咨询与建议

限定检索结果

文献类型

  • 6,306 篇 会议
  • 4,278 篇 期刊文献
  • 182 册 图书

馆藏范围

  • 10,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,719 篇 工学
    • 3,415 篇 计算机科学与技术...
    • 2,776 篇 软件工程
    • 1,401 篇 信息与通信工程
    • 922 篇 控制科学与工程
    • 806 篇 电气工程
    • 682 篇 电子科学与技术(可...
    • 658 篇 生物工程
    • 592 篇 生物医学工程(可授...
    • 533 篇 光学工程
    • 470 篇 核科学与技术
    • 414 篇 仪器科学与技术
    • 351 篇 机械工程
    • 351 篇 动力工程及工程热...
    • 351 篇 网络空间安全
    • 339 篇 化学工程与技术
    • 284 篇 材料科学与工程(可...
    • 255 篇 安全科学与工程
  • 4,299 篇 理学
    • 2,248 篇 物理学
    • 1,368 篇 数学
    • 800 篇 生物学
    • 481 篇 统计学(可授理学、...
    • 453 篇 化学
    • 282 篇 系统科学
  • 1,432 篇 管理学
    • 975 篇 管理科学与工程(可...
    • 548 篇 图书情报与档案管...
    • 476 篇 工商管理
  • 697 篇 医学
    • 564 篇 临床医学
    • 523 篇 基础医学(可授医学...
    • 343 篇 公共卫生与预防医...
    • 302 篇 药学(可授医学、理...
  • 271 篇 法学
  • 206 篇 经济学
  • 172 篇 农学
  • 87 篇 教育学
  • 35 篇 文学
  • 12 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 440 篇 accuracy
  • 363 篇 deep learning
  • 308 篇 real-time system...
  • 286 篇 internet of thin...
  • 239 篇 machine learning
  • 224 篇 feature extracti...
  • 212 篇 computational mo...
  • 210 篇 hadron colliders
  • 200 篇 predictive model...
  • 183 篇 artificial intel...
  • 178 篇 optimization
  • 165 篇 support vector m...
  • 165 篇 convolutional ne...
  • 163 篇 training
  • 148 篇 informatics
  • 144 篇 wireless sensor ...
  • 130 篇 monitoring
  • 127 篇 medical services
  • 126 篇 security
  • 125 篇 reliability

机构

  • 1,093 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 987 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 649 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 621 篇 fakultät physik ...
  • 602 篇 infn sezione di ...
  • 599 篇 infn sezione di ...
  • 567 篇 school of physic...
  • 556 篇 horia hulubei na...
  • 542 篇 iccub universita...
  • 541 篇 university of ch...
  • 535 篇 department of ph...
  • 534 篇 school of physic...
  • 527 篇 h.h. wills physi...
  • 520 篇 imperial college...
  • 511 篇 stfc rutherford ...
  • 508 篇 nikhef national ...
  • 503 篇 school of physic...

作者

  • 276 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 248 篇 c. alexa
  • 248 篇 blake t.
  • 245 篇 j. m. izen
  • 239 篇 g. bella
  • 239 篇 j. strandberg
  • 239 篇 d. calvet
  • 239 篇 c. amelung
  • 239 篇 bellee v.
  • 233 篇 g. spigo
  • 232 篇 brundu d.
  • 232 篇 bowcock t.j.v.
  • 232 篇 betancourt c.
  • 231 篇 f. siegert
  • 230 篇 borsato m.
  • 228 篇 amato s.
  • 228 篇 s. chen
  • 223 篇 r. ströhmer

