咨询与建议

限定检索结果

文献类型

  • 435,309 篇 会议
  • 2,849 篇 期刊文献
  • 2,586 册 图书
  • 3 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 440,747 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 257,479 篇 工学
    • 177,810 篇 计算机科学与技术...
    • 144,624 篇 软件工程
    • 61,877 篇 信息与通信工程
    • 40,379 篇 控制科学与工程
    • 33,098 篇 电气工程
    • 29,104 篇 电子科学与技术(可...
    • 26,711 篇 机械工程
    • 25,768 篇 生物工程
    • 21,087 篇 生物医学工程(可授...
    • 16,812 篇 光学工程
    • 16,270 篇 仪器科学与技术
    • 15,106 篇 动力工程及工程热...
    • 13,869 篇 化学工程与技术
    • 11,505 篇 安全科学与工程
    • 10,454 篇 交通运输工程
    • 9,842 篇 材料科学与工程(可...
  • 114,897 篇 理学
    • 59,673 篇 数学
    • 31,313 篇 物理学
    • 27,610 篇 生物学
    • 17,930 篇 统计学(可授理学、...
    • 13,075 篇 化学
    • 13,013 篇 系统科学
  • 69,266 篇 管理学
    • 45,709 篇 管理科学与工程(可...
    • 27,268 篇 图书情报与档案管...
    • 21,345 篇 工商管理
  • 17,667 篇 医学
    • 15,150 篇 临床医学
    • 14,413 篇 基础医学(可授医学...
    • 9,345 篇 药学(可授医学、理...
  • 11,187 篇 法学
    • 8,958 篇 社会学
  • 9,257 篇 教育学
  • 9,154 篇 经济学
    • 9,073 篇 应用经济学
  • 6,688 篇 农学
  • 3,650 篇 文学
  • 1,377 篇 军事学
  • 1,271 篇 艺术学
  • 45 篇 哲学
  • 29 篇 历史学

主题

  • 12,334 篇 accuracy
  • 12,117 篇 feature extracti...
  • 12,096 篇 computational mo...
  • 9,704 篇 training
  • 9,421 篇 computer science
  • 9,191 篇 computer archite...
  • 8,421 篇 deep learning
  • 6,467 篇 machine learning
  • 6,453 篇 real-time system...
  • 6,389 篇 predictive model...
  • 6,317 篇 support vector m...
  • 6,154 篇 data mining
  • 5,821 篇 convolutional ne...
  • 5,608 篇 neural networks
  • 5,402 篇 data models
  • 5,313 篇 internet of thin...
  • 5,055 篇 monitoring
  • 4,977 篇 optimization
  • 4,912 篇 educational inst...
  • 4,878 篇 computer vision

机构

  • 2,234 篇 chitkara univers...
  • 1,311 篇 school of comput...
  • 852 篇 school of comput...
  • 760 篇 school of electr...
  • 580 篇 lovely professio...
  • 554 篇 college of compu...
  • 524 篇 school of comput...
  • 520 篇 maharishi school...
  • 509 篇 college of compu...
  • 507 篇 school of comput...
  • 495 篇 department of co...
  • 486 篇 department of co...
  • 361 篇 school of comput...
  • 357 篇 school of comput...
  • 352 篇 school of comput...
  • 337 篇 the islamic univ...
  • 324 篇 school of comput...
  • 298 篇 department of el...
  • 287 篇 computer science...
  • 265 篇 school of comput...

