咨询与建议

限定检索结果

文献类型

  • 88,090 篇 会议
  • 38,173 篇 期刊文献
  • 1,299 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,564 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,078 篇 工学
    • 45,767 篇 计算机科学与技术...
    • 36,827 篇 软件工程
    • 18,496 篇 信息与通信工程
    • 11,996 篇 控制科学与工程
    • 11,681 篇 电气工程
    • 11,392 篇 电子科学与技术(可...
    • 8,284 篇 生物工程
    • 7,037 篇 生物医学工程(可授...
    • 6,815 篇 光学工程
    • 5,038 篇 机械工程
    • 4,629 篇 化学工程与技术
    • 4,494 篇 仪器科学与技术
    • 4,339 篇 动力工程及工程热...
    • 4,085 篇 材料科学与工程(可...
    • 3,177 篇 网络空间安全
    • 2,949 篇 安全科学与工程
  • 43,255 篇 理学
    • 19,269 篇 数学
    • 16,657 篇 物理学
    • 9,507 篇 生物学
    • 6,299 篇 统计学(可授理学、...
    • 5,176 篇 化学
    • 4,680 篇 系统科学
  • 17,515 篇 管理学
    • 11,018 篇 管理科学与工程(可...
    • 7,247 篇 图书情报与档案管...
    • 5,365 篇 工商管理
  • 7,129 篇 医学
    • 5,903 篇 临床医学
    • 5,301 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,029 篇 公共卫生与预防医...
  • 3,452 篇 法学
    • 2,825 篇 社会学
  • 2,222 篇 经济学
  • 1,855 篇 农学
  • 1,145 篇 教育学
  • 551 篇 文学
  • 279 篇 军事学
  • 121 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,692 篇 accuracy
  • 2,995 篇 deep learning
  • 2,850 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,686 篇 machine learning
  • 2,600 篇 computational mo...
  • 2,243 篇 training
  • 1,853 篇 real-time system...
  • 1,817 篇 internet of thin...
  • 1,807 篇 support vector m...
  • 1,741 篇 convolutional ne...
  • 1,717 篇 predictive model...
  • 1,573 篇 artificial intel...
  • 1,403 篇 optimization
  • 1,381 篇 neural networks
  • 1,332 篇 wireless sensor ...
  • 1,240 篇 data mining
  • 1,217 篇 bandwidth
  • 1,204 篇 computer archite...
  • 1,197 篇 security

机构

  • 1,092 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 963 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 766 篇 university of ch...
  • 645 篇 department of el...
  • 638 篇 chitkara univers...
  • 609 篇 infn laboratori ...
  • 605 篇 infn sezione di ...
  • 584 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 549 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 524 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 513 篇 imperial college...
  • 509 篇 nikhef national ...
  • 504 篇 stfc rutherford ...

作者

  • 256 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 beiter a.
  • 231 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 g. spigo
  • 216 篇 boettcher t.
  • 213 篇 brundu d.

