咨询与建议

限定检索结果

文献类型

  • 40,746 篇 会议
  • 2,947 册 图书

馆藏范围

  • 43,692 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 40,000 篇 工学
    • 38,643 篇 计算机科学与技术...
    • 7,089 篇 软件工程
    • 3,996 篇 信息与通信工程
    • 3,136 篇 电气工程
    • 2,304 篇 控制科学与工程
    • 761 篇 生物医学工程(可授...
    • 431 篇 生物工程
    • 320 篇 机械工程
    • 293 篇 交通运输工程
    • 158 篇 测绘科学与技术
    • 156 篇 土木工程
    • 145 篇 光学工程
    • 136 篇 建筑学
  • 3,350 篇 管理学
    • 1,879 篇 管理科学与工程(可...
    • 1,145 篇 图书情报与档案管...
    • 860 篇 工商管理
  • 3,075 篇 理学
    • 1,889 篇 数学
    • 815 篇 生物学
    • 456 篇 统计学(可授理学、...
    • 340 篇 物理学
    • 178 篇 系统科学
  • 1,487 篇 医学
    • 937 篇 临床医学
    • 683 篇 基础医学(可授医学...
    • 235 篇 特种医学
    • 138 篇 药学(可授医学、理...
  • 1,478 篇 教育学
    • 1,396 篇 教育学
  • 550 篇 文学
    • 371 篇 外国语言文学
    • 178 篇 新闻传播学
  • 415 篇 经济学
    • 317 篇 理论经济学
  • 374 篇 法学
    • 340 篇 社会学
  • 177 篇 艺术学
  • 95 篇 历史学
  • 59 篇 农学
  • 11 篇 军事学

主题

  • 1,862 篇 artificial intel...
  • 1,187 篇 machine learning
  • 898 篇 deep learning
  • 779 篇 computer communi...
  • 668 篇 information syst...
  • 558 篇 computer applica...
  • 328 篇 computer systems...
  • 314 篇 cloud computing
  • 304 篇 clustering
  • 299 篇 security
  • 288 篇 internet of thin...
  • 276 篇 classification
  • 264 篇 software enginee...
  • 235 篇 information syst...
  • 229 篇 computer imaging...
  • 224 篇 data mining
  • 218 篇 software enginee...
  • 208 篇 data mining and ...
  • 205 篇 ontology
  • 180 篇 computers and ed...

机构

  • 83 篇 univ chinese aca...
  • 76 篇 univ dist franci...
  • 69 篇 chinese acad sci...
  • 67 篇 shanghai univ sc...
  • 48 篇 tsinghua univers...
  • 43 篇 natl res univ hi...
  • 39 篇 huazhong univers...
  • 35 篇 harbin inst tech...
  • 33 篇 tsinghua univ de...
  • 30 篇 shanghai jiao to...
  • 30 篇 pontificia univ ...
  • 29 篇 harbin universit...
  • 27 篇 polytechnic inst...
  • 27 篇 chinese acad sci...
  • 26 篇 lomonosov moscow...
  • 25 篇 chongqing univ s...
  • 25 篇 beijing univ pos...
  • 24 篇 university of cr...
  • 24 篇 hunan univ coll ...
  • 23 篇 univ nacl colomb...

作者

  • 58 篇 kim tai-hoon
  • 53 篇 lima jose
  • 43 篇 o'connor rory v.
  • 37 篇 wang lei
  • 34 篇 liu yang
  • 33 篇 zhang lin
  • 31 篇 kim seoksoo
  • 30 篇 wang jing
  • 28 篇 sabu m. thampi
  • 28 篇 crawford broderi...
  • 26 篇 zhang lei
  • 25 篇 li yang
  • 25 篇 li li
  • 24 篇 wang jian
  • 21 篇 zhang min
  • 20 篇 hassanien aboul ...
  • 19 篇 li peng
  • 19 篇 serra roberto
  • 18 篇 valencia-garcia ...
  • 18 篇 li xin

