咨询与建议

限定检索结果

文献类型

  • 569,172 篇 会议
  • 7,396 篇 期刊文献
  • 4,784 册 图书
  • 9 篇 学位论文

馆藏范围

  • 581,352 篇 电子文献
  • 22 种 纸本馆藏

日期分布

学科分类号

  • 334,533 篇 工学
    • 239,404 篇 计算机科学与技术...
    • 195,949 篇 软件工程
    • 79,123 篇 信息与通信工程
    • 50,181 篇 控制科学与工程
    • 36,544 篇 电气工程
    • 34,348 篇 生物工程
    • 32,412 篇 电子科学与技术(可...
    • 29,773 篇 机械工程
    • 28,486 篇 生物医学工程(可授...
    • 21,609 篇 光学工程
    • 19,190 篇 仪器科学与技术
    • 16,259 篇 动力工程及工程热...
    • 16,061 篇 化学工程与技术
    • 13,300 篇 安全科学与工程
    • 12,061 篇 交通运输工程
    • 10,550 篇 材料科学与工程(可...
  • 152,014 篇 理学
    • 84,154 篇 数学
    • 37,430 篇 物理学
    • 36,812 篇 生物学
    • 25,584 篇 统计学(可授理学、...
    • 18,316 篇 系统科学
    • 15,722 篇 化学
  • 90,623 篇 管理学
    • 56,175 篇 管理科学与工程(可...
    • 38,960 篇 图书情报与档案管...
    • 27,082 篇 工商管理
  • 23,338 篇 医学
    • 19,759 篇 临床医学
    • 18,659 篇 基础医学(可授医学...
    • 12,345 篇 药学(可授医学、理...
  • 14,495 篇 法学
    • 11,930 篇 社会学
  • 10,694 篇 教育学
  • 10,598 篇 经济学
    • 10,524 篇 应用经济学
  • 7,999 篇 农学
  • 4,062 篇 文学
  • 1,583 篇 军事学
  • 1,317 篇 艺术学
  • 51 篇 哲学
  • 33 篇 历史学

主题

  • 26,419 篇 computer science
  • 16,776 篇 feature extracti...
  • 16,689 篇 computational mo...
  • 15,837 篇 accuracy
  • 13,653 篇 training
  • 10,884 篇 computer archite...
  • 10,751 篇 deep learning
  • 9,459 篇 data mining
  • 9,013 篇 machine learning
  • 8,977 篇 predictive model...
  • 8,659 篇 support vector m...
  • 8,431 篇 neural networks
  • 7,969 篇 data models
  • 7,626 篇 real-time system...
  • 7,336 篇 optimization
  • 7,197 篇 educational inst...
  • 7,179 篇 software enginee...
  • 6,912 篇 convolutional ne...
  • 6,857 篇 artificial intel...
  • 6,597 篇 testing

机构

  • 1,901 篇 chitkara univers...
  • 1,378 篇 school of comput...
  • 1,106 篇 school of comput...
  • 1,078 篇 school of comput...
  • 888 篇 school of comput...
  • 755 篇 department of co...
  • 711 篇 department of co...
  • 682 篇 school of comput...
  • 665 篇 school of comput...
  • 605 篇 school of comput...
  • 593 篇 department of co...
  • 592 篇 college of compu...
  • 588 篇 lovely professio...
  • 539 篇 school of comput...
  • 511 篇 maharishi school...
  • 473 篇 college of compu...
  • 472 篇 college of compu...
  • 445 篇 college of compu...
  • 429 篇 department of co...
  • 425 篇 school of comput...

作者

  • 314 篇 wang wei
  • 275 篇 yang liu
  • 274 篇 wei wang
  • 269 篇 li wei
  • 267 篇 yang yang
  • 257 篇 liu yang
  • 245 篇 vinay kukreja
  • 232 篇 kukreja vinay
  • 224 篇 china
  • 201 篇 li li
  • 201 篇 wei li
  • 197 篇 wei zhang
  • 194 篇 zhang yu
  • 169 篇 zhang lei
  • 166 篇 wang lei
  • 164 篇 zhang wei
  • 163 篇 li yang
  • 136 篇 liu wei
  • 133 篇 li bo
  • 131 篇 lei wang

