咨询与建议

限定检索结果

文献类型

  • 6,306 篇 会议
  • 4,278 篇 期刊文献
  • 182 册 图书

馆藏范围

  • 10,766 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,719 篇 工学
    • 3,415 篇 计算机科学与技术...
    • 2,776 篇 软件工程
    • 1,401 篇 信息与通信工程
    • 922 篇 控制科学与工程
    • 806 篇 电气工程
    • 682 篇 电子科学与技术(可...
    • 658 篇 生物工程
    • 592 篇 生物医学工程(可授...
    • 533 篇 光学工程
    • 470 篇 核科学与技术
    • 414 篇 仪器科学与技术
    • 351 篇 机械工程
    • 351 篇 动力工程及工程热...
    • 351 篇 网络空间安全
    • 339 篇 化学工程与技术
    • 284 篇 材料科学与工程(可...
    • 255 篇 安全科学与工程
  • 4,299 篇 理学
    • 2,248 篇 物理学
    • 1,368 篇 数学
    • 800 篇 生物学
    • 481 篇 统计学(可授理学、...
    • 453 篇 化学
    • 282 篇 系统科学
  • 1,432 篇 管理学
    • 975 篇 管理科学与工程(可...
    • 548 篇 图书情报与档案管...
    • 476 篇 工商管理
  • 697 篇 医学
    • 564 篇 临床医学
    • 523 篇 基础医学(可授医学...
    • 343 篇 公共卫生与预防医...
    • 302 篇 药学(可授医学、理...
  • 271 篇 法学
  • 206 篇 经济学
  • 172 篇 农学
  • 87 篇 教育学
  • 35 篇 文学
  • 12 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 440 篇 accuracy
  • 363 篇 deep learning
  • 308 篇 real-time system...
  • 286 篇 internet of thin...
  • 239 篇 machine learning
  • 224 篇 feature extracti...
  • 212 篇 computational mo...
  • 210 篇 hadron colliders
  • 200 篇 predictive model...
  • 183 篇 artificial intel...
  • 178 篇 optimization
  • 165 篇 support vector m...
  • 165 篇 convolutional ne...
  • 163 篇 training
  • 148 篇 informatics
  • 144 篇 wireless sensor ...
  • 130 篇 monitoring
  • 127 篇 medical services
  • 126 篇 security
  • 125 篇 reliability

机构

  • 1,093 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 987 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 649 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 621 篇 fakultät physik ...
  • 602 篇 infn sezione di ...
  • 599 篇 infn sezione di ...
  • 567 篇 school of physic...
  • 556 篇 horia hulubei na...
  • 542 篇 iccub universita...
  • 541 篇 university of ch...
  • 535 篇 department of ph...
  • 534 篇 school of physic...
  • 527 篇 h.h. wills physi...
  • 520 篇 imperial college...
  • 511 篇 stfc rutherford ...
  • 508 篇 nikhef national ...
  • 503 篇 school of physic...

作者

  • 276 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 248 篇 c. alexa
  • 248 篇 blake t.
  • 245 篇 j. m. izen
  • 239 篇 g. bella
  • 239 篇 j. strandberg
  • 239 篇 d. calvet
  • 239 篇 c. amelung
  • 239 篇 bellee v.
  • 233 篇 g. spigo
  • 232 篇 brundu d.
  • 232 篇 bowcock t.j.v.
  • 232 篇 betancourt c.
  • 231 篇 f. siegert
  • 230 篇 borsato m.
  • 228 篇 amato s.
  • 228 篇 s. chen
  • 223 篇 r. ströhmer

