咨询与建议

限定检索结果

文献类型

  • 112,995 篇 会议
  • 52,028 篇 期刊文献
  • 1,508 册 图书

馆藏范围

  • 166,531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 97,805 篇 工学
    • 65,151 篇 计算机科学与技术...
    • 52,785 篇 软件工程
    • 25,219 篇 信息与通信工程
    • 16,171 篇 控制科学与工程
    • 14,367 篇 电气工程
    • 13,734 篇 电子科学与技术(可...
    • 11,771 篇 生物工程
    • 9,321 篇 生物医学工程(可授...
    • 8,300 篇 光学工程
    • 6,890 篇 机械工程
    • 5,917 篇 化学工程与技术
    • 5,811 篇 动力工程及工程热...
    • 5,570 篇 仪器科学与技术
    • 4,889 篇 材料科学与工程(可...
    • 4,463 篇 网络空间安全
    • 4,128 篇 安全科学与工程
  • 56,355 篇 理学
    • 26,907 篇 数学
    • 19,312 篇 物理学
    • 13,346 篇 生物学
    • 8,751 篇 统计学(可授理学、...
    • 6,366 篇 化学
    • 6,312 篇 系统科学
  • 25,716 篇 管理学
    • 16,014 篇 管理科学与工程(可...
    • 10,736 篇 图书情报与档案管...
    • 7,503 篇 工商管理
  • 9,259 篇 医学
    • 7,702 篇 临床医学
    • 6,958 篇 基础医学(可授医学...
    • 4,363 篇 药学(可授医学、理...
    • 3,994 篇 公共卫生与预防医...
  • 4,873 篇 法学
    • 3,969 篇 社会学
  • 3,002 篇 经济学
  • 2,410 篇 农学
  • 1,574 篇 教育学
  • 867 篇 文学
  • 359 篇 军事学
  • 223 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,206 篇 computer science
  • 4,837 篇 accuracy
  • 4,146 篇 deep learning
  • 3,913 篇 feature extracti...
  • 3,587 篇 machine learning
  • 3,475 篇 computational mo...
  • 3,086 篇 training
  • 2,495 篇 support vector m...
  • 2,361 篇 internet of thin...
  • 2,331 篇 convolutional ne...
  • 2,255 篇 predictive model...
  • 2,240 篇 real-time system...
  • 2,131 篇 optimization
  • 1,953 篇 artificial intel...
  • 1,897 篇 wireless sensor ...
  • 1,893 篇 data mining
  • 1,682 篇 neural networks
  • 1,581 篇 computer archite...
  • 1,559 篇 security
  • 1,507 篇 data models

机构

  • 1,080 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 917 篇 department of co...
  • 837 篇 department of el...
  • 738 篇 university of ch...
  • 675 篇 department of el...
  • 673 篇 department of co...
  • 593 篇 infn sezione di ...
  • 582 篇 infn laboratori ...
  • 572 篇 infn sezione di ...
  • 551 篇 chitkara univers...
  • 546 篇 infn sezione di ...
  • 536 篇 horia hulubei na...
  • 535 篇 school of physic...
  • 523 篇 fakultät physik ...
  • 521 篇 department of ph...
  • 520 篇 school of physic...
  • 514 篇 imperial college...