语言

  • 8,986 篇 英文
  • 1,705 篇 其他
  • 75 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
检索条件"机构=R.A. Computer Technology Institute and Computer Engineering and Informatics Department"
10766 条 记 录,以下是181-190 订阅
排序:
Smart Flood Detection and Communication in Hazardous Zones via MANET-Based IoT and Parallely Distributed Slimmable Neural Networks  4
Smart Flood Detection and Communication in Hazardous Zones v...
收藏 引用
4th Inter.a.ional Conference on Sustainable Expert Systems, ICSES 2024
作者: Sathya, V. Bhadula, Shuchi Srinivasan, r. Bhar.a., H.K. Panda, Bhavani Sankar Barve, Amit Department of Computer Science Vallam Tamil Nadu Thanjavur613403 India Graphic Era Deemed to be University Department of Computer Science & Engineering Uttarakhand Dehradun248 002 India Veltech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Department of Computer Science and Engineering Avadi Tiruvallur Tamil Nadu Chennai600054 India Shridevi Institute of Engineering and Technology Department of Computer Science and Engineering Karnataka Tumakuru572106 India Raghu Engineering College Department of Computer Science and Engineering Andhra Pradesh Visakhapatnam531162 India Parul Institute of Technology Parul University Faculty of Engineering and Technology Department of Computer Science and Engineering P.O.Limda Gujarat 391760 India
Disasters can be mitigated by an early warning signal and proper communication within the hazardous environment using the MANET technology. However, the exact prediction of disaster situation is needed for the timely ... 详细信息
来源: 评论
An Intelligent Appr.a.h for retinal Vessels Extraction Based on Transfer Learning
收藏 引用
SN computer Science 2024年 第8期5卷 1-16页
作者: Ver.a. Prem Kumari Kaur, Jagdeep Singh, Nagendra Pratap Department of Computer Science and Engineering Dr. B. R. Ambedkar National Institute of Technology Punjab Jalandhar 144008 India
An essential step in diagnosing ocular illnesses is automatically segmenting retinal blood vessels. Although current deep-learning techniques have attained excellent accuracy in artery segmentation, maintaining vascul... 详细信息
来源: 评论
Steganography Methods for GIF Images: A review  4th
Steganography Methods for GIF Images: A Review
收藏 引用
4th Inter.a.ional Conference on Computing, Communications, and Cyber-Security, IC4S 2022
作者: Gupta, Anjali Awasthi, Lalit K. Singh, Samayveer Department of Computer Science and Engineering Dr. B R Ambedkar National Institute of Technology Punjab Jalandhar India Department of Computer Science and Engineering National Institute of Technology Uttarakhand Srinagar India
Steganography is the art of hiding secret messages within a non-secret object. It helps hide infor.a.ion in images such as graphics interchange for.a. (GIF) images, text, audio, and video. In GIFs, animated GIFs are a... 详细信息
来源: 评论
Software Cost Estimation: A Literature review and Current Trends  3
Software Cost Estimation: A Literature Review and Current Tr...
收藏 引用
3rd Inter.a.ional Conference on Secure Cyber Computing and Communications, ICSCCC 2023
作者: Singh, Suneeta Kumar, Kuldeep Dr B R Ambedkar National Institute of Technology Jalandhar Department of Computer Science and Engineering Punjab Jalandhar India National Institute of Technology Kurukshetra Department of Computer Engineering Haryana Kurukshetra India
Software cost estimation is a challenging and complex task during software development. It directs project managers and developers to analyze and predict costs at the beginning of the software development life cycle. ... 详细信息
来源: 评论
Code word Based Bi-Server.a.thentication and Key Exchange Encryption Technique  1
Code word Based Bi-Server Authentication and Key Exchange En...
收藏 引用
1st Inter.a.ional Conference on Optimization Techniques for Learning, ICOTL 2023
作者: Thangarasan, T. Karthikeyan, V. Arunkumar, G. Arul Prakash, A. Keerthana, r. Gouthami, Kamsala Madanapalle Institute of Technology & Science Department of Computer Science & Engineering AndhraPradesh Madanapalle India Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Department of Computer Science & Engineering Tamilnadu Chennai India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Tamilandu Chennai India K.S.R.College of Engineering Department of Computer Science and Engineering Tamilnadu Tiruchengode India
The data transfer.a.d communication happening between the client and server or the source to destination should be made in some secure way. It must be protected and authenticated. the passwords related to that all wil... 详细信息
