咨询与建议

限定检索结果

文献类型

  • 114,086 篇 会议
  • 52,233 篇 期刊文献
  • 1,502 册 图书

馆藏范围

  • 167,821 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,948 篇 工学
    • 65,562 篇 计算机科学与技术...
    • 53,010 篇 软件工程
    • 25,379 篇 信息与通信工程
    • 16,303 篇 控制科学与工程
    • 14,604 篇 电气工程
    • 13,983 篇 电子科学与技术(可...
    • 11,799 篇 生物工程
    • 9,375 篇 生物医学工程(可授...
    • 8,259 篇 光学工程
    • 6,936 篇 机械工程
    • 5,959 篇 化学工程与技术
    • 5,827 篇 动力工程及工程热...
    • 5,585 篇 仪器科学与技术
    • 5,298 篇 材料科学与工程(可...
    • 4,509 篇 网络空间安全
    • 4,151 篇 安全科学与工程
  • 56,593 篇 理学
    • 27,060 篇 数学
    • 19,431 篇 物理学
    • 13,384 篇 生物学
    • 8,886 篇 统计学(可授理学、...
    • 6,418 篇 化学
    • 6,315 篇 系统科学
  • 25,860 篇 管理学
    • 16,126 篇 管理科学与工程(可...
    • 10,782 篇 图书情报与档案管...
    • 7,567 篇 工商管理
  • 9,315 篇 医学
    • 7,756 篇 临床医学
    • 7,018 篇 基础医学(可授医学...
    • 4,365 篇 药学(可授医学、理...
    • 4,060 篇 公共卫生与预防医...
  • 4,904 篇 法学
    • 3,998 篇 社会学
  • 3,011 篇 经济学
  • 2,415 篇 农学
  • 1,604 篇 教育学
  • 862 篇 文学
  • 360 篇 军事学
  • 225 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,205 篇 computer science
  • 5,077 篇 accuracy
  • 4,296 篇 deep learning
  • 4,000 篇 feature extracti...
  • 3,605 篇 machine learning
  • 3,583 篇 computational mo...
  • 3,142 篇 training
  • 2,542 篇 support vector m...
  • 2,445 篇 convolutional ne...
  • 2,407 篇 internet of thin...
  • 2,388 篇 real-time system...
  • 2,351 篇 predictive model...
  • 2,166 篇 optimization
  • 1,998 篇 artificial intel...
  • 1,897 篇 data mining
  • 1,881 篇 wireless sensor ...
  • 1,729 篇 neural networks
  • 1,619 篇 computer archite...
  • 1,612 篇 security
  • 1,575 篇 data models

机构

  • 1,079 篇 cavendish labora...
  • 1,004 篇 department of ph...
  • 939 篇 physikalisches i...
  • 929 篇 oliver lodge lab...
  • 915 篇 department of co...
  • 837 篇 department of el...
  • 730 篇 university of ch...
  • 683 篇 department of el...
  • 682 篇 department of co...
  • 595 篇 infn sezione di ...
  • 576 篇 infn laboratori ...
  • 569 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 539 篇 infn sezione di ...
  • 535 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 528 篇 fakultät physik ...
  • 513 篇 school of physic...
  • 513 篇 department of ph...
  • 510 篇 imperial college...

作者

  • 255 篇 barter w.
  • 253 篇 a. gomes
  • 242 篇 c. alexa
  • 240 篇 s. chen
  • 238 篇 j. m. izen
  • 235 篇 j. wang
  • 232 篇 blake t.
  • 229 篇 c. amelung
  • 228 篇 g. bella
  • 228 篇 j. strandberg
  • 228 篇 d. calvet
  • 226 篇 beiter a.
  • 225 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 211 篇 g. spigo

