咨询与建议

限定检索结果

文献类型

  • 33,144 篇 会议
  • 22,473 篇 期刊文献
  • 616 册 图书

馆藏范围

  • 56,233 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,285 篇 工学
    • 22,439 篇 计算机科学与技术...
    • 18,181 篇 软件工程
    • 8,872 篇 信息与通信工程
    • 6,062 篇 控制科学与工程
    • 5,128 篇 电气工程
    • 4,732 篇 电子科学与技术(可...
    • 4,134 篇 生物工程
    • 3,372 篇 生物医学工程(可授...
    • 3,058 篇 光学工程
    • 2,427 篇 机械工程
    • 2,088 篇 动力工程及工程热...
    • 2,053 篇 化学工程与技术
    • 2,043 篇 仪器科学与技术
    • 1,773 篇 网络空间安全
    • 1,599 篇 材料科学与工程(可...
    • 1,491 篇 安全科学与工程
  • 20,636 篇 理学
    • 9,768 篇 数学
    • 7,063 篇 物理学
    • 4,826 篇 生物学
    • 3,317 篇 统计学(可授理学、...
    • 2,390 篇 化学
    • 2,227 篇 系统科学
  • 9,109 篇 管理学
    • 6,003 篇 管理科学与工程(可...
    • 3,423 篇 图书情报与档案管...
    • 2,696 篇 工商管理
  • 3,652 篇 医学
    • 2,934 篇 临床医学
    • 2,612 篇 基础医学(可授医学...
    • 1,655 篇 公共卫生与预防医...
    • 1,532 篇 药学(可授医学、理...
  • 1,739 篇 法学
    • 1,447 篇 社会学
  • 1,053 篇 经济学
  • 821 篇 农学
  • 553 篇 教育学
  • 276 篇 文学
  • 117 篇 军事学
  • 75 篇 艺术学
  • 6 篇 历史学
  • 5 篇 哲学

主题

  • 1,842 篇 accuracy
  • 1,583 篇 deep learning
  • 1,256 篇 machine learning
  • 1,219 篇 feature extracti...
  • 1,089 篇 training
  • 1,053 篇 computer science
  • 1,045 篇 computational mo...
  • 971 篇 internet of thin...
  • 856 篇 real-time system...
  • 814 篇 convolutional ne...
  • 786 篇 predictive model...
  • 764 篇 optimization
  • 764 篇 artificial intel...
  • 686 篇 support vector m...
  • 531 篇 data models
  • 496 篇 security
  • 447 篇 reliability
  • 430 篇 wireless sensor ...
  • 428 篇 cloud computing
  • 425 篇 neural networks

机构

  • 1,100 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 989 篇 physikalisches i...
  • 976 篇 oliver lodge lab...
  • 642 篇 university of ch...
  • 599 篇 fakultät physik ...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 541 篇 department of ph...
  • 537 篇 school of physic...
  • 527 篇 imperial college...
  • 524 篇 iccub universita...
  • 524 篇 nikhef national ...
  • 516 篇 h.h. wills physi...
  • 515 篇 stfc rutherford ...
  • 513 篇 school of physic...
  • 506 篇 physik-institut ...
  • 497 篇 henryk niewodnic...
  • 495 篇 infn laboratori ...
  • 494 篇 school of physic...

作者

  • 275 篇 barter w.
  • 268 篇 a. gomes
  • 259 篇 beiter a.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 239 篇 g. spigo
  • 239 篇 bellee v.
  • 239 篇 s. chen
  • 234 篇 brundu d.
  • 232 篇 bowcock t.j.v.
  • 231 篇 blake t.
  • 229 篇 f. siegert
  • 223 篇 betancourt c.
  • 222 篇 y. tayalati
  • 220 篇 amato s.
  • 219 篇 borsato m.