语言

  • 565,359 篇 英文
  • 11,594 篇 其他
  • 5,688 篇 中文
  • 35 篇 西班牙文
  • 33 篇 法文
  • 31 篇 土耳其文
  • 16 篇 俄文
  • 9 篇 葡萄牙文
  • 6 篇 德文
  • 2 篇 阿拉伯文
  • 2 篇 朝鲜文
  • 2 篇 乌克兰文
  • 1 篇 捷克文
检索条件"任意字段=International Multi-Conference in Computer Science and Computer Engineering"
581361 条 记 录,以下是311-320 订阅
排序:
17th international conference on Advanced computer Theory and engineering, ICACTE 2024
17th International Conference on Advanced Computer Theory an...
收藏 引用
17th international conference on Advanced computer Theory and engineering, ICACTE 2024
The proceedings contain 66 papers. The topics discussed include: a proposal of a multi-agent supporting system for network community formation;multimedia checkpoint protocol with lower recovery overhead;learning throu...
来源: 评论
Data-Driven Strategies for Optimizing MLM Performance: A Comprehensive Review
Data-Driven Strategies for Optimizing MLM Performance: A Com...
收藏 引用
2025 IEEE international Students' conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Salpe, Shruti N. Bais, Ashvini Wyawahare, Nikhil Nekita Chavhan, Morris G H Raisoni College of Engineering Department of Dic Nagpur440016 India G H Raisoni College of Engineering Department of Data Science Nagpur440016 India
This review examines the pivotal role of data analytics in optimizing multi-Level Marketing (MLM) operations amid evolving market challenges. It highlights key strategies such as predictive analytics for customer acqu... 详细信息
来源: 评论
Optimized Extreme Learning Machine Framework for Efficient Ransomware Detection Using Seagull Optimization-Based Feature Selection  2
Optimized Extreme Learning Machine Framework for Efficient R...
收藏 引用
2nd IEEE international conference on Emerging Research in Computational science, ICERCS 2024
作者: Rajululi, G. Govinda Geetha, R. Bebitha, J. Basha, SK Mahaboob Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science & Engineering Chennai India R.M.K. Engineering College Department of Computer Science & Engineering Chennai India Vel Tech Multi Tech Dr Rangarajan Dr Sakunthala Engineering College Department of Computer Science & Engineering Chennai India TKR College of Engineering and Technology Department of Computer Science & Engineering Telangana India
Ransomware is becoming a more serious threat to cybersecurity, and conventional detection techniques frequently fail to maintain up with its changing strategies. To overcome this difficulty, this research proposes an ... 详细信息
来源: 评论
Study on the application of transfer learning in small sample image classification of military equipment  5
Study on the application of transfer learning in small sampl...
收藏 引用
5th international conference on Signal Processing and computer science, SPCS 2024
作者: Lu, Leiji Yu, Hongxia Xiao, Hongju Bao, Lei Department of Information Engineering Army Academy of Artillery and Air Defense Hefei China
To address the issue of insufficient military equipment sample data, which cannot meet the training requirements of deep neural networks and tends to cause overfitting, this paper introduces transfer learning technolo... 详细信息
来源: 评论
On the plausibility of simulation based security in multi Key Searchable Encryption with short share keys  28th
On the plausibility of simulation based security in Multi Ke...
收藏 引用
28th international conference on Knowledge Based and Intelligent information and engineering Systems, KES 2024
作者: Horduna, Manuela University Alexandru Ioan Cuza Faculty of Computer Science Iasi Romania
In the multi-key searchable encryption scenario, individuals save their encrypted files on a distant computer system, having the ability to retrieve them. An individual should have the ability to conduct keyword searc... 详细信息
来源: 评论
2nd international Seminar on computer science and engineering Technology, SCSET 2020
2nd International Seminar on Computer Science and Engineerin...
收藏 引用
2nd international Seminar on computer science and engineering Technology, SCSET 2020
The proceedings contain 193 papers. The topics discussed include: the effect and research of environmental analysis software in environmental early warning under the background of big data;digital protection and refle...
来源: 评论
multi-scale Cross Aggregation Network for Camouflage Object Detection Based on Boundary Guidance  9
Multi-scale Cross Aggregation Network for Camouflage Object ...
收藏 引用
9th international conference on Intelligent Informatics and BioMedical sciences, ICIIBMS 2024
作者: Chen, Yuhong Dai, Meng Shanghai Institute of Technology School of Computer Science and Information Engineering Shang Hai China
Camouflaged object detection (COD) is challenging due to objects blending seamlessly with their surroundings. This task is crucial in medical imaging, surface defect detection, and surveillance. To address these chall... 详细信息
来源: 评论
Design and implementation of intermediate frequency (IF) downconversion and direct radio frequency (RF) sampling in AIS receivers  5
Design and implementation of intermediate frequency (IF) dow...
收藏 引用
5th international conference on Signal Processing and computer science, SPCS 2024
作者: Chen, Guohao Yu, Detao Wu, Na Yu, Zhaolei Gao, Wen Faculty of Information and Electronic Engineering Shandong Technology and Business University Yantai China Yantai Sanhang Radar Service Technology Research Institute Yantai264000 China Yan Tai En Bang Electronic Technology Co. Ltd. Yantai264006 China
This paper presents a practical approach for processing AIS signals after RF direct acquisition in the ship automatic identification system. The method involves shifting the signals of the two AIS frequencies to baseb... 详细信息
来源: 评论
multi-Agent Based Social Interaction Model for Neurological Disorder  1
Multi-Agent Based Social Interaction Model for Neurological ...
收藏 引用
1st international conference on Pioneering Developments in computer science and Digital Technologies, IC2SDT 2024
作者: Mazumdar, Bireshwar Dass Gupta, Prashant K. Komaragiri, Rama S. School of Computer Science & Engineering Technology Bennett University Uttar Pradesh Greater Noida201310 India
Neurological disorders rooted in cognitive impairments can have a profound impact on the cognitive and brain developmental functions of children resulting in persistent cognitive disabilities. We proposed a multi-agen... 详细信息
来源: 评论
AMSFuse:Adaptive multi-Scale Feature Fusion Network for Diabetic Retinopathy Classification
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5153-5167页
作者: Chengzhang Zhu Ahmed Alasri Tao Xu Yalong Xiao Abdulrahman Noman Raeed Alsabri Xuanchu Duan Monir Abdullah School of Computer Science and Engineering Central South UniversityChangsha410083China School of Humanities Central South UniversityChangsha410083China Department of Human Anatomy and Histology & Embryology Basic Medical SciencesChangsha Health Vocational CollegeChangsha410100China Glaucoma Institute Changsha Aier Eye HospitalChangsha410000China Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha67714Saudi Arabia
Globally,diabetic retinopathy(DR)is the primary cause of blindness,affecting millions of people *** widespread impact underscores the critical need for reliable and precise diagnostic techniques to ensure prompt diagn... 详细信息
来源: 评论