咨询与建议

限定检索结果

文献类型

  • 33,246 篇 会议
  • 22,515 篇 期刊文献
  • 613 册 图书

馆藏范围

  • 56,374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,392 篇 工学
    • 22,370 篇 计算机科学与技术...
    • 18,096 篇 软件工程
    • 8,852 篇 信息与通信工程
    • 6,042 篇 控制科学与工程
    • 5,119 篇 电气工程
    • 4,763 篇 电子科学与技术(可...
    • 4,132 篇 生物工程
    • 3,362 篇 生物医学工程(可授...
    • 3,020 篇 光学工程
    • 2,417 篇 机械工程
    • 2,083 篇 动力工程及工程热...
    • 2,053 篇 化学工程与技术
    • 2,031 篇 仪器科学与技术
    • 1,775 篇 网络空间安全
    • 1,657 篇 材料科学与工程(可...
    • 1,488 篇 安全科学与工程
  • 20,563 篇 理学
    • 9,738 篇 数学
    • 7,047 篇 物理学
    • 4,820 篇 生物学
    • 3,322 篇 统计学(可授理学、...
    • 2,395 篇 化学
    • 2,224 篇 系统科学
  • 9,084 篇 管理学
    • 5,996 篇 管理科学与工程(可...
    • 3,412 篇 图书情报与档案管...
    • 2,684 篇 工商管理
  • 3,630 篇 医学
    • 2,914 篇 临床医学
    • 2,590 篇 基础医学(可授医学...
    • 1,637 篇 公共卫生与预防医...
    • 1,534 篇 药学(可授医学、理...
  • 1,733 篇 法学
    • 1,443 篇 社会学
  • 1,051 篇 经济学
  • 816 篇 农学
  • 548 篇 教育学
  • 274 篇 文学
  • 116 篇 军事学
  • 76 篇 艺术学
  • 6 篇 历史学
  • 5 篇 哲学

主题

  • 1,880 篇 accuracy
  • 1,610 篇 deep learning
  • 1,268 篇 machine learning
  • 1,243 篇 feature extracti...
  • 1,090 篇 training
  • 1,063 篇 computational mo...
  • 1,049 篇 computer science
  • 988 篇 internet of thin...
  • 895 篇 real-time system...
  • 820 篇 convolutional ne...
  • 796 篇 predictive model...
  • 786 篇 optimization
  • 776 篇 artificial intel...
  • 693 篇 support vector m...
  • 555 篇 data models
  • 506 篇 security
  • 463 篇 reliability
  • 444 篇 cloud computing
  • 438 篇 wireless sensor ...
  • 429 篇 neural networks

机构

  • 1,103 篇 cavendish labora...
  • 1,037 篇 department of ph...
  • 997 篇 physikalisches i...
  • 979 篇 oliver lodge lab...
  • 647 篇 university of ch...
  • 609 篇 fakultät physik ...
  • 561 篇 school of physic...
  • 541 篇 department of ph...
  • 540 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 526 篇 imperial college...
  • 523 篇 iccub universita...
  • 517 篇 nikhef national ...
  • 515 篇 h.h. wills physi...
  • 514 篇 stfc rutherford ...
  • 509 篇 school of physic...
  • 500 篇 physik-institut ...
  • 498 篇 infn laboratori ...
  • 494 篇 infn sezione di ...
  • 493 篇 henryk niewodnic...

作者

  • 283 篇 barter w.
  • 268 篇 a. gomes
  • 259 篇 beiter a.
  • 249 篇 c. alexa
  • 248 篇 c. amelung
  • 247 篇 j. m. izen
  • 246 篇 g. bella
  • 246 篇 j. strandberg
  • 246 篇 d. calvet
  • 242 篇 bellee v.
  • 240 篇 g. spigo
  • 239 篇 brundu d.
  • 239 篇 s. chen
  • 237 篇 blake t.
  • 232 篇 bowcock t.j.v.
  • 229 篇 f. siegert
  • 226 篇 betancourt c.
  • 225 篇 amato s.
  • 223 篇 boettcher t.
  • 222 篇 y. tayalati

