咨询与建议

限定检索结果

文献类型

  • 107,183 篇 会议
  • 678 篇 期刊文献
  • 565 册 图书
  • 2 篇 学位论文

馆藏范围

  • 108,427 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 60,908 篇 工学
    • 49,897 篇 计算机科学与技术...
    • 39,812 篇 软件工程
    • 13,426 篇 信息与通信工程
    • 11,482 篇 生物工程
    • 8,512 篇 控制科学与工程
    • 6,739 篇 电气工程
    • 6,349 篇 生物医学工程(可授...
    • 3,866 篇 光学工程
    • 3,332 篇 机械工程
    • 2,984 篇 电子科学与技术(可...
    • 2,763 篇 网络空间安全
    • 2,719 篇 安全科学与工程
    • 2,516 篇 动力工程及工程热...
    • 2,319 篇 化学工程与技术
    • 2,188 篇 仪器科学与技术
  • 25,996 篇 理学
    • 12,113 篇 生物学
    • 12,065 篇 数学
    • 5,172 篇 物理学
    • 4,919 篇 统计学(可授理学、...
    • 3,515 篇 系统科学
    • 2,330 篇 化学
  • 17,450 篇 管理学
    • 11,016 篇 管理科学与工程(可...
    • 7,614 篇 图书情报与档案管...
    • 5,174 篇 工商管理
  • 13,621 篇 教育学
    • 13,420 篇 教育学
  • 6,408 篇 医学
    • 5,469 篇 临床医学
    • 5,220 篇 基础医学(可授医学...
    • 3,406 篇 药学(可授医学、理...
    • 2,887 篇 公共卫生与预防医...
  • 3,377 篇 法学
    • 2,923 篇 社会学
  • 1,965 篇 文学
  • 1,766 篇 农学
  • 1,661 篇 经济学
  • 267 篇 艺术学
  • 106 篇 军事学
  • 11 篇 历史学
  • 10 篇 哲学

主题

  • 7,214 篇 machine learning
  • 7,071 篇 deep learning
  • 5,537 篇 accuracy
  • 5,104 篇 training
  • 4,929 篇 computational mo...
  • 4,222 篇 education
  • 3,838 篇 students
  • 3,623 篇 feature extracti...
  • 3,070 篇 support vector m...
  • 3,068 篇 predictive model...
  • 3,061 篇 machine learning...
  • 3,029 篇 convolutional ne...
  • 2,594 篇 real-time system...
  • 2,397 篇 data models
  • 2,245 篇 neural networks
  • 2,010 篇 cloud computing
  • 1,840 篇 teaching
  • 1,497 篇 reinforcement le...
  • 1,472 篇 artificial intel...
  • 1,412 篇 internet of thin...

机构

  • 826 篇 chitkara univers...
  • 145 篇 lovely professio...
  • 105 篇 computer science...
  • 98 篇 karnataka bangal...
  • 94 篇 college of compu...
  • 89 篇 school of comput...
  • 79 篇 chitkara univers...
  • 76 篇 school of comput...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 67 篇 department of co...
  • 63 篇 department of co...
  • 58 篇 school of comput...
  • 58 篇 department of co...
  • 52 篇 department of in...
  • 49 篇 chitkara univers...
  • 43 篇 department of me...
  • 42 篇 school of automa...
  • 41 篇 chennai
  • 40 篇 vellore institut...

作者

  • 70 篇 shiva mehta
  • 70 篇 anjali t.
  • 53 篇 li yang
  • 42 篇 sharma vikrant
  • 40 篇 wang lei
  • 40 篇 kukreja vinay
  • 39 篇 rakesh kumar
  • 36 篇 gill kanwarparta...
  • 35 篇 sharma neha
  • 33 篇 wang jing
  • 32 篇 vinay kukreja
  • 31 篇 lei wang
  • 31 篇 zhang lei
  • 30 篇 huang yueh-min
  • 29 篇 yu wang
  • 28 篇 liu bo
  • 27 篇 li xin
  • 26 篇 amandeep nagpal
  • 25 篇 vinay gautam
  • 25 篇 shang wang

