咨询与建议

限定检索结果

文献类型

  • 62,387 篇 会议
  • 29,271 篇 期刊文献
  • 981 册 图书

馆藏范围

  • 92,639 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53,435 篇 工学
    • 35,480 篇 计算机科学与技术...
    • 28,589 篇 软件工程
    • 13,738 篇 信息与通信工程
    • 8,988 篇 控制科学与工程
    • 8,250 篇 电气工程
    • 7,683 篇 电子科学与技术(可...
    • 6,544 篇 生物工程
    • 5,475 篇 生物医学工程(可授...
    • 5,122 篇 光学工程
    • 3,560 篇 机械工程
    • 3,419 篇 化学工程与技术
    • 3,261 篇 动力工程及工程热...
    • 3,137 篇 仪器科学与技术
    • 3,018 篇 材料科学与工程(可...
    • 2,798 篇 网络空间安全
    • 2,384 篇 安全科学与工程
  • 32,525 篇 理学
    • 14,327 篇 数学
    • 12,392 篇 物理学
    • 7,552 篇 生物学
    • 4,710 篇 统计学(可授理学、...
    • 3,941 篇 化学
    • 3,308 篇 系统科学
  • 13,693 篇 管理学
    • 8,595 篇 管理科学与工程(可...
    • 5,710 篇 图书情报与档案管...
    • 4,158 篇 工商管理
  • 5,665 篇 医学
    • 4,684 篇 临床医学
    • 4,252 篇 基础医学(可授医学...
    • 2,588 篇 药学(可授医学、理...
    • 2,545 篇 公共卫生与预防医...
  • 2,733 篇 法学
    • 2,237 篇 社会学
  • 1,697 篇 经济学
  • 1,516 篇 农学
  • 829 篇 教育学
  • 420 篇 文学
  • 189 篇 军事学
  • 87 篇 艺术学
  • 9 篇 哲学
  • 7 篇 历史学

主题

  • 3,145 篇 accuracy
  • 2,681 篇 computer science
  • 2,641 篇 deep learning
  • 2,247 篇 feature extracti...
  • 2,224 篇 machine learning
  • 1,933 篇 computational mo...
  • 1,704 篇 training
  • 1,553 篇 internet of thin...
  • 1,553 篇 real-time system...
  • 1,535 篇 support vector m...
  • 1,513 篇 convolutional ne...
  • 1,377 篇 predictive model...
  • 1,178 篇 artificial intel...
  • 1,074 篇 optimization
  • 986 篇 neural networks
  • 946 篇 wireless sensor ...
  • 905 篇 security
  • 882 篇 data mining
  • 847 篇 computer archite...
  • 801 篇 data models

机构

  • 1,098 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 971 篇 physikalisches i...
  • 964 篇 oliver lodge lab...
  • 721 篇 university of ch...
  • 631 篇 infn laboratori ...
  • 611 篇 infn sezione di ...
  • 590 篇 infn sezione di ...
  • 579 篇 fakultät physik ...
  • 574 篇 chitkara univers...
  • 566 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 530 篇 department of ph...
  • 516 篇 h.h. wills physi...
  • 515 篇 imperial college...
  • 514 篇 nikhef national ...
  • 506 篇 stfc rutherford ...
  • 499 篇 school of physic...

作者

  • 261 篇 barter w.
  • 258 篇 a. gomes
  • 245 篇 c. alexa
  • 245 篇 beiter a.
  • 243 篇 j. m. izen
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 234 篇 j. wang
  • 231 篇 s. chen
  • 229 篇 blake t.
  • 225 篇 bellee v.
  • 223 篇 g. spigo
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 f. siegert
  • 217 篇 brundu d.
  • 217 篇 borsato m.

