咨询与建议

限定检索结果

文献类型

  • 62,387 篇 会议
  • 29,271 篇 期刊文献
  • 981 册 图书

馆藏范围

  • 92,639 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53,435 篇 工学
    • 35,480 篇 计算机科学与技术...
    • 28,589 篇 软件工程
    • 13,738 篇 信息与通信工程
    • 8,988 篇 控制科学与工程
    • 8,250 篇 电气工程
    • 7,683 篇 电子科学与技术(可...
    • 6,544 篇 生物工程
    • 5,475 篇 生物医学工程(可授...
    • 5,122 篇 光学工程
    • 3,560 篇 机械工程
    • 3,419 篇 化学工程与技术
    • 3,261 篇 动力工程及工程热...
    • 3,137 篇 仪器科学与技术
    • 3,018 篇 材料科学与工程(可...
    • 2,798 篇 网络空间安全
    • 2,384 篇 安全科学与工程
  • 32,525 篇 理学
    • 14,327 篇 数学
    • 12,392 篇 物理学
    • 7,552 篇 生物学
    • 4,710 篇 统计学(可授理学、...
    • 3,941 篇 化学
    • 3,308 篇 系统科学
  • 13,693 篇 管理学
    • 8,595 篇 管理科学与工程(可...
    • 5,710 篇 图书情报与档案管...
    • 4,158 篇 工商管理
  • 5,665 篇 医学
    • 4,684 篇 临床医学
    • 4,252 篇 基础医学(可授医学...
    • 2,588 篇 药学(可授医学、理...
    • 2,545 篇 公共卫生与预防医...
  • 2,733 篇 法学
    • 2,237 篇 社会学
  • 1,697 篇 经济学
  • 1,516 篇 农学
  • 829 篇 教育学
  • 420 篇 文学
  • 189 篇 军事学
  • 87 篇 艺术学
  • 9 篇 哲学
  • 7 篇 历史学

主题

  • 3,145 篇 accuracy
  • 2,681 篇 computer science
  • 2,641 篇 deep learning
  • 2,247 篇 feature extracti...
  • 2,224 篇 machine learning
  • 1,933 篇 computational mo...
  • 1,704 篇 training
  • 1,553 篇 internet of thin...
  • 1,553 篇 real-time system...
  • 1,535 篇 support vector m...
  • 1,513 篇 convolutional ne...
  • 1,377 篇 predictive model...
  • 1,178 篇 artificial intel...
  • 1,074 篇 optimization
  • 986 篇 neural networks
  • 946 篇 wireless sensor ...
  • 905 篇 security
  • 882 篇 data mining
  • 847 篇 computer archite...
  • 801 篇 data models

机构

  • 1,098 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 971 篇 physikalisches i...
  • 964 篇 oliver lodge lab...
  • 721 篇 university of ch...
  • 631 篇 infn laboratori ...
  • 611 篇 infn sezione di ...
  • 590 篇 infn sezione di ...
  • 579 篇 fakultät physik ...
  • 574 篇 chitkara univers...
  • 566 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 530 篇 department of ph...
  • 516 篇 h.h. wills physi...
  • 515 篇 imperial college...
  • 514 篇 nikhef national ...
  • 506 篇 stfc rutherford ...
  • 499 篇 school of physic...

作者

  • 261 篇 barter w.
  • 258 篇 a. gomes
  • 245 篇 c. alexa
  • 245 篇 beiter a.
  • 243 篇 j. m. izen
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 234 篇 j. wang
  • 231 篇 s. chen
  • 229 篇 blake t.
  • 225 篇 bellee v.
  • 223 篇 g. spigo
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 f. siegert
  • 217 篇 brundu d.
  • 217 篇 borsato m.

