咨询与建议

限定检索结果

文献类型

  • 156,181 篇 会议
  • 64,734 篇 期刊文献
  • 1,733 册 图书
  • 2 篇 科技报告

馆藏范围

  • 222,650 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 127,692 篇 工学
    • 81,046 篇 计算机科学与技术...
    • 65,360 篇 软件工程
    • 33,072 篇 信息与通信工程
    • 21,240 篇 控制科学与工程
    • 20,780 篇 电气工程
    • 20,156 篇 电子科学与技术(可...
    • 14,241 篇 生物工程
    • 11,496 篇 生物医学工程(可授...
    • 10,740 篇 光学工程
    • 9,243 篇 机械工程
    • 7,943 篇 动力工程及工程热...
    • 7,763 篇 化学工程与技术
    • 7,707 篇 仪器科学与技术
    • 6,631 篇 材料科学与工程(可...
    • 5,079 篇 网络空间安全
    • 5,036 篇 安全科学与工程
  • 72,800 篇 理学
    • 34,656 篇 数学
    • 25,805 篇 物理学
    • 16,117 篇 生物学
    • 11,159 篇 统计学(可授理学、...
    • 8,546 篇 系统科学
    • 8,227 篇 化学
  • 31,656 篇 管理学
    • 20,031 篇 管理科学与工程(可...
    • 12,877 篇 图书情报与档案管...
    • 9,515 篇 工商管理
  • 11,189 篇 医学
    • 9,337 篇 临床医学
    • 8,390 篇 基础医学(可授医学...
    • 5,297 篇 药学(可授医学、理...
    • 4,646 篇 公共卫生与预防医...
  • 5,924 篇 法学
    • 4,814 篇 社会学
  • 3,882 篇 经济学
  • 2,868 篇 农学
  • 2,189 篇 教育学
  • 1,110 篇 文学
  • 511 篇 军事学
  • 275 篇 艺术学
  • 17 篇 哲学
  • 13 篇 历史学

主题

  • 5,755 篇 accuracy
  • 5,291 篇 computer science
  • 4,943 篇 feature extracti...
  • 4,687 篇 deep learning
  • 4,640 篇 computational mo...
  • 4,242 篇 machine learning
  • 3,859 篇 training
  • 3,024 篇 support vector m...
  • 2,816 篇 optimization
  • 2,797 篇 predictive model...
  • 2,786 篇 internet of thin...
  • 2,658 篇 real-time system...
  • 2,654 篇 wireless sensor ...
  • 2,614 篇 convolutional ne...
  • 2,472 篇 data mining
  • 2,468 篇 neural networks
  • 2,409 篇 bandwidth
  • 2,309 篇 computer archite...
  • 2,308 篇 artificial intel...
  • 2,068 篇 algorithm design...

机构

  • 1,137 篇 department of el...
  • 1,078 篇 cavendish labora...
  • 978 篇 department of ph...
  • 926 篇 physikalisches i...
  • 916 篇 department of co...
  • 912 篇 oliver lodge lab...
  • 833 篇 department of el...
  • 767 篇 university of ch...
  • 745 篇 department of co...
  • 663 篇 department of co...
  • 611 篇 chitkara univers...
  • 589 篇 infn sezione di ...
  • 566 篇 infn sezione di ...
  • 562 篇 infn laboratori ...
  • 532 篇 horia hulubei na...
  • 531 篇 infn sezione di ...
  • 521 篇 school of physic...
  • 518 篇 school of physic...
  • 514 篇 department of ph...
  • 510 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 250 篇 a. gomes
  • 247 篇 j. wang
  • 242 篇 s. chen
  • 240 篇 c. alexa
  • 238 篇 j. m. izen
  • 227 篇 blake t.
  • 223 篇 g. bella
  • 221 篇 j. strandberg
  • 221 篇 c. amelung
  • 221 篇 bellee v.
  • 220 篇 d. calvet
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 beiter a.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 211 篇 brundu d.
  • 208 篇 bencivenni g.