语言

  • 43,527 篇 英文
  • 655 篇 中文
  • 1 篇 丹麦文
检索条件"丛书名=Communications in Computer and Information Science"
43693 条 记 录,以下是1701-1710 订阅
排序:
Lightweight Hybrid CNN Model for Face Presentation Attack Detection  2nd
Lightweight Hybrid CNN Model for Face Presentation Attack De...
收藏 引用
2nd International Conference on information Technologies and Their Applications
作者: Turhal, Ugur Yilmaz, Asuman Gunay Nabiyev, Vasif Bayburt Univ Bayburt Turkiye Karadeniz Tech Univ Trabzon Turkiye
Today, face recognition systems are widely used in many areas that require biometric-based verification, especially because they are contactless and require low user cooperation. Despite their ease of implementation, ... 详细信息
来源: 评论
An Exercise in Uppaal: Modelling the Circadian Clock of a Cyanobacteria  4th
An Exercise in Uppaal: Modelling the Circadian Clock of a Cy...
收藏 引用
4th International Conference on Artificial Intelligence Logic and Applications
作者: Iglesias, Antonio Figueiredo, Daniel Madeira, Alexandre Univ Aveiro Res Ctr Math & Applicat CIDMA Aveiro Portugal Assoc Innovat & Biomed Res Light & Image AIBILI Coimbra Portugal
As in engineering, many phenomena of natural sciences such as biology and chemistry can be modelled using state-transition systems. In this context, the solid tools and theories from computer science represent a valua... 详细信息
来源: 评论
Hybrid AI Techniques for Non-invasive Fault Detection with Experimental Validation  37th
Hybrid AI Techniques for Non-invasive Fault Detection with E...
收藏 引用
37th International Conference on computer Applications in Industry and Engineering
作者: Lee, Hoon Cheok, Ka. C. Oakland Univ Elect & Comp Engn Dept Rochester MI 48309 USA
This paper will provide a non-invasive fault detection solution with Artificial Intelligence (AI) techniques. Non-invasive methods would not require system and machine modification. This solution would use the existin... 详细信息
来源: 评论
Smart Tourism Ecosystem: From Connectivity to Value Co-creation
Smart Tourism Ecosystem: From Connectivity to Value Co-creat...
收藏 引用
4th International Conference on Advanced Research in Technologies information Innovation and Sustainability-ARTIIS-Annual
作者: Serra, Pedro Vaz Seabra, Claudia Caldeira, Ana Univ Coimbra Coimbra Portugal CEGOT Geog & Spatial Planning Res Ctr Coimbra Portugal
Technological changes have always been essential for tourism and the developments that took place in contemporary times, which initiated the concept of smart, are recognised as likely to cause a change in basic assump... 详细信息
来源: 评论
One-Class Convolutional Neural Network for Arabic Mispronunciation Detection  4th
One-Class Convolutional Neural Network for Arabic Mispronunc...
收藏 引用
4th International Conference on Intelligent Systems and Pattern Recognition-ISPR
作者: Lounis, Meriem Dendani, Bilal Bahi, Halima Univ Badji Mokhtar Dept Comp Sci Annaba Algeria Univ Badji Mokhtar LISCO Lab Annaba Algeria
In today's interconnected world, humans live in a closely connected community, where it is essential to acquire proficiency in multiple languages to interact with others effectively. Therefore, research in compute... 详细信息
来源: 评论
ViTSigat: Early Black Sigatoka Detection in Banana Plants Using Vision Transformer  12th
ViTSigat: Early Black Sigatoka Detection in Banana Plants Us...
收藏 引用
12th Ecuadorian Conference on information and Communication Technologies
作者: Charco, Jorge L. Yanza-Montalvan, Angela Zumba-Gamboa, Johanna Alonso-Anguizaca, Jose Basurto-Cruz, Edgar Univ Guayaquil Delta & Kennedy Ave Guayaquil Ecuador
This paper presents a model based on Vision Transformer for black Sigatoka detection in early stages, which is called ViTSigat. A comparative of the performance with other proposed model based on Convolutional Neural ... 详细信息
来源: 评论
Deep Reinforcement Learning-Driven Path Optimization in Multi-UAV Edge Computing Systems  4th
Deep Reinforcement Learning-Driven Path Optimization in Mult...
收藏 引用
4th International Conference on Advanced Network Technologies and Intelligent Computing-ANTIC-Annual
作者: Adhikari, Pronab Kumar Tomar, Abhinav Netaji Subhas Univ Technol Dept Comp Sci & Engn New Delhi India
Aerial drones, in general known as Unmanned Aerial Vehicles (UAVs), holds a longstanding history of being utilized within mobile networks as network processors;however, a shift has been observed where they are now bei... 详细信息
来源: 评论
Design and Deployment of an IoT System for Hydrometeorological Monitoring in an Andean Catchment  4th
Design and Deployment of an IoT System for Hydrometeorologic...
收藏 引用
4th International Conference on Advanced Research in Technologies information Innovation and Sustainability-ARTIIS-Annual
作者: Duque, Felipe Salinas, Edison Torres, Renato Merino, Pabel Samaniego, Natalia Univ Nacl Loja Carrera Ingn Ambiental Ave Pio Jaramillo Alvarado Loja 1101608 Ecuador Univ Nacl Loja Carrera Ingn Elect & Telecomunicac Ave Pio Jaramillo Alvarado Loja 1101608 Ecuador Univ Nacl Loja Ctr Invest Trop Ambiente & Biodivers CITIAB Carrera Ingn Forestal Ave Pio Jaramillo Alvarado Loja 1101608 Ecuador
The Andean catchments, crucial for their biodiversity and water resource supply in the region, are under increasing pressure due to threats such as deforestation, soil degradation, and climate change. These threats no... 详细信息
来源: 评论
Comparison of Machine Learning Based Anomaly Detection Methods for ADS-B System  2nd
Comparison of Machine Learning Based Anomaly Detection Metho...
收藏 引用
2nd International Conference on information Technologies and Their Applications
作者: Cevik, Nursah Akleylek, Sedat HAVELSAN Ankara Turkiye Ondokuz Mayis Univ Computat Sci Samsun Turkiye Univ Tartu Inst Comp Sci Tartu Estonia Istinye Univ Dept Comp Engn Istanbul Turkiye
This paper introduces an anomaly/intrusion detection system utilizing machine learning techniques for detecting attacks in the Automatic Detection System-Broadcast (ADS-B). Real ADS-B messages between Turkiye's co... 详细信息
来源: 评论
Automated Legality Detection on Privacy Policy Based on Deep Learning  4th
Automated Legality Detection on Privacy Policy Based on Deep...
收藏 引用
4th International Conference on Artificial Intelligence Logic and Applications
作者: Li, Juan Zhao, Chenggong Sang, Jinze Gao, Yan Cent South Univ Sch Law Changsha 410083 Peoples R China Cent South Univ Sch Automat Changsha 410083 Peoples R China
The Personal information Protection Law (PIPL) have strengthened the protection of personal information in China, and regulators have accordingly strengthened their supervision over the collection and use of personal ... 详细信息
来源: 评论