咨询与建议

限定检索结果

文献类型

  • 88,107 篇 会议
  • 38,336 篇 期刊文献
  • 1,297 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,742 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,216 篇 工学
    • 45,852 篇 计算机科学与技术...
    • 36,827 篇 软件工程
    • 18,546 篇 信息与通信工程
    • 12,070 篇 控制科学与工程
    • 11,710 篇 电气工程
    • 11,417 篇 电子科学与技术(可...
    • 8,299 篇 生物工程
    • 7,050 篇 生物医学工程(可授...
    • 6,811 篇 光学工程
    • 5,037 篇 机械工程
    • 4,637 篇 化学工程与技术
    • 4,501 篇 仪器科学与技术
    • 4,345 篇 动力工程及工程热...
    • 4,121 篇 材料科学与工程(可...
    • 3,193 篇 网络空间安全
    • 2,955 篇 安全科学与工程
  • 43,315 篇 理学
    • 19,272 篇 数学
    • 16,680 篇 物理学
    • 9,523 篇 生物学
    • 6,294 篇 统计学(可授理学、...
    • 5,212 篇 化学
    • 4,681 篇 系统科学
  • 17,517 篇 管理学
    • 11,012 篇 管理科学与工程(可...
    • 7,254 篇 图书情报与档案管...
    • 5,356 篇 工商管理
  • 7,149 篇 医学
    • 5,916 篇 临床医学
    • 5,302 篇 基础医学(可授医学...
    • 3,277 篇 药学(可授医学、理...
    • 3,023 篇 公共卫生与预防医...
  • 3,450 篇 法学
    • 2,824 篇 社会学
  • 2,222 篇 经济学
  • 1,858 篇 农学
  • 1,141 篇 教育学
  • 554 篇 文学
  • 278 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,698 篇 accuracy
  • 3,012 篇 deep learning
  • 2,852 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,698 篇 machine learning
  • 2,602 篇 computational mo...
  • 2,248 篇 training
  • 1,858 篇 real-time system...
  • 1,819 篇 internet of thin...
  • 1,807 篇 support vector m...
  • 1,746 篇 convolutional ne...
  • 1,721 篇 predictive model...
  • 1,576 篇 artificial intel...
  • 1,412 篇 optimization
  • 1,385 篇 neural networks
  • 1,333 篇 wireless sensor ...
  • 1,240 篇 data mining
  • 1,217 篇 bandwidth
  • 1,204 篇 computer archite...
  • 1,201 篇 security

机构

  • 1,092 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 963 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 769 篇 university of ch...
  • 643 篇 department of el...
  • 639 篇 chitkara univers...
  • 609 篇 infn laboratori ...
  • 605 篇 infn sezione di ...
  • 584 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 549 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 524 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 513 篇 imperial college...
  • 509 篇 nikhef national ...
  • 504 篇 stfc rutherford ...

作者

  • 256 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 232 篇 beiter a.
  • 231 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 g. spigo
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 214 篇 brundu d.