语言

  • 212,557 篇 英文
  • 7,463 篇 其他
  • 2,603 篇 中文
  • 170 篇 日文
  • 24 篇 法文
  • 24 篇 朝鲜文
  • 22 篇 德文
  • 17 篇 斯洛文尼亚文
  • 17 篇 土耳其文
  • 7 篇 荷兰文
  • 3 篇 爱沙尼亚文
  • 2 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
  • 1 篇 泰文
检索条件"机构=Department of Computer and Technology Engineering"
222650 条 记 录,以下是91-100 订阅
排序:
Low-light image enhancement using the illumination boost algorithm along with the SKWGIF method
收藏 引用
Multimedia Tools and Applications 2024年 第17期84卷 1-35页
作者: Radmand, Elnaz Saberi, Erfan Sorkhi, Ali Ghanbari Pirgazi, Jamshid Department of Computer Engineering University of Science and Technology of Mazandaran Behshahr Iran
Low-light image enhancement is highly desirable for outdoor image processing and computer vision applications. Research conducted in recent years has shown that images taken in low-light conditions often pose two main... 详细信息
来源: 评论
An optimized deep network-based intermediate code generation for the mathematical expression
收藏 引用
Multimedia Tools and Applications 2024年 第17期84卷 1-24页
作者: Sharada, H.N. Anami, Basavaraj Allagi, Shridhar Department of Computer Science & amp Engineering SDM College of Engineering and Technology Karnataka Dharwad580002 India Department of Computer Science & amp Engineering KLE Institute of Technology Karnataka Hubli580030 India
In recent times, the system's mathematical expression and operation have gained greater reach in engineering and mathematics. It is vital to solving more complex expressions and equations in a short time. The most... 详细信息
来源: 评论
Semantic similarity and mutual information-based model for fake news detection
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Gorai, Joy Shaw, Dilip Kumar Department of Computer Science and Engineering National Institute of Technology Jamshedpur India
As internet use in communication networks has grown, fake news has become a big problem. The misleading heading of the news loses the trust of the reader. Many techniques have emerged, but they fail because fraudsters... 详细信息
来源: 评论
Rain Attenuation Modelling Based on Symbolic Regression and Differential Evolution for 5G mmWave Wireless Communication Networks
收藏 引用
Progress in Electromagnetics Research B 2025年 111卷 45-58页
作者: Matondo, Sandra Bazebo Owolawi, Pius Adewale Department of Computer Systems Engineering Tshwane University of Technology Pretoria South Africa
The microphysical structure of rain has a significant impact on the quality of radio signal transmission in the upcoming deployment of 5G millimetre-wave wireless communications in South Africa. To address this, mitig... 详细信息
来源: 评论
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2675-2719页
作者: Singamaneni Krishnapriya Sukhvinder Singh Department of Computer Science School of Engineering and TechnologyPondicherry UniversityKalapet605014India
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att... 详细信息
来源: 评论
A collision proof energy efficient lightweight hybrid cryptosystem for fog
收藏 引用
International Journal of Information and computer Security 2025年 第3期26卷 179-203页
作者: Kumar, Sandeep Garg, Ritu Department of Computer Engineering National Institute of Technology Kurukshetra India
Fog computing extends cloud capabilities to the network edge, aiding IoT and users. It mitigates cloud issues like latency and reliability. However, fog’s limited resources pose security vulnerabilities like data the... 详细信息
来源: 评论
Impact of machine learning-based imputation techniques on medical datasets- a comparative analysis
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5905-5925页
作者: Tiwaskar, Shweta Rashid, Mamoon Gokhale, Prasad Department of Computer Engineering Faculty of Science and Technology Vishwakarma University Pune India
In the realm of medical datasets, particularly when considering diabetes, the occurrence of data incompleteness is a prevalent issue. Unveiling valuable patterns through medical data analysis is crucial for early and ... 详细信息
来源: 评论
Maximizing aged photovoltaic array power:a computer modelling study
收藏 引用
Clean Energy 2024年 第1期8卷 171-187页
作者: Fadi N.Sibai Electrical&Computer Engineering Department Gulf University for Science and TechnologyMishrefKuwait
Photovoltaic(PV)modules age with time for various reasons such as corroded joints and terminals and glass coating defects,and their ageing degrades the PV array *** the help of the PV array numerical model,this paper ... 详细信息
来源: 评论
Hybrid optimization assisted deep ensemble classification framework for skin cancer detection
收藏 引用
Multimedia Tools and Applications 2025年 第1期84卷 63-94页
作者: Pukhta, Irfan Rashid Rout, Ranjeet Kumar Department of Computer Science and Engineering National Institute of Technology Srinagar190006 India
In 2018, there were 1 million occurrences of non-melanoma cancer and 288,000 occurrences of malignant skin cancer (MM) recorded worldwide. Given the aging of the population and limited resources for medical care, a co... 详细信息
来源: 评论
A novel Cosine-Cosine chaotic map-based video encryption scheme
收藏 引用
Journal of engineering and Applied Science 2024年 第1期71卷 36页
作者: Kumari, Sweta Dua, Mohit Dua, Shelza Dhingra, Deepti Department of Computer Engineering National Institute of Technology Kurukshetra India Department of Electronics and Communication Engineering National Institute of Technology Kurukshetra India
The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encrypt... 详细信息
来源: 评论