语言

  • 47,077 篇 英文
  • 8,636 篇 其他
  • 659 篇 中文
  • 72 篇 日文
  • 15 篇 德文
  • 15 篇 法文
  • 7 篇 斯洛文尼亚文
  • 4 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering GITAM School of Technology"
56374 条 记 录,以下是91-100 订阅
排序:
Composite spectral spatial pixel CNN for land-use hyperspectral image classification with hybrid activation function
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10527-10550页
作者: Banerjee, Anasua Swain, Satyajit Rout, Minakhi Bandyopadhyay, Mainak School of Computer Engineering Kalinga Institute of Industrial Technology-Deemed-to-be-University Bhubaneswar India Department of Computer Science and Engineering National Institute of Technology Silchar India
Deep learning methods have played a prominent role in the development of computer visualization in recent years. Hyperspectral imaging (HSI) is a popular analytical technique based on spectroscopy and visible imaging ... 详细信息
来源: 评论
Enhanced prediction of agricultural CO2 emission using ensemble machine learning-based imputation approach
收藏 引用
Neural Computing and Applications 2024年 第36期36卷 22867-22887页
作者: Thendral, M. Sathya Abinaya, S. Devi, M. K. Kavitha Department of Computer Science and Engineering Thiagarajar College of Engineering Madurai625015 India School of Computer Science and Engineering Vellore Institute of Technology Chennai600127 India
The agricultural sector contributes significantly to greenhouse gas emissions, which cause global warming and climate change. Numerous mathematical models have been developed to predict the greenhouse gas emissions fr... 详细信息
来源: 评论
A Privacy-Preserving Data Aggregation Protocol for Internet of Vehicles with Federated Learning
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-11页
作者: Xu, Zisang Zhang, Ruirui Liang, Wei Li, Kuan-Ching Gu, Ke Li, Xiong Huang, Jialun Computer and Communication Engineer Institute Changsha University of Science and Technology Changsha China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Department of Computer Science and Information Engineering Providence University Taichung Taiwan Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Federated learning (FL) is widely used in various fields because it can guarantee the privacy of the original data source. However, in data-sensitive fields such as Internet of Vehicles (IoV), insecure communication c... 详细信息
来源: 评论
ComMatch: A semi-supervised learning classification algorithm based on model calibration
收藏 引用
Journal of Intelligent and Fuzzy Systems 2025年 第6期48卷 811-822页
作者: Li, Ye Zhou, Jingkang School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai China Department of Control Science and Engineering University of Shanghai for Science and Technology Shanghai China
Semi-supervised learning (SSL) aims to reduce reliance on labeled data. Achieving high performance often requires more complex algorithms, therefore, generic SSL algorithms are less effective when it comes to image cl... 详细信息
来源: 评论
Comprehensive Learning Particle Swarm Optimization(CLPSO) based hybrid cloud task scheduling with predefined completion time constraints  1
Comprehensive Learning Particle Swarm Optimization(CLPSO) ba...
收藏 引用
1st IEEE International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems, ICAECIS 2023
作者: Nallola, Sandhya Rani Ayyasam, Vadivel Gitam Deemed to Be University Gitam School of Technology Dept. of Computer Science & Engineering Bengaluru India
This paper proposed comprehensive learning PSO based on deadline constraint task scheduling for a hybrid IaaS cloud environment. One of the significant challenges in managing cloud services is scheduling tasks to VMs ... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
Appearance and motion-based unusual crowd events detection using multiple moving objects
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90177-90189页
作者: Babu, K. Atlas, L. Godlin Sreeji, S. Arjun, K.P. Rasmi, A. Senthilvel, P. Gururama Computational Intelligence SRM Institute of Science & Technology Chengalpet Kattankulathur603203 India Department of Computer Science and Engineering Bharath Institute of Higher Education and Research Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Department of Computer Science and Engineering Gitam University Karnataka Bengaluru India Information Science and Engineering RRIT Bangalore India Saveetha University Chennai602 105 India
Unusual crowd analysis is an important problem in surveillance video due to their features cannot be extracted efficiently on the crowd scenes. To overcome this challenge, this paper introduced the appearance and moti... 详细信息
来源: 评论
Malware Evasion Attacks Against IoT and Other Devices: An Empirical Study
收藏 引用
Tsinghua science and technology 2024年 第1期29卷 127-142页
作者: Yan Xu Deqiang Li Qianmu Li Shouhuai Xu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Department of Computer Science University of Colorado Colorado SpringsColorado SpringsCO 80918USA
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***... 详细信息
来源: 评论
Inductive Lottery Ticket Learning for Graph Neural Networks
收藏 引用
Journal of computer science & technology 2024年 第6期39卷 1223-1237页
作者: Yong-Duo Sui Xiang Wang Tianlong Chen Meng Wang Xiang-Nan He Tat-Seng Chua School of Data Science University of Science and Technology of ChinaHefei 230027China Department of Electrical and Computer Engineering The University of Texas at AustinAustin 78712U.S.A School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China School of Computing National University of SingaporeSingapore
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplor... 详细信息
来源: 评论
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1205-1222页
作者: Jungpil Shin Md.AlMehedi Hasan Md.Maniruzzaman Taiki Watanabe Issei Jozume School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... 详细信息
来源: 评论