咨询与建议

限定检索结果

文献类型

  • 435,828 篇 会议
  • 2,851 篇 期刊文献
  • 2,587 册 图书
  • 3 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 441,269 篇 电子文献
  • 8 种 纸本馆藏

日期分布

学科分类号

  • 257,487 篇 工学
    • 177,818 篇 计算机科学与技术...
    • 144,627 篇 软件工程
    • 61,879 篇 信息与通信工程
    • 40,385 篇 控制科学与工程
    • 33,100 篇 电气工程
    • 29,104 篇 电子科学与技术(可...
    • 26,713 篇 机械工程
    • 25,768 篇 生物工程
    • 21,087 篇 生物医学工程(可授...
    • 16,812 篇 光学工程
    • 16,271 篇 仪器科学与技术
    • 15,106 篇 动力工程及工程热...
    • 13,869 篇 化学工程与技术
    • 11,505 篇 安全科学与工程
    • 10,454 篇 交通运输工程
    • 9,842 篇 材料科学与工程(可...
  • 114,902 篇 理学
    • 59,677 篇 数学
    • 31,313 篇 物理学
    • 27,610 篇 生物学
    • 17,931 篇 统计学(可授理学、...
    • 13,076 篇 化学
    • 13,013 篇 系统科学
  • 69,269 篇 管理学
    • 45,712 篇 管理科学与工程(可...
    • 27,268 篇 图书情报与档案管...
    • 21,345 篇 工商管理
  • 17,668 篇 医学
    • 15,150 篇 临床医学
    • 14,414 篇 基础医学(可授医学...
    • 9,345 篇 药学(可授医学、理...
  • 11,187 篇 法学
    • 8,958 篇 社会学
  • 9,258 篇 教育学
  • 9,153 篇 经济学
    • 9,072 篇 应用经济学
  • 6,688 篇 农学
  • 3,650 篇 文学
  • 1,377 篇 军事学
  • 1,271 篇 艺术学
  • 45 篇 哲学
  • 29 篇 历史学

主题

  • 12,475 篇 accuracy
  • 12,167 篇 feature extracti...
  • 12,146 篇 computational mo...
  • 9,752 篇 training
  • 9,421 篇 computer science
  • 9,212 篇 computer archite...
  • 8,466 篇 deep learning
  • 6,505 篇 real-time system...
  • 6,486 篇 machine learning
  • 6,430 篇 predictive model...
  • 6,343 篇 support vector m...
  • 6,157 篇 data mining
  • 5,847 篇 convolutional ne...
  • 5,615 篇 neural networks
  • 5,428 篇 data models
  • 5,321 篇 internet of thin...
  • 5,069 篇 monitoring
  • 5,016 篇 optimization
  • 4,905 篇 educational inst...
  • 4,891 篇 computer vision

机构

  • 2,236 篇 chitkara univers...
  • 1,317 篇 school of comput...
  • 859 篇 school of comput...
  • 760 篇 school of electr...
  • 605 篇 lovely professio...
  • 555 篇 college of compu...
  • 528 篇 school of comput...
  • 520 篇 maharishi school...
  • 509 篇 college of compu...
  • 507 篇 school of comput...
  • 495 篇 department of co...
  • 488 篇 department of co...
  • 362 篇 school of comput...
  • 357 篇 school of comput...
  • 352 篇 school of comput...
  • 337 篇 the islamic univ...
  • 328 篇 school of comput...
  • 298 篇 department of el...
  • 287 篇 computer science...
  • 269 篇 school of comput...

