咨询与建议

限定检索结果

文献类型

  • 569,172 篇 会议
  • 7,396 篇 期刊文献
  • 4,784 册 图书
  • 9 篇 学位论文

馆藏范围

  • 581,352 篇 电子文献
  • 22 种 纸本馆藏

日期分布

学科分类号

  • 334,533 篇 工学
    • 239,404 篇 计算机科学与技术...
    • 195,949 篇 软件工程
    • 79,123 篇 信息与通信工程
    • 50,181 篇 控制科学与工程
    • 36,544 篇 电气工程
    • 34,348 篇 生物工程
    • 32,412 篇 电子科学与技术(可...
    • 29,773 篇 机械工程
    • 28,486 篇 生物医学工程(可授...
    • 21,609 篇 光学工程
    • 19,190 篇 仪器科学与技术
    • 16,259 篇 动力工程及工程热...
    • 16,061 篇 化学工程与技术
    • 13,300 篇 安全科学与工程
    • 12,061 篇 交通运输工程
    • 10,550 篇 材料科学与工程(可...
  • 152,014 篇 理学
    • 84,154 篇 数学
    • 37,430 篇 物理学
    • 36,812 篇 生物学
    • 25,584 篇 统计学(可授理学、...
    • 18,316 篇 系统科学
    • 15,722 篇 化学
  • 90,623 篇 管理学
    • 56,175 篇 管理科学与工程(可...
    • 38,960 篇 图书情报与档案管...
    • 27,082 篇 工商管理
  • 23,338 篇 医学
    • 19,759 篇 临床医学
    • 18,659 篇 基础医学(可授医学...
    • 12,345 篇 药学(可授医学、理...
  • 14,495 篇 法学
    • 11,930 篇 社会学
  • 10,694 篇 教育学
  • 10,598 篇 经济学
    • 10,524 篇 应用经济学
  • 7,999 篇 农学
  • 4,062 篇 文学
  • 1,583 篇 军事学
  • 1,317 篇 艺术学
  • 51 篇 哲学
  • 33 篇 历史学

主题

  • 26,419 篇 computer science
  • 16,776 篇 feature extracti...
  • 16,689 篇 computational mo...
  • 15,837 篇 accuracy
  • 13,653 篇 training
  • 10,884 篇 computer archite...
  • 10,751 篇 deep learning
  • 9,459 篇 data mining
  • 9,013 篇 machine learning
  • 8,977 篇 predictive model...
  • 8,659 篇 support vector m...
  • 8,431 篇 neural networks
  • 7,969 篇 data models
  • 7,626 篇 real-time system...
  • 7,336 篇 optimization
  • 7,197 篇 educational inst...
  • 7,179 篇 software enginee...
  • 6,912 篇 convolutional ne...
  • 6,857 篇 artificial intel...
  • 6,597 篇 testing

机构

  • 1,901 篇 chitkara univers...
  • 1,378 篇 school of comput...
  • 1,106 篇 school of comput...
  • 1,078 篇 school of comput...
  • 888 篇 school of comput...
  • 755 篇 department of co...
  • 711 篇 department of co...
  • 682 篇 school of comput...
  • 665 篇 school of comput...
  • 605 篇 school of comput...
  • 593 篇 department of co...
  • 592 篇 college of compu...
  • 588 篇 lovely professio...
  • 539 篇 school of comput...
  • 511 篇 maharishi school...
  • 473 篇 college of compu...
  • 472 篇 college of compu...
  • 445 篇 college of compu...
  • 429 篇 department of co...
  • 425 篇 school of comput...

