咨询与建议

限定检索结果

文献类型

  • 156,788 篇 会议
  • 1,737 篇 期刊文献
  • 272 册 图书
  • 1 篇 学位论文

馆藏范围

  • 158,794 篇 电子文献
  • 10 种 纸本馆藏

日期分布

学科分类号

  • 108,682 篇 工学
    • 74,559 篇 计算机科学与技术...
    • 60,578 篇 软件工程
    • 24,506 篇 信息与通信工程
    • 15,001 篇 控制科学与工程
    • 11,602 篇 电气工程
    • 11,323 篇 机械工程
    • 10,770 篇 生物工程
    • 9,550 篇 电子科学与技术(可...
    • 8,253 篇 生物医学工程(可授...
    • 7,025 篇 光学工程
    • 6,522 篇 仪器科学与技术
    • 6,319 篇 化学工程与技术
    • 5,521 篇 材料科学与工程(可...
    • 5,178 篇 动力工程及工程热...
    • 4,593 篇 安全科学与工程
    • 4,343 篇 交通运输工程
  • 47,602 篇 理学
    • 24,160 篇 数学
    • 12,390 篇 物理学
    • 11,703 篇 生物学
    • 7,661 篇 统计学(可授理学、...
    • 5,982 篇 化学
    • 4,973 篇 系统科学
  • 32,782 篇 管理学
    • 19,330 篇 管理科学与工程(可...
    • 15,096 篇 图书情报与档案管...
    • 9,575 篇 工商管理
  • 7,304 篇 医学
    • 6,195 篇 临床医学
    • 5,831 篇 基础医学(可授医学...
  • 5,299 篇 法学
    • 4,389 篇 社会学
  • 4,737 篇 教育学
    • 4,475 篇 教育学
  • 3,976 篇 经济学
    • 3,912 篇 应用经济学
  • 2,711 篇 农学
  • 1,576 篇 文学
  • 600 篇 军事学
  • 496 篇 艺术学
  • 29 篇 哲学
  • 25 篇 历史学

主题

  • 4,159 篇 accuracy
  • 3,600 篇 feature extracti...
  • 3,293 篇 deep learning
  • 3,017 篇 computational mo...
  • 2,995 篇 computer science
  • 2,763 篇 training
  • 2,493 篇 data mining
  • 2,323 篇 machine learning
  • 2,095 篇 predictive model...
  • 1,939 篇 real-time system...
  • 1,898 篇 convolutional ne...
  • 1,872 篇 support vector m...
  • 1,871 篇 data models
  • 1,730 篇 semantics
  • 1,711 篇 internet of thin...
  • 1,533 篇 computer archite...
  • 1,460 篇 visualization
  • 1,260 篇 security
  • 1,250 篇 neural networks
  • 1,207 篇 analytical model...

机构

  • 341 篇 school of comput...
  • 299 篇 chitkara univers...
  • 249 篇 maharishi school...
  • 169 篇 university of ch...
  • 148 篇 maharishi school...
  • 143 篇 university of sc...
  • 133 篇 institute of inf...
  • 121 篇 department of ph...
  • 120 篇 school of comput...
  • 119 篇 department of ph...
  • 119 篇 school of cyber ...
  • 118 篇 department of mo...
  • 115 篇 department of ph...
  • 113 篇 infn e laborator...
  • 112 篇 school of comput...
  • 104 篇 faculté des scie...
  • 104 篇 college of compu...
  • 103 篇 school of automa...
  • 103 篇 school of comput...
  • 100 篇 department of ph...

作者

  • 109 篇 c. alexa
  • 109 篇 j. m. izen
  • 109 篇 g. bella
  • 109 篇 j. strandberg
  • 109 篇 d. calvet
  • 109 篇 c. amelung
  • 109 篇 n. orlando
  • 109 篇 y. tayalati
  • 109 篇 g. spigo
  • 109 篇 v. chiarella
  • 109 篇 f. siegert
  • 108 篇 wang lei
  • 104 篇 a. c. könig
  • 103 篇 h. a. gordon
  • 103 篇 a. dimitrievska
  • 102 篇 a. grummer
  • 102 篇 k. j. r. cormier
  • 102 篇 f. deliot
  • 100 篇 f. a. förster
  • 98 篇 m. klein