作者

  • 267 篇 wang wei
  • 239 篇 vinay kukreja
  • 235 篇 kukreja vinay
  • 209 篇 china
  • 203 篇 li wei
  • 201 篇 yang yang
  • 188 篇 liu yang
  • 169 篇 zhang wei
  • 168 篇 li li
  • 166 篇 wei wang
  • 154 篇 yang liu
  • 147 篇 wang lei
  • 142 篇 zhang yu
  • 135 篇 wei zhang
  • 128 篇 zhang lei
  • 127 篇 li yang
  • 108 篇 liu wei
  • 107 篇 lei wang
  • 103 篇 mengchu zhou
  • 96 篇 wei li

语言

  • 427,319 篇 英文
  • 9,709 篇 其他
  • 4,469 篇 中文
  • 21 篇 俄文
  • 16 篇 法文
  • 14 篇 土耳其文
  • 10 篇 西班牙文
  • 6 篇 乌克兰文
  • 5 篇 德文
  • 3 篇 葡萄牙文
检索条件"任意字段=International Conference on Computer Engineering and Technology"
440748 条 记 录,以下是601-610 订阅
排序:
Mathematical Model and Simulink Simulation Method of Rigid Body Motion of Quadcopter UAV  2
Mathematical Model and Simulink Simulation Method of Rigid B...
收藏 引用
2nd IEEE international conference on Electrical, Automation and computer engineering, ICEACE 2024
作者: Wang, Yilin Xu, Lin Li, Mingxuan Chen, Hao Cheng, Zhuo Xie, Qiang Wuhan University of Technology School of Mechanical and Electronic Engineering Wuhan China Wuhan University of Technology School of Automotive Engineering Wuhan China Wuhan University of Technology School of Naval Architecture Ocean and Energy Power Engineering Wuhan China
This article provides a comprehensive summary of the mathematical model of rigid body motion for conventional quadcopter UAVs, along with the complete simulation flow. The dynamics and kinematics models of both the po... 详细信息
来源: 评论
Detection of Deepfakes: Protecting Images and Vedios Against Deepfake  21
Detection of Deepfakes: Protecting Images and Vedios Against...
收藏 引用
21st international computer conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2024
作者: Tian, Ying Zhou, Wang Haq, Amin Ul Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province LuZhou China School of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an... 详细信息
来源: 评论
Evaluating Self-Supervised Learning Models for Multi-Label Pathology Detection: A Benchmark Against Supervised Learning  2
Evaluating Self-Supervised Learning Models for Multi-Label P...
收藏 引用
2nd international conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Agarwal, Nidhi Pooja Kumar, Nitish Anushka Garg, Yashica Department of Computer Science Engineering Galgotias University Greater Noida India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Information Technology Bharati Vidyapeeth College of Engineering New Delhi India Department of Computer Science and Engineering Indira Gandhi Delhi Technical University for Women New Delhi India
The analysis and objective of the current work is to check the performance of SSL Models in multi-label classification on the available dataset of NIH Chest X-ray images which is a large-scale medical imaging dataset.... 详细信息
来源: 评论
Design and Implementation of a Mobile Infant Care Monitoring System Based on Virtual Simulation technology of computer Service Programs
Design and Implementation of a Mobile Infant Care Monitoring...
收藏 引用
2024 international conference Optoelectronic Information and Optical engineering, OIOE 2024
作者: Jun, Guobin School of Children's Welfare Changchun Humanities and Sciences College Changchun China
With the changes in modern families and the needs of infants, traditional parenting methods are no longer able to meet the needs of parents. In order to provide a more advanced and convenient parenting method, this st... 详细信息
来源: 评论
Optimized Routing in FANET Using Marine Predators Algorithm  4
Optimized Routing in FANET Using Marine Predators Algorithm
收藏 引用
4th IEEE international conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Minocha, Sachin Singh, Birmohan Kaur, Manpreet Namasudra, Suyel Lorenz, Pascal School of Computer Science Engineering and Technology Bennett University Greater Noida India Sant Longowal Institute of Engineering and Technology Department of Computer Science and Engineering Longowal India Sant Longowal Institute of Engineering and Technology Department of Electrical and Instrumentation Engineering Longowal India National Institute of Technology Agartala Department of Computer Science and Engineering Tripura India University of Haute Alsace Colmar France
