咨询与建议

限定检索结果

文献类型

  • 88,320 篇 会议
  • 38,121 篇 期刊文献
  • 1,294 册 图书

馆藏范围

  • 127,735 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,423 篇 工学
    • 45,709 篇 计算机科学与技术...
    • 36,722 篇 软件工程
    • 18,477 篇 信息与通信工程
    • 11,982 篇 控制科学与工程
    • 11,843 篇 电气工程
    • 11,547 篇 电子科学与技术(可...
    • 8,280 篇 生物工程
    • 7,018 篇 生物医学工程(可授...
    • 6,680 篇 光学工程
    • 5,034 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,472 篇 仪器科学与技术
    • 4,417 篇 材料科学与工程(可...
    • 4,332 篇 动力工程及工程热...
    • 3,181 篇 网络空间安全
    • 2,940 篇 安全科学与工程
  • 43,183 篇 理学
    • 19,300 篇 数学
    • 16,640 篇 物理学
    • 9,498 篇 生物学
    • 6,356 篇 统计学(可授理学、...
    • 5,180 篇 化学
    • 4,677 篇 系统科学
  • 17,494 篇 管理学
    • 11,005 篇 管理科学与工程(可...
    • 7,248 篇 图书情报与档案管...
    • 5,347 篇 工商管理
  • 7,074 篇 医学
    • 5,856 篇 临床医学
    • 5,271 篇 基础医学(可授医学...
    • 3,276 篇 药学(可授医学、理...
    • 3,002 篇 公共卫生与预防医...
  • 3,447 篇 法学
    • 2,823 篇 社会学
  • 2,210 篇 经济学
  • 1,839 篇 农学
  • 1,141 篇 教育学
  • 550 篇 文学
  • 279 篇 军事学
  • 122 篇 艺术学
  • 14 篇 哲学
  • 8 篇 历史学

主题

  • 3,792 篇 accuracy
  • 3,039 篇 deep learning
  • 2,895 篇 feature extracti...
  • 2,823 篇 computer science
  • 2,694 篇 machine learning
  • 2,653 篇 computational mo...
  • 2,272 篇 training
  • 1,932 篇 real-time system...
  • 1,842 篇 support vector m...
  • 1,837 篇 internet of thin...
  • 1,770 篇 convolutional ne...
  • 1,762 篇 predictive model...
  • 1,584 篇 artificial intel...
  • 1,440 篇 optimization
  • 1,384 篇 neural networks
  • 1,340 篇 wireless sensor ...
  • 1,261 篇 data mining
  • 1,223 篇 security
  • 1,217 篇 bandwidth
  • 1,202 篇 computer archite...

机构

  • 1,087 篇 cavendish labora...
  • 1,020 篇 department of ph...
  • 962 篇 physikalisches i...
  • 950 篇 oliver lodge lab...
  • 765 篇 university of ch...
  • 646 篇 department of el...
  • 635 篇 chitkara univers...
  • 604 篇 infn laboratori ...
  • 603 篇 infn sezione di ...
  • 583 篇 infn sezione di ...
  • 559 篇 infn sezione di ...
  • 549 篇 school of physic...
  • 546 篇 fakultät physik ...
  • 535 篇 horia hulubei na...
  • 526 篇 department of ph...
  • 523 篇 school of physic...
  • 511 篇 imperial college...
  • 510 篇 h.h. wills physi...
  • 502 篇 stfc rutherford ...
  • 501 篇 nikhef national ...

