咨询与建议

限定检索结果

文献类型

  • 438,481 篇 会议
  • 2,863 篇 期刊文献
  • 2,596 册 图书
  • 3 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 443,943 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 258,925 篇 工学
    • 178,685 篇 计算机科学与技术...
    • 145,306 篇 软件工程
    • 62,153 篇 信息与通信工程
    • 40,688 篇 控制科学与工程
    • 33,281 篇 电气工程
    • 29,218 篇 电子科学与技术(可...
    • 26,826 篇 机械工程
    • 25,803 篇 生物工程
    • 21,182 篇 生物医学工程(可授...
    • 17,002 篇 光学工程
    • 16,338 篇 仪器科学与技术
    • 15,195 篇 动力工程及工程热...
    • 13,939 篇 化学工程与技术
    • 11,585 篇 安全科学与工程
    • 10,521 篇 交通运输工程
    • 9,889 篇 材料科学与工程(可...
  • 115,457 篇 理学
    • 59,986 篇 数学
    • 31,517 篇 物理学
    • 27,661 篇 生物学
    • 18,069 篇 统计学(可授理学、...
    • 13,121 篇 化学
    • 13,028 篇 系统科学
  • 69,590 篇 管理学
    • 45,917 篇 管理科学与工程(可...
    • 27,414 篇 图书情报与档案管...
    • 21,481 篇 工商管理
  • 17,792 篇 医学
    • 15,256 篇 临床医学
    • 14,519 篇 基础医学(可授医学...
    • 9,344 篇 药学(可授医学、理...
  • 11,238 篇 法学
    • 8,994 篇 社会学
  • 9,328 篇 教育学
  • 9,187 篇 经济学
    • 9,106 篇 应用经济学
  • 6,730 篇 农学
  • 3,650 篇 文学
  • 1,378 篇 军事学
  • 1,271 篇 艺术学
  • 45 篇 哲学
  • 29 篇 历史学

主题

  • 12,860 篇 accuracy
  • 12,336 篇 computational mo...
  • 12,280 篇 feature extracti...
  • 9,844 篇 training
  • 9,427 篇 computer science
  • 9,276 篇 computer archite...
  • 8,742 篇 deep learning
  • 6,739 篇 real-time system...
  • 6,560 篇 machine learning
  • 6,552 篇 predictive model...
  • 6,424 篇 support vector m...
  • 6,171 篇 data mining
  • 6,077 篇 convolutional ne...
  • 5,644 篇 neural networks
  • 5,493 篇 data models
  • 5,346 篇 internet of thin...
  • 5,140 篇 monitoring
  • 5,066 篇 optimization
  • 5,030 篇 information tech...
  • 4,953 篇 computer vision

机构

  • 2,253 篇 chitkara univers...
  • 1,320 篇 school of comput...
  • 859 篇 school of comput...
  • 760 篇 school of electr...
  • 605 篇 lovely professio...
  • 555 篇 college of compu...
  • 534 篇 school of comput...
  • 520 篇 maharishi school...
  • 513 篇 college of compu...
  • 507 篇 school of comput...
  • 495 篇 department of co...
  • 488 篇 department of co...
  • 365 篇 school of comput...
  • 364 篇 school of comput...
  • 357 篇 school of comput...
  • 337 篇 the islamic univ...
  • 328 篇 school of comput...
  • 298 篇 department of el...
  • 287 篇 computer science...
  • 279 篇 department of el...