语言

  • 118,978 篇 英文
  • 7,415 篇 其他
  • 1,384 篇 中文
  • 119 篇 日文
  • 17 篇 法文
  • 15 篇 德文
  • 14 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127742 条 记 录,以下是321-330 订阅
排序:
Advanced skin lesion detection via efficientNetB0 and vision transformer model with spatial-aware attention
收藏 引用
Multimedia Tools and Applications 2025年 1-19页
作者: Shaheen, Hera Singh, Maheshwari Prasad Singh, Amit Kumar Department of Computer Science and Engineering National Institute of Technology Patna Ashok Rajpath Bihar Patna800005 India
Due to the high incidence and possibly fatal nature of skin cancer, early identification is crucial for enhancing patient results. This paper presents a unique deep learning network, EfficientNetB0 ViT, to accurately ... 详细信息
来源: 评论
A novel dominating set and centrality based graph convolutional network for node classification
收藏 引用
Multimedia Tools and Applications 2025年 第14期84卷 12979-13004页
作者: Garg, Neeraj Garg, Sneha Jadeja, Mahipal Meena, Yogesh Kumar Gopalani, Dinesh Chauhan, Ganpat Singh Department of Computer Science and Engineering Malaviya National Institute of Technology Jaipur Rajasthan Jaipur302017 India Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Jaipur Rajasthan Jaipur302017 India Department of Information Technology School of IT Manipal University Jaipur Rajasthan Jaipur302034 India
To learn and analyze graph-structured data, Graph Neural Networks (GNNs) have emerged as a powerful framework over traditional neural networks, which work well on grid-like or sequential structure data. GNNs are parti... 详细信息
来源: 评论
DyPSS: Dynamic Priority Signalling System for Emergency Vehicles using Fog and YOLOv8  17
DyPSS: Dynamic Priority Signalling System for Emergency Vehi...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Kakde, Anuj Nath, Shubha Brata Ghosh, Soumya K. Indian Institute of Technology Department of Computer Science and Engineering Kharagpur India Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India
Efficient navigation of emergency response vehicles (ERVs) through urban congestion is crucial to life-saving efforts, yet traditional traffic systems often slow down their swift passage. In this work, we introduce Dy... 详细信息
来源: 评论
NADR-Net: A Deep Learning Framework for Predicting Neurological Adverse Drug Reactions Using 17 Molecular Descriptors
NADR-Net: A Deep Learning Framework for Predicting Neurologi...
收藏 引用
2024 International Symposium on Computing and Intelligent Systems, SCI 2024
作者: Chaurasia, Anushka Kumar, Deepak Yogita Department of Computer Science and Engineering National Institute of Technology Meghalaya India Department of Computer and Engineering National Institute of Technology Kurukshetra India
Neurological adverse drug reactions (NADRs) pose a significant clinical challenge as they can have a profound impact on patient health and treatment outcomes. While diverse drug descriptors have been employed for neur... 详细信息
来源: 评论
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for Virtual Network Embedding  16
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Keerthan Kumar, T.G. Kb, Aneesh Siddheshwar, Anagha Marali, Amulya Kamath, Anupama Koolagudi, S.G. Addya, Sourav Kanti National Institute of Technology Department of Computer Science and Engineering Karnataka India Siddaganga Institute of Technology Department of Computer Science and Engineering India Pes University Department of Computer Science and Engineering India
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs... 详细信息
来源: 评论
Enhancing Indian sign language recognition through data augmentation and visual transformer
收藏 引用
Neural Computing and Applications 2024年 第24期36卷 15103-15116页
作者: Singla, Venus Bawa, Seema Singh, Jasmeet Department of Computer Science Thapar Institute of Engineering and Technology Adarsh Nagar Punjab Patiala147004 India
This paper introduces a novel approach to Indian Sign Language Recognition (ISLR) by integrating Keras, Visual Transformers (ViT), and sophisticated data augmentation techniques. Our methodology emphasizes the develop... 详细信息
来源: 评论
Data Augmentation and Random Multi-Model Deep Learning for Data Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5191-5207页
作者: Fatma Harby Adel Thaljaoui Durre Nayab Suliman Aladhadh Salim EL Khediri Rehan Ullah Khan Computer Science Department Future Academy-Higher Future Institute for Specialized Technological StudiesEgypt Department of Computer Systems Engineering Faculty of Electrical and Computer EngineeringUniversity of Engineering and TechnologyPeshawar25120Pakistan Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Computer Sciences Faculty of Sciences of GafsaUniversity of GafsaGafsaTunisia
In the machine learning(ML)paradigm,data augmentation serves as a regularization approach for creating ML *** increase in the diversification of training samples increases the generalization capabilities,which enhance... 详细信息
来源: 评论
Hierarchical blockchain-based secure data storage in cloud using Merkle tree approach
收藏 引用
International Journal of Cloud Computing 2024年 第6期13卷 605-626页
作者: Bruno, Judy Flavia Chelliah, Balika J. Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai India
An authenticated manager must reinforce huge applications and operating systems, keeping information in the cloud while resisting potentially unreliable service providers. This article explores the presence of multipl... 详细信息
来源: 评论
Deep Learning Approach for Hand Gesture Recognition:Applications in Deaf Communication and Healthcare
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 127-144页
作者: Khursheed Aurangzeb Khalid Javeed Musaed Alhussein Imad Rida Syed Irtaza Haider Anubha Parashar Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Kingdom of Saudi Arabia Department of Computer Engineering College of Computing and InformaticsUniversity of SharjahSharjah27272United Arab Emirates Laboratory Biomechanics and Bioengineering University of Technology of CompiegneCompiegne60200France Department of Computer Science and Engineering Manipal University JaipurJaipur303007India
Hand gestures have been used as a significant mode of communication since the advent of human *** facilitating human-computer interaction(HCI),hand gesture recognition(HGRoc)technology is crucial for seamless and erro... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论