作者

  • 258 篇 barter w.
  • 257 篇 a. gomes
  • 244 篇 c. alexa
  • 240 篇 j. m. izen
  • 236 篇 beiter a.
  • 235 篇 c. amelung
  • 235 篇 j. wang
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 232 篇 blake t.
  • 231 篇 s. chen
  • 225 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 219 篇 borsato m.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 110,503 篇 英文
  • 15,903 篇 其他
  • 1,428 篇 中文
  • 119 篇 日文
  • 24 篇 法文
  • 23 篇 德文
  • 19 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 爱沙尼亚文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Engineering and Informatics Computer Technology Institute"
127735 条 记 录,以下是871-880 订阅
排序:
A Novel Fuzzy-Based Modified GAN and Faster RCNN for Classification of Banana Leaf Disease
收藏 引用
Journal of The Institution of Engineers (India): Series A 2023年 第3期104卷 529-540页
作者: Raja, N. Bharathi Rajendran, P. Selvi Department of Computer Science and Engineering Hindustan Institute of Technology and Science Tamil Nadu Kelambakkam India
In the global marketplace, agriculture plays an important role. However, diseases produced in plants mostly affect the financial system. Pest occurrence and climatic changes are the leading trouble that the banana pla... 详细信息
来源: 评论
A fast verifiable fully homomorphic encryption technique for secret computation on cloud data
收藏 引用
International Journal of Information technology (Singapore) 2025年 第4期17卷 2193-2207页
作者: Mahato, Ganesh Kumar Chakraborty, Swarnendu Kumar Department of Computer Science and Engineering National Institute of Technology Arunachal Pradesh Jote 791113 India
In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of utmost importance. This paper introduces a pioneering verifiable homom... 详细信息
来源: 评论
An efficient botnet detection approach based on feature learning and classification
收藏 引用
Journal of Control and Decision 2023年 第1期10卷 40-53页
作者: B.Padmavathi B.Muthukumar Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyChennaiIndia Computer Science and Engineering Easwari Engineering CollegeChennaiIndia DMI College of Engineering ChennaiIndia
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced b... 详细信息
来源: 评论
Quality of Service-aware 6G-Enabled NB-IoT for Health Monitoring in Long Distance High-Speed Trains
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1136-1147页
作者: Roy, Bipasha Guha Roy, Deepsubhra Guha Dutta, Piyali Khan, Surbhi Bhatia Asiri, Fatima Ayadi, Manel Institute of Engineering and Management Kolkata India Institute of Engineering and Management Kolkata India University of Salford Chitkara University Institute of Engineering and Technology Chitkara University Department of Data Science United Kingdom University Centre for Research and Development Chandigarh University India Centre for Research Impact and Outcome Punjab Rajpura140401 India King Khalid University College of computer science Informatics and computer systems department Saudi Arabia Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Systems Riyadh11671 Saudi Arabia
Internet of Things connectivity in home health monitoring is a high-in-demand application area. The electronics industry and procedural researchers seek high-end, secured, on-time, cost-effective ways to build reliabl... 详细信息
来源: 评论
Music Generation Algorithms: An In-Depth Review of Future Directions and Applications Explored
Music Generation Algorithms: An In-Depth Review of Future Di...
收藏 引用
2024 IEEE International Conference on Big Data and Machine Learning, ICBDML 2024
作者: Duraisamy, Premkumar Naveen, V. Kishore, G.N. Nishal, S. KPR Institute of Engineering and Technology Department of Computer Science and Engineering Coimbatore India
Music generation algorithms have made significant progress in recent years, enabling the development of algorithms to generate creative and realistic music. This survey paper provides a comprehensive overview of music... 详细信息
来源: 评论
Q-Learning-Assisted Meta-Heuristics for Scheduling Distributed Hybrid Flow Shop Problems
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3573-3589页
作者: Qianyao Zhu Kaizhou Gao Wuze Huang Zhenfang Ma Adam Slowik Institute of Systems Engineering Macao University of Science and TechnologyMacao99078China Department of Electronics and Computer Science Koszalin University of TechnologyKoszalin75-453Poland
The flow shop scheduling problem is important for the manufacturing *** flow shop scheduling can bring great benefits to the ***,there are few types of research on Distributed Hybrid Flow Shop Problems(DHFSP)by learni... 详细信息
来源: 评论
Leveraging Large Language Models and RAPIDS AI to Detect Fraudulent AI-Generated Marketplace Reviews
Leveraging Large Language Models and RAPIDS AI to Detect Fra...
收藏 引用
2024 IEEE Region 10 Conference, TENCON 2024
作者: Dudeja, Nishit Pundir, Arun Singh Thapar Institute of Engineering and Technology Computer Science and Engineering Department Patiala India
Consumer confidence is, in the present time, a dilemma given the steadily rising number of deceptive and inaccurate AI-generated reviews on internet marketplaces. There is an urgent need for a thorough dataset, which ... 详细信息
来源: 评论
Blockchain-based immunization against kleptographic attacks
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 172-183页
作者: Changsong JIANG Chunxiang XU Jie CHEN Kefei CHEN School of Computer Science and Engineering University of Electronic Science and Technology of China Yangtze Delta Region Institute (Huzhou) University of Electronic Science and Technology of China Department of Mathematics Hangzhou Normal University
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel attacks are one of the kleptographic attacks. In such attacks, backdoors... 详细信息
来源: 评论
A geometric-approach based Combinatorial Transformative Scalogram analysis for multiclass identification of pathologies in a voice signal
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Khumukcham, Ranita Nongmeikapam, Kishorjit Department of Electronics and Communication Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India Department of Computer Science and Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from th... 详细信息
来源: 评论
Energy Aware Routing in Wireless Sensor Networks for Agricultural Monitoring: A Deep Q-Network Based Framework
收藏 引用
SN computer Science 2024年 第7期5卷 1-21页
作者: Dey, Ranadeep Thakurta, Parag Kumar Guha Kar, Samarjit Department of Computer Science and Engineering National Institute of Technology Durgapur India Department of Mathematics National Institute of Technology Durgapur India
Instead of earlier traditional farming, wireless sensor networks (WSNs) can be effectively used in the precision agriculture to improve the farmer’s livelihood. Whereas, hierarchical routing based protocols in WSNs a... 详细信息
来源: 评论