咨询与建议

限定检索结果

文献类型

  • 92,464 篇 会议
  • 46,662 篇 期刊文献
  • 937 册 图书
  • 2 篇 科技报告

馆藏范围

  • 140,065 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,123 篇 工学
    • 53,594 篇 计算机科学与技术...
    • 43,912 篇 软件工程
    • 21,060 篇 信息与通信工程
    • 13,958 篇 控制科学与工程
    • 11,994 篇 电气工程
    • 11,971 篇 电子科学与技术(可...
    • 9,232 篇 生物工程
    • 7,110 篇 光学工程
    • 6,835 篇 机械工程
    • 6,568 篇 生物医学工程(可授...
    • 5,030 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,581 篇 材料科学与工程(可...
    • 3,172 篇 交通运输工程
    • 3,072 篇 网络空间安全
    • 3,007 篇 安全科学与工程
  • 46,710 篇 理学
    • 23,170 篇 数学
    • 15,214 篇 物理学
    • 10,323 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,235 篇 系统科学
    • 5,191 篇 化学
  • 21,451 篇 管理学
    • 13,744 篇 管理科学与工程(可...
    • 8,581 篇 图书情报与档案管...
    • 5,725 篇 工商管理
  • 6,246 篇 医学
    • 5,109 篇 临床医学
    • 4,579 篇 基础医学(可授医学...
    • 2,792 篇 药学(可授医学、理...
  • 3,442 篇 法学
    • 2,819 篇 社会学
  • 2,313 篇 经济学
  • 1,674 篇 农学
  • 1,305 篇 教育学
  • 590 篇 文学
  • 329 篇 军事学
  • 244 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,570 篇 accuracy
  • 3,525 篇 feature extracti...
  • 3,088 篇 deep learning
  • 3,027 篇 computational mo...
  • 3,018 篇 training
  • 2,353 篇 machine learning
  • 2,159 篇 computer science
  • 2,062 篇 optimization
  • 1,915 篇 predictive model...
  • 1,583 篇 semantics
  • 1,578 篇 neural networks
  • 1,566 篇 real-time system...
  • 1,517 篇 internet of thin...
  • 1,508 篇 data models
  • 1,487 篇 support vector m...
  • 1,466 篇 convolutional ne...
  • 1,465 篇 data mining
  • 1,223 篇 artificial intel...
  • 1,214 篇 wireless sensor ...
  • 1,159 篇 robustness

机构

  • 3,276 篇 school of electr...
  • 2,477 篇 school of comput...
  • 1,547 篇 school of comput...
  • 1,383 篇 school of comput...
  • 1,082 篇 cavendish labora...
  • 993 篇 department of ph...
  • 978 篇 school of comput...
  • 938 篇 physikalisches i...
  • 917 篇 oliver lodge lab...
  • 858 篇 university of ch...
  • 681 篇 school of comput...
  • 620 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 534 篇 school of comput...
  • 533 篇 horia hulubei na...
  • 522 篇 school of physic...
  • 518 篇 school of physic...
  • 517 篇 fakultät physik ...
  • 516 篇 department of ph...

作者

  • 281 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 c. amelung
  • 238 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 210 篇 bencivenni g.