作者

  • 267 篇 wang wei
  • 239 篇 vinay kukreja
  • 235 篇 kukreja vinay
  • 209 篇 china
  • 205 篇 yang yang
  • 203 篇 li wei
  • 188 篇 liu yang
  • 171 篇 zhang wei
  • 168 篇 li li
  • 168 篇 wei wang
  • 156 篇 yang liu
  • 147 篇 wang lei
  • 142 篇 zhang yu
  • 135 篇 wei zhang
  • 128 篇 zhang lei
  • 127 篇 li yang
  • 108 篇 liu wei
  • 107 篇 lei wang
  • 103 篇 mengchu zhou
  • 96 篇 wei li

语言

  • 427,841 篇 英文
  • 9,709 篇 其他
  • 4,469 篇 中文
  • 21 篇 俄文
  • 16 篇 法文
  • 14 篇 土耳其文
  • 10 篇 西班牙文
  • 6 篇 乌克兰文
  • 5 篇 德文
  • 3 篇 葡萄牙文
检索条件"任意字段=International Conference on Computer Engineering and Technology"
441270 条 记 录,以下是681-690 订阅
排序:
A cloud based interactive framework for emergency medical data sharing  4th
A cloud based interactive framework for emergency medical da...
收藏 引用
4th Annual international conference on Data Science, Machine Learning and Blockchain technology, AICDMB 2023
作者: Taranum, Ayesha Manishankar, S. Padmaja, K. Balarengadurai, C. Department of Computer Science and Engineering Vidyavardhaka College of Engineering Karnataka Mysore India Department of Computer Science and Engineering Sahrdaya College of Engineering and Technology Kodakkara Thrissur India Department of Computer Science and Engineering GSSS Institue of Engineering and Technology for Women Karnataka Mysore India
Pandemic bringing a change in the medical system and medical infrastructure. This requires a complete revamping of medical data collections and storage. In such a scenario there has to be a system which enables the ef... 详细信息
来源: 评论
Logistic cost factors of Rayong durian export to China under Regional Comprehensive Economic Partnership  9
Logistic cost factors of Rayong durian export to China under...
收藏 引用
Joint 9th international conference on Digital Arts, Media and technology with 7th ECTI Northern Section conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2024
作者: Wannagoat, Kodchanitch Jiang, Jiannan Wanitwattanakosol, Jirapat Paphawasit, Boontarika Chiang Mai University Modern Management and Information Technology Thailand
China is currently the largest export market for Thai durians, and several studies have shown that China will maintain this position for a long time to come. At the same time, under the implementation of the Regional ... 详细信息
来源: 评论
computer Vision Algorithms for Microscopy Classification of Nanocomposites Using a Federated Machine Learning Approach
Computer Vision Algorithms for Microscopy Classification of ...
收藏 引用
2024 international conference on Actual Problems of Electron Devices engineering, APEDE 2024
作者: Korchagin, Sergey Alekseevich Institute of Digital Technologies Department of Artificial Intelligence Financial University under the Government of the Russian Federation Moscow Russia
The work solves the problem of classifying nanocomposites using computer vision technology in conditions where microscopy images obtained for training cannot be used centrally for training for various confidentiality ... 详细信息
来源: 评论
Enhancing Cloud Infrastructure Security with GraphSAGE-Based Intrusion Detection Systems  1
Enhancing Cloud Infrastructure Security with GraphSAGE-Based...
收藏 引用
1st international conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Kumar, G. Nanda Kishor Syed, Shakir Mogal, Amit Karbhari Abid, Tahera Perada, Anvesh Suneetha, Sampathirao University of South Florida United States Malla Reddy University Department of Computer Science and Engineering Hyderabad India Bargersville IN United States Mvp Samaj's Cmcs College Department of Computer Science and Application Nashik India Nawab Shah Alam Khan College of Engineering and Technology Department of Information Technology Hyderabad India Drexel University Department of Electrical and Computer Engineering Philadelphia United States Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Vaddeswaram India
Cloud computing provides scalable and adaptable infrastructure however is significantly susceptible to cyber-attacks. This work presents a hybrid methodology that integrates the GOA and GA for feature selection, along... 详细信息
来源: 评论
Extending Defense-in-Depth to Multi-Domain Networks  24
Extending Defense-in-Depth to Multi-Domain Networks
收藏 引用
8th international conference on Electronic Information technology and computer engineering, EITCE 2024
作者: Xu, Yaobing Yang, Junhai Zhou, Ziyan Shi, Xinyi Wang, Jing Zhang, Junhao Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Multi-domain networks, consisting of interconnected management domains with distinct control mechanisms, introduce unique cybersecurity challenges that are often overlooked in current research. This paper addresses th... 详细信息
