咨询与建议

限定检索结果

文献类型

  • 6,665 篇 会议
  • 4,838 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 11,530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,912 篇 工学
    • 4,357 篇 计算机科学与技术...
    • 3,513 篇 软件工程
    • 1,621 篇 信息与通信工程
    • 1,101 篇 控制科学与工程
    • 909 篇 电气工程
    • 787 篇 生物工程
    • 764 篇 电子科学与技术(可...
    • 674 篇 生物医学工程(可授...
    • 603 篇 光学工程
    • 496 篇 化学工程与技术
    • 449 篇 材料科学与工程(可...
    • 443 篇 机械工程
    • 428 篇 网络空间安全
    • 401 篇 动力工程及工程热...
    • 369 篇 仪器科学与技术
    • 338 篇 核科学与技术
  • 4,370 篇 理学
    • 1,737 篇 物理学
    • 1,608 篇 数学
    • 1,022 篇 生物学
    • 555 篇 化学
    • 504 篇 统计学(可授理学、...
  • 1,873 篇 管理学
    • 1,239 篇 管理科学与工程(可...
    • 702 篇 图书情报与档案管...
    • 522 篇 工商管理
  • 947 篇 医学
    • 696 篇 临床医学
    • 593 篇 基础医学(可授医学...
    • 399 篇 公共卫生与预防医...
    • 346 篇 药学(可授医学、理...
  • 466 篇 教育学
    • 434 篇 教育学
  • 387 篇 法学
    • 336 篇 社会学
  • 278 篇 农学
  • 202 篇 经济学
  • 81 篇 文学
  • 21 篇 军事学
  • 12 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 403 篇 deep learning
  • 346 篇 accuracy
  • 278 篇 machine learning
  • 262 篇 feature extracti...
  • 234 篇 real-time system...
  • 218 篇 internet of thin...
  • 193 篇 computational mo...
  • 175 篇 support vector m...
  • 169 篇 predictive model...
  • 150 篇 educational inst...
  • 150 篇 training
  • 142 篇 hadron colliders
  • 139 篇 optimization
  • 136 篇 convolutional ne...
  • 124 篇 data mining
  • 112 篇 security
  • 111 篇 image segmentati...
  • 106 篇 reliability
  • 104 篇 computer science
  • 103 篇 semantics

机构

  • 375 篇 yerevan physics ...
  • 349 篇 department of ph...
  • 344 篇 faculty of scien...
  • 344 篇 college of compu...
  • 340 篇 department for p...
  • 328 篇 department of ph...
  • 325 篇 department of ph...
  • 298 篇 kirchhoff-instit...
  • 281 篇 department of ph...
  • 269 篇 fakultät für phy...
  • 250 篇 institute of phy...
  • 246 篇 department of ph...
  • 240 篇 departamento de ...
  • 240 篇 institute of phy...
  • 237 篇 department of ph...
  • 234 篇 department of ph...
  • 222 篇 faculté des scie...
  • 216 篇 department of ph...
  • 214 篇 instituto de fís...
  • 204 篇 department of ph...

作者

  • 307 篇 c. alexa
  • 305 篇 j. m. izen
  • 296 篇 g. bella
  • 294 篇 j. strandberg
  • 292 篇 d. calvet
  • 292 篇 c. amelung
  • 272 篇 g. spigo
  • 266 篇 f. siegert
  • 263 篇 m. klein
  • 262 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 257 篇 s. jin
  • 257 篇 g. gaudio
  • 254 篇 s. mohapatra
  • 251 篇 y. tayalati
  • 245 篇 s. guindon
  • 233 篇 a. kaczmarska
  • 226 篇 j. schaarschmidt
  • 224 篇 h. a. gordon
  • 222 篇 f. pastore

