咨询与建议

限定检索结果

文献类型

  • 107,183 篇 会议
  • 678 篇 期刊文献
  • 565 册 图书
  • 2 篇 学位论文

馆藏范围

  • 108,427 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 60,908 篇 工学
    • 49,897 篇 计算机科学与技术...
    • 39,812 篇 软件工程
    • 13,426 篇 信息与通信工程
    • 11,482 篇 生物工程
    • 8,512 篇 控制科学与工程
    • 6,739 篇 电气工程
    • 6,349 篇 生物医学工程(可授...
    • 3,866 篇 光学工程
    • 3,332 篇 机械工程
    • 2,984 篇 电子科学与技术(可...
    • 2,763 篇 网络空间安全
    • 2,719 篇 安全科学与工程
    • 2,516 篇 动力工程及工程热...
    • 2,319 篇 化学工程与技术
    • 2,188 篇 仪器科学与技术
  • 25,996 篇 理学
    • 12,113 篇 生物学
    • 12,065 篇 数学
    • 5,172 篇 物理学
    • 4,919 篇 统计学(可授理学、...
    • 3,515 篇 系统科学
    • 2,330 篇 化学
  • 17,450 篇 管理学
    • 11,016 篇 管理科学与工程(可...
    • 7,614 篇 图书情报与档案管...
    • 5,174 篇 工商管理
  • 13,621 篇 教育学
    • 13,420 篇 教育学
  • 6,408 篇 医学
    • 5,469 篇 临床医学
    • 5,220 篇 基础医学(可授医学...
    • 3,406 篇 药学(可授医学、理...
    • 2,887 篇 公共卫生与预防医...
  • 3,377 篇 法学
    • 2,923 篇 社会学
  • 1,965 篇 文学
  • 1,766 篇 农学
  • 1,661 篇 经济学
  • 267 篇 艺术学
  • 106 篇 军事学
  • 11 篇 历史学
  • 10 篇 哲学

主题

  • 7,214 篇 machine learning
  • 7,071 篇 deep learning
  • 5,537 篇 accuracy
  • 5,104 篇 training
  • 4,929 篇 computational mo...
  • 4,222 篇 education
  • 3,838 篇 students
  • 3,623 篇 feature extracti...
  • 3,070 篇 support vector m...
  • 3,068 篇 predictive model...
  • 3,061 篇 machine learning...
  • 3,029 篇 convolutional ne...
  • 2,594 篇 real-time system...
  • 2,397 篇 data models
  • 2,245 篇 neural networks
  • 2,010 篇 cloud computing
  • 1,840 篇 teaching
  • 1,497 篇 reinforcement le...
  • 1,472 篇 artificial intel...
  • 1,412 篇 internet of thin...

机构

  • 826 篇 chitkara univers...
  • 145 篇 lovely professio...
  • 105 篇 computer science...
  • 98 篇 karnataka bangal...
  • 94 篇 college of compu...
  • 89 篇 school of comput...
  • 79 篇 chitkara univers...
  • 76 篇 school of comput...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 67 篇 department of co...
  • 63 篇 department of co...
  • 58 篇 school of comput...
  • 58 篇 department of co...
  • 52 篇 department of in...
  • 49 篇 chitkara univers...
  • 43 篇 department of me...
  • 42 篇 school of automa...
  • 41 篇 chennai
  • 40 篇 vellore institut...

作者

  • 70 篇 shiva mehta
  • 70 篇 anjali t.
  • 53 篇 li yang
  • 42 篇 sharma vikrant
  • 40 篇 wang lei
  • 40 篇 kukreja vinay
  • 39 篇 rakesh kumar
  • 36 篇 gill kanwarparta...
  • 35 篇 sharma neha
  • 33 篇 wang jing
  • 32 篇 vinay kukreja
  • 31 篇 lei wang
  • 31 篇 zhang lei
  • 30 篇 huang yueh-min
  • 29 篇 yu wang
  • 28 篇 liu bo
  • 27 篇 li xin
  • 26 篇 amandeep nagpal
  • 25 篇 vinay gautam
  • 25 篇 shang wang

