咨询与建议

限定检索结果

文献类型

  • 113,836 篇 会议
  • 52,630 篇 期刊文献
  • 1,508 册 图书

馆藏范围

  • 167,974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,917 篇 工学
    • 65,837 篇 计算机科学与技术...
    • 53,180 篇 软件工程
    • 25,490 篇 信息与通信工程
    • 16,485 篇 控制科学与工程
    • 14,558 篇 电气工程
    • 13,860 篇 电子科学与技术(可...
    • 11,815 篇 生物工程
    • 9,404 篇 生物医学工程(可授...
    • 8,394 篇 光学工程
    • 6,951 篇 机械工程
    • 5,963 篇 化学工程与技术
    • 5,857 篇 动力工程及工程热...
    • 5,618 篇 仪器科学与技术
    • 4,986 篇 材料科学与工程(可...
    • 4,535 篇 网络空间安全
    • 4,167 篇 安全科学与工程
  • 56,808 篇 理学
    • 27,083 篇 数学
    • 19,484 篇 物理学
    • 13,405 篇 生物学
    • 8,823 篇 统计学(可授理学、...
    • 6,446 篇 化学
    • 6,325 篇 系统科学
  • 25,913 篇 管理学
    • 16,141 篇 管理科学与工程(可...
    • 10,802 篇 图书情报与档案管...
    • 7,579 篇 工商管理
  • 9,392 篇 医学
    • 7,812 篇 临床医学
    • 7,050 篇 基础医学(可授医学...
    • 4,364 篇 药学(可授医学、理...
    • 4,080 篇 公共卫生与预防医...
  • 4,903 篇 法学
    • 3,991 篇 社会学
  • 3,020 篇 经济学
  • 2,435 篇 农学
  • 1,600 篇 教育学
  • 867 篇 文学
  • 360 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,974 篇 accuracy
  • 4,270 篇 deep learning
  • 3,962 篇 feature extracti...
  • 3,618 篇 machine learning
  • 3,540 篇 computational mo...
  • 3,123 篇 training
  • 2,519 篇 support vector m...
  • 2,411 篇 convolutional ne...
  • 2,370 篇 internet of thin...
  • 2,308 篇 real-time system...
  • 2,305 篇 predictive model...
  • 2,145 篇 optimization
  • 1,973 篇 artificial intel...
  • 1,906 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,691 篇 neural networks
  • 1,613 篇 computer archite...
  • 1,588 篇 security
  • 1,547 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 926 篇 department of co...
  • 842 篇 department of el...
  • 741 篇 university of ch...
  • 679 篇 department of el...
  • 675 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 232 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 156,020 篇 英文
  • 10,140 篇 其他
  • 1,863 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering Technology"
167974 条 记 录,以下是691-700 订阅
排序:
Job Candidate Eligibility Prediction using Convolutional Neural Network  4
Job Candidate Eligibility Prediction using Convolutional Neu...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Shaw, Mayank Kumar Dey, Prianka Chowdhury, Sagarika Ghosh, Tanmoy University of Calcutta Department of Computer Science and Engineering India Narula Institute of Technology Department of Computer Science and Engineering India
The foundation of the applicant selection process is the candidate eligibility criteria. All applications must go through some evaluation process to get selected for a job. Without the use of a machine learning algori... 详细信息
来源: 评论
Intent and URL based ML Classification for Phishing Detection
Intent and URL based ML Classification for Phishing Detectio...
收藏 引用
2024 International Conference on Smart Systems for Electrical, Electronics, Communication and computer engineering, ICSSEEC 2024
作者: Uloli, Thiruvaazhi Sadasivam, Sudha Kumaraguru College of Technology Department of Computer Science & Engineering Coimbatore India PSG College of Technology Department of Computer Science & Engineering Coimbatore India
Reports show that the number of phishing web sites is exponentially increasing and it is estimated that between 80% to 93 % of the data breaches are involving phishing attacks. With both probability of occurrence as w... 详细信息
来源: 评论
A Novel Deep Reinforcement Learning Approach for Stability-Based Parallel Disassembly Sequence Planning Problem
收藏 引用
SN computer science 2025年 第3期6卷 1-19页
作者: Kumar, M. R. Mahesh Ravi, Chandrasekar Department of Computer Science and Engineering National Institute of Technology Puducherry Karaikal India
Parallel Disassembly Sequence Planning (DSP) deals with obtaining the order of disassembling the product with multiple parts disassembling simultaneously. Existing studies derive the product’s disassembly order based... 详细信息
来源: 评论
Energy inefficiency diagnosis for Android applications: a literature review
收藏 引用
Frontiers of computer science 2023年 第1期17卷 35-50页
作者: Yuxia SUN Jiefeng FANG Yanjia CHEN Yepang LIU Zhao CHEN Song GUO Xinkai CHEN Ziyuan TAN Department of Computer Science Jinan UniversityGuangzhou 510632China Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China The Department of Computing Hong Kong Polytechnic UniversityHong Kong 999077China
