咨询与建议

限定检索结果

文献类型

  • 107,183 篇 会议
  • 681 篇 期刊文献
  • 559 册 图书
  • 2 篇 学位论文

馆藏范围

  • 108,424 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 60,912 篇 工学
    • 49,900 篇 计算机科学与技术...
    • 39,812 篇 软件工程
    • 13,426 篇 信息与通信工程
    • 11,482 篇 生物工程
    • 8,512 篇 控制科学与工程
    • 6,743 篇 电气工程
    • 6,349 篇 生物医学工程(可授...
    • 3,866 篇 光学工程
    • 3,332 篇 机械工程
    • 2,984 篇 电子科学与技术(可...
    • 2,763 篇 网络空间安全
    • 2,719 篇 安全科学与工程
    • 2,516 篇 动力工程及工程热...
    • 2,319 篇 化学工程与技术
    • 2,188 篇 仪器科学与技术
  • 25,996 篇 理学
    • 12,113 篇 生物学
    • 12,065 篇 数学
    • 5,172 篇 物理学
    • 4,919 篇 统计学(可授理学、...
    • 3,515 篇 系统科学
    • 2,330 篇 化学
  • 17,450 篇 管理学
    • 11,016 篇 管理科学与工程(可...
    • 7,614 篇 图书情报与档案管...
    • 5,174 篇 工商管理
  • 13,620 篇 教育学
    • 13,419 篇 教育学
  • 6,408 篇 医学
    • 5,469 篇 临床医学
    • 5,220 篇 基础医学(可授医学...
    • 3,406 篇 药学(可授医学、理...
    • 2,887 篇 公共卫生与预防医...
  • 3,377 篇 法学
    • 2,923 篇 社会学
  • 1,965 篇 文学
  • 1,766 篇 农学
  • 1,661 篇 经济学
  • 267 篇 艺术学
  • 106 篇 军事学
  • 11 篇 历史学
  • 10 篇 哲学

主题

  • 7,211 篇 machine learning
  • 7,071 篇 deep learning
  • 5,537 篇 accuracy
  • 5,104 篇 training
  • 4,929 篇 computational mo...
  • 4,221 篇 education
  • 3,834 篇 students
  • 3,628 篇 feature extracti...
  • 3,068 篇 support vector m...
  • 3,068 篇 predictive model...
  • 3,064 篇 machine learning...
  • 3,031 篇 convolutional ne...
  • 2,593 篇 real-time system...
  • 2,386 篇 data models
  • 2,238 篇 neural networks
  • 2,032 篇 cloud computing
  • 1,829 篇 teaching
  • 1,491 篇 reinforcement le...
  • 1,480 篇 artificial intel...
  • 1,411 篇 internet of thin...

机构

  • 814 篇 chitkara univers...
  • 134 篇 lovely professio...
  • 109 篇 computer science...
  • 97 篇 karnataka bangal...
  • 94 篇 college of compu...
  • 89 篇 school of comput...
  • 76 篇 school of comput...
  • 73 篇 department of co...
  • 72 篇 chitkara univers...
  • 72 篇 department of co...
  • 67 篇 department of co...
  • 63 篇 department of co...
  • 58 篇 school of comput...
  • 58 篇 department of co...
  • 52 篇 department of in...
  • 49 篇 chitkara univers...
  • 45 篇 chennai
  • 43 篇 department of me...
  • 42 篇 school of automa...
  • 42 篇 vellore institut...

作者

  • 71 篇 anjali t.
  • 70 篇 shiva mehta
  • 52 篇 li yang
  • 42 篇 sharma vikrant
  • 40 篇 wang lei
  • 39 篇 rakesh kumar
  • 35 篇 sharma neha
  • 33 篇 wang jing
  • 32 篇 kukreja vinay
  • 32 篇 vinay kukreja
  • 31 篇 lei wang
  • 30 篇 huang yueh-min
  • 30 篇 zhang lei
  • 28 篇 liu bo
  • 28 篇 yu wang
  • 28 篇 gill kanwarparta...
  • 27 篇 li xin
  • 26 篇 amandeep nagpal
  • 25 篇 vinay gautam
  • 24 篇 zhang tao

