咨询与建议

限定检索结果

文献类型

  • 88,107 篇 会议
  • 38,336 篇 期刊文献
  • 1,297 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,742 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,216 篇 工学
    • 45,852 篇 计算机科学与技术...
    • 36,827 篇 软件工程
    • 18,546 篇 信息与通信工程
    • 12,070 篇 控制科学与工程
    • 11,710 篇 电气工程
    • 11,417 篇 电子科学与技术(可...
    • 8,299 篇 生物工程
    • 7,050 篇 生物医学工程(可授...
    • 6,811 篇 光学工程
    • 5,037 篇 机械工程
    • 4,637 篇 化学工程与技术
    • 4,501 篇 仪器科学与技术
    • 4,345 篇 动力工程及工程热...
    • 4,121 篇 材料科学与工程(可...
    • 3,193 篇 网络空间安全
    • 2,955 篇 安全科学与工程
  • 43,315 篇 理学
    • 19,272 篇 数学
    • 16,680 篇 物理学
    • 9,523 篇 生物学
    • 6,294 篇 统计学(可授理学、...
    • 5,212 篇 化学
    • 4,681 篇 系统科学
  • 17,517 篇 管理学
    • 11,012 篇 管理科学与工程(可...
    • 7,254 篇 图书情报与档案管...
    • 5,356 篇 工商管理
  • 7,149 篇 医学
    • 5,916 篇 临床医学
    • 5,302 篇 基础医学(可授医学...
    • 3,277 篇 药学(可授医学、理...
    • 3,023 篇 公共卫生与预防医...
  • 3,450 篇 法学
    • 2,824 篇 社会学
  • 2,222 篇 经济学
  • 1,858 篇 农学
  • 1,141 篇 教育学
  • 554 篇 文学
  • 278 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,698 篇 accuracy
  • 3,012 篇 deep learning
  • 2,852 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,698 篇 machine learning
  • 2,602 篇 computational mo...
  • 2,248 篇 training
  • 1,858 篇 real-time system...
  • 1,819 篇 internet of thin...
  • 1,807 篇 support vector m...
  • 1,746 篇 convolutional ne...
  • 1,721 篇 predictive model...
  • 1,576 篇 artificial intel...
  • 1,412 篇 optimization
  • 1,385 篇 neural networks
  • 1,333 篇 wireless sensor ...
  • 1,240 篇 data mining
  • 1,217 篇 bandwidth
  • 1,204 篇 computer archite...
  • 1,201 篇 security

机构

  • 1,092 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 963 篇 physikalisches i...
  • 960 篇 oliver lodge lab...
  • 769 篇 university of ch...
  • 643 篇 department of el...
  • 639 篇 chitkara univers...
  • 609 篇 infn laboratori ...
  • 605 篇 infn sezione di ...
  • 584 篇 infn sezione di ...
  • 562 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 549 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 524 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 513 篇 imperial college...
  • 509 篇 nikhef national ...
  • 504 篇 stfc rutherford ...

作者

  • 256 篇 a. gomes
  • 253 篇 barter w.
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 234 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 232 篇 beiter a.
  • 231 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 g. spigo
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 214 篇 brundu d.

