咨询与建议

限定检索结果

文献类型

  • 89,152 篇 会议
  • 38,592 篇 期刊文献
  • 1,303 册 图书

馆藏范围

  • 129,047 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,939 篇 工学
    • 46,491 篇 计算机科学与技术...
    • 37,158 篇 软件工程
    • 18,985 篇 信息与通信工程
    • 12,507 篇 控制科学与工程
    • 11,938 篇 电气工程
    • 11,515 篇 电子科学与技术(可...
    • 8,313 篇 生物工程
    • 7,068 篇 生物医学工程(可授...
    • 6,829 篇 光学工程
    • 5,177 篇 机械工程
    • 4,684 篇 化学工程与技术
    • 4,565 篇 仪器科学与技术
    • 4,448 篇 动力工程及工程热...
    • 4,147 篇 材料科学与工程(可...
    • 3,451 篇 网络空间安全
    • 3,090 篇 安全科学与工程
  • 43,612 篇 理学
    • 19,436 篇 数学
    • 16,770 篇 物理学
    • 9,558 篇 生物学
    • 6,365 篇 统计学(可授理学、...
    • 5,287 篇 化学
    • 4,683 篇 系统科学
  • 17,902 篇 管理学
    • 11,310 篇 管理科学与工程(可...
    • 7,404 篇 图书情报与档案管...
    • 5,398 篇 工商管理
  • 7,305 篇 医学
    • 5,947 篇 临床医学
    • 5,320 篇 基础医学(可授医学...
    • 3,283 篇 药学(可授医学、理...
    • 3,158 篇 公共卫生与预防医...
  • 3,535 篇 法学
    • 2,902 篇 社会学
  • 2,242 篇 经济学
  • 1,869 篇 农学
  • 1,155 篇 教育学
  • 595 篇 文学
  • 282 篇 军事学
  • 123 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,891 篇 accuracy
  • 3,173 篇 deep learning
  • 2,932 篇 feature extracti...
  • 2,829 篇 computer science
  • 2,793 篇 machine learning
  • 2,666 篇 computational mo...
  • 2,291 篇 training
  • 1,993 篇 real-time system...
  • 1,881 篇 internet of thin...
  • 1,849 篇 support vector m...
  • 1,794 篇 convolutional ne...
  • 1,776 篇 predictive model...
  • 1,638 篇 artificial intel...
  • 1,470 篇 optimization
  • 1,405 篇 neural networks
  • 1,350 篇 wireless sensor ...
  • 1,261 篇 security
  • 1,254 篇 data mining
  • 1,219 篇 bandwidth
  • 1,216 篇 computer archite...

机构

  • 1,093 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 970 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 770 篇 university of ch...
  • 680 篇 chitkara univers...
  • 650 篇 department of el...
  • 615 篇 infn laboratori ...
  • 606 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 568 篇 infn sezione di ...
  • 561 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 526 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 510 篇 imperial college...
  • 502 篇 nikhef national ...
  • 501 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 256 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 blake t.
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 231 篇 s. chen
  • 229 篇 beiter a.
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 217 篇 bencivenni g.