语言

  • 51,170 篇 英文
  • 4,381 篇 其他
  • 646 篇 中文
  • 72 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering GITAM School of Technology"
56233 条 记 录,以下是51-60 订阅
排序:
Slender loris optimization algorithm for solving optimization problems
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 8799-8810页
作者: Lakshmi, A. Vijaya Vaitheki, K. Joseph, K. Suresh Department of Computer Science School of Engineering and Technology Pondicherry University India
Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a nov... 详细信息
来源: 评论
A QoS-aware routing approach for Internet of Things-enabled wireless sensor networks in smart cities
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17951-17977页
作者: Karunkuzhali, D. Meenakshi, B. Lingam, Keerthi Department of Information Technology Panimalar Engineering College Chennai India Department of Electrical and Electronics Engineering Sri Sairam Engineering College Chennai India Department of Computer Science and Engineering Gitam University Visakhapatnam India
In the Internet of Things (IoT), optimizing machine performance through data analysis and improved connectivity is pivotal. Addressing the growing need for environmentally friendly IoT solutions, we focus on "gre... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论
Privacy-preserving recommendation with coarse-grained spatiotemporal contexts
收藏 引用
science China(Information sciences) 2025年 第4期68卷 66-81页
作者: Lei CHEN Chen GAO Jiahuan LEI Xiaoyi DU Xinlei SHI Hengliang LUO Depeng JIN Yong LI Meng WANG Department of Electronic Engineering BNRist Tsinghua University Meituan Inc. School of Computer Science and Information Engineering Hefei University of Technology
The behavior of users on online life service platforms like Meituan and Yelp often occurs within specific finegrained spatiotemporal contexts(i.e., when and where). Recommender systems, designed to serve millions of u... 详细信息
来源: 评论
The Implication of Multimedia in the Information Revolution  2
The Implication of Multimedia in the Information Revolution
收藏 引用
2nd International Conference Computational and Characterization Techniques in engineering and sciences, IC3TES 2024
作者: Kamidi, Deepthi Mirona, G. Gudipati, Sri Sowmya Rani T, Jhansi Govathoti, Sudeepthi Polamuri, Subba Rao Vignan Institute of Technology and Science Department of Computer Science and Engineering India Malla Reddy Engineering College for Women Secunderabad India Gitam Deemed-to-be-University Dept of Cse Gitam School of Technology Telangana Hyderabad India Gitam Deemed-to-be-University Dept of Cse Gitam School of Technology Hyderabad India Aditya University Department of Computer Science and Engineering Andhra Pradesh Surampalem India
The Information Revolution has been greatly influenced by advancements in the integrated use of various media, including documents, images, and audiovisual content transmitted via radio waves and television. Multimedi... 详细信息
来源: 评论
Investigation of symmetric and asymmetric eye patterns for bell's palsy diagnosis  21
Investigation of symmetric and asymmetric eye patterns for b...
收藏 引用
21st OITS International Conference on Information technology, OCIT 2023
作者: Prasad, Thati Ravi Naulegari, Janardhan Visvesvaraya National Institute of Technology Department of Computer Science and Engineering Nagpur India GITAM Deemed-To-be-University GITAM School of Technology Department of Computer Science and Engineering Hyderabad India
The development of an objective tool for the diagnosis of Bell's palsy (BP) has garnered significant attention among researchers, as it can aid in early treatment. This study aimed to address three research questi... 详细信息
来源: 评论
An Encoding-Decoding Framework Based on CNN for circ RNA-RBP Binding Sites Prediction
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 256-263页
作者: Yajing GUO Xiujuan LEI Yi PAN School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Department of Computer Science Georgia State University
Predicting RNA binding protein(RBP) binding sites on circular RNAs(circ RNAs) is a fundamental step to understand their interaction mechanism. Numerous computational methods are developed to solve this problem, but th... 详细信息
来源: 评论
Towards an Efficient DDoS Attack Detection in SDN: An Approach with CNN-GRU Fusion  4
Towards an Efficient DDoS Attack Detection in SDN: An Approa...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Goud, Konda Srikar Rao, Giduturi Srinivasa Gitam University Gitam School of Technology Department of Computer Science and Engineering AP Visakhapatnam India Bvrit Hyderabad College of Engineering for Women Telangana Hyderabad India
The emergence of Distributed Denial of Service (DDoS) attacks presents a significant risk to Software-Defined Networking (SDN) services. This study focuses on developing an effective method for detecting DDoS attacks ... 详细信息
来源: 评论
Poor and rich squirrel algorithm-based Deep Maxout network for credit card fraud detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 123-134页
作者: Paul, Annu Paul, Varghese Department of Computer Science Alphonsa College Kottayam Kerala Pala India Department of Computer Science and Engineering Rajagiri School of Engineering and Technology Kerala Kochi India
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation... 详细信息
来源: 评论