咨询与建议

限定检索结果

文献类型

  • 88,107 篇 会议
  • 38,336 篇 期刊文献
  • 1,297 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,742 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,216 篇 工学
    • 45,852 篇 计算机科学与技术...
    • 36,827 篇 软件工程
    • 18,546 篇 信息与通信工程
    • 12,070 篇 控制科学与工程
    • 11,710 篇 电气工程
    • 11,417 篇 电子科学与技术(可...
    • 8,299 篇 生物工程
    • 7,050 篇 生物医学工程(可授...
    • 6,811 篇 光学工程
    • 5,037 篇 机械工程
    • 4,637 篇 化学工程与技术
    • 4,501 篇 仪器科学与技术
    • 4,345 篇 动力工程及工程热...
    • 4,121 篇 材料科学与工程(可...
    • 3,193 篇 网络空间安全
    • 2,955 篇 安全科学与工程
  • 43,315 篇 理学
    • 19,272 篇 数学
    • 16,680 篇 物理学
    • 9,523 篇 生物学
    • 6,294 篇 统计学(可授理学、...
    • 5,212 篇 化学
    • 4,681 篇 系统科学
  • 17,517 篇 管理学
    • 11,012 篇 管理科学与工程(可...
    • 7,254 篇 图书情报与档案管...
    • 5,356 篇 工商管理
  • 7,149 篇 医学
    • 5,916 篇 临床医学
    • 5,302 篇 基础医学(可授医学...
    • 3,277 篇 药学(可授医学、理...
    • 3,023 篇 公共卫生与预防医...
  • 3,450 篇 法学
    • 2,824 篇 社会学
  • 2,222 篇 经济学
  • 1,858 篇 农学
  • 1,141 篇 教育学
  • 554 篇 文学
  • 278 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,698 篇 accuracy
  • 3,012 篇 deep learning
  • 2,852 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,698 篇 machine learning
  • 2,602 篇 computational mo...
  • 2,248 篇 training
  • 1,858 篇 real-time system...
  • 1,819 篇 internet of thin...
  • 1,807 篇 support vector m...
  • 1,746 篇 convolutional ne...
  • 1,721 篇 predictive model...
  • 1,576 篇 artificial intel...
  • 1,412 篇 optimization
  • 1,385 篇 neural networks
  • 1,333 篇 wireless sensor ...
  • 1,240 篇 data mining
  • 1,217 篇 bandwidth
  • 1,204 篇 computer archite...
  • 1,201 篇 security

机构

  • 1,092 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 963 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 769 篇 university of ch...
  • 643 篇 department of el...
  • 639 篇 chitkara univers...
  • 609 篇 infn laboratori ...
  • 605 篇 infn sezione di ...
  • 584 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 549 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 524 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 513 篇 imperial college...
  • 509 篇 nikhef national ...
  • 504 篇 stfc rutherford ...

作者

  • 256 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 232 篇 beiter a.
  • 231 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 g. spigo
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 214 篇 brundu d.