语言

  • 129,429 篇 英文
  • 8,215 篇 其他
  • 2,388 篇 中文
  • 138 篇 日文
  • 18 篇 德文
  • 14 篇 法文
  • 11 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
检索条件"机构=School of Computer Engineering and Technology"
140065 条 记 录,以下是4721-4730 订阅
排序:
Multi-Scale Analysis Technique for Low Energy Data Aggregation  5th
Multi-Scale Analysis Technique for Low Energy Data Aggregati...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Alam, Intekhab Krishnamoorthy, Ramkumar Verma, Tushar K. Raghavendra, T.S. Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Civil Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
The multiscale evaluation technique is a low-power facts aggregation method using numerous evaluation scales to mix data from several properties. The method is based on multiscale structures, in which more than one sc... 详细信息
来源: 评论
Towards Safer Digital Spaces: Automated Detection of Cyberbullying Through Multi-Modal Learning  5
Towards Safer Digital Spaces: Automated Detection of Cyberbu...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Karthikeyan, M. Saravana Francis Raj, J. Relin Krishnan, R. Santhana Kumari, D. Abitha Murali, S. Joshua, K. Paul Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Electronics and Communication Engineering Chennai India SCAD College of Engineering and Technology Department of Electronics and Communication Engineering Cheranmahadevi India RMK Engineering College Department of Computer Science and Engineering Thiruvallur India Velammal College of Engineering and Technology Department of Computer Science and Engineering Madurai India SCAD College of Engineering and Technology Department of Computer Science and Engineering Cheranmahadevi India
Cyberbullying and online harassment present significant challenges to digital safety, demanding robust detection systems capable of identifying abusive content across multiple formats. This work proposes a multi-modal... 详细信息
来源: 评论
Investigating the Role of Applied Cryptography in Digital Forensics  5th
Investigating the Role of Applied Cryptography in Digital Fo...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Mishra, Awakash Nachappa, M.N. Negi, Bichitra Singh Dakhole, Dipali Khushalrao Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Civil Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper examines the position of cryptography in virtual forensic evaluation. It aims to discover the one-of-a-kind sorts of cryptographic techniques available to investigators and to talk about how they may be app... 详细信息
来源: 评论
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4791-4812页
作者: Ahmad Yahiya Ahmad Bani Ahmad Jafar Alzubi Sophers James Vincent Omollo Nyangaresi Chanthirasekaran Kutralakani Anguraju Krishnan Department of Accounting and Finance Faculty of BusinessMiddle East UniversityAmman11831Jordan Faculty of Engineering Al-Balqa Applied UniversitySalt19117Jordan Department of Mathematics Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo210-40601Kenya Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Department of Electronics and Communication Engineering Saveetha Engineering College(Autonomous)Chennai602105India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi... 详细信息
来源: 评论
Variational Bayesian Adaptive Learning of Deep Latent Variables for Acoustic Knowledge Transfer
收藏 引用
IEEE/ACM Transactions on Audio Speech and Language Processing 2025年 33卷 719-730页
作者: Hu, Hu Siniscalchi, Sabato Marco Yang, Chao-Han Huck Lee, Chin-Hui School of Electrical and Computer Engineering Georgia Institute of Technology AtlantaGA30332 United States Georgia Institute of Technology University of Palermo Palermo90133 Italy Norwegian University of Science and Technology Trondheim7034 Norway Nvidia Santa ClaraCA95051 United States
In this work, we propose a novel variational Bayesian adaptive learning approach for cross-domain knowledge transfer to address acoustic mismatches between training and testing conditions, such as recording devices an... 详细信息
来源: 评论
Interference Management for IRS-NOMA Networks via Constructive Interference  16
Interference Management for IRS-NOMA Networks via Constructi...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Cui, Ke Wang, Wei Dong, Chao Zhao, Nan Wu, Qihui Niyato, Dusit School of Information and Communication Engineering Dalian University of Technology Dalian China School of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing China School of Computer Science and Engineering Nanyang Technological University Singapore
Owing to the ability of reconfiguring wireless channels, intelligent reflecting surface (IRS) can help non-orthogonal multiple access (NOMA) to release its tremendous potential. However, the inter-user interference be... 详细信息
来源: 评论
Attention-Based Recurrent Neural Networks for Medical Image Classification  5th
Attention-Based Recurrent Neural Networks for Medical Image ...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Manjunath, K.V. Alam, Intekhab Nidhya, M.S. Verma, Tushar K. School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bengaluru India Department of Civil Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India
Attention-primarily based Recurrent Neural Networks (RNNs) are a technique for medical image classification. RNNs can robotically extract temporal and spatial facts from scientific imaging statistics and make sensible... 详细信息
来源: 评论
Evolving ATM Networks for High Volume Transactions  5th
Evolving ATM Networks for High Volume Transactions
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Impa, B.H. Alam, Intekhab Kavitha, R. Prajapati, Sandhya School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Civil Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India
ATM networks are evolving to guide excessive extent transactions and offer new features which includes increased safety, scalability, and cost performance. To lessen value, Banks are utilizing personal cloud environme... 详细信息
来源: 评论
PBRL-TChain: A performance-enhanced permissioned blockchain for time-critical applications based on reinforcement learning
收藏 引用
Future Generation computer Systems 2024年 154卷 301-313页
作者: Zhang, Yiguang Lin, Junxiong Lu, Zhihui Duan, Qiang Huang, Shih-Chia School of Computer Science Fudan University Shanghai200433 China Information Sciences & Technology Department Pennsylvania State University AbingtonPA United States Shanghai Blockchain Engineering Research Center Shanghai China Department of Electronic Engineering National Taipei University of Technology Taiwan
Permissioned blockchains can provide high security and reliability for various Internet of Things (IoT) systems, such as smart healthcare and vehicular networks. However, the performance issues of permissioned blockch... 详细信息
来源: 评论
Optimizing Fabric Welding Using Image Processed Laser Inspection  5th
Optimizing Fabric Welding Using Image Processed Laser Inspec...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Ansari, Tabish Sekhar, Malepati Chandra Alam, Intekhab Bargavi, Manju Department of Civil Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bengaluru India
Material welding is used in expanding industrial and industrial applications and depends on accuracy and precision to ensure satisfaction and protection. Laser inspection technology has been developed to help enhance ... 详细信息
来源: 评论