Flying Adhoc Network (FANET) has gained attention due to regressive real-time use of Unmanned Aerial Vehicles (UAVs). Optimized routing in FANETs is more challenging than mobile ad-hoc networks and vehicular ad-hoc ne... 详细信息
来源: 评论
A low quiescent current high PSRR LDO circuit  3
A low quiescent current high PSRR LDO circuit
收藏 引用
3rd international conference on computer technology, Information engineering, and Electron Materials, CTIEEM 2023
作者: Zhou, Haining Zhu, Bin Lin, Haijun Lei, Yajie School of Opto-Electronic and Communication Engineering Xiamen University of Technology Fujian Xiamen China
In order to meet the needs of Internet of Things devices and wearable electronic devices for lower standby power consumption and power supply noise, a Low Dropout Regulator (LDO) circuit with low quiescent current and... 详细信息
来源: 评论
An Automatic Detection of Counterfeit or Damaged Indian Rupee Notes  15
An Automatic Detection of Counterfeit or Damaged Indian Rupe...
收藏 引用
15th international conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Deepak, N.R. Pal, Simran R. Yasmeen, Nikhat Amin, Omar Ismail Sahu, Ankit Kumar Suhas, G.K. Department of Computer Science Engineering Atria Institute of Technology Karnataka Bengaluru India Department of Computer Science Engineering HKBK College of Engineering Karnataka Bengaluru India Department of Information Science Engineering Akshaya Institute of Technology Karnataka Tumkur India
Every year in India, the Reserve Bank of India (RBI) deals with the issue of counterfeit currency *** employees are highly educated to detect counterfeit notes, however the trouble comes when such notes are used blend... 详细信息
来源: 评论
Slotted Rectangular Microstrip Patch Antenna for 2.4 GHz Applications  10
Slotted Rectangular Microstrip Patch Antenna for 2.4 GHz App...
收藏 引用
10th international conference on Digital Arts, Media and technology and 8th ECTI Northern Section conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2025
作者: Tabaiya, Kamon Konpang, Jessada Sirikham, Adisorn Tubtongdee, Suttee Supreeyatitikul, Nathapat Thitimahatthanakusol, Phatsakul Rajamangala University of Technology Faculty of Engineering Department of Electrical and Telecommunication Engineering Bangkok10120 Thailand Rajamangala University of Technology Isan Faculty of Engineering and Technology Department of Telecommunication Engineering Nakorn Ratchasima Thailand
This work proposes a slotted rectangular-microstrip patch antenna for Wi-Fi band (2.4 GHz). The antenna was designed using CST Microwave Studio, which is utilized for designing a slotted rectangular-microstrip patch a... 详细信息
来源: 评论
Design and implementation of content confidentiality check system  3
Design and implementation of content confidentiality check s...
收藏 引用
3rd international conference on Electronic Information engineering, Big Data, and computer technology, EIBDCT 2024
作者: Song, Yanyan Chen, Menghong Pi, Chunying Nie, Peng College of Computer Science Nankai University Tianjin300350 China College of Cyber Science Nankai University Tianjin300350 China College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300350 China
Nowadays, companies use databases for information storage and it is inevitable that there will be confidential information which can cause severe crises and public relations problems if leaked. In order to solve this ... 详细信息
来源: 评论
Sign Language Recognition Using Hand Gestures  3
Sign Language Recognition Using Hand Gestures
收藏 引用
3rd international conference for Advancement in technology, ICONAT 2024
作者: More, Pravin Baban Jadhav, Amolkumar N. Khatik, Irfan Singh, Sonam Borate, Vishal Kisan Mali, Yogesh Kisan Annasaheb Dange Colleg of Engineering & Technology Department of CSE Ashta India Fergusson College Pune India Dr D y Patil Institute of Technology Department of AIML Pune India Dr D y Patil College of Engineering & Innovation Talegaon Department of Computer Engineering Pune India G.H Raisoni College of Engineering and Management Wagholi Department of AIML Pune India
Communication is an essential part of life, but it can be a significant challenge for those who cannot speak. That's why we are working on a research project to develop a real-time American Sign Language (ASL) det... 详细信息
来源: 评论