语言

  • 85,618 篇 英文
  • 6,134 篇 其他
  • 951 篇 中文
  • 84 篇 日文
  • 14 篇 法文
  • 11 篇 德文
  • 10 篇 斯洛文尼亚文
  • 7 篇 朝鲜文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Engineering Godavari Institute of Engineering and Technology"
92639 条 记 录,以下是1081-1090 订阅
排序:
Software Reliability Growth Testing Effort Function Model Dependent on Machine Learning and Neural Network Algorithm
Software Reliability Growth Testing Effort Function Model De...
收藏 引用
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
作者: Farooq, Refath Chishti, Mohammad Ahsan National Institute of Technology Department of Computer Science Engineering Srinagar India
The quantification of dependency stands as a crucial element in programming quality. The Software Reliability Growth Model (SRGM) is a commonly utilized tool for evaluating reliability across diverse and challenging s... 详细信息
来源: 评论
Security and Service Vulnerabilities with HTTP/3  16
Security and Service Vulnerabilities with HTTP/3
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Hari Hara Sudhan, S. Kulkarni, Sameer G. Indian Institute of Technology Gandhinagar Department of Computer Science and Engineering India
The adoption of Hypertext Transfer Protocol v3 (HTTP/3 or H3) is on the rise. In this context, we analyze the security vulnerabilities of H3, specifically with the QUIC protocol, and the associated challenges they pos... 详细信息
来源: 评论
Deep transfer learning technique to detect white blood cell classification in regular clinical practice using histopathological images
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5699-5723页
作者: Davamani, K. Anita Jawahar, Malathy Anbarasi, L. Jani Ravi, Vinayakumar Al Mazroa, Alanoud Robin, C. R. Rene Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Leather Process Technology Division CSIR-Central Leather Research Institute Chennai India School of Computing Science and Engineering Vellore Institute of Technology Vellore India Computer Science and Engineering Sri Sairam Engineering College Sirukalathur India Center for Artificial Intelligence Prince Mohammad Bin Fahd University Khobar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh11671 Saudi Arabia
Leukemia, a malignant disease characterized by the rapid proliferation of specific types of white blood cells (WBC), has prompted increased interest in leveraging automatic WBC classification system. This study presen... 详细信息
来源: 评论
Malicious Activities Prediction Over Online Social Networking Using Ensemble Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 461-479页
作者: S.Sadhasivam P.Valarmathie K.Dinakaran Department of Computer Science and Engineering K.S.R College of EngineeringThiruchengodeIndia Centre for Artificial Intelligence Chennai Institute of TechnologyChennaiIndia Department of Computer Science and Engineering S.A.Engineering CollegeChennaiIndia
With the vast advancements in Information technology,the emergence of Online Social Networking(OSN)has also hit its peak and captured the atten-tion of the young generation *** clone intends to replicate the users and... 详细信息
来源: 评论
PCLive: Pipelined Restoration of Application Containers for Reduced Service Downtime  15
PCLive: Pipelined Restoration of Application Containers for ...
收藏 引用
15th Annual ACM Symposium on Cloud Computing, SoCC 2024
作者: Tripathi, Shiv Bhushan Mishra, Debadatta Department of Computer Science and Engineering Indian Institute of Technology Kanpur India
Application containers are widely used in contemporary cloud computing environments. Migration of containers across hosts provides cost-effective cloud management by enabling improved server consolidation, load balanc... 详细信息
来源: 评论
Phishion: Phishing Detection Application  2
Phishion: Phishing Detection Application
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Rangasamy, Gokul Primya, T. Kumar, Gurupriya Sivakumar, Harinath Kanagaraj, G. Kpr Institute of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India Kumaraguru College of Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India
The threat posed by phishing websites is significant in the digital era due to the widespread use of online activities, which has prompted the need for a comprehensive remedy. The project involves building a website t... 详细信息
来源: 评论
Enhanced U-Net with Transformer-Driven Encoder for Medical Image Segmentation
Enhanced U-Net with Transformer-Driven Encoder for Medical I...
收藏 引用
2024 International Conference on Brain computer Interface and Healthcare Technologies, iCon-BCIHT 2024
作者: Palaniappan, Ramya Surendran, Suseendran Balakrishnan, Saranya Madanapalle Institute of Technology & Science Department of Computer Science & Engineering Madanapalle India Bannari Amman Institute of Technology Department of Computer Science and Engineering Erode India KGiSL Institute of Technology Department of Artificial Intelligence and Data science Coimbatore India
The automatic segmentation of tumours or lesions from magnetic resonance imaging (MRI) pictures is a critical but difficult task in clinical settings, sometimes necessitating laborious and time-consuming techniques. D... 详细信息
来源: 评论
A New Approach for Prevention of Malicious Attack in Post Disaster Using Delay Tolerant Network
A New Approach for Prevention of Malicious Attack in Post Di...
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Chakrabarti, Chandrima Bal, Saptarshi Jaiswal, Rishabh Ansari, Arbaz Akhtar Narula Institute of Technology Department of Computer Science and Engineering Kolkata India
Natural disasters still have a crippling effect on our infrastructure notwithstanding society's development. Communication systems, the backbone of our network, sustain the most damage during such crises. When it ... 详细信息
来源: 评论
Pedestrian Trajectory Prediction with Missing Data: Datasets, Imputation, and Benchmarking  38
Pedestrian Trajectory Prediction with Missing Data: Datasets...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chib, Pranav Singh Singh, Pravendra Department of Computer Science and Engineering Indian Institute of Technology Roorkee India
Pedestrian trajectory prediction is crucial for several applications such as robotics and self-driving vehicles. Significant progress has been made in the past decade thanks to the availability of pedestrian trajector...
来源: 评论
Blockchain Approaches for Healthcare: A Review and Outlook  5
Blockchain Approaches for Healthcare: A Review and Outlook
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Shaikh, Natasha Kasar, Smita Maharashtra Institute of Technology Department of Computer Science & Engineering Aurangabad India
Nowadays, the application of information technology worldwide is accelerating the digital transformation of the healthcare sector. Incorporating blockchain technology into healthcare provides better and more innovativ... 详细信息
来源: 评论