咨询与建议

限定检索结果

文献类型

  • 115,133 篇 会议
  • 52,963 篇 期刊文献
  • 1,516 册 图书

馆藏范围

  • 169,612 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99,826 篇 工学
    • 66,617 篇 计算机科学与技术...
    • 53,604 篇 软件工程
    • 26,059 篇 信息与通信工程
    • 16,987 篇 控制科学与工程
    • 14,884 篇 电气工程
    • 14,014 篇 电子科学与技术(可...
    • 11,851 篇 生物工程
    • 9,458 篇 生物医学工程(可授...
    • 8,433 篇 光学工程
    • 7,131 篇 机械工程
    • 6,049 篇 化学工程与技术
    • 5,988 篇 动力工程及工程热...
    • 5,718 篇 仪器科学与技术
    • 5,044 篇 材料科学与工程(可...
    • 4,862 篇 网络空间安全
    • 4,321 篇 安全科学与工程
  • 57,204 篇 理学
    • 27,271 篇 数学
    • 19,605 篇 物理学
    • 13,467 篇 生物学
    • 8,915 篇 统计学(可授理学、...
    • 6,568 篇 化学
    • 6,327 篇 系统科学
  • 26,388 篇 管理学
    • 16,508 篇 管理科学与工程(可...
    • 10,980 篇 图书情报与档案管...
    • 7,630 篇 工商管理
  • 9,596 篇 医学
    • 7,868 篇 临床医学
    • 7,086 篇 基础医学(可授医学...
    • 4,373 篇 药学(可授医学、理...
    • 4,256 篇 公共卫生与预防医...
  • 5,005 篇 法学
    • 4,087 篇 社会学
  • 3,055 篇 经济学
  • 2,447 篇 农学
  • 1,630 篇 教育学
  • 905 篇 文学
  • 363 篇 军事学
  • 226 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,206 篇 computer science
  • 5,200 篇 accuracy
  • 4,480 篇 deep learning
  • 4,051 篇 feature extracti...
  • 3,734 篇 machine learning
  • 3,612 篇 computational mo...
  • 3,167 篇 training
  • 2,564 篇 support vector m...
  • 2,478 篇 convolutional ne...
  • 2,473 篇 real-time system...
  • 2,439 篇 internet of thin...
  • 2,365 篇 predictive model...
  • 2,230 篇 optimization
  • 2,065 篇 artificial intel...
  • 1,903 篇 data mining
  • 1,903 篇 wireless sensor ...
  • 1,719 篇 neural networks
  • 1,660 篇 security
  • 1,626 篇 computer archite...
  • 1,609 篇 data models

机构

  • 1,085 篇 cavendish labora...
  • 1,004 篇 department of ph...
  • 956 篇 physikalisches i...
  • 933 篇 oliver lodge lab...
  • 912 篇 department of co...
  • 834 篇 department of el...
  • 739 篇 university of ch...
  • 692 篇 department of el...
  • 682 篇 department of co...
  • 600 篇 chitkara univers...
  • 594 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 569 篇 infn sezione di ...
  • 550 篇 infn sezione di ...
  • 538 篇 school of physic...
  • 534 篇 horia hulubei na...
  • 533 篇 fakultät physik ...
  • 517 篇 department of ph...
  • 516 篇 school of physic...
  • 513 篇 h.h. wills physi...