语言

  • 144,687 篇 英文
  • 21,357 篇 其他
  • 1,928 篇 中文
  • 128 篇 日文
  • 29 篇 斯洛文尼亚文
  • 28 篇 德文
  • 28 篇 法文
  • 20 篇 朝鲜文
  • 6 篇 俄文
  • 5 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Science and Engineering Technology"
167821 条 记 录,以下是4261-4270 订阅
排序:
An Empirical Study of Machine Learning Techniques for ODI Bowler Performance Evaluation  4
An Empirical Study of Machine Learning Techniques for ODI Bo...
收藏 引用
4th International Conference on computer, Communication, Control and Information technology, C3IT 2024
作者: Das, Biswaranjan Das, Nayan Ranjan Mondal, Bappaditya Sur, Ratul Paul, Sushmita Das, Basudha Maity, Sutanu Academy of Technology Department of Engineering Science & Humanities West Bengal Hooghly712121 India Academy of Technology Department of Computer Science & Engineering West Bengal Hooghly712121 India Academy of Technology Department of Computer Science & Business Systems West Bengal Hooghly712121 India
The objective of the paper is to construct an innovative ranking system based on various Machine Learning (ML) techniques specifically tailored for One Day International (ODI) male players. It aims to create a recomme... 详细信息
来源: 评论
Securing Secret Information  1st
Securing Secret Information
收藏 引用
1st International Conference on Sci/Tech and engineering, ICSTE 2023
作者: Shamsi, Zeba Singh, Laiphrakpam Dolendro Department of Computer Science and Engineering National Institute of Technology Assam Silchar788010 India
The art of information concealment has become a crucial subject since information security has grown to be a primary concern in the online world. Using cryptography and steganography plays a significant role in secure... 详细信息
来源: 评论
Deep Learning and Dynamic BPSO for Road Accident Severity Prediction using Twitter Data  15
Deep Learning and Dynamic BPSO for Road Accident Severity Pr...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Raul, Sanjib Kumar Rout, Rashmi Ranjan Somayajulu, Dvln National Institute of Technology Department of Computer Science and Engineering Telangana Warangal506004 India
The traffic and medical authorities utilize accident severity prediction through social media postings for better administration and robust emergency response. Deep learning-based models can be used for accident sever... 详细信息
来源: 评论
A Key-Value pair Schema based Message Digest-5 Hash Algorithm for the Dynamic Data Masking  2
A Key-Value pair Schema based Message Digest-5 Hash Algorith...
收藏 引用
2nd IEEE International Conference on Data science and Network Security, ICDSNS 2024
作者: Gowda, Bharath Tumkur Shankare Raju, Channa Krishna Sri Siddhartha Institute of Technology Department of Computer Science and Engineering Maraluru Tumkur India
Dynamic data masking (DDM) is an efficient data security system for protecting personal, as well as other data from attackers or third parties. Reversible Data Hiding (RDH) is a scheme that hides secret data in a cove... 详细信息
来源: 评论
Deep Learning for Fraud Detection in Bitcoin Transactions: An AI Approach
Deep Learning for Fraud Detection in Bitcoin Transactions: A...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Shravan, M. Ajitha, E. Arnone, Gioia Renu, Nekkanti Tiwari, Mohit Chouhan, Kuldeep Sr University School of Business Telangana Warangal India St. Joseph's Institute of Technology Computer Science and Engineering India Vrije Universiteit Brussel Department of Private and Economic Law Bruxelles Belgium Department of Computer Science and Engineering Duvvada India Bharati Vidyapeeth's College of Engineering Department of Computer Science and Engineering Delhi Delhi India Sharda University Sharda School of Engineering and Technology Department of Computer Science and Applications Greater Noida201310 India
This research looks into how deep learning methods can be used to find fake Bitcoin transfers. It's mostly about the unique problems and chances that come with trading in cryptocurrencies and blockchain. Deep lear... 详细信息
来源: 评论
Enhancing Spatial Steganography for Optimal Data Concealment with Image Quality Preservation
Enhancing Spatial Steganography for Optimal Data Concealment...
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable technology, ICRISST 2024
作者: Padma, R. Yendapalli, Vamsidhar Gitam University Gitam School of Technology Department of Computer Science and Engineering Bangalore India
In the domain of steganography, the act of concealing data within an image poses a significant challengebalancing between the precision of the carrier image and the capacity for embedding information. This article int... 详细信息
来源: 评论
Multi-classifier approach to detect Alzheimer's Disease based on Handwriting Analysis  3
Multi-classifier approach to detect Alzheimer's Disease base...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Dadhania, Jatan K. Chaudhuri, Abhilasha Sardar Vallabhbhai National Institute of Technology Department of Computer Science and Engineering Surat India
Alzheimer's disease (AD) is a degenerative brain condition that predominantly impacts older individuals, resulting in a gradual decline in cognitive function and memory. Effective management and treatment of AD re... 详细信息
来源: 评论
Security in VANETs with Insider Attack Resistance and Signature Aggregation  2nd
Security in VANETs with Insider Attack Resistance and Sig...
收藏 引用
2nd International Conference on Advances in Data-driven Computing and Intelligent Systems, ADCIS 2023
作者: Lode, Vijaya Lasushe, Kekhelo Pinapati, Anil Department of Computer Science and Engineering National Institute of Technology Kerala Calicut673601 India
Vehicular Ad-hoc Networks (VANETs) are a type of network in which vehicles communicate with one another and exchange information so as to provide quality-of-life improvements to the vehicle users as well as the people... 详细信息
来源: 评论
Enhancing Elephant Emotion Detection Using YOLOv5, YOLOv8, and YOLOv9: A Study on Performance and Explainability
Enhancing Elephant Emotion Detection Using YOLOv5, YOLOv8, a...
收藏 引用
2024 IEEE Silchar Subsection Annual Conference, SILCON 2024
作者: Subair, Rubiya Benedict, Shajulin Indian Institute of Information Technology Kottayam Department of Computer Science and Engineering Kottayam India
Elephant emotion detection has marked a crucial component owing to the increased casualties due to human-elephant conflicts. The difficulty has increased due to the lack of algorithms that quickly identify emotions wi... 详细信息
来源: 评论
IoT-Based Pesticide Detection in Fruits and Vegetables Using Hyperspectral Imaging and Deep Learning  4th
IoT-Based Pesticide Detection in Fruits and Vegetables Usi...
收藏 引用
4th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2023
作者: Augustin, Anju Kiliroor, Cinu C. Department of Computer Science and Engineering Indian Institute of Information Technology Kottayam Kottayam India
Fruits and vegetables contain rich nutrients and vitamins. So that they are part of our daily diet. For proper cell growth and health, we need these nutrients. Today in most crops during their growth and post-harvesti... 详细信息
来源: 评论