Android applications are becoming increasingly powerful in recent years. While their functionality is still of paramount importance to users, the energy efficiency of these applications is also gaining more and more a... 详细信息
来源: 评论
Identifying Selected Diseases of Leaves using Deep Learning and Transfer Learning Models
收藏 引用
Machine Graphics and Vision 2023年 第1期32卷 55-71页
作者: Mimi, Afsana Zohura, Sayeda Fatema Tuj Ibrahim, Muhammad Haque, Riddho Ridwanul Farrok, Omar Jabid, Taskeed Ali, Md Sawkat Department of Computer Science and Engineering East West University Dhaka Bangladesh Department of Computer Science and Engineering University of Dhaka Dhaka Bangladesh Ahsanullah University of Science and Technology Dhaka Bangladesh
Leaf diseases may harm plants in different ways, often causing reduced productivity and, at times, lethal consequences. Detecting such diseases in a timely manner can help plant owners take effective remedial measures... 详细信息
来源: 评论
A Service Level Agreement Aware Online Algorithm for Virtual Machine Migration
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 279-291页
作者: Iftikhar Ahmad Ambreen Shahnaz Muhammad Asfand-e-Yar Wajeeha Khalil Yasmin Bano Department of Computer Science and Information Technology University of Engineering and TechnologyPeshawar25120Pakistan Department of Computer Science Shaheed Benazir Bhutto Women UniversityPeshawar25000Pakistan Center of Excellence in Artificial Intelligence Department of Computer ScienceBahria UniversityIslamabadPakistan
The demand for cloud computing has increased manifold in the recent *** specifically,on-demand computing has seen a rapid rise as organizations rely mostly on cloud service providers for their day-to-day computing ***... 详细信息
来源: 评论
An Investigation of Frequency-Domain Pruning Algorithms for Accelerating Human Activity Recognition Tasks Based on Sensor Data
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2219-2242页
作者: Jian Su Haijian Shao Xing Deng Yingtao Jiang School of Computer Jiangsu University of Science and TechnologyZhenjiang212003China Department of Electrical and Computer Engineering University of NevadaLas VegasNV 89154USA
The rapidly advancing Convolutional Neural Networks(CNNs)have brought about a paradigm shift in various computer vision tasks,while also garnering increasing interest and application in sensor-based Human Activity Rec... 详细信息
来源: 评论
A Novel Lightweight Image Encryption Scheme
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2137-2153页
作者: Rawia Abdulla Mohammed Maisa’a Abid Ali Khodher Ashwak Alabaichi Department of Computer Science University of TechnologyBaghdadIraq Department of Biomedical Engineering University of KerbalaKerbalaIraq
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t... 详细信息
来源: 评论
Securing Autonomous UAV Cluster With Blockchain-Based Threshold Key Management System Utilizing Crypto-Asset and Multisignature
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5765-5778页
作者: Kharjana, Mebanjop Sahana, Subhas Chandra Saha, Goutam North-Eastern Hill University Department of Information Technology Shillong793022 India National Institute of Technology Department of Computer Science and Engineering Durgapur713209 India
Unmanned aerial vehicles deployed in remote locations rely on self-governed key management for their protection. However, conventional key management depends on a centralized ground-based station or single vehicle. Su... 详细信息
来源: 评论
Hobby Based Learning for Automata Theory and Computability  2
Hobby Based Learning for Automata Theory and Computability
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Pallavi, N. Darshna, A. Naik Manjula, L. Keerthi, P. Ramaiah Institute of Technology Department of Computer Science and Engineering Bangalore India Impact Institute of Technology Department of Computer Science and Engineering Bangalore India
In the traditional form of instruction, the teacher and pupil converse face to face. The discussion is started by the instructor, who generally discusses the material from the required textbooks. Many students might n... 详细信息
来源: 评论