语言

  • 9,701 篇 英文
  • 1,690 篇 其他
  • 145 篇 中文
  • 8 篇 日文
  • 7 篇 斯洛文尼亚文
  • 6 篇 德文
  • 4 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 阿拉伯文
检索条件"机构=College of Engineering Education Computer Engineering Program"
11530 条 记 录,以下是4971-4980 订阅
排序:
Convolutional Neural Network Model With Hybrid Feature Learning For Sematic Text Mining
Convolutional Neural Network Model With Hybrid Feature Learn...
收藏 引用
Communications and Information Technologies (GCCIT), Global Conference on
作者: Shrinivas Patil V.K. Kolekar K. Ranjith Singh Pratibha Sharma Hariharasudhan S Shubhi Goyal School of Management - PG Management JAIN Deemed to be University Bangalore Karnataka Computer Engineering Vishwakarma Institute of Technology Pune Department of Computer Science Karpagam Academy of Higher Education Coimbatore Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Information Technology Prince Shri Venkateshwara Padmavathy Engineering College Chennai Quantum University Research Center Quantum University Roorkee Uttarakhand India
In this article, we present a generic inference hybrid structure for Convolutional Recurrent Neural Network (conv-RNN) text semantic modelling, combining the strengths of convolutional and recurrent neural network str... 详细信息
来源: 评论
SpreadFGL: Edge-Client Collaborative Federated Graph Learning with Adaptive Neighbor Generation
arXiv
收藏 引用
arXiv 2024年
作者: Zhong, Luying Pi, Yueyang Chen, Zheyi Yu, Zhengxin Miao, Wang Chen, Xing Min, Geyong College of Computer and Data Science Fuzhou University China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University China Engineering Research Center of Big Data Intelligence Ministry of Education China School of Computing and Communications University of Lancaster United Kingdom School of Engineering Computing and Mathematics University of Plymouth United Kingdom Department of Computer Science University of Exeter United Kingdom
Federated Graph Learning (FGL) has garnered widespread attention by enabling collaborative training on multiple clients for semi-supervised classification tasks. However, most existing FGL studies do not well consider... 详细信息
来源: 评论
Optimizing Congestion Control in Wireless Sensor Networks Using a Trust-Based, Security-Aware Approach
Optimizing Congestion Control in Wireless Sensor Networks Us...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: S. Sathiya Naveena Abhinav Mishra Xavier V K P.R. Rege D. Anandhasilambarasan Divya Sharma Department of MBA Prince Shri Venkateshwara Padmavathy Engineering College Chennai Chitkara Centre for Research and Development Chitkara University Himachal Pradesh India School of Mangement - PG Management JAIN (Deemed to be University) Bangalore Karnataka Computer Vishwakarma Institute of Technology Pune India Department of Computer Science Engineering Karpagam Academy of Higher Education Coimbatore Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India
Both random events and self-centred nodes may trigger network congestion. In Wireless Sensor Networks (WSNs), bad nodes may cause congestion-like conditions by discarding data packets or transmitting duplicate, fraudu... 详细信息
来源: 评论
Improved TF-IDF Algorithm Combined with Multiple Factors
Improved TF-IDF Algorithm Combined with Multiple Factors
收藏 引用
International Conference on Applied Machine Learning (ICAML)
作者: Zhe Zhang Zhifeng Wu College of computer technology and Engineering Tianjin University of Technology and Education Tianjin China
The TF-IDF algorithm is often used for the extraction of keywords of articles, but it only considers the information of word frequency, which limits the choice of keywords. In order to improve the efficiency of the al... 详细信息
来源: 评论
Semantic Communication-Empowered Physical-layer Network Coding
Semantic Communication-Empowered Physical-layer Network Codi...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Shuai Yang Haoyuan Pan Tse-Tin Chan Zhaorui Wang College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Mathematics and Information Technology The Education University of Hong Kong Hong Kong SAR China School of Science and Engineering Future Network of Intelligence Institute The Chinese University of Hong Kong (Shenzhen) Shenzhen China
In a two-way relay channel (TWRC), physical-layer network coding (PNC) doubles the system throughput by turning superimposed signals transmitted simultaneously by different end nodes into useful network-coded informat... 详细信息