语言

  • 118,978 篇 英文
  • 7,415 篇 其他
  • 1,384 篇 中文
  • 119 篇 日文
  • 17 篇 法文
  • 15 篇 德文
  • 14 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127742 条 记 录,以下是521-530 订阅
排序:
mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
收藏 引用
Journal of Reliable Intelligent Environments 2023年 第3期9卷 333-347页
作者: Prabhakaran, Varun Kulandasamy, Ashokkumar Department of Computer Science and Engineering St.Joseph’s College of Engineering Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st... 详细信息
来源: 评论
A comparative study of recommender systems in different domains  4th
A comparative study of recommender systems in different doma...
收藏 引用
4th International Conference on Computational Methods in Science and technology, ICCMST 2024
作者: Rohit Sharma, Aditi Kumar, Aditya Singh, Prabal Singh, Ashutosh Kumar Department of Computer Science and Engineering Institute of Engineering and Rural Technology Prayagraj India
Recommender systems are techniques designed to enhance user experience in various domains. They suggest relevant items to users based on their behavior and preferences (Linyuan et al. Feb 2012). These systems are bein... 详细信息
来源: 评论
Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks
收藏 引用
Cluster Computing 2024年 第4期27卷 4673-4685页
作者: Swain, Smruti Rekha Parashar, Anshu Singh, Ashutosh Kumar Lee, Chung Nan Department of Computer Applications National Institute of Technology Haryana Kurukshetra136119 India Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung Kaohsiung804201 Taiwan
In the modern era, large-scale computing systems distribute tasks into smaller units, allowing them to be executed simultaneously, accelerating job completion, and reducing energy usage. However, cloud computing syste... 详细信息
来源: 评论
To Enhance the Security System of Mobile Phones by Using GSM technology
To Enhance the Security System of Mobile Phones by Using GSM...
收藏 引用
2024 International Conference on Advances in Computing Research on Science engineering and technology, ACROSET 2024
作者: Mangal, Mayank Tiwari, Gagan Malviya, Kanchan Sahu, Vivek Pathare, Kalpesh Vaidya, Kaustubh Computer Engineering Alamuri Ratnamala Institute of Engineering & Technology Mumbai India Alamuri Ratnamala Institute of Engineering & Technology Department of Computer Science & Engineering Mumbai India
Nowadays to interconnect with the world, smart phones become an important part of our life, smart phones help us in various ways like keeping lots of important application and data. Using this we can store contacts me... 详细信息
来源: 评论
Multilevel Augmentation for Identifying Thin Vessels in Diabetic Retinopathy Using UNET Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 2273-2288页
作者: A.Deepak Kumar T.Sasipraba Faculty of Computer Science and Engineering Sathyabama Institute of Science and TechnologyChennai600119India Department of Computer Science and Engineering St.Joseph’s Institute of TechnologyChennai600119India
Diabetic Retinopathy is a disease,which happens due to abnormal growth of blood vessels that causes spots on the vision and vision *** techniques are applied to identify the disease in the early stage with different m... 详细信息
来源: 评论
Protected Test-Time Adaptation via Online Entropy Matching: A Betting Approach  38
Protected Test-Time Adaptation via Online Entropy Matching: ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Bar, Yarin Shaer, Shalev Romano, Yaniv Department of Computer Science Technion-Israel Institute of Technology Israel Department of Electrical and Computer Engineering Technion-Israel Institute of Technology Israel
We present a novel approach for test-time adaptation via online self-training, consisting of two components. First, we introduce a statistical framework that detects distribution shifts in the classifier's entropy...
来源: 评论
Integration of Blockchain and IPFS: healthcare data management & sharing for IoT Environment
收藏 引用
Multimedia Tools and Applications 2024年 1-22页
作者: Mishra, Rajiv Kumar Yadav, Rajesh Kumar Nath, Prem Department of Computer Science & amp Engineering Jaypee Institute of Information Technology Noida India Department of Computer Science & amp Engineering Delhi Technological University Delhi India Department of Computer Science HNB Garhwal University Srinagar India
The immense volume of data generated and collected by smart devices has significantly enhanced various aspects of our daily lives. However, safeguarding the sensitive information shared among these devices is crucial.... 详细信息
来源: 评论
Improving bot detection of fake followers on Twitter via a hybrid B-HC optimisation algorithm  5
Improving bot detection of fake followers on Twitter via a h...
收藏 引用
5th IEEE International Conference on Electrical, computer and Communication Technologies, ICECCT 2023
作者: Alzeyadi, Haider Duran, Fecir Informatics Institute Department of Computer Science Gazi University Ankara Turkey Gazi University Engineering Faculty of Technology Department of Computer Engineering Ankara Turkey
Sophisticated cyber threats are seen on Online Social Networks (OSNs) social media accounts automated to imitate human behaviours has an impactful effect on distorting public thoughts and opinions. OSNs are weaponized... 详细信息
来源: 评论
A Comparative Study on Reinforcement Learning in Disease Prediction on Medical Data
A Comparative Study on Reinforcement Learning in Disease Pre...
收藏 引用
2024 International Conference on Advances in Data engineering and Intelligent Computing Systems, ADICS 2024
作者: Nijana, V. Rajendran, P. Selvi Hindustan Institute Of Technology And Science Computer Application Department India Hindustan Institute Of Technology And Science Department Of Computer Science And Engineering India
Medical imaging has been used extensively in healthcare in recent years for a variety of purposes, including disease diagnosis, treatment planning, and tracking the course of an illness. These applications entail taki... 详细信息
来源: 评论
WSO-KELM: War Strategy Optimization-Based Kernel Extreme Learning Machine for Automatic Software Fault Prediction Model
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第1期106卷 145-163页
作者: Elci, J. Brundha Nandagopalan, S. Department of Computer Science and Engineering Vemana Institute of Technology Visvesvaraya Technological University Karnataka Belagavi India Department of Information Science and Engineering Vemana Institute of Technology Visvesvaraya Technological University Karnataka Belagavi India
The software development projects’ testing part is usually expensive and complex, but it is essential to gauge the effectiveness of the developed software. Software Fault Prediction (SFP) primarily serves to detect f... 详细信息
来源: 评论