语言

  • 154,104 篇 英文
  • 3,791 篇 其他
  • 1,750 篇 中文
  • 9 篇 法文
  • 5 篇 土耳其文
  • 3 篇 西班牙文
  • 3 篇 俄文
  • 1 篇 葡萄牙文
检索条件"任意字段=International Conference on Advanced Research on Computer Science and Information Engineering"
158799 条 记 录,以下是321-330 订阅
排序:
A Novel VGG-XGB Model for the Comprehensive Detection and Classification of Apple Leaf Diseases Using Transfer Learning  3
A Novel VGG-XGB Model for the Comprehensive Detection and Cl...
收藏 引用
3rd international conference on Trends in Electrical, Electronics and computer engineering, TEECCON 2024
作者: Shakila, A. Joice Saravanan, S. Annamalai University Department of Computer and Information Science Tamilnadu Chidambaram India Annamalai University Faculty of Science Department of Computer and Information Science Tamilnadu Chidambaram India
The vital role of growing apples in global farming, both for their nutritional and economic power, shows the need to tackle diseases hitting apple orchards. Using technology, especially computer-aided diagnosis system... 详细信息
来源: 评论
Investigating the Effects of AI-Driven Systems on Data science Automation  15
Investigating the Effects of AI-Driven Systems on Data Scien...
收藏 引用
15th international conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Senthilkumar, K.K. Mehta, Pradnya S. Pandey, Megha Rao, Panduranga M.V. Singh, Baldev Khurana, Saniya Department of Electronics and Communication Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai127 India Department of Computer Engineering Vishwakarma Institute of Information Technology Pune India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Karnataka Bangalore India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and technology Chitkara University Punjab India
This article investigates the effect of AI-driven structures on the automation of information science. AI-pushed structures and automation of records technology have ended up an increasing number of essential because ... 详细信息
来源: 评论
Machine Learning as the Shield: Mitigating ARP Poisoning Attacks in Software Defined Networks  25
Machine Learning as the Shield: Mitigating ARP Poisoning Att...
收藏 引用
25th international Arab conference on information Technology, ACIT 2024
作者: Alquran, Rabee Al Jamal, Mahmoud Aljaidi, Mohammad Al-Jamal, Mohammad Khassawneh, Bashar Alsarhan, Ayoub Alidmat, Omar Samara, Ghassan Almatarneh, Sattam The Hashemite University Faculty of Prince Al-Hussien bin Abdullah for It Department of Information Technology Zarqa Jordan Irbid National University Department of Cybersecurity Irbid Jordan Zarqa University Department of Computer Science Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Yarmouk University Department of Statistics Irbid Jordan Amman Arab University Faculty of Computer Science and Informatics Department of Computer Science Amman Jordan Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Department of Artificial Intelligence Zarqa Jordan
Software-defined networking (SDN) revolutionizes network management by centralizing control, but this centralization also introduces notable vulnerabilities, especially Address Resolution Protocol (ARP) poisoning atta... 详细信息
来源: 评论
Compiler-provenance identification in obfuscated binaries using vision transformers
收藏 引用
FORENSIC science international-DIGITAL INVESTIGATION 2024年 49卷
作者: Khan, Wasif Alrabaee, Saed Al-kfairy, Mousa Tang, Jie Choo, Kim-Kwang Raymond United Arab Emirates Univ Informat Syst Secur Al Ain 15551 U Arab Emirates Zayed Univ Coll Technol Innovat Abu Dhabi U Arab Emirates Tsinghua Univ Dept Comp Sci Beijing Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA United Arab Emirates Univ Big Data Analyt Ctr Al Ain 15551 U Arab Emirates United Arab Emirates Univ Coll IT Cybersecur Res Grp Ctr Al Ain 15551 U Arab Emirates
Extracting compiler-provenance-related information (e.g., the source of a compiler, its version, its optimization settings, and compiler-related functions) is crucial for binary-analysis tasks such as function fingerp... 详细信息
来源: 评论
Forecasting the Impact of Deep Learning on Data science Practices: A Comprehensive Analysis  15
Forecasting the Impact of Deep Learning on Data Science Prac...
收藏 引用
15th international conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Acharjya, Kalyan Devaraj Verma, C. Umamaheswari, B. Shelke, Priya M. Kumar, Mukesh Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Ramnagar District562112 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Computer Science and Engineering Chennai127 India Vishwakarma Institute of Technology Department of Information Technology Pune India Vivekananda Global University Department of Mechanical Engineering Jaipur India