语言

  • 105,757 篇 英文
  • 21,997 篇 其他
  • 1,509 篇 中文
  • 119 篇 日文
  • 26 篇 斯洛文尼亚文
  • 25 篇 法文
  • 24 篇 德文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 5 篇 阿拉伯文
  • 4 篇 俄文
  • 2 篇 荷兰文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
129047 条 记 录,以下是831-840 订阅
排序:
An Experimental Analysis of Machine Learning Model in the Context of Sales Forecasting: -A Walmart Dataset as A Case Study  15
An Experimental Analysis of Machine Learning Model in the Co...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Wankhede, Disha Athanikar, Abhishek Borude, Yash Chougule, Raviraj Diware, Om Department of Computer Engineering Vishwakarma Institute of Information Technology India
Software programmers may get gradually precise at expecting consequences without being clearly coded using machine learning techniques. Machine learning is based on the idea that models and algorithms may collect inpu... 详细信息
来源: 评论
Enhanced Non-Defended Website Fingerprinting Attack Model Using Deep Learning
Enhanced Non-Defended Website Fingerprinting Attack Model Us...
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Sinha, Minal Dave, Mayank National Institute of Technology Department of Computer Engineering Kurukshetra India
Onion routing (Tor) is a routing protocol that uses multiple-layer encryption to protect privacy and security for authentic users during web browsing. The website fingerprinting (WF) attack, which may be used to ident... 详细信息
来源: 评论
Hybrid Steganographic and Encryption Approach using Color Analysis for Secure Image Communication  2
Hybrid Steganographic and Encryption Approach using Color An...
收藏 引用
2nd International Conference on Advances in Computation, Communication and Information technology, ICAICCIT 2024
作者: Jadhav, Swati Darekar, Smeet Deshmukh, Anurag Deore, Bhavesh Datir, Dev Department of Computer Engineering Vishwakarma Institute of Technology Pune India
Digital privacy and secure communication are under increasing threats, making strong methods of protection of sensitive data ever more important. Steganography is the art of concealing information within seemingly inn... 详细信息
来源: 评论
PerceptiGuard: Unveiling DeepFakes Through Enhanced Media Perception
PerceptiGuard: Unveiling DeepFakes Through Enhanced Media Pe...
收藏 引用
2024 IEEE Silchar Subsection Annual Conference, SILCON 2024
作者: Phatangare, Sheetal Tekade, Om Thakare, Prathamesh Wankhade, Abhishek Wankhade, Purva Vishwakarma Institute of Technology Department of Computer Engineering Pune India
This research presents a comprehensive approach to developing a multi-modal deepfake detection system leveraging advanced deep learning architectures. The primary objectives include the creation of a robust detection ... 详细信息
来源: 评论
Audio Classification Using Ensemble Model
Audio Classification Using Ensemble Model
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Gupta, Neelabh Ahlawat, Priyanka National Institute of Technology Department of Computer Engineering Kurukshetra India
Audio classification is essential for numerous ap-plications, including environmental sound monitoring, speech recognition systems and music genre classification. The ability to accurately classify audio data improves... 详细信息
来源: 评论
Using Unsupervised Learning to detect Fraud in Cryptocurrency  3
Using Unsupervised Learning to detect Fraud in Cryptocurrenc...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Chordia, Sankalp Nilesh Shinde, Sandeep Vishwakarma Institute of Technology Department of Computer Engineering Pune India
Bitcoin, the most popular form of cryptocurrency, operates independently of central banks or governmental entities. The emphasis on anonymity complicates the task of tracing cryptocurrency payments linked to illicit a... 详细信息
来源: 评论
Forecasting Renewable Energy Generation: A Predictive Modelling Approach  2
Forecasting Renewable Energy Generation: A Predictive Modell...
收藏 引用
2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Mondal, Priotosh Bhatia, Aditi Panjwani, Roshini Dokare, Indu Ves Institute of Technology Department of Computer Engineering Mumbai India
India's rapid urbanization demands innovative solutions to address energy consumption patterns while reducing reliance on fossil fuels. This research paper explores the application of predictive modelling techniqu... 详细信息
来源: 评论
Sign Language Translation Across Multiple Languages  4
Sign Language Translation Across Multiple Languages
收藏 引用
4th International Conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Antad, Sonali M. Chakrabarty, Siddhartha Bhat, Sneha Bisen, Somrath Jain, Sneha Vishwakarma Institute of Technology Department of Computer Engineering Pune India
Sign Language serves as the only mode of communication for people who are speech and hearing disabled. Despite this, they face many difficulties in communication due to different sign languages across the world using ... 详细信息
来源: 评论
Stock Indexes Community Identification Using BAT-Modified Optimization Algorithm
收藏 引用
SN computer Science 2024年 第8期5卷 1-14页
作者: Aggarwal, Kirti Arora, Anuja Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Stock price accelerates interest and preference of the young generation to explore the stock market with elicit interest. An autopilot system is needed where users choose beneficial stocks of their choice without payi... 详细信息
来源: 评论
Satellite Image to Map Translation using GANs  15
Satellite Image to Map Translation using GANs
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Phatangare, Sheetal Khalifa, Mohammed Mansoor Kharche, Sejal Khatib, Amaan Kshirsagar, Atharva Vishwakarma Institute of Technology Computer Engineering Department Pune India
Generative adversarial networks (GANs) are a promising method for learning deep representations without spending a lot of time on data for annotated training. They accomplish this by obtaining signals that are back pr... 详细信息
来源: 评论