作者

  • 254 篇 a. gomes
  • 250 篇 barter w.
  • 244 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 225 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 158,529 篇 英文
  • 6,221 篇 其他
  • 1,812 篇 中文
  • 127 篇 日文
  • 20 篇 法文
  • 20 篇 朝鲜文
  • 18 篇 德文
  • 13 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Engineering Science and Technology"
166531 条 记 录,以下是4911-4920 订阅
排序:
Anomaly Detection in Social Media Texts Using Optimal Convolutional Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 1027-1042页
作者: Swarna Sudha Muppudathi Valarmathi Krishnasamy Department of Computer Science and Engineering Ramco Institute of TechnologyRajapalayam626117India Department of Electronics and Communication Engineering P.S.R.Engineering CollegeSivakasi626140India
Social Networking Sites(SNSs)are nowadays utilized by the whole world to share ideas,images,and valuable contents by means of a post to reach a group of *** use of SNS often inflicts the physical and the mental health ... 详细信息
来源: 评论
CHIE: Generative MRC Evaluation for in-context QA with Correctness, Helpfulness, Irrelevancy, and Extraneousness Aspects  2
CHIE: Generative MRC Evaluation for in-context QA with Corre...
收藏 引用
2nd Workshop on Generalisation (Benchmarking) in NLP, GenBench 2024
作者: Phatthiyaphaibun, Wannaphong Nonesung, Surapon Limkonchotiwat, Peerat Udomcharoenchaikit, Can Sawatphol, Jitkapat Chuangsuwanich, Ekapol Nutanong, Sarana School of Information Science and Technology VISTEC Thailand Department of Computer Engineering Faculty of Engineering Chulalongkorn University Thailand
The evaluation of generative models in Machine Reading Comprehension (MRC) presents distinct difficulties, as traditional metrics like BLEU, ROUGE, METEOR, Exact Match, and F1 score often struggle to capture the nuanc...
来源: 评论
Siamese Multiple Attention Temporal Convolution Networks for Human Mobility Signature Identification  27
Siamese Multiple Attention Temporal Convolution Networks for...
收藏 引用
27th IEEE International Conference on Intelligent Transportation Systems, ITSC 2024
作者: Zheng, Zhipeng Jiang, Yuchen Zhang, Shiyao Wei, Xuetao Research Institute for Trustworthy Autonomous Systems Southern University of Science and Technology Department of Computer Science and Engineering China
The Human Mobility Signature Identification (HuMID) problem stands as a fundamental task within the realm of driving style representation, dedicated to discerning latent driving behaviors and preferences from diverse ... 详细信息
来源: 评论
Navigating the Landscape of Ransomware Detection Methods: A Review  3rd
Navigating the Landscape of Ransomware Detection Methods: A ...
收藏 引用
3rd International Conference on Advanced Computing and Intelligent Technologies, ICACIT 2023
作者: Benito, Nikiema Martial, Ouedraogo Banda, Tamiano Sahana, Subrata Department of Computer Science and Engineering School of Engineering and Technology Sharda University UP Greater Noida201306 India
The global impact of ransomware on cybersecurity has increased alarmingly in recent years. It is the cause of important financial damage for individuals as well as for corporations. From the early days of computers, t... 详细信息
来源: 评论
Developing a Translation Model to Bridge ASL and Indian Regional Languages Using Neural Networks
Developing a Translation Model to Bridge ASL and Indian Regi...
收藏 引用
2025 International Conference on Computing for Sustainability and Intelligent Future, COMP-SIF 2025
作者: Swetha, M.S. Muneshwara, M.S. Venkatesh, Varnitha Kudremane, Shreyaa S. M. Nair, Ritika S Vismitha, H. Bms Institute of Technology & Management Department of Information Science and Engineering Bengaluru India Bms Institute of Technology & Management Department of Computer Science and Engineering Bengaluru India
In this resarch work, a real-time hand gesture detection system for Ame rican Sign Language (ASL) that enables the deaf-dumb co mmun ity to interact with others by translating sign language into text. The current meth... 详细信息
来源: 评论
Sleep Stage and Sleep Disorder Detection using Spatial and Temporal Attention based Capsule Network  1
Sleep Stage and Sleep Disorder Detection using Spatial and T...
收藏 引用
1st International Conference on Software, Systems and Information technology, SSITCON 2024
作者: Devi, R. Renuga Elavarasi, S. Anitha Venkateswarlu, Chetti Anitha, R. Ali, Hassan Mohamed Srm Institute of Science and Technology Ramapuram Department of Computer Science and Applications Chennai India Sona College of Technology Department of Computer Science and Engineering Salem India Maisammaguda Department of Electronics and Communication Engineering Hyderabad India New Prince Shri Bhavani College of Engineering and Technology Department of Information Technology Chennai India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq
Sleep is referred as a cyclic process which is the most important part in human life. The sleep disorder and its stages are observed from time waveforms such as Electroencephalogram (EEG), Electrocardiograms (ECG), an... 详细信息
来源: 评论
Deep Neural Networks for Detecting Insider Threats and Social engineering Attacks  4
Deep Neural Networks for Detecting Insider Threats and Socia...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Zewdie, Marshet Girma, Anteneh Sitote, Tilahun Melak Science and Technology University Department of Computer Science & Engineering Adama Adama Ethiopia WashingtonDC United States
Cybersecurity (CS) plays a crucial role in protecting valuable and sensitive organizational data, systems, computers, and networks from unauthorized access. However, the incressing prevalence of insider threats and so... 详细信息
来源: 评论
Distance Matrix and Markov Chain Based Sensor Localization in WSN
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 4051-4068页
作者: Omaima Bamasaq Daniyal Alghazzawi Surbhi Bhatia Pankaj Dadheech Farrukh Arslan Sudhakar Sengan Syed Hamid Hassan Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Information Systems College of Computer Science and Information TechnologyKing Faisal UniversitySaudi Arabia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement&GramothanJaipurRajasthanIndia University of Engineering and Technology LahorePakistan Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveliTamilnaduIndia
Applications based on Wireless Sensor Networks(WSN)have shown to be quite useful in monitoring a particular geographic area of *** geometries of the surrounding environment are essential to establish a successful WSN ... 详细信息
来源: 评论
Fast and Accurate Community Detection in Social Media Networks with a Multi-Algorithmic Approach
Fast and Accurate Community Detection in Social Media Networ...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Pabitha, P. Petchiammal, G. Eswari Anna University Department of Computer Technology MIT Campu Chromepet600044 India Knowledge Institute of Technology Department of Computer Science and Engineering Salem637504 India
Community detection is an essential technique for uncovering structural patterns in complex networks, such as social, biological, and information networks. In this paper to explore a hybrid approach to community detec... 详细信息
来源: 评论
RUL Estimation for Power Electronic Devices Using RNNs
RUL Estimation for Power Electronic Devices Using RNNs
收藏 引用
2024 Prognostics and System Health Management Conference, PHM 2024
作者: Cai, Congrui Lu, Zhonghai School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Embedded Systems Master Program Sweden School of Electrical Engineering and Computer Science Department of Electrical Engineering KTH Royal Institute of Technology Sweden
Recurrent Neural Networks (RNNs) are commonly used in data-driven approaches to estimate the Remaining Useful Lifetime (RUL) of power electronic devices. RNNs are preferred because their intrinsic feedback mechanisms ... 详细信息
来源: 评论