It comprehensively discusses the effect of deep mastering on data technology practices. Deep studying has advanced to become a powerful tool for information mining, pattern recognition, and feature engineering. It is ... 详细信息
来源: 评论
Sensitive Content Detection in Social Networks Using Deep Learning Models and Explainability Techniques  9
Sensitive Content Detection in Social Networks Using Deep Le...
收藏 引用
9th IEEE/ACIS international conference on Big Data, Cloud Computing, and Data science, BCD 2024
作者: Perikos, Isidoros University of Patras Computer Engineering and Informatics Department Patras Greece University of Peloponnese Computer Technology Institute and Press 'Diophantus' Electrical and Computer Engineering Dept. Patras Greece
In the dynamic landscape of online social networks, recognizing sensitive content is essential for safeguarding user privacy, fostering inclusivity, and enhancing diversity awareness. Building on prior research, this ... 详细信息
来源: 评论
Evaluating the Performance of Object Detection Algorithm in Low Light  1
Evaluating the Performance of Object Detection Algorithm in ...
收藏 引用
1st IEEE international conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Solanki, Arjun Vaidya, Himadri Rithak Rawat, Ruchira Sandhya Gupta, Rupesh Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Graphic Deemed to Be University Department of Computer Science and Engineering Dehradun India Chitkara University Institute of Engineering and Tech Chitkara University Department of Computer Science and Engineering Punjab India
In this crucial area of computer vision, this study tackles the difficulties of identifying objects in dim illumination. As deep learning is advancing quickly and sophisticated CNN designs appear, this research invest... 详细信息
来源: 评论
Automated Extraction of Company Names from Product Label Images: A Text Mining Approach  2
Automated Extraction of Company Names from Product Label Ima...
收藏 引用
2nd international conference on advanced Computing and Communication Technologies, ICACCTech 2024
作者: Kholiya, Gaurav Joshi, Vimal Pandey, Sanyam Thapa, Sashank Sharma, Vikrant Vats, Satvik Computer Science & Engineering Graphic Era Hill University Dehradun India Computer Science and Engineering Graphic Era Hill University Graphic Era Deemed to be University Dehradun India
Nowadays, it is becoming more and more important to get information from various sources. One of the key details that provide us with information about the product is its name, which is prominently printed on it. In t... 详细信息
来源: 评论
An IoT Based Electromyography Signal Transmission from sEMG Electrodes to Client's Server with ICT Infrastructure  10
An IoT Based Electromyography Signal Transmission from sEMG ...
收藏 引用
10th international conference on advanced Computing and Communication Systems, ICACCS 2024
作者: Pavithra, P.M. Balakrishnan, M. Anandaraj, A. Ramya, M. Sudharsan, R. Raja Sri Shanmugha College of Engineering and Technology Department of Artificial intelligence and Data Science Salem India Dr. Mahalingam College of Engineering and Technology Department of Artificial intelligence and Data Science Pollachi India Sri Eshwar College of Engineering Department of Computer Science and Engineering Coimbatore India Sri Shanmugha College of Engineering and Technology Department of Information Technology Salem India Sri Shanmugha College of Engineering and Technology Department of Biomedical Engineering Salem India
Bio-electric signal like Electromyography (EMG) can measure signal data from nerves and muscles separately in the particular region of affected nerve or muscles from a Human Being. For incorporating these measurements... 详细信息
来源: 评论
A Denial of Service Attack Defense Method for Roadside Units  12
A Denial of Service Attack Defense Method for Roadside Units
收藏 引用
12th international conference on advanced Cloud and Big Data, CBD 2024
作者: Wang, Huanbin He, Gaofeng Zhu, Haiting Xu, Bingfeng Zhang, Lu Guo, Naixuan School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China College of Information Science and Technology Nanjing Forestry University Nanjing China School of Computer Science Nanjing Audit University Nanjing China School of Information Engineering Yancheng Institute of Technology Yancheng China
Roadside Units (RSUs) constitute a vital component of Vehicular Ad Hoc Network (VANET) due to their primary role in gathering vehicle information. However, as indicated in the literature, they are vulnerable to Denial... 详细信息
来源: 评论