语言

  • 91,086 篇 英文
  • 16,987 篇 其他
  • 949 篇 中文
  • 23 篇 西班牙文
  • 12 篇 葡萄牙文
  • 5 篇 阿拉伯文
  • 3 篇 法文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 捷克文
检索条件"任意字段=International Conference on Teaching and Learning in Computing and Engineering"
108428 条 记 录,以下是4091-4100 订阅
排序:
A Comprehensive Survey of Trending Tools and Techniques in Deep learning
A Comprehensive Survey of Trending Tools and Techniques in D...
收藏 引用
2023 international conference on Disruptive Technologies, ICDT 2023
作者: Prakash, Aishwarya Chauhan, Shweta Chandigarh University AIT-CSE Engineering Mohali India University Centre for Research & Development Chandigarh University Department of Electronics and Communication Engineering Mohali India
Automated feature learning is now possible in various fields, including healthcare, image recognition, and, more recently, feature extraction and classification of simple and complex human activity detection in mobile... 详细信息
来源: 评论
Advanced Deepfake Detection using Machine learning Algorithms: A Statistical Analysis and Performance Comparison  7
Advanced Deepfake Detection using Machine Learning Algorithm...
收藏 引用
7th international conference on Information and Computer Technologies, ICICT 2024
作者: Rana, Md Shohel Sung, Andrew H. Florida Gulf Coast University Computing And Software Engineering Fort MyersFL33965 United States The University Of Southern Mississippi Computing Sciences And Computer Engineering HattiesburgMS39406 United States
As techniques and tools for synthetic media and Deepfakes continue to advance, it is increasingly clear that video, audio and images can no longer be relied upon as truthful recordings of reality. Every digital commun... 详细信息
来源: 评论
Flood Detection from Satellite Images Using Self-Attention Empowered EfficientNetV2 Mechanism  7
Flood Detection from Satellite Images Using Self-Attention E...
收藏 引用
2023 7th international conference On computing, Communication, Control And Automation, ICCUBEA 2023
作者: Selva Jeba, G. Chitra, P. Thiagarajar College of Engineering Dept. of Computer Science and Engineering Madurai India Thiagarajar College of Engineering Dept. of Computer Applications Madurai India
Floods occur when water overflows onto normally dry land and are a destructive natural disaster. In recent times, deep learning models have demonstrated their remarkable capabilities in identifying objects and classif... 详细信息
来源: 评论
Effective Cyber Threat Detection Through Machine learning Algorithms  2
Effective Cyber Threat Detection Through Machine Learning Al...
收藏 引用
2nd international conference on computing and Data Analytics, ICCDA 2024
作者: Aslam, Muhammad Adnan Ul Hassan, Ch. Anwar Air University Department of Creative Technologies Islamabad Pakistan
the digital world today, with the rapidly evolving threats against information systems, has required quite sophisticated mechanisms for their detection. This work evaluates the efficiency of using machine learning alg... 详细信息
来源: 评论
Thresholding based Smart Home Automation System using K-means  13
Thresholding based Smart Home Automation System using K-mean...
收藏 引用
13th international conference on Cloud computing, Data Science and engineering, Confluence 2023
作者: Katiyar, Aakash Singh, Akash Parvez, Mohammad Rajora, Nitin Sharma, Lokesh K. Singal, Gaurav Netaji Subhas University of Technology NSUT Computer Engineering Delhi India Bennett University Greater Noida India Netaji Subhas University of Technology NSUT Delhi India
Home automation is a technology that is often viewed as a luxury and not a necessity. The means of achieving home automation is always considered expensive and inconvenient in the long run. Due to this there is no suc... 详细信息
来源: 评论
The Landscape of Deep Distributed computing: An In-Depth Analysis  10
The Landscape of Deep Distributed Computing: An In-Depth Ana...
收藏 引用
10th IEEE Uttar Pradesh Section international conference on Electrical, Electronics and Computer engineering, UPCON 2023
作者: Bhagat, Gautam Mishra, Khushboo Dutta, Tanima Uttar Pradesh Varanasi India
In the last decade, there has been a significant upsurge in the demand for artificial intelligence. This remarkable growth can be attributed to the advancements in machine and deep learning techniques, coupled with th... 详细信息
来源: 评论
FL-SERENADE: Federated learning for SEmi-supeRvisEd Network Anomaly DEtection. A Case Study
FL-SERENADE: Federated Learning for SEmi-supeRvisEd Network ...
收藏 引用
2023 IEEE international conference on Dependable, Autonomic and Secure computing, 2023 international conference on Pervasive Intelligence and computing, 2023 international conference on Cloud and Big Data computing, 2023 international conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Bekbulatova, Veronika Morichetta, Andrea Dustdar, Schahram Tu Wien Vienna Austria Tu Wien Distributed Systems Group Vienna Austria
The use of connected devices in the industry represents a necessity and, at the same time, a challenge. Building a network of interconnected industry assets can improve performance and scale but can lead to dangerous ... 详细信息
来源: 评论
An Energy Efficient Power Allocation Method for NOMA-Based VLC Systems  12
An Energy Efficient Power Allocation Method for NOMA-Based V...
收藏 引用
12th international conference on Intelligent computing and Wireless Optical Communications (ICWOC)
作者: Wu, Yali Li, Xiaojuan Sun, Lei Lin, Xiaoran Hebei Univ Econ & Business Inst Informat Technol Shijiazhuang Hebei Peoples R China
We present an optimal power allocation method to improve the energy efficiency (EE) of visible light communications (VLC) based on non-orthogonal multiple access (NOMA). The EE optimization model is established under ... 详细信息
来源: 评论
An Ensemble Method for Data Classification Using State-of-the-art Methodologies  4
An Ensemble Method for Data Classification Using State-of-th...
收藏 引用
4th international conference on Emerging Systems and Intelligent computing, ESIC 2024
作者: Ray, Sujata Pradhan, Debasmita Ray, Niranjan Kumar Kiit Deemed to Be University School of Computer Engineering Bhubaneswar India Kiit Deemed to Be University School of Computer Application Bhubaneswar India
Over the past few decades, classification has consistently posed a significant computational challenge. This study presents an innovative ensemble classification model designed for data classification, drawing inspira... 详细信息
来源: 评论
Detecting Security Requirements in GitHub Issues - Novel Dataset and SmallBERT-based model  14
Detecting Security Requirements in GitHub Issues - Novel Dat...
收藏 引用
14th IEEE international conference on Cloud computing Technology and Science (CloudCom)
作者: Minina, Polina Sadovykh, Andrey Ivanov, Vladimir SOFTEAM Paris France
Cloud application security initiates with the analysis of security requirements in DevOps. This involves gathering, managing, and tracking requirements within integrated issue-tracking systems found in repositories li... 详细信息
来源: 评论