来源: 评论
Knowledge-Driven Possibilistic Clustering with Automatic Cluster Elimination
收藏 引用
computers, Mater.a.s & Continua 2024年 第9期80卷 4917-4945页
作者: Xianghui Hu Yiming Tang Witold Pedrycz Jiuchuan Jiang Yichuan Jiang The School of Computer Science and Engineering Southeast UniversityNanjing211189China The School of Computer and Information Hefei University of TechnologyHefei230601China The Department of Electrical and Computer Engineering University of AlbertaEdmontonAB T6R 2V4Canada The Systems Research Institute Polish Academy of SciencesWarsaw00-901Poland The School of Information Engineering Nanjing University of Finance and EconomicsNanjing210023China
Traditional Fuzzy C-Means(FCM)and Possibilistic C-Means(PCM)clustering algorithms are data-driven,and their objective function minimization process is based on the available numeric ***,knowledge hints have been intro... 详细信息
来源: 评论
Hybrid Algorithm for Secure routing in MANET Using Cryptographic Applications
Hybrid Algorithm for Secure Routing in MANET Using Cryptogra...
收藏 引用
2024 IEEE Inter.a.ional Conference on Electronic Systems and Intelligent Computing, ICESIC 2024
作者: Muruganandam, S. Gnanavel, S. Narayana, K.E. Jaeyalakshmi, M. Antony Kumar, K. Panimalar Engineering College Department of Computer Science and Business Systems Chennai India SRM Institute of Science and Technology Kattankulathur Campus Faculty of Engineering and Technology Department of Computing Technologies Chengalpattu India Rajalakshmi Engineering College Department of Information Technology Chennai India Rajalakshmi Engineering College Department of Computer Science and Engineering Chennai India Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology Department of Computer Science and Engineering Chennai India
In Mobile sensor Networks, Each and every wireless node dynamically changes its location due to its mobility nature. The routing infor.a.ion is maintained by the master node to deliver.a.data packet from source to des... 详细信息
来源: 评论
Pixel Similarity-Based Steganography in Bit Planes: An Optimization-Driven Appr.a.h  4
Pixel Similarity-Based Steganography in Bit Planes: An Optim...
收藏 引用
4th Inter.a.ional Conference on Soft Computing for Security Applications, ICSCSA 2024
作者: roselinkiruba, r. Jude Moses Anto Devakanth, J. Sharmila, L. Vasumathy, M. Misba, M. Saranya Jothi, C. Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology Chennai Avadi India Madanapalle Institute of Technology and Science Department of Computer Applications Andra Pradesh India Department of Information Technology Kingston Engineering College Vellore India
Steganography is the method that convert data into bits to make it suitable for hiding. While embedding data the factors such as stego image quality and distortion which cannot be observed by the human eyes. The aim o... 详细信息
来源: 评论
Transfer Function Based Feature Selection Using Harris Hawk Optimization for Biomedical Applications
Transfer Function Based Feature Selection Using Harris Hawk ...
收藏 引用
2024 Inter.a.ional Conference on Smart Electronics and Communication Systems, ISENSE 2024
作者: Jayachitra, S. Prasanth, A. Prasannakiruba, G.S. Abbineni, Srichandana PSNA College of Engineering and Technology Department of Electronics and Communication Engineering Tamilnadu India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Bannari Amman Institute of Technology Department of Computer Technology Sathyamangalam India Hyderabad India
Feature Selection plays key role to truncate the high dimensionality in the datasets through eradicating the unwanted and noisy attributes to improve the perfor.a.ce of classification. The Meta-heuristic technique is ... 详细信息
来源: 评论
An Efficient Fog Computing Platform Through Genetic Algorithm-Based Scheduling  1st
An Efficient Fog Computing Platform Through Genetic Algorith...
收藏 引用
1st Inter.a.ional Conference on Machine Intelligence for research and Innovations, MAiTrI 2023
作者: Chauhan, Shivam Swain, Chinmaya Kumar Behera, Lalatendu Department of Computer Science and Engineering Dr. B. R. Ambedkar National Institute of Technology Jalandhar India Department of Computer Science and Engineering SRM University Andhra Pradesh Amaravati India
The Internet of Things (IoT) has led to the adoption of fog computing for data-intensive applications that require low-latency processing. Fog computing uses distributed nodes near the network edge to reduce delays an... 详细信息
来源: 评论