咨询与建议

限定检索结果

文献类型

  • 43,770 篇 会议
  • 22,083 篇 期刊文献
  • 357 册 图书

馆藏范围

  • 66,210 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,767 篇 工学
    • 27,903 篇 计算机科学与技术...
    • 22,806 篇 软件工程
    • 10,318 篇 信息与通信工程
    • 6,908 篇 控制科学与工程
    • 5,107 篇 电气工程
    • 4,855 篇 生物工程
    • 4,467 篇 电子科学与技术(可...
    • 3,884 篇 生物医学工程(可授...
    • 3,046 篇 光学工程
    • 2,945 篇 机械工程
    • 2,345 篇 动力工程及工程热...
    • 2,300 篇 网络空间安全
    • 2,224 篇 化学工程与技术
    • 2,140 篇 仪器科学与技术
    • 1,872 篇 安全科学与工程
    • 1,644 篇 材料科学与工程(可...
    • 1,630 篇 交通运输工程
  • 22,569 篇 理学
    • 10,846 篇 数学
    • 7,186 篇 物理学
    • 5,593 篇 生物学
    • 3,402 篇 统计学(可授理学、...
    • 2,497 篇 化学
    • 2,252 篇 系统科学
  • 11,695 篇 管理学
    • 7,527 篇 管理科学与工程(可...
    • 4,734 篇 图书情报与档案管...
    • 3,135 篇 工商管理
  • 4,155 篇 医学
    • 3,425 篇 临床医学
    • 3,077 篇 基础医学(可授医学...
    • 1,902 篇 公共卫生与预防医...
    • 1,828 篇 药学(可授医学、理...
  • 1,983 篇 法学
  • 1,249 篇 经济学
  • 1,209 篇 农学
  • 650 篇 教育学
  • 282 篇 文学
  • 191 篇 军事学
  • 124 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 2,540 篇 accuracy
  • 2,236 篇 deep learning
  • 2,011 篇 feature extracti...
  • 1,660 篇 machine learning
  • 1,522 篇 training
  • 1,463 篇 computational mo...
  • 1,376 篇 educational inst...
  • 1,331 篇 internet of thin...
  • 1,316 篇 convolutional ne...
  • 1,302 篇 real-time system...
  • 1,191 篇 predictive model...
  • 1,159 篇 support vector m...
  • 1,126 篇 computer science
  • 978 篇 optimization
  • 858 篇 security
  • 815 篇 data models
  • 788 篇 artificial intel...
  • 777 篇 data mining
  • 740 篇 cloud computing
  • 710 篇 neural networks

机构

  • 1,068 篇 college of compu...
  • 1,028 篇 department of ph...
  • 1,010 篇 cavendish labora...
  • 977 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 803 篇 college of compu...
  • 639 篇 university of ch...
  • 619 篇 infn sezione di ...
  • 611 篇 infn laboratori ...
  • 599 篇 infn sezione di ...
  • 588 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 544 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 536 篇 school of physic...
  • 532 篇 imperial college...
  • 522 篇 nikhef national ...
  • 518 篇 h.h. wills physi...
  • 517 篇 school of physic...

作者

  • 268 篇 barter w.
  • 264 篇 a. gomes
  • 253 篇 beiter a.
  • 247 篇 c. alexa
  • 244 篇 j. m. izen
  • 238 篇 bellee v.
  • 237 篇 s. chen
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 230 篇 brundu d.
  • 229 篇 g. spigo
  • 229 篇 blake t.
  • 226 篇 bowcock t.j.v.
  • 221 篇 f. siegert
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 220 篇 bencivenni g.
  • 219 篇 borsato m.

