咨询与建议

限定检索结果

文献类型

  • 106,776 篇 会议
  • 685 篇 期刊文献
  • 560 册 图书
  • 4 篇 学位论文

馆藏范围

  • 108,024 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 60,928 篇 工学
    • 49,906 篇 计算机科学与技术...
    • 39,834 篇 软件工程
    • 13,431 篇 信息与通信工程
    • 11,483 篇 生物工程
    • 8,515 篇 控制科学与工程
    • 6,743 篇 电气工程
    • 6,346 篇 生物医学工程(可授...
    • 3,872 篇 光学工程
    • 3,330 篇 机械工程
    • 2,987 篇 电子科学与技术(可...
    • 2,763 篇 网络空间安全
    • 2,723 篇 安全科学与工程
    • 2,516 篇 动力工程及工程热...
    • 2,322 篇 化学工程与技术
    • 2,189 篇 仪器科学与技术
  • 26,005 篇 理学
    • 12,117 篇 生物学
    • 12,067 篇 数学
    • 5,173 篇 物理学
    • 4,920 篇 统计学(可授理学、...
    • 3,517 篇 系统科学
    • 2,333 篇 化学
  • 17,449 篇 管理学
    • 11,015 篇 管理科学与工程(可...
    • 7,615 篇 图书情报与档案管...
    • 5,172 篇 工商管理
  • 13,607 篇 教育学
    • 13,406 篇 教育学
  • 6,413 篇 医学
    • 5,474 篇 临床医学
    • 5,225 篇 基础医学(可授医学...
    • 3,407 篇 药学(可授医学、理...
    • 2,891 篇 公共卫生与预防医...
  • 3,375 篇 法学
    • 2,921 篇 社会学
  • 1,965 篇 文学
  • 1,768 篇 农学
  • 1,663 篇 经济学
  • 267 篇 艺术学
  • 106 篇 军事学
  • 11 篇 历史学
  • 10 篇 哲学

主题

  • 7,165 篇 machine learning
  • 6,965 篇 deep learning
  • 5,342 篇 accuracy
  • 5,031 篇 training
  • 4,826 篇 computational mo...
  • 4,192 篇 education
  • 3,835 篇 students
  • 3,548 篇 feature extracti...
  • 3,029 篇 support vector m...
  • 3,026 篇 predictive model...
  • 3,024 篇 machine learning...
  • 2,975 篇 convolutional ne...
  • 2,482 篇 real-time system...
  • 2,333 篇 data models
  • 2,231 篇 neural networks
  • 1,982 篇 cloud computing
  • 1,830 篇 teaching
  • 1,486 篇 reinforcement le...
  • 1,445 篇 artificial intel...
  • 1,385 篇 internet of thin...

机构

  • 826 篇 chitkara univers...
  • 145 篇 lovely professio...
  • 106 篇 computer science...
  • 98 篇 karnataka bangal...
  • 94 篇 college of compu...
  • 89 篇 school of comput...
  • 79 篇 chitkara univers...
  • 76 篇 school of comput...
  • 72 篇 department of co...
  • 64 篇 department of co...
  • 64 篇 department of co...
  • 60 篇 department of co...
  • 58 篇 school of comput...
  • 50 篇 department of in...
  • 49 篇 chitkara univers...
  • 49 篇 department of co...
  • 43 篇 department of me...
  • 42 篇 school of automa...
  • 41 篇 vellore institut...
  • 41 篇 chennai

作者

  • 70 篇 shiva mehta
  • 70 篇 anjali t.
  • 53 篇 li yang
  • 42 篇 sharma vikrant
  • 40 篇 wang lei
  • 40 篇 kukreja vinay
  • 39 篇 rakesh kumar
  • 37 篇 gill kanwarparta...
  • 35 篇 sharma neha
  • 34 篇 wang jing
  • 32 篇 vinay kukreja
  • 31 篇 lei wang
  • 31 篇 zhang lei
  • 30 篇 huang yueh-min
  • 29 篇 liu bo
  • 29 篇 yu wang
  • 27 篇 li xin
  • 26 篇 amandeep nagpal
  • 25 篇 vinay gautam
  • 25 篇 shang wang