作者

  • 271 篇 wang wei
  • 239 篇 vinay kukreja
  • 235 篇 kukreja vinay
  • 209 篇 china
  • 207 篇 yang yang
  • 203 篇 li wei
  • 191 篇 liu yang
  • 173 篇 zhang wei
  • 168 篇 wei wang
  • 167 篇 li li
  • 160 篇 yang liu
  • 149 篇 wang lei
  • 142 篇 zhang yu
  • 135 篇 wei zhang
  • 130 篇 zhang lei
  • 127 篇 li yang
  • 114 篇 liu wei
  • 107 篇 lei wang
  • 103 篇 mengchu zhou
  • 98 篇 li yan

语言

  • 422,486 篇 英文
  • 17,737 篇 其他
  • 4,678 篇 中文
  • 21 篇 俄文
  • 16 篇 法文
  • 14 篇 土耳其文
  • 10 篇 西班牙文
  • 6 篇 乌克兰文
  • 5 篇 德文
  • 3 篇 葡萄牙文
检索条件"任意字段=International Conference on Computer Engineering and Technology"
443944 条 记 录,以下是1521-1530 订阅
排序:
Efficient Classification for Neural Machines Interpretations Based on Mathematical Models  4
Efficient Classification for Neural Machines Interpretations...
收藏 引用
4th international conference on Innovative Practices in technology and Management, ICIPTM 2024
作者: Kumar, Rahul Kapoor, Monit Varshney, Neeraj Saraswat, Manish Sankhyan, Akhil Singh, Devendra Chitkara University Chitkara Centre for Research and Development Himachal Pradesh 174103 India Chitkara University Centre of Research Impact and Outreach Punjab Rajpura140401 India GLA University Department of Computer Engineering and Applications Mathura India Lloyd Institute of Engineering & Technology Greater Noida India Lloyd Law College Greater Noida India Uttaranchal University Uttaranchal Institute of Technology Department of Computer Science & Engineering Dehradun248007 India
This study explores mathematical models to enhance our understanding of information generated by neural machines. We tested various models, including Statistical Machine Translation (SMT), Neural Machine Translation (... 详细信息
来源: 评论
Multi-Task Scheduling Method for Information Security of Heterogeneous Big Data Networks Based on Artificial Intelligence technology  2
Multi-Task Scheduling Method for Information Security of Het...
收藏 引用
2nd IEEE international conference on Sensors, Electronics and computer engineering, ICSECE 2024
作者: Chen, Yiping Zheng, Yingzi Guangzhou Institute of Science and Technology Department of Computer Science and Engineering Guangzhou510540 China
Multi-task scheduling of heterogeneous big data network information is proposed to improve the optimal configuration and application ability of network big data resources. A multi-task scheduling method of heterogeneo... 详细信息
来源: 评论
IoT Based Agricultural Monitoring and Alert System  4
IoT Based Agricultural Monitoring and Alert System
收藏 引用
4th international conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Priya, V Vishnu Nisanth, G. Dhanushree, D. Sindhu, M. Varshini, T. Preteka, A.T. Kongu Engineering College Department of Computer Science and Engineering Perundurai India Kongu Engineering College Department of Computer Applications Perundurai India Kongu Engineering College Department of Computer Technology Perundurai India
The goal of this project is to implement an Internet of Things (IoT)-based Agricultural Monitoring & Alert System (AMAS) that will integrate multiple sensors to continuously monitor agricultural parameters, such a... 详细信息
来源: 评论
Growing Greener: Exploring the Creative Potential of Deep Learning in Agricultural Disease Control
Growing Greener: Exploring the Creative Potential of Deep Le...
收藏 引用
2024 international conference on Signal Processing, Computation, Electronics, Power and Telecommunication, IConSCEPT 2024
作者: Kiran, Ajmeera Rahman, Syed Ziaur Sreelatha, P. Dhanasekaran, S. Ayyasamy, Ramesh Kumar Swetha, Devulapally MLR Institute of Technology Department of Computer Science and Engineering Hyderabad India Majan University College Faculty of Information Technology Oman A.P Tirupati India Kalasalingam Academy of Research and Education Deemed to be University Department of Information Technology Tamilnadu India Faculty of Information and Communication Technology Kampar Malaysia Vaagdevi Engineering College Department of Computer Science and Engineering Telangana Bolli Kunta India
According to estimates, by mid-2030, there will be 8.6 billion people on the planet. The human population has been growing exponentially. There will be a rise in food production and consumption due to the massive popu... 详细信息