作者

  • 314 篇 wang wei
  • 275 篇 yang liu
  • 274 篇 wei wang
  • 269 篇 li wei
  • 267 篇 yang yang
  • 257 篇 liu yang
  • 245 篇 vinay kukreja
  • 232 篇 kukreja vinay
  • 224 篇 china
  • 201 篇 li li
  • 201 篇 wei li
  • 197 篇 wei zhang
  • 194 篇 zhang yu
  • 169 篇 zhang lei
  • 166 篇 wang lei
  • 164 篇 zhang wei
  • 163 篇 li yang
  • 136 篇 liu wei
  • 133 篇 li bo
  • 131 篇 lei wang

语言

  • 565,359 篇 英文
  • 11,594 篇 其他
  • 5,688 篇 中文
  • 35 篇 西班牙文
  • 33 篇 法文
  • 31 篇 土耳其文
  • 16 篇 俄文
  • 9 篇 葡萄牙文
  • 6 篇 德文
  • 2 篇 阿拉伯文
  • 2 篇 朝鲜文
  • 2 篇 乌克兰文
  • 1 篇 捷克文
检索条件"任意字段=International Multi-Conference in Computer Science and Computer Engineering"
581361 条 记 录,以下是4801-4810 订阅
排序:
Handwritten Signature Verification for Inspection Report of Special Equipment Based on Improved GANomaly  6
Handwritten Signature Verification for Inspection Report of ...
收藏 引用
6th international conference on Electronics and Communication, Network and computer Technology, ECNCT 2024
作者: Ren, Huaping Luo, Heng Fu, Jingbo Yan, Chunyu Wang, Zhangjian Chongqing Special Equipment Testing and Research Institute Chongqing China School of Electrical Engineering Chongqing University of Science and Technology Chongqing China
Special equipment in China is under the supervision of the special equipment inspection department, and the manufacturing and operation of special equipment are based on the special equipment inspection report. The in... 详细信息
来源: 评论
Design of mine low power wireless movable column shrinkage sensor  5
Design of mine low power wireless movable column shrinkage s...
收藏 引用
5th international conference on Signal Processing and computer science, SPCS 2024
作者: Lu, Ping China Coal Technology Engineering Group Chongqing Research Institute Chongqing400039 China
Addressing the issue of measuring the expansion and contraction of hydraulic support movable columns in coal mine working faces, this paper designs a low-power wireless movable column shrinkage sensor for mines. The s... 详细信息
来源: 评论
Detection and Categorization of Conflict Flows Within SDN Environments using Machine Learning Approach  2
Detection and Categorization of Conflict Flows Within SDN En...
收藏 引用
2nd international conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Kousalya, S. Sundararajan, Kanthimathi Vasudevan, I. Jaichitra Sheela, L. Jaba Thyagarajan, Sarunya Panimalar Engineering College M.E. Computer Science and Engineering Tamil Nadu Chennai India Panimalar Engineering College B.E. Computer Science and Engineering Tamil Nadu Chennai India Panimalar Engineering College Dept of Computer Science and Engineering Tamil Nadu Chennai India
Software-Defined Networking (SDN) is known for its remarkable versatility and adaptability. SDN applications encompass a wide range of network management and control functionalities, including load balancing, access c... 详细信息
来源: 评论
Application of Matlab in Yinchuan Climate Change Characteristics  5
Application of Matlab in Yinchuan Climate Change Characteris...
收藏 引用
5th international conference on computer Information science and Artificial Intelligence, CISAI 2022
作者: Ma, Jiafu School of Electronic Information Engineering South-Central University for Nationalities Hubei Wuhan10524 China
MATLAB is a collection of computing algorithms. It has more than 600 mathematical operation functions used in projects, and it is also widely used in climate analysis. This paper is based on the daily and monthly data... 详细信息
来源: 评论
A 3D Object Detection Algorithm Based on Improved EPNet  5
A 3D Object Detection Algorithm Based on Improved EPNet
收藏 引用
5th international conference on Communications, Information System and computer engineering, CISCE 2023
作者: Tang, Jiwu Zhu, Xianzhao Yin, Dejun Nanjing University of Science and Technologu Jiangsu Nanjing China
Early 3D object detection algorithms focused on using a single sensor. However, with the development of target detection technology, the target detection algorithm based on multi-sensor fusion has gradually entered pe... 详细信息
来源: 评论