语言

  • 8,986 篇 英文
  • 1,705 篇 其他
  • 75 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
检索条件"机构=R.A. Computer Technology Institute and Computer Engineering and Informatics Department"
10766 条 记 录,以下是11-20 订阅
排序:
Distributed computing and shared memory-based utility list buffer miner with parallel frameworks for high utility itemset mining
收藏 引用
Inter.a.ional Jour.a. of Business Intelligence and Data Mining 2023年 第2期23卷 125-149页
作者: Atmaja, Eduardus Hardika Sandy Sonawane, Kavita Department of Computer Engineering St. Francis Institute of Technology Mumbai India Department of Informatics Sanata Dharma University Yogyakarta Indonesia
High utility itemset mining (HUIM) is a well-known pattern mining technique. It considers the utility of the items that leads to finding high profit patterns which are more useful for r.a. conditions. Handling large a... 详细信息
来源: 评论
Optimized Price Prediction of Cryptocurrencies using Deep Learning on High-Volume Time Series Data  15
Optimized Price Prediction of Cryptocurrencies using Deep Le...
收藏 引用
15th Inter.a.ional Conference on Infor.a.ion, Intelligence, Systems and Applications, IISA 2024
作者: Vonitsanos, Gerasimos Kanavos, Andr.a. Grivokostopoulou, Foteini Sioutas, Spyros University of Patras Computer Engineering and Informatics Department Patras Greece Ionian University Department of Informatics Corfu Greece Computer Technology Institute and Press 'Diophantus' Patras Greece
Statistical models, enhanced by deep learning techniques, have become pivotal in various predictive tasks, including financial forecasting. This paper.a.dresses the challenge of predicting cryptocurrency prices, utili... 详细信息
来源: 评论
Text Analysis and recognition of Emotional Content Using Deep Learning Methods and BErT  23
Text Analysis and Recognition of Emotional Content Using Dee...
收藏 引用
23rd IEEE/ACIS Inter.a.ional Conference on computer and Infor.a.ion Science, ICIS 2023
作者: Andrikakis, Efthymios Perikos, Isidoros Paraskevas, Michael Hatzilygeroudis, Ioannis University of Patras Department of Computer Engineering & Informatics Patras Greece University of Patras Computer Technology Institute and Press Diophantus Department of Computer Engineering & Informatics Patras Greece Department of Electrical and Computer Engineering University of Peloponnese Computer Technology Institute and Press Diophantus Patras Greece
recognizing the emotional content of Natural Language sentences can improve the way humans communicate with a computer system by enabling them to recognize and imitate emotional expressions. In this paper, deep learni... 详细信息
来源: 评论
Sensitive Content Detection in Social Networks Using Deep Learning Models and Explainability Techniques  9
Sensitive Content Detection in Social Networks Using Deep Le...
收藏 引用
9th IEEE/ACIS Inter.a.ional Conference on Big Data, Cloud Computing, and Data Science, BCD 2024
作者: Perikos, Isidoros University of Patras Computer Engineering and Informatics Department Patras Greece University of Peloponnese Computer Technology Institute and Press 'Diophantus' Electrical and Computer Engineering Dept. Patras Greece
In the dynamic landscape of online social networks, recognizing sensitive content is essential for safeguarding user privacy, fostering inclusivity, and enhancing diversity awareness. Building on prior research, this ... 详细信息
来源: 评论
Empirical techniques for effort estimation in designing effective ML models
收藏 引用
Inter.a.ional Jour.a. of computers and Applications 2025年 第2期47卷 226-234页
作者: Padmanabha reddy, Y.C.A. Kosuru, Sai Sathwik Sirisalla, Nageswara rao Vivekananda, G.N. Perala, Venkata Akanksha Department of Artificial Intelligence and Machine Learning Chaitanya Bharati Institute of Technology Telangana Hyderabad India Department of CSE B V Raju Institute of Technology Telangana Narsapur India Department of Computer Science and Engineering K.S.R.M. College of Engineering AP Kadapa India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Machine Learning research often involves the use of diverse libraries, modules, and pseudocodes for data processing, cleaning, filtering, pattern recognition, and computer intelligence. Quantization of Effort required... 详细信息
来源: 评论
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Far.a.ui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i... 详细信息
来源: 评论
(POSTEr) A Holistic IoT-Enabled Appr.a.h for Indoor.a.r Quality Control  19
(POSTER) A Holistic IoT-Enabled Approach for Indoor Air Qual...
收藏 引用
19th Annual Inter.a.ional Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023
作者: Kalioras, Fotios Filios, Gabriel Karatzas, Stylianos Nikoletseas, Sotiris University of Patras Department of Computer Engineering and Informatics Greece University of Patras Computer Technology Institute and Press Diophantus Department of Computer Engineering and Informatics Greece University of Patras Department of Civil Engineering Greece
Indoor.a.r quality (IAQ) is an impor.a.t yet often overlooked aspect of public health, with poor IAQ contributing to a significant number of diverse health problems worldwide. Existing air quality standards have faile... 详细信息
来源: 评论
An intrusion detection system using ranked feature bagging
收藏 引用
Inter.a.ional Jour.a. of Infor.a.ion technology (Singapore) 2024年 第2期16卷 1213-1219页
作者: Azhagiri, M. rajesh, A. Karthik, S. raja, K. Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Computer Science and Engineering Jain University Bangalore India Department of IT College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
An Intrusion Detection System monitors the network for.a.y malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ... 详细信息
来源: 评论
Deep learning based predicting ur.a. traffic congestion with rGB-coded images using GrU-CNN and LSTM
收藏 引用
Multimedia Tools and Applications 2024年 第38期83卷 86261-86280页
作者: P, rajesh Azhagiri, M. Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & ampD Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Campus Tamil Nadu Chennai600 089 India
r.a. traffic management requires the ability to foresee geographical congestion conditions in an ur.a. r.a. traffic network. The proposed investigation is aimed to envisage the presence of blockage in a specific regio... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Far.a.Jianguo Ding Kim-Kwang raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user.a.thentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论