作者

  • 260 篇 barter w.
  • 252 篇 a. gomes
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 238 篇 j. m. izen
  • 237 篇 j. wang
  • 233 篇 blake t.
  • 231 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 229 篇 d. calvet
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 beiter a.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 138,255 篇 英文
  • 29,632 篇 其他
  • 2,038 篇 中文
  • 129 篇 日文
  • 37 篇 斯洛文尼亚文
  • 32 篇 德文
  • 32 篇 法文
  • 20 篇 朝鲜文
  • 9 篇 俄文
  • 7 篇 阿拉伯文
  • 3 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Engineering Science and Technology"
169612 条 记 录,以下是1291-1300 订阅
排序:
Enhance Vertical Handover Security During Execution Phase in Mobile Networks
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3863-3875页
作者: Omar Khattab Department of Computer Science and Engineering Kuwait College of Science and Technology(KCST)Kuwait
The Vertical Handover(VHO)is one of the most vital features provided for the heterogeneous mobile *** allows Mobile Users(MUs)to keep ongoing sessions without disruption while they continuously move between different ... 详细信息
来源: 评论
Improving Gemstone Identification Accuracy Using Convolutional Neural Networks
Improving Gemstone Identification Accuracy Using Convolution...
收藏 引用
2024 International Conference on IT and Industrial Technologies, ICIT 2024
作者: Raheem, Raza Ahmad, Wakeel Adnan, Syed M. Department of Computer Science University of Engineering and Technology Taxila Pakistan
Accurate identification of gemstones is crucial in various fields, including gemology research, jewelry appraisal, and consumer protection, where authenticity verification is paramount to prevent fraud and ensure trus... 详细信息
来源: 评论
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted Smart Slide Supervision  17
SlidEar: Exploring eSense in-Ear Wearable for Voice-Assisted...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Mondal, Susmita Zingre, Sameeran Ravishankar Chakraborty, Suchetana Indian Institute of Technology Department of Computer Science and Engineering Jodhpur India
In corporate settings, conferences, or classrooms, an orator relies on manual slide transitions, which can disrupt their presentation flow. Presentation devices can be inaccessible due to the physical limitations of i... 详细信息
来源: 评论
Implementation of CNN-LSTM Integration for Advancing Human-computer Dialogue through Precise Sign Language Gesture Interpretation  5
Implementation of CNN-LSTM Integration for Advancing Human-C...
收藏 引用
5th IEEE International Conference on Recent Trends in computer science and technology, ICRTCST 2024
作者: Duraisamy, Premkumar Abinaya Srijanani, A. Duraisamy, M. Amrit Candida, M. Dinesh Babu, P. Karthik, S. KPR Institute of Engineering and Technology Department of Computer Science and Engineering Coimbatore India Government Arts and Science College Department of Computer Science Tirupattur635901 India Hindusthan College of Engineering & Technology Department of Information Technology Coimbatore India
Sign gestures play a crucial role in communication for the deaf community, emphasizing the need for effective translation systems. Hand gestures convey thoughts more rapidly than other actions, making them essential f... 详细信息
来源: 评论
Advanced Fraud Detection in Smart Grids Using Deep Neural Networks
Advanced Fraud Detection in Smart Grids Using Deep Neural Ne...
收藏 引用
2025 International Conference on Advances in Renewable Energy and Electric Vehicles, AREEV 2025
作者: Teja, Pallapothu Sasank Kumar, Pane Pavan Sankari, M. Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai600119 India
Fraud detection in smart grids is critical to ensure reliable and efficient energy distribution, preventing significant financial losses and maintaining grid stability. This project presents an advanced fraud detectio... 详细信息
来源: 评论
RISE: Modular Blockchain-Integrated Enhancements for Reducing Food Waste and Boosting Retail Accountability  17
RISE: Modular Blockchain-Integrated Enhancements for Reducin...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Sharma, Rishika Banda, Gourinath Indian Institute of Technology Department of Computer Science and Engineering Indore India
Effective management of semi-perishable food items is essential for minimising waste, maintaining food safety, and supporting sustainability efforts. This paper introduces the Responsibility Index for Sustainability a... 详细信息
来源: 评论
Indian sign language recognition using TensorFlow and MediaPipe  1st
Indian sign language recognition using TensorFlow and MediaP...
收藏 引用
1st International Conference on Applications of AI in 5G and IOT, ICAAI5GI 2024
作者: Kanyal, Hoshiyar Singh Gupta, Shubham Singh, Smriti Kumari, Sarita Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad India
With this work, a technical method for identifying Indian Sign Language is attempted to be developed. This work attempted to create a system for recognizing the hand movements from Indian Sign Language using machine l... 详细信息
来源: 评论
Usability Evaluation of Online Food Delivery Applications in Bangladesh: A Comparative Study
Usability Evaluation of Online Food Delivery Applications in...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Islam Arif, Md. Ariful Kabir, Shahriar Islam, Zohirul Hussain Khan, Md Faruk Islam, Iyolita Islam, Muhammad Nazrul Military Institute of Science and Technology Department of Computer Science and Engineering Dhaka Bangladesh Bangladesh University of Professionals Department of Computer Science and Engineering Dhaka Bangladesh
The online food order and delivery service is becoming a very popular web-based application in Bangladesh. These days, a growing number of individuals are interested in ordering a variety of foods online. In addition,... 详细信息
来源: 评论
Predictive Vigilance: AI And ML Methods For DDOS Attack Detection And Forecasting  2
Predictive Vigilance: AI And ML Methods For DDOS Attack Dete...
收藏 引用
2nd IEEE Global Conference on Communications and Information Technologies, GCCIT 2024
作者: Ravikumar, S. Rajendran, P. Revathi, S. Kumar, K. Antony Saranraj, S. Vel Tech Rangarajan Dr Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Cmr Institute of Technology Department of Computer Science & Engineering Telangana Hyderabad India Kongunadu College of Engineering and Technology Department of Computer Science & Engineering Trichy India
Distributed network attacks are referred to, usually, as Distributed Denial of Service (DDoS) attacks. These attacks take advantage of specific limitations that apply to any arrangement asset, such as the framework of... 详细信息
来源: 评论
Improved Consensus ADMM for Cooperative Motion Planning of Large-Scale Connected Autonomous Vehicles with Limited Communication
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第11期9卷 1-17页
作者: Liu, Haichao Huang, Zhenmin Zhu, Zicheng Li, Yulin Shen, Shaojie Ma, Jun Guangzhou China Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong SAR China
This paper investigates a cooperative motion planning problem for large-scale connected autonomous vehicles (CAVs) under limited communications, which addresses the challenges of high communication and computing resou... 详细信息
来源: 评论