语言

  • 100,203 篇 英文
  • 7,459 篇 其他
  • 786 篇 中文
  • 27 篇 西班牙文
  • 17 篇 葡萄牙文
  • 5 篇 阿拉伯文
  • 3 篇 法文
  • 3 篇 土耳其文
  • 2 篇 俄文
检索条件"任意字段=International Conference on Learning and Teaching in Computing and Engineering"
108025 条 记 录,以下是4141-4150 订阅
排序:
Emotion Speech Recognition in the Cloud  2
Emotion Speech Recognition in the Cloud
收藏 引用
2nd international conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Ganesh, Devalla Bhaskar Prasanth, Balisetty Chowdary, Manne Teena Avala, Varsha Sree Gangashetty, Suryakanth V Koneru Lakshmaiah Education Foundation Computer Science and Engineering Vaddeswaram India
Emotion speech recognition in the cloud has emerged as a transformative technology with the potential to revolutionize various sectors, induding customer service, mental health, and human-computer interaction. This ab... 详细信息
来源: 评论
Review of Databases used for Text Based Emotion Detection
Review of Databases used for Text Based Emotion Detection
收藏 引用
2024 MIT Art, Design and Technology School of computing international conference, MITADTSoCiCon 2024
作者: Deshmukh, Shrikala Amity University Mumbai India College of Engineering Department of Information Technology Pune India
Currently most all the information sharing takes place in the form of Text-based input. Diverse information sources, encompassing speech, text, and visual elements, offer opportunities for analyzing emotions. Presentl... 详细信息
来源: 评论
Android Malware Categorization and Characterization Using Machine learning
Android Malware Categorization and Characterization Using Ma...
收藏 引用
2024 international conference on Advances in computing, Communication, Electrical, and Smart Systems, iCACCESS 2024
作者: Nabi, Nurun Khan, Mozammel H. A. East West University Department of Computer Science and Engineering Dhaka Bangladesh
Among all the current mobile operating systems, Android has the most market share with more than three billion active users. As android is open-source, it possesses many challenges of malicious cyberattacks. Most of t... 详细信息
来源: 评论
A Novel Approach for Retinal Vessel Extraction Using Multi-Scale Deep learning and Morphological Techniques
A Novel Approach for Retinal Vessel Extraction Using Multi-S...
收藏 引用
2024 international conference on computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Kavya, G.S. Kumarganesh, S. Department of BME Paavai College of Engineering Tamil Nadu Namakal India Department of ECE Knowledge Institute of Technology Tamil Nadu Salem India
Retinal vessel extraction is pivotal in diagnosing and managing various ophthalmic and systemic diseases. This study introduces a novel approach that combines multi-scale deep learning with advanced morphological tech... 详细信息
来源: 评论
Clustering-Based Intrusion Detection System for High Volume and High Velocity Packet Streams  8
Clustering-Based Intrusion Detection System for High Volume ...
收藏 引用
8th IEEE international conference on computing, Communication, Control and Automation, ICCUBEA 2024
作者: Chormale, Avinash Appasha Ukhalkar, Prakash Deshmukh, Uttam Anantrao Pimpri Chinchwad College of Engineering Mca Department Pune India Ajinkya D. Y. Patil University MS Pune India
Any intrusion detection system's efficacy is determined by how quickly it can identify fresh threats and stop subsequent assaults. This requires employing highly efficient machine learning techniques, including cl... 详细信息
来源: 评论
Advancing Plant Disease Prediction Accuracy with ViT Based Deep learning Model
Advancing Plant Disease Prediction Accuracy with ViT Based D...
收藏 引用
2024 IEEE international conference on computing, Semiconductor, Mechatronics, Intelligent Systems and Communications, COSMIC 2024
作者: Sam, Felicita Kavitha, B.R. School of Computer Science Engineering and Information Systems Vellore Institute of Technology TamilNadu Vellore India
Agriculture is the key source for many people's livelihoods and an important contributor to a country's economy. There is a huge demand to streamline the process in the field of agriculture by integrating Comp... 详细信息
来源: 评论
Path planning for mobile robots based on improving Dijkstra algorithm
Path planning for mobile robots based on improving Dijkstra ...
收藏 引用
2023 international conference on Cloud computing, Performance computing, and Deep learning, CCPCDL 2023
作者: Ma, Qiaoling Yang, Ruiqi Lian, Tianjiao Wang, Gan Mu, Son College of Computer Engineering Guangzhou City University of Technology Guang Dong Guang Zhou510800 China College of Mechanical Engineering Guangzhou City University of Technology Guang Dong Guang Zhou510800 China College of Electrical Engineering Guangzhou City University of Technology Guang Dong Guang Zhou510800 China
In response to the traditional Dijkstra algorithm, the long search time of pheromone and the occasional redundant inflection points When the final path is obtained can lead to the inefficiency of the algorithm due to ... 详细信息
来源: 评论
Fault Detection and Fault Tolerant Control of Pressure System by Reinforcement learning Approach  1
Fault Detection and Fault Tolerant Control of Pressure Syste...
收藏 引用
1st international conference on Cognitive, Green and Ubiquitous computing, IC-CGU 2024
作者: Patil, Maheshkumar S. Malwatkar, Gajanan M. Government College of Engineering Department of Instrumentation Engineering Maharashtra Jalgaon425002 India
In this paper, a reinforcement learning-based methodology is introduced to detect sensor fault and FTC in a pressure system. The methodology includes reinforcement learning skills to attain optimal performance and the... 详细信息
来源: 评论
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts
Exploiting Bytecode Analysis for Reentrancy Vulnerability De...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Tahir, Usman Siyal, Fiza Ianni, Michele Guzzo, Antonella Fortino, Giancarlo University of Camerino Italy Modeling Electronics and Systems University of Calabria Department of Computer Engineering Italy
Reentrancy is a type of attack that can occur in smart contracts, enabling untrusted external code execution within the contract. This method exploits a vulnerability that allows an attacker to repeatedly invoke a fun... 详细信息
来源: 评论
Quantum Machine learning Techniques based on Nurturing Agri-Ontology Framework in Agricultural Science  3
Quantum Machine Learning Techniques based on Nurturing Agri-...
收藏 引用
3rd international conference on Applied Artificial Intelligence and computing, ICAAIC 2024
作者: Deepa, R. Jayalakshmi, V. Thilakavathy, P. Bennet Prabhu, A. Surendran, R. Srm Institute of Science and Technology School of Computing Department of Computing Technologies Chennai India Drbccc Hindu College Department of Computer Applications Chennai India Computer Science and Engineering Vels Institute of Science and Engineering Vels Institute of Science Technology and Advanced Studies Chennai India Kone Elevator India Technology & Engineering Centre Chennai India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India
The absence of a consistent ontological framework often impedes efficient knowledge organization and sharing within the agricultural community, despite the quantity of data created in agricultural research. The lack o... 详细信息
来源: 评论