语言

  • 118,978 篇 英文
  • 7,415 篇 其他
  • 1,384 篇 中文
  • 119 篇 日文
  • 17 篇 法文
  • 15 篇 德文
  • 14 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127742 条 记 录,以下是511-520 订阅
排序:
A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML
收藏 引用
International Journal of computers and Applications 2024年 第8期46卷 666-685页
作者: Benedek Szabo, Aron Katona, Jozsef Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Department of Instrumentation and Automation Institute of Electronics and Communication Systems Kandó Kálmán Faculty of Electrical Engineering Obuda University Budapest Hungary Department of Informatics GAMF Faculty of Engineering and Computer Science Kecskemét Hungary
The integration of machine learning (ML) into mobile applications presents unique challenges, particularly in resource-constrained environments such as iOS devices. Skin lesion classification is a critical task in der... 详细信息
来源: 评论
Exploring Personalized Internet of Things(PIoT),social connectivity,and Artificial Social Intelligence(ASI):A survey
收藏 引用
High-Confidence Computing 2024年 第3期4卷 136-162页
作者: Bisma Gulzar Shabir Ahmad Sofi Sahil Sholla Department of Information Technology National Institute of TechnologySrinagar 190001India Department of Computer Science and Engineering Islamic University of Science and TechnologyGazipur 1700India
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ... 详细信息
来源: 评论
Exploration of Semantic Priming Studies in Native Language of Children:Study on Bengali L1 and English L2 Bilingual Children
收藏 引用
SN computer Science 2025年 第2期6卷 1-18页
作者: Banerjee, Jaya Nithin, Kota Sai Sai, Uppalapati Hari Krishna Chakraborty, Baisakhi Basu, Anupam Department of Computer Science & Engineering National Institute of Technology West Bengal Durgapur 713209 India National Institute of Technology West Bengal Durgapur India Department of Computer Science & Engineering Indian Institute of Technology (IIT) Kharagpur 721302 India
Word Priming is an event in which prior subjection to a particular word impacts the reply of the individual to the upcoming correlated word. The response time is inferred to be less in identifying the target word prec... 详细信息
来源: 评论
MAIDS: malicious agent identification-based data security model for cloud environments
收藏 引用
Cluster Computing 2024年 第5期27卷 6167-6184页
作者: Gupta, Kishu Saxena, Deepika Gupta, Rishabh Singh, Ashutosh Kumar Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan School of Computer Science and Engineering The University of Aizu Aizuwakamatsu965-0006 Japan Department of Computer Science The University of Economics and Human Sciences Warsaw01-043 Poland Department of Computer Applications SRM Institute of Science & ampTechnology Delhi-NCR Campus Modinagar Uttar Pradesh Ghaziabad201204 India Department of Computer Science and Engineering Indian Institute of Information Technology Bhopal Bhopal462003 India
With the vigorous development of cloud computing, most organizations have shifted their data and applications to the cloud environment for storage, computation, and sharing purposes. During storage and data sharing ac... 详细信息
来源: 评论
Workout Action Recognition in Video Streams Using an Attention Driven Residual DC-GRU Network
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3067-3087页
作者: Arnab Dey Samit Biswas Dac-Nhuong Le Department of Computer Science and Technology Indian Institute of Engineering Science and TechnologyShibpurHowrah711103India Faculty of Information Technology Haiphong UniversityHaiphong180000Vietnam
Regular exercise is a crucial aspect of daily life, as it enables individuals to stay physically active, lowers thelikelihood of developing illnesses, and enhances life expectancy. The recognition of workout actions i... 详细信息
来源: 评论
SMART DRIVING LICENSING SYSTEM AND AUTHORIZATION OF AUTONOMOUS VEHICLE INTEGRATING WIRELESS SENSOR NETWORKS AND IoT
收藏 引用
Telecommunications and Radio engineering (English translation of Elektrosvyaz and Radiotekhnika) 2024年 第9期83卷 69-85页
作者: Santhakumar, D. Sudhan, M.B. Prasanna, R. Manikandan, S.P. Prathaban, Banu Priya Kanna, Rajesh R. Saravanan, G. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Chennai Ramapuram India Department of Electronics and Communication Engineering SRM Institute of Science and Technology Kattankulathur Chennai India Department of Electronics and Communication Engineering Sree Sastha Institute of Engineering and Technology Chennai India Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India Department of Electronics and Communication Engineering Sri Sairam Institute of Technology Tamil Nadu Chennai India
The advent of autonomous vehicles has revolutionized the automotive industry, offering promising advancements in safety, efficiency, and mobility. To integrate these autonomous vehicles into our society seamlessly, it... 详细信息
来源: 评论
Blockchain Integration in Emergency Medical Transportation: Advancing Security and Coordination for Critical Care Scenarios  5th
Blockchain Integration in Emergency Medical Transportation: ...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Rawat, Abhishek Suryavanshi, Raghuraj Singh Nagar, Vishal Yadav, Divakar Department of Computer Science and Engineering Pranveer Singh Institute of Technology Uttar Pradesh Kanpur India Department of Computer Science and Engineering Institute of Engineering and Technology Uttar Pradesh Lucknow India
Blockchains improve safety and faster teamwork for emergency medical transport in critical care. Emergency medical transport is not the only healthcare sector that has become better and different because of current bl... 详细信息
来源: 评论
Comparative Evaluation of Mango Fruit Diseases Classification Using Machine Learning
Comparative Evaluation of Mango Fruit Diseases Classificatio...
收藏 引用
2024 International Conference on Emerging Innovations and Advanced Computing, INNOCOMP 2024
作者: Kumar, Sandeep Gupta, Bhupesh Chhabra, Mohit Garg, Lucy Department of Computer Science & Engineering Mullana India Panipat Institute of Engineering Technology Department of Computer Science & Engineering Panipat India
A fruit valued for its great flavor, scent, and nutritional content;the mango (Mangifera indica L.) is one of the most significant tropical fruits in the world economically. However, several illnesses that compromise ... 详细信息
来源: 评论
Securing Autonomous UAV Cluster With Blockchain-Based Threshold Key Management System Utilizing Crypto-Asset and Multisignature
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5765-5778页
作者: Kharjana, Mebanjop Sahana, Subhas Chandra Saha, Goutam North-Eastern Hill University Department of Information Technology Shillong793022 India National Institute of Technology Department of Computer Science and Engineering Durgapur713209 India
Unmanned aerial vehicles deployed in remote locations rely on self-governed key management for their protection. However, conventional key management depends on a centralized ground-based station or single vehicle. Su... 详细信息
来源: 评论
Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 14273-14304页
作者: Anoop, M. Mary, L. William Wilson, Allan J. Kiran, W.S. Department of Computer Science and Application SRM Institute of Science and Technology Ramapuram campus Chennai600089 India Department of Electronics and Communication Engineering Amrita College of Engineering and Technology Nagercoil India
In today's rapidly evolving network landscape, cybersecurity has become increasingly crucial. However, wireless sensor networks face unique challenges due to their limited resources and diverse composition, high c... 详细信息
来源: 评论