语言

  • 91,082 篇 英文
  • 16,988 篇 其他
  • 949 篇 中文
  • 23 篇 西班牙文
  • 12 篇 葡萄牙文
  • 5 篇 阿拉伯文
  • 3 篇 法文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 捷克文
检索条件"任意字段=International Conference on Learning and Teaching in Computing and Engineering"
108425 条 记 录,以下是4041-4050 订阅
排序:
Fortifying Email Security: A Machine learning Approach  15
Fortifying Email Security: A Machine Learning Approach
收藏 引用
15th international conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2024
作者: Begum, Shaik Salma Pavani, Ananta Naidu, Gedela Narasimha Sandeep, Gonela Pavan, Devu Seshadri Rao Gudlavalleru Engineering College CSE Gudlavalleru India
In today's communication landscape, emails are essential for both personal and business interactions, serving as a common method to transmit sensitive information, including financial data, credit reports, and log... 详细信息
来源: 评论
Parity-Based Amplitude Embedding for Rational Quantum Dataset Preprocessing  1
Parity-Based Amplitude Embedding for Rational Quantum Datase...
收藏 引用
1st international conference on Quantum Communications, Networking, and computing, QCNC 2024
作者: Prasetiadi, Agi Mambo, Masahiro Kanazawa University Graduate School of Natural Science and Technology Kanazawa Japan Kanazawa University Institute of Science and Engineering Kanazawa Japan
Quantum dataset preprocessing for amplitude embedding is understudied despite its importance for achieving good generalization in quantum machine learning models. Amplitude embedding, known for its compression capabil... 详细信息
来源: 评论
Image-Based Cognitive States Identification through Deep learning  2
Image-Based Cognitive States Identification through Deep Lea...
收藏 引用
2nd IEEE international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2024
作者: Kundan Rao, S. Ambannavar, Siddarth Sinha, G.R. Bms College of Engineering Dept. of Machine Learning Bangalore560019 India Gfsc University Gujarat Vadodara India
Yoga and mindfulness practices offer a variety of benefits, promoting both physical and mental well-being. This research intersects with AI, psychology, neuroscience, and more within cognitive science, contributing to... 详细信息
来源: 评论
Enhancing EEG Analysis for Rapid Brain Activities Detection in Patients  1
Enhancing EEG Analysis for Rapid Brain Activities Detection ...
收藏 引用
1st international conference for Women in computing, InCoWoCo 2024
作者: Yadav, Abhivyakti Ahmed, R Kaif Annamalai, R. Mercy, S.Sudha CSE Amrita School of Computing Chennai India R.M.K. Engineering College Department of Computer Science and Design Chennai India
Electroencephalogram (EEG) analysis plays a critical role in diagnosing various neurological conditions by detecting abnormal brain activities. However, the complex nature of EEG signals poses challenges for tradition... 详细信息
来源: 评论
Fraud Detection In Ethereum Transactions: A Machine learning Approach  1
Fraud Detection In Ethereum Transactions: A Machine Learning...
收藏 引用
1st international conference on Advanced computing and Emerging Technologies, ACET 2024
作者: Neogi, Anandarupa Mukhopadhyay, Disha Jaiswal, Anubhav Kumar, Ankush Misra, Bitan Techno International New Town Computer Science and Engineering Kolkata700156 India
This study explored the use of machine learning models to detect fraudulent transactions made over Ethereum, a type of cryptocurrency. The dataset included data from 9840 transactions which included both fraudulent an... 详细信息
来源: 评论
Extraction Method of Disturbance Elements of Urban Emergencies Based on Large Language Model
Extraction Method of Disturbance Elements of Urban Emergenci...
收藏 引用
2024 international conference on Intelligent computing and Data Mining, ICDM 2024
作者: Xu, Jian Dang, Anrong Chen, Yang Zhao, Mingyu Sun, Bijiao Wang, Hua Xie, Zhuokun Tsinghua University School of Architecture Beijing China State Key Laboratory of Geo-Information Engineering Xian China
The general knowledge extraction model lacks the knowledge learning of such as urban emergencies, and the precision of knowledge extraction is insufficient. In this paper, a large language model (LLM) based method for... 详细信息
来源: 评论
Research on computing Offloading Methods Based on Edge computing and Reinforcement learning in The Industrial Internet of Things
Research on Computing Offloading Methods Based on Edge Compu...
收藏 引用
international conference on Internet of Things and Machine learning, IoTML 2023
作者: Wang, Xian Wan, Qiang Li, JianCheng Faculty of Intelligent Manufacturing Wuyi University Jiangmen529020 China School ofComputer Science and Engineering South China University of Technology Guangdong GuangZhou510000 China School of Computer Science and Technology Guangdong University of Technology GuangZhou528300 China
Most of the existing research focuses on a single MEC server scenario, and there are few studies on computing offloading and resource allocation in multi-MEC server scenarios. Therefore, this paper proposes a dynamic ... 详细信息
来源: 评论
Split and Federated learning with Mobility in Vehicular Edge computing  21
Split and Federated Learning with Mobility in Vehicular Edge...
收藏 引用
21st IEEE/ACIS international conference on Software engineering Research, Management and Applications, SERA 2023
作者: Moon, Sungwon Lim, Yujin Sookmyung Women's University Dept. of IT Engineering Seoul04310 Korea Republic of
Vehicular edge computing (VEC) is a promising technology to support vehicular applications that leverage machine learning (ML) technology. Due to limited resources of the vehicle, the vehicle uses Split learning (SL) ... 详细信息
来源: 评论
Integrating Synthetic Data Modelling into an Adaptive Sampling Framework for IoT Devices  17
Integrating Synthetic Data Modelling into an Adaptive Sampli...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE international conference on Internet of Things, iThings 2024, 20th IEEE international conference on Green computing and Communications, GreenCom 2024, 17th IEEE international conference on Cyber, Physical and Social computing, CPSCom 2024, 10th IEEE international conference on Smart Data, SmartData 2024
作者: Alawad, Faiga Herrmann, Peter Thambawita, Vajira Trondheim Norway Simula Metropolitan Center for Digital Engineering Oslo Norway
Wireless Sensor Networks (WSNs) often rely on constrained devices with limited processor and power resources. Therefore, many approaches in the literature have studied data reduction methods to relieve these resources... 详细信息
来源: 评论
Convolutional Neural Network-based image tamper detection with Error Level Analysis  2
Convolutional Neural Network-based image tamper detection wi...
收藏 引用
2nd IEEE international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2024
作者: Manjunatha, S. Swetha, M.D. Rashmi, S. Subramanian, Ananda Kumar Vinoth Kumar, V. Mallikarjuna Swamy, S. Global Academy of Technology Department of Information Science and Engineering Bengaluru India BNM Institute of Technology Department of Computer Science and Engineering Bengaluru India Bengaluru India Vit - University School of Computer Science Engineering Dept of Computational Intelligence Vellore India Vit - University School of Computer Science Engineering and Information Systems Vellore India Jss Academy of Technical Education Dept of Electronics and Communication Engineering Bengaluru India
Photography is the most important, powerful, and reliable means of expression. Today, digital images not only provide disinformation but also act as agents for secret communication. Users and editing professionals wor... 详细信息
来源: 评论