语言

  • 118,825 篇 英文
  • 7,382 篇 其他
  • 1,384 篇 中文
  • 119 篇 日文
  • 17 篇 法文
  • 15 篇 德文
  • 14 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127564 条 记 录,以下是4761-4770 订阅
排序:
Autonomous Search and Rescue Agent Using Deep Reinforcement Learning
Autonomous Search and Rescue Agent Using Deep Reinforcement ...
收藏 引用
2023 International Conference on Recent Advances in Science and engineering technology, ICRASET 2023
作者: Rampriya, R.S. Alam, Mohammed Junaid Jayan, Sri Vellore Institute of Technology School of Computer Science Engineering and Information Systems Tamilnadu Vellore India Madras Institute of Technology Department of Computer Technology Tamilnadu Chennai India
Disaster management is one of the areas of paramount importance for any government or organization. This process gets very tedious and tricky for some specific type of disasters. Deploying manpower for mitigating the ... 详细信息
来源: 评论
Utilizing Machine Learning Models to Determine the Security Level of Different Cryptosystems  7
Utilizing Machine Learning Models to Determine the Security ...
收藏 引用
7th International Conference on Trends in Electronics and informatics, ICOEI 2023
作者: Pranathi, Kantipudi Priya, Bodepudi Lakshmi Felix, A. Yovan Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
Due to recent developments in multimedia technology, digital data security has emerged as an important concern. To improve upon the state of the art in terms of security, researchers often recommend modifications to p... 详细信息
来源: 评论
Preserving Service Availability Under DDoS Attack in Micro-Service Based Cloud Infrastructure  16
Preserving Service Availability Under DDoS Attack in Micro-S...
收藏 引用
16th International Conference on Security of Information and Networks, SIN 2023
作者: Kumar, Anmol Agarwal, Mayank Indian Institute of Technology Department of Computer Science & Engineering Patna801103 India
Distributed denial of service (DDoS) attacks target the availability of the victim's services. DDoS attacks, being resource-consumption attacks, create heavy resource contention. In the state of the art, we found ... 详细信息
来源: 评论
Generalizing a Secure Framework for Domain Transfer Network for Face Anti-spoofing  18th
Generalizing a Secure Framework for Domain Transfer Network ...
收藏 引用
18th International Conference on Data Science and Artificial Intelligence, ICDSAI 2022
作者: Chandavarkar, B.R. Rana, Ayushman Ketkar, Mihir M. Pai, Priyanka G. Department of Computer Science and Engineering National Institute of Technology Karnataka Mangalore India
An essential field in cyber-security is the technology behind the authentication of users. In the contemporary era, alphanumeric passwords have been the primary tool used. A password is easy to understand but theoreti... 详细信息
来源: 评论
A Lightweight Authentication and Key Agreement Protocol for IoT-Based Smart Healthcare System
A Lightweight Authentication and Key Agreement Protocol for ...
收藏 引用
2023 IEEE World Conference on Communication and Computing, WCONF 2023
作者: Das, Sangjukta Singh, Maheshwari Prasad Namasudra, Suyel National Institute of Technology Patna Department of Computer Science and Engineering Bihar India
Nowadays, the enormous advantages of the Internet of Things (IoT) are being used in a variety of fields, including, but not limited to, transportation, healthcare, and traffic monitoring. However, the lack of strong s... 详细信息
来源: 评论
Decentralized Blockchain based Online Voting System with Biometric Authentication  8
Decentralized Blockchain based Online Voting System with Bio...
收藏 引用
8th International Conference on Communication and Electronics Systems, ICCES 2023
作者: Waniya, Joel Sanjeev Palmer, Matthew Kathrine, G Jaspher W. Basil Xavier, S. Aarthi, Shilpa Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India
Online voting system using blockchain with integration of biometric authentication have emerged as a promising solution to address the challenges of online voting such as preventing fraud and maintaining the integrity... 详细信息
来源: 评论
Advancing Spelling Correction through Natural Language Processing and TextBlob: A Context-Aware Approach
Advancing Spelling Correction through Natural Language Proce...
收藏 引用
2023 International Conference on the Confluence of Advancements in Robotics, Vision and Interdisciplinary technology Management, IC-RVITM 2023
作者: Singh, Nongmeikapam Thoiba Mishra, Aditya Mohan Singh, Ankit Chanu, Asem Debala Chandigarh University Department of Computer Science and Engineering Punjab India Indian Institute of Information Technology Department of Computer Science and Engineering Assam Guwahati India
This study explores the development of an advanced spelling correction system using Natural Language Processing (NLP) and the TextBlob library. It addresses the prevalent issue of spelling errors in written text and a... 详细信息
来源: 评论
An Intelligent Air Defense Recommendation Model based on Fuzzy Inference System  26
An Intelligent Air Defense Recommendation Model based on Fuz...
收藏 引用
26th International Conference on computer and Information technology, ICCIT 2023
作者: Islam Arif, Md. Ariful Islam, Zohirul Sharmee, Sharmin Sultana Akhtaruzzaman, M. Military Institute of Science and Technology Department of Computer Science and Engineering Dhaka Bangladesh
Securing the nation's airspace demands the integration of an advanced air defense system. Automation technology can be incorporated to deploy anti-missile rockets, acting as a deterrent against various air-missile... 详细信息
来源: 评论
Predicting Density in Post-Rift Lithologic Sequence from Well Log Data Using Multilayer Perceptron Neural Network  2
Predicting Density in Post-Rift Lithologic Sequence from Wel...
收藏 引用
2nd International Conference on informatics, ICI 2023
作者: Roy, Avik Arora, Anuja Jaypee Institute of Information Technology Department of Computer Science Engineering and IT Noida India
Estimating the density log is essential in analyzing reservoir characterization of oil and gas exploration. Density and Sonic logs assist in generating the acoustic impedance logs that further help in the impedance vo... 详细信息
来源: 评论
Image Classification of Ischemic Stroke Blood Clot Origin using Stacked EfficientNet-B0, VGG19 and ResNet-152  3
Image Classification of Ischemic Stroke Blood Clot Origin us...
收藏 引用
3rd International Conference on Secure Cyber Computing and Communications, ICSCCC 2023
作者: Rao, Masabathula V S Raghavendra Puligundla, Surya Ekkala, Nikhil Sai Chebrolu, Srilatha National Institute of Technology Department of Computer Science and Engineering Andhra Pradesh India
Stroke continues to be the second-leading cause of mortality globally. Over 700,000 Americans suffer from an ischemic stroke every year as a result of a blood clot clogging a brain artery. The chances of the patient s... 详细信息
来源: 评论