语言

  • 60,475 篇 英文
  • 4,808 篇 其他
  • 951 篇 中文
  • 45 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 5 篇 斯洛文尼亚文
  • 2 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=College of Computer Science and Technology Engineering"
66210 条 记 录,以下是581-590 订阅
排序:
"affectAlchemy": An Affective Dataset Based on Plutchik's Psychological Model for Text-Based Emotion Recognition and its Analysis Using ML Techniques  8
"affectAlchemy": An Affective Dataset Based on Plutchik's Ps...
收藏 引用
8th IEEE International Conference on Computing, Communication, Control and Automation, ICCUBEA 2024
作者: Kapase, Ajay Uke, Nilesh Savant, Jatin Desai, Mrunali Ghatage, Shravani Rahangdale, Atul Vishwakarma Institute of Information Technology Computer Science & Engineering Pune India Trinity Academy of Engineering Computer Science & Engineering Pune India KITs College of Engineering Computer Science & Engineering Kolhapur India
A technique to identify people's attitudes, and sentiments towards specified targets such as things, services, and subjects, is called sentiment analysis. As a dedicated subset of NLP, it deals with predicting spe... 详细信息
来源: 评论
Machine Learning based Phishing Website Detection  18
Machine Learning based Phishing Website Detection
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Kawale, Manav Maru, Bhavik Dagu, Sakshi Varghese, Maya Gupta, Vikas Vidyavardhini's College of Engineering & Technology Department of Computer Science and Engineering Mumbai India
Phishing websites are those where a person can imitate a legitimate website and trick an innocent user into thinking he is visiting a legitimate website while stealing sensitive information. Statistics from the Anti-P... 详细信息
来源: 评论
Deep Learning for Cross-Domain Few-Shot Visual Recognition: A Survey
收藏 引用
ACM Computing Surveys 2025年 第8期57卷 1-37页
作者: Xu, Huali Zhi, Shuaifeng Sun, Shuzhou Patel, Vishal Liu, Li College of Computer Science Nankai University Tianjin China College of Electronic Science and Technology National University of Defense Technology Changsha China Faculty of Information Technology and Electrical Engineering University of Oulu Oulu Finland Johns Hopkins University Baltimore United States
While deep learning excels in computer vision tasks with abundant labeled data, its performance diminishes significantly in scenarios with limited labeled samples. To address this, Few-shot learning (FSL) enables mode... 详细信息
来源: 评论
CNN Based Smart Waste Segregation and Collection System  4
CNN Based Smart Waste Segregation and Collection System
收藏 引用
4th IEEE International Conference on Data engineering and Communication Systems, ICDECS 2024
作者: Lavanya, V. Abikash Shivam, G. Shanmugasundaram, S. Deepalakshmi, R. Velammal College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu India
Waste management is an increasing concern in urban areas worldwide, because of population growth and environmental sustainability goals. To address this challenge, this paper presents a Convolutional Neural Network (C... 详细信息
来源: 评论
Campus Sync - One Central Hub for Attendance, Events, and On-Duty Management  9
Campus Sync - One Central Hub for Attendance, Events, and On...
收藏 引用
9th International Conference on science, technology, engineering and Mathematics, ICONSTEM 2024
作者: Rohini, M. Vijayvenkatajalapathi, G. Selvakumar, S. Sugavanesh, M. Viswanath, S. Gowthamani, R. Sri Krishna College of Engineering And Technology Department of Computer Science And Engineering Coimbatore India
Our comprehensive application provides a versatile solution for managing attendance, events, and on-duty assignments within college administrative operations. Developed meticulously, our application comprises three co... 详细信息
来源: 评论
Detecting Inaudible Voice Commands via Acoustic Attenuation by Multi-channel Microphones
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 1-17页
作者: Ji, Xiaoyu Zhang, Guoming Li, Xinfeng Qu, Gang Cheng, Xiuzhen Xu, Wenyuan Electrical Engineering of Zhejiang University Hangzhou China School of Computer Science and Technology of Shandong University Qingdao China Department of Electrical and Computer Engineering at the University of Maryland College Park MD USA
DolphinAttacks (i.e., inaudible voice commands) modulate audible voices over ultrasounds to inject malicious commands silently into voice assistants and manipulate controlled systems (e.g., doors or smart speakers). E... 详细信息
来源: 评论
Enhanced Criminal Identification through MTCNN: Leveraging Advanced Facial Recognition technology  9
Enhanced Criminal Identification through MTCNN: Leveraging A...
收藏 引用
9th International Conference on science, technology, engineering and Mathematics, ICONSTEM 2024
作者: Gowthamani, R. Sasi Kala Rani, K. Gayathri, D. Geetha, R. Harish, S. Rohini, M. Sri Krishna College of Engineering And Technology Department of Computer Science And Engineering Coimbatore India
Due to the rise in crime, it is harder for police to identify criminals in public. Constantly reviewing surveillance footage is a laborious process that requires careful attention to detail and is not cognitively stim... 详细信息
来源: 评论
Enhancing Network Security: A Comparative Analysis of Deep Learning and Machine Learning Models for Intrusion Detection
Enhancing Network Security: A Comparative Analysis of Deep L...
收藏 引用
2024 International Conference on E-Mobility, Power Control and Smart Systems, ICEMPS 2024
作者: Ajeesh, Arunima Mathew, Tessy Mar Baselios College of Engineering and Technology Department of Computer Science and Engineering Thiruvananthapuram India
The escalating reliance of computer networks on security systems exposes them to increasing threats. In response, an advanced security system is proposed, utilizing machine learning and deep learning techniques and le... 详细信息
来源: 评论
Optimized Autonomous Computing with Trusted Resilient Data Management for IoT Emerging Networks
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 20778-20785页
作者: Shafique, Ayesha Cheng, Benmao Zhao, Bo Alwakid, Ghadah Naif Haq, Muhammad Inaam Ul Laboratory of Intelligent IOT Technology and Applications in Universities China Jouf University College of Computer and Information Sciences Department of Computer Science Al Jowf Sakaka72341 Saudi Arabia Quanzhou University of Information Engineering School of Computer Science and Software Engineering Quanzhou362000 China
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre... 详细信息
来源: 评论
Improving 5G Positioning Through Signal-to-Noise Ratio Recognition Training
Improving 5G Positioning Through Signal-to-Noise Ratio Recog...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zheng, Wenqi Chen, Jianing Yang, Junze Chen, Chuhao Li, Wei Yadav, Rahul Meng, Xiangxu College of Computer Science and Technology Harbin Engineering University China
Fifth-generation communication technology enables advanced indoor positioning with its high bandwidth and frequency capabilities. However, indoor environment variability causes signal propagation fluctuations, making ... 详细信息
来源: 评论