来源: 评论
A lightweight network intrusion detection model based on convolution and attention mechanisms  3
A lightweight network intrusion detection model based on con...
收藏 引用
3rd international conference on Electronic Information engineering, Big Data, and computer technology, EIBDCT 2024
作者: Fang, Zizheng Liu, Yaodi Yuan, Shuai Ye, Tiancheng School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
With the development of the Internet of Things (IoT), people's lives have become more intelligent. However, the proliferation of numerous small devices has also introduced serious risks to network security. Networ... 详细信息
来源: 评论
Enhancing IoT Sidechain Security and Efficiency: A Restaking and Contract Approach  12
Enhancing IoT Sidechain Security and Efficiency: A Restaking...
收藏 引用
12th IEEE international conference on computer Science and Network technology, ICCSNT 2024
作者: Zhou, Zitao Su, Hang Li, Yibing Ye, Fang Harbin Engineering University Key Laboratory of Advanced Marine Communication and Information Technology Harbin China Harbin Engineering University College of Information and Communication Engineering Harbin China Harbin Engineering University National Key Laboratory of Underwater Acoustic Technology Harbin China
Sidechain technology aids in building lightweight and rapid-response blockchain services in resource limited Internet of Things (IoT) environments, yet the low trust model of sidechains is a concern. The restaking mec... 详细信息
来源: 评论
Unmasking the Reality: A Comprehensive Study of Deepfake Identification Techniques and Their Expanding Terrain  2
Unmasking the Reality: A Comprehensive Study of Deepfake Ide...
收藏 引用
2nd international conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Sharma, Shubh Pathak, Disha Mohini Jain, Dhyanendra Srivastava, Somya Vats, Prashant Upadhyay, Govind Murari Department of Computer Science ABES Engineering College U.P. Ghaziabad India Department of Computer Science Engineering-AIML ABES Engineering College U.P. Ghaziabad India Dept. of CSE School of CSE Manipal University Jaipur Rajasthan Jaipur India Dept. of Computer Application Manipal University Jaipur Rajasthan Jaipur India
The swift progression of deepfake-generating technologies has elicited much apprehension about their potential misuse in digital media, necessitating the development of efficient detection methods. This research aims ... 详细信息
来源: 评论
Deep Learning Techniques for Alzheimer's Disease Prediction  5
Deep Learning Techniques for Alzheimer's Disease Prediction
收藏 引用
5th IEEE international conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Mahesh, T.R. Agarwal, Ankita Nair, Amrutha V. Faculty of Engineering and Technology Department of Computer Science Engineering Karnataka Bangalore India Maharishi University of Information Technology Maharishi School of Engineering & Technology Uttar Pradesh India Presidency University Department of Electronics and Communication Engineering Karnataka Bangalore India
Deep learning, a cutting-edge approach of machine learning, surpasses classical machine learning when it comes to detecting particular structures in complicated, high-dimensional data in the area of computer vision. T... 详细信息
来源: 评论
A Comparative Study of Validation Methods for Sensor-Based Human Activity Recognition Using Deep Learning Models  10
A Comparative Study of Validation Methods for Sensor-Based H...
收藏 引用
10th international conference on Digital Arts, Media and technology and 8th ECTI Northern Section conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2025
作者: Mekruksavanich, Sakorn Hnoohom, Narit Phaphan, Wikanda Jitpattanakul, Anuchit University of Phayao School of Information and Communication Technology Department of Computer Engineering Phayao Thailand Mahidol University Image Information and Intelligence Laboratory Department of Computer Engineering Faculty of Engineering Nakhon Pathom Thailand King Mongkut's University of Technology North Bangkok Research Group in Statistical Learning and Inference Department of Applied Statistics Faculty of Applied Science Bangkok Thailand King Mongkut's University of Technology North Bangkok Intelligent and Nonlinear Dynamic Innovations Research Center Department of Mathematics Faculty of Applied Science Bangkok Thailand
With the rise of wearable sensors and smart devices, human activity recognition (HAR) has become a vital research area in ubiquitous computing. Although many studies report high accuracy using k-fold cross-validation,... 详细信息
来源: 评论