and Engineering Kushtia Bangladesh Islamic University Department of Tourism and Hospitality Management Kushtia Bangladesh Independent University Department of Computer Science and Engineering Dhaka Bangladesh
Smart home systems, industrial automation, healthcare systems, and others have been ground sectors developed massively because of the exponential growth that the Internet of Things (IoT) has had. The significant issue... 详细信息
来源: 评论
Guardian PI : Raspberry Based Night Survaillance Camera  4
Guardian PI : Raspberry Based Night Survaillance Camera
收藏 引用
4th International Conference on Power, Energy, Control and Transmission Systems, ICPECTS 2024
作者: Lalitha, V. Venkat Raj, M. Nirmal Raaghav, N. Ramanan, D. Sri Sairam Engineering College Department of Computer Science and Engineering Chennai India
Personal safety, especially for women during nighttime, remains a pressing concern. The "Guardian Pi"is an innovative solution that leveragesthe Raspberry Pi 4 Model B+ to provide real-time surveillance and ... 详细信息
来源: 评论
Experience Replay: A value-based deep reinforcement approach for Malicious URL Detection in the Tor Browser  7
Experience Replay: A value-based deep reinforcement approach...
收藏 引用
7th International Conference on Circuit Power and Computing Technologies, ICCPCT 2024
作者: Sakthivel, K. Srinithi, V. Swetha, S. Birundha, S. Sri Ramakrishna Engineering College Department of Computer Science and Engineering Coimbatore India
Finding malicious URLs in Tor is vital for preserving network security and privacy. Subsequently, Tor affords anonymity by routing traffic over a sequence of relays, it's frequently used for both legitimate and il... 详细信息
来源: 评论
An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 111-128页
作者: K.Meenakshi K.Sashi Rekha Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennaiIndia
Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a *** transactions in the system are carried out by consensus processes and to preserve confident... 详细信息
来源: 评论
Leveraging Attention Mechanisms to Enhance EfficientNet for Precise Analysis of Chest CT Images  2nd
Leveraging Attention Mechanisms to Enhance EfficientNet for...
收藏 引用
2nd International Conference on Big Data, IoT and Machine Learning, BIM 2023
作者: Rakibul Haque, Md. Al Mamun, Md. Department of Computer Science & Engineering Rajshahi University of Engineering & Technology Rajshahi Bangladesh
Accurate and timely analysis of chest CT images is crucial for effectively diagnosing and treating a wide range of respiratory, cardiovascular, and infectious diseases, making it a vital component of modern medicine. ... 详细信息
来源: 评论
A Review of the Repercussions of Mobile Phones and the Internet on Education
A Review of the Repercussions of Mobile Phones and the Inter...
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable Technology, ICRISST 2024
作者: Komarasamy, Dinesh Madhuradharani, Madhuradharani Krishnakumar, B. Parthasarathy, Karthikeyan Chinnusamy, Koushalya. K Kongu Engineering College Department of Computer Science and Engineering TamilNadu Perundurai India
Mobile phones and the Internet are the most popular modern technologies for life organization, especially in the field of education. Rapid advancements in mobile technology have made it possible for Internet-based mob... 详细信息
来源: 评论
CryptoGuard Education: Unleashing Cipher-Text Magic for Enhanced Security  1
CryptoGuard Education: Unleashing Cipher-Text Magic for Enha...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Abinaya, P. Senthil Kumar, J. Gowtham Babu, E. Jeyanth Balaji, K. Mepco Schlenk Engineering College Department of Computer Science and Engineering Sivakasi India
As educational systems increasingly rely on secure and efficient data access control, This paper introduces a comprehensive approach to fortifying data access security in educational systems by integrating 'Cipher... 详细信息
来源: 评论
***: Learning-based Governance for Decentralized Finance (DeFi)
收藏 引用
IEEE Transactions on Services Computing 2025年 第03期18卷 1278-1292页
作者: Xu, Jiahua Feng, Yebo Perez, Daniel Livshits, Benjamin University College London United Kingdom Exponential Science Foundation United Kingdom Nanyang Technological University School of Computer Science and Engineering Singapore Imperial College London Computer Science Department United Kingdom Imperial College London United Kingdom
Decentralized finance (DeFi) is an integral component of the blockchain ecosystem, enabling a range of financial activities through smart-contract-based protocols. Traditional DeFi governance typically involves manual... 详细信息
来源: 评论