语言

  • 85,618 篇 英文
  • 6,134 篇 其他
  • 951 篇 中文
  • 84 篇 日文
  • 14 篇 法文
  • 11 篇 德文
  • 10 篇 斯洛文尼亚文
  • 7 篇 朝鲜文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Engineering Godavari Institute of Engineering and Technology"
92639 条 记 录,以下是781-790 订阅
排序:
log-Sigmoid Activation-Based Long Short-Term Memory for Time-Series Data Classification
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第2期5卷 672-683页
作者: Ranjan, Priyesh Khan, Pritam Kumar, Sudhir Das, Sajal K. Department of Computer Science Missouri University of Science and Technology RollaMO65409 United States Department of Electrical Engineering Indian Institute of Technology Patna Patna801106 India
With the enhanced usage of artificial-intelligence-driven applications, the researchers often face challenges in improving the accuracy of data classification models, while trading off the complexity. In this article,... 详细信息
来源: 评论
A Novel Approach on Medical Health Record Management System Using Blockchain
A Novel Approach on Medical Health Record Management System ...
收藏 引用
International Conference on Intelligent Systems and Networks, ICISN 2024
作者: Swetha, M.S. Muneshwara, M.S. Madihalli, Amurtha T. Bhardwaj, Anand Ananya Solanki, Vijender Kumar Department of Information Science and Engineering BMS Institute of Technology and Management Bengaluru India Department of Computer Science and Engineering BMS Institute of Technology and Management Bengaluru India Department of Computer Science and Engineering Stanley College of Engineering & Technology for Women Telangana Hyderabad India
Blockchain technology has garnered significant attention across industries, offering advantages such as enhanced security, privacy, and decentralization. The healthcare sector, with its stringent requirements for data... 详细信息
来源: 评论
Generating Time-Series Data Using Generative Adversarial Networks for Mobility Demand Prediction
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5507-5525页
作者: Subhajit Chatterjee Yung-Cheol Byun Department of Computer Engineering Jeju National UniversityJeju-si63243Korea Department of Computer Engineering Major of Electronic EngineeringJeju National UniversityInstitute of Information Science&TechnologyJeju63243Korea
The increasing penetration rate of electric kickboard vehicles has been popularized and promoted primarily because of its clean and efficient *** kickboards are gradually growing in popularity in tourist and education... 详细信息
来源: 评论
Adaptive Malware Detection In Windows Portable Executables (Wpes)  4
Adaptive Malware Detection In Windows Portable Executables (...
收藏 引用
4th IEEE Asian Conference on Innovation in technology, ASIANCON 2024
作者: Sathish, A. Babu, N. Bhavani, M. Divya, K. Jhoshna, B. Hemavathi, T. Siddharth Institute of Engineering & Technology Department of Computer Science and Engineering Andra Pradesh India
It's crucial to comprehend the characteristics of malware variants that enable them to elude malware detection methods as they are created with the intention of avoiding detection by means of a variety of evasion ... 详细信息
来源: 评论
An intrusion detection system using ranked feature bagging
收藏 引用
International Journal of Information technology (Singapore) 2024年 第2期16卷 1213-1219页
作者: Azhagiri, M. Rajesh, A. Karthik, S. Raja, K. Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Computer Science and Engineering Jain University Bangalore India Department of IT College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ... 详细信息
来源: 评论
Motion Detection in Real-Time Surveillance Using Two Frame Differencing  1
收藏 引用
8th International Conference on Information and Communication technology for Competitive Strategies, ICTCS 2023
作者: Biswas, Tamal Bhattacharya, Diptendu Rudrapal, Dwijen Roy, Srijan Mandal, Gouranga National Institute of Technology Agartala Department of Computer Science and Engineering Tripura Agartala India National Institute of Technology Agartala Department of Computer Science and Engineering Tripura Agartala India National Institute of Technology Agartala Department of Computer Science and Engineering Tripura Agartala India National Institute of Technology Agartala Department of Computer Science and Engineering Tripura Agartala India Vellore Institute of Technology Andhra Pradesh India
This research article delves into the creation of a real-time system for detecting motion, particularly for surveillance purposes. The proposed approach relies on computer vision algorithms to analyze live video strea... 详细信息
来源: 评论
A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 1337-1351页
作者: W.Gracy Theresa A.Gayathri P.Rama Department of Computer Science and Engineering Panimalar Institute of TechnologyChennai600123Tamil NaduIndia Department of Information Technology Vellore Institute of TechnologyVellore632014Tamil NaduIndia Department of Computer Science and Engineering Loyola Institute of TechnologyChennai600123Tamil NaduIndia
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th... 详细信息
来源: 评论
Unmasking offensive content: a multimodal approach with emotional understanding
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Singh, Gopendra Vikram Ghosh, Soumitra Firdaus, Mauajama Ekbal, Asif Bhattacharyya, Pushpak Department of Computer Science and Engineering Indian Institute of Technology Patna Bihta Bihar Patna801103 India Fondazione Bruno Kessler Povo Trento38123 Italy University of Alberta Edmonton Alberta Canada Department of Computer Science and Engineering Indian Institute of Technology Bombay Powai Maharashtra Mumbai400076 India
The widespread use of social media has brought people from all over the world closer, but it has also become a platform for spreading hate, offensive content, and misinformation. Various forms of media, such as text, ... 详细信息
来源: 评论
Innovative Approach for Early Heart Disease Prediction: Gaussian Mixture Model and K-Nearest Neighbour  3
Innovative Approach for Early Heart Disease Prediction: Gaus...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Surendran, R. Anandaraj, B. Deepa, P. Mageshwari, M. Balamurugan, K.S. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Department of Computer Science and Engineering Madnapalle Institute of Technology & Science Andhra Pradesh Madanapalle India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer science and engineering Karpaga Vinayaga College of Engineering and Technology Tamil Nadu Chengalpattu India Department of Electronics and communication engineering Karpaga Vinayaga College of Engineering and Technology Tamil Nadu Chengalpattu India
An Electrocardiogram (ECG) contributes significantly to early diagnosis and classification of heart diseases, arrhythmia which means irregular heart rate. Regrettably, the process became difficult due to asymmetric an... 详细信息
来源: 评论
Decision Tree Based Key Management for Secure Group Communication
收藏 引用
computer Systems science & engineering 2022年 第8期42卷 561-575页
作者: P.Parthasarathi S.Shankar Department of Computer Science and Engineering Bannari Amman Institute of TechnologySathyamangalam638401India Department of Computer Science and Engineering Hindusthan College of Engineering and TechnologyCoimbatore641032India
Group communication is widely used by most of the emerging network applications like telecommunication,video conferencing,simulation applications,distributed and other interactive *** group communication plays a vital... 详细信息
来源: 评论