来源: 评论
Optimized Millimeter Wave AoA Localization in Indoor Parking Environments: A Precise Approach with Beam Forming and Antenna Analysis in Line of Sight Scenarios  4
Optimized Millimeter Wave AoA Localization in Indoor Parking...
收藏 引用
4th international conference on Neural Networks, Information and Communication engineering, NNICE 2024
作者: Cai, Lingxiang Lai, Hanyi Liu, Yongliang University of Illinois Department of Electrical and Computer Engineering Urbana-ChampaignIL United States Beijing University of Technology Faculty of Science Beijing China Hebei University of Technology Department of Electrical Engineering Tianjin China
In recent years, the demand for indoor localization techniques has grown rapidly. In order to meet such demand, this article focuses on indoor localization and proposes a novel application of AoA technology-based loca... 详细信息
来源: 评论
Real-Time Facial Recognition System for Secure College Bus Transport using Deep Learning Techniques  3
Real-Time Facial Recognition System for Secure College Bus T...
收藏 引用
3rd international conference on Electronics and Renewable Systems, ICEARS 2025
作者: Kavitha, M.N. Saranya, S.S. Pragatheeswari, E. Priya, N. Kaviya Ranjith, S.R. Vanchivel, N. Rahul Kongu Engineering College Department of Computer Science and Design Tamil Nadu India Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Tamil Nadu Coimbatore India Kongu Engineering College Department of Computer Science and Engineering Tamil Nadu Erode India Kongu Engineering College Department of Csd Tamil Nadu India
The proposed system aims to enhance student transportation security through real-time face detection and recognition. Leveraging the MTCNN framework for accurate face detection and the FaceNet model for reliable face ... 详细信息
来源: 评论
Research on Data Mining technology of Internet Privacy Protection Based on Local Differential Privacy  6
Research on Data Mining Technology of Internet Privacy Prote...
收藏 引用
6th international conference on Communications, Information System and computer engineering, CISCE 2024
作者: Yu, Juan School of Computer and Information Engineering Maanshan Teacher's College Maanshan China
With the rapid development of social economy and science and technology, data sharing and analysis technology is one of the contents widely used in the Internet field. Collecting and distributing terminal data and min... 详细信息
来源: 评论
Optimization design of nuclear power plant monitoring display interface based on SEEV model  24
Optimization design of nuclear power plant monitoring displa...
收藏 引用
5th international conference on computer Science and Management technology, ICCSMT 2024
作者: Xing, Rui Dou, Jinzhen Xue, Chengqi School of Mechanical Engineering Southeast University Jiangsu Nanjing China
Based on the SEEV model, the nuclear power plant monitoring and display interface is optimized and ***, we summarize the key contents and existing problems of the interface, then introduce the salience and effort fact... 详细信息
来源: 评论
Role of Smali Opcodes in Identifying Android Malware Obfuscation Variants  4
Role of Smali Opcodes in Identifying Android Malware Obfusca...
收藏 引用
4th international conference on computer, Communication, Control and Information technology, C3IT 2024
作者: Anand, Abhishek Singh, Jyoti Prakash Amity School of Engineering and Technology Amity University Patna Patna India Computer Science and Engineering National Institute of Technology Patna Patna India
With the widespread adoption of Android and its applications, obfuscated malware poses significant challenges to the platform's security. Addressing these challenges requires automated, lightweight, and scalable m... 详细信息
来源: 评论
Method and design of encrypted image hiding based on random LSB matching
Method and design of encrypted image hiding based on random ...
收藏 引用
2024 international conference on computer Network Security and Software engineering, CNSSE 2024
作者: Yun, Feng SiChuan Technology &Business College Chengdu China
The Internet has provided great convenience for people, but at the same time, there have also been some problems that infringe on people's interests. How to effectively protect intellectual property rights and pre... 详细信息
来源: 评论