Knowledge Graph Indexing Enhanced Q&A System Based on Large Language Model  4
Knowledge Graph Indexing Enhanced Q&A System Based on Large ...
收藏 引用
4th international conference on Electronic Information engineering and computer science, EIECS 2024
作者: Sun, Jiawei Zhang, Quan Zhi, Yongqi Ling, Weiqing Cims Research Center School of Electronic and Information Engineering Tongji University Shanghai China
With the advent of the digital age, the explosive growth of data has brought unprecedented opportunities and challenges to societal development. The rapid evolution of data science is driving innovation and progress a... 详细信息
来源: 评论
Integrity Shield: Defending Genuine Goods
Integrity Shield: Defending Genuine Goods
收藏 引用
2024 IEEE international conference on Emerging Technologies in computer science for Interdisciplinary Applications, ICETCS 2024
作者: Kshitija Nagareddy, G.B. Param Preetham, R. Bavagi, Raghavendra R. Sushmitha, S. Dayananda Sagar Academy of Technology and Management Department of Computer Science and Engineering Bengaluru India
The rise in counterfeit products poses a significant challenge for consumers, businesses, and governments worldwide. Counterfeit goods not only impact the economy but also pose health and safety risks. Traditional met... 详细信息
来源: 评论
A study of code search technology  7
A study of code search technology
收藏 引用
7th international conference on computer Information science and Application Technology, CISAT 2024
作者: Zhao, Lingjun National University of Defence Technology School of Computer Science Changsha China
The expansion of open-source communities like Github and Stack Overflow has led to an abundance of high-quality code snippets and engineering projects, driving advancements in the domain of code search. This section s... 详细信息
来源: 评论
Intelligent Energy Management for Electric Vehicles: Fuzzy Logic and Neural Network Integration  10
Intelligent Energy Management for Electric Vehicles: Fuzzy L...
收藏 引用
10th international conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Thirumalaikumari, T. Princy, D. Lita Uma, S. Sadaieswaran, R. Malathi, P. Legapriyadharshini, N. Saveetha College of Liberal Arts and Sciences Simats Deemed to be University Department of Computer Science Tamil Nadu Chennai India Meenakshi College of Engineering Department of Master of Computer Applications Tamil Nadu Chennai India Dhanalakshmi Srinivasan College of Engineering and Technology Department of Computer Science Engineering Tamil Nadu Mahabalipuram India Tagore College of arts and science Department of Computer Applications Chennai Chromepet India Saveetha College of Liberal Arts and Sciences Simats Deemed to be University Department of Data Analytics Tamil Nadu Chennai India Saveetha College of Liberal Arts and Sciences Simats Deemed to be University Department of Computer Application Tamil Nadu Chennai India
This study suggests a novel methodology for intelligent energy management in electric vehicles (EVs) through the integration of neural networks and fuzzy logic. Achieving enhanced energy efficiency for electric vehicl... 详细信息
来源: 评论
PWKTAP: A Lightweight Three-Factor Authentication Protocol for Smart Highways  24
PWKTAP: A Lightweight Three-Factor Authentication Protocol f...
收藏 引用
5th international conference on computer science and Management Technology, ICCSMT 2024
作者: Liu, Changxin Zhu, Jiafeng An, Zhenhuan Kou, Yujiao Li, Xiaomin Li, Xiaohai Chen, Chen Ma, Jing Xie, Pengshou Gansu Province Transportation Planning Survey & Design Institute Co. Ltd. Gansu Lanzhou China School of Computer and Communications Lanzhou University of Technology Gansu Lanzhou China Gansu Province Highway Development Group Co. Ltd. Gansu Lanzhou China Gansu Province Transportation Science and Technology Communication Center Gansu Lanzhou China
To solve the challenge of the large number and types of IoT devices in smart highways, which makes it difficult to share authentication protocols, a three-factor authentication protocol (PWKTAP) based on PUF, wireless... 详细信息
来源: 评论