语言

  • 91,086 篇 英文
  • 16,987 篇 其他
  • 949 篇 中文
  • 23 篇 西班牙文
  • 12 篇 葡萄牙文
  • 5 篇 阿拉伯文
  • 3 篇 法文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 捷克文
检索条件"任意字段=International Conference on Teaching and Learning in Computing and Engineering"
108428 条 记 录,以下是4021-4030 订阅
排序:
Handwritten Digits Recognition using Machine and Deep learning  18
Handwritten Digits Recognition using Machine and Deep Learni...
收藏 引用
18th INDIAcom;11th international conference on computing for Sustainable Global Development, INDIACom 2024
作者: Mittal, Vishul Sharma, Shilpa Thapar, Puneet Lovely Professional University Department of Computer Science and Engineering Punjab Phagwara India
Information processing has shown a great deal of use for handwritten digit recognition. However, because people's writing styles vary so much, correctly identifying these characters from photos is a challenging un... 详细信息
来源: 评论
Decentralized Multi-UAV Management in Mobile Edge computing: A Hierarchical Reinforcement learning Approach  3
Decentralized Multi-UAV Management in Mobile Edge Computing:...
收藏 引用
3rd international conference on computing, Communication, Perception and Quantum Technology, CCPQT 2024
作者: Peng, Ziling Liu, Shuai Jaber, Al Jian, Lim W.E.I. Li, Hui Qian, Jin College of Information Engineering Taizhou University Taizhou China
The integration of drones in Mobile Edge computing (MEC) has opened new possibilities for enhancing network performance in various fields, such as agriculture, environmental monitoring, and disaster management. Howeve... 详细信息
来源: 评论
Securing SDN Networks: Employing LSTM and Linear SVM Models for Enhanced Network Security with VPN Integration  15
Securing SDN Networks: Employing LSTM and Linear SVM Models ...
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Baji, Sotsava Skandhaa Suryadevara, Kranthi Bodapati, Viswanath Velagapudi Ramakrishna Siddhartha Engineering College Department of Information Technology Vijayawada India
In the ever-changing landscape of network security, Software-Defined Networking (SDN) is a critical foundation that requires strong protections against cyber threats. This research describes a novel strategy to fortif... 详细信息
来源: 评论
Anomalous Behavior Detection in ATM using Different Methodologies: A Review  3
Anomalous Behavior Detection in ATM using Different Methodol...
收藏 引用
3rd international conference on Automation, computing and Renewable Systems, ICACRS 2024
作者: Thakre, Harsh Bhushanwar, Kush Patel, Anil Computer Engineering Department PIET Parul University Gujarat Vadodara India
The necessity for standardized anomaly detection systems in financial transactions is driven by the alarming increase in ATM fraud and criminal activities. Many techniques for detecting anomalous behavior in ATM syste... 详细信息
来源: 评论
Convolutional Neural Network-based image tamper detection with Error Level Analysis  2
Convolutional Neural Network-based image tamper detection wi...
收藏 引用
2nd IEEE international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2024
作者: Manjunatha, S. Swetha, M.D. Rashmi, S. Subramanian, Ananda Kumar Vinoth Kumar, V. Mallikarjuna Swamy, S. Global Academy of Technology Department of Information Science and Engineering Bengaluru India BNM Institute of Technology Department of Computer Science and Engineering Bengaluru India Bengaluru India Vit - University School of Computer Science Engineering Dept of Computational Intelligence Vellore India Vit - University School of Computer Science Engineering and Information Systems Vellore India Jss Academy of Technical Education Dept of Electronics and Communication Engineering Bengaluru India
Photography is the most important, powerful, and reliable means of expression. Today, digital images not only provide disinformation but also act as agents for secret communication. Users and editing professionals wor... 详细信息
来源: 评论
Comparative Evaluation of Machine learning Techniques for Breast Cancer Detection
Comparative Evaluation of Machine Learning Techniques for Br...
收藏 引用
2024 international conference on Electrical, Electronics and computing Technologies, ICEECT 2024
作者: Sharma, Atul Pati, Natasha Gourisaria, Mahendra Kumar Panda, Amiya Ranjan Patra, Sudhansu Shekhar Pattnayak, Parthasarathi KIIT Deemed to be University School of Computer Engineering Odisha Bhubaneswar India KIIT Deemed to be University School of Computer Applications Odisha Bhubaneswar India
Breast cancer is a primary cause of death for women. Millions of women worldwide were suspected with breast cancer diagnosis in 2022. But early-stage breast cancer is still treatable. Patients' recoveries become b... 详细信息
来源: 评论
An Analysis of Privacy Attacks in Supervised Machine learning Algorithms  1
An Analysis of Privacy Attacks in Supervised Machine Learnin...
收藏 引用
1st international conference on computing, Sciences and Communications, ICCSC 2024
作者: Gupta, Kavya Gupta, Anurag Raipoot, Abha Kiran Ghaziabad India Ghaziabad India School of Computer Science & Engineering Galgotias University Greater Noida India
With the widespread integration of machine learning (ML) into diverse applications, it has become paramount to scrutinize its implications for security and privacy. Despite the burgeoning body of work in privacy, ther... 详细信息
来源: 评论
Citation Prediction Analysis Using Deep learning Techniques  15
Citation Prediction Analysis Using Deep Learning Techniques
收藏 引用
15th international conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Mahalakshmi, G.S. Vinitha Kumari, R. Jaysankar, Pranav Sendhilkumar, S. Anna University Department of Computer Science and Engineering Chennai India Anna University Department of Information Science and Technology Chennai India
In scientific research, the evaluation of significant articles has traditionally relied on metrics such as Journal Impact Factor and citation counts, but these measures often miss the true essence of an article's ... 详细信息
来源: 评论
Effectiveness of Class Imbalance Treatment for Diagnosis of PCOS Using Machine learning Models: A Comparative Study  10
Effectiveness of Class Imbalance Treatment for Diagnosis of ...
收藏 引用
10th international conference on Advanced computing and Communication Systems, ICACCS 2024
作者: Majumdar, Sounak Biswas, Saroj Kr. Purkayastha, Biswajit National Institute of Technology Silchar Department of Computer Science and Engineering Silchar India
Polycystic Ovary Syndrome (PCOS) is the most prevalent hormonal disorder among women during their reproductive years. It is one of the leading causes of female infertility. Diagnosing peos is difficult because the sym... 详细信息
来源: 评论
Image-Based Cognitive States Identification through Deep learning  2
Image-Based Cognitive States Identification through Deep Lea...
收藏 引用
2nd IEEE international conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2024
作者: Kundan Rao, S. Ambannavar, Siddarth Sinha, G.R. Bms College of Engineering Dept. of Machine Learning Bangalore560019 India Gfsc University Gujarat Vadodara India
Yoga and mindfulness practices offer a variety of benefits, promoting both physical and mental well-being. This research intersects with AI, psychology, neuroscience, and more within cognitive science, contributing to... 详细信息
来源: 评论