来源: 评论
Quantifying the Benefits of Verifiable Security Schemes in Communications Software Design
Quantifying the Benefits of Verifiable Security Schemes in C...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Lakshya Swarup Richa Tiwari Dattatraya Babanrao Nalawade N. Thangarasu Rajat Saini A Keerthika Chitkara Centre for Research and Development Chitkara University Himachal Pradesh India School of Mangement - UG Management JAIN (Deemed to be University) Bangalore Karnataka Vishwakarma Institute of Technology Pune Department of Computer Science Karpagam Academy of Higher Education Coimbatore Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Computer Science and Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai
The increasing use of communications software programs for replacing sensitive data requires cozy designs that prevent malicious actors from viewing or tampering with data. Verifiable security schemes offer an additio... 详细信息
来源: 评论
Multi Objective Optimization Based Land Cover Classification Using NSGA-II
Multi Objective Optimization Based Land Cover Classification...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Ajay Kumar Singh Arpit Jain Divya Yogesh Kumar Sharma Senthil Athithan Savya Sachi University Institute of Engineering & Technology Chandigarh University Mohali Punjab India Department of Computer Science & Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of Computer Science Shah Satnam Ji Girls' College Affiliated to Chaudhary Devi Lal University Sirsa Haryana India Department of Information Technology Lalit Narayan Mishra College of Business Management Muzaffarpur Bihar India
The current investigation makes use of a technique referred to as with multiple goals ounces-based land cover classification in order to identify the several forms of land use that are present in a certain area. For t...
来源: 评论
Secure Relay Selection for UAV-empowered Two Way Untrusted Relaying Networks
Secure Relay Selection for UAV-empowered Two Way Untrusted R...
收藏 引用
Mobile Internet, Cloud Computing and Information Security (MICCIS), International Conference on
作者: Kan Yu Zhiyong Feng Lin Yang Dianxia Chen Dong Li Xiaoshan Ma The School of Computer Science and Engineering Macau University of Science and Technology Taipa P. R. China The Key Laboratory of Universal Wireless Communications Ministry of Education Beijing University of Posts and Telecommunications Beijing P.R. China School of Computer Science and Engineering Macau University of Science and Technolog China The National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute AMS PLA Beijing P.R. China The Education Tianjin Ren’ai College Tianjin P.R. China The School of Computer Science and Engineering Macau University of Science and Technology P. R. China The Academy of Military Sciences of PLA Beijing P.R. China
In this paper, we examine the security aspects of two-way untrusted relaying networks (TWURNs) through the lens of physical layer security (PLS). These networks involve the exchange of confidential information between... 详细信息
来源: 评论
TokenHPE: Learning Orientation Tokens for Efficient Head Pose Estimation via Transformers
TokenHPE: Learning Orientation Tokens for Efficient Head Pos...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Cheng Zhang Hai Liu Yongjian Deng Bochen Xie Youfu Li National Engineering Research Center for E-Learning Central China Normal University Wuhan China College of Computer Science Beijing University of Technology Beijing China Engineering Research Center of Intelligence Perception and Autonomous Control Ministry of Education Beijing China Department of Mechanical Engineering City University of Hong Kong Kowloon Hong Kong China
Head pose estimation (HPE) has been widely used in the fields of human machine interaction, self-driving, and attention estimation. However, existing methods cannot deal with extreme head pose randomness and serious o...
来源: 评论
Deep Learning Detection of Defect-Free Bangles: Machine Vision Approach for Quality Assurance in Bangle Manufacturing
Deep Learning Detection of Defect-Free Bangles: Machine Visi...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Helcy D. Alon Alvin Sarraga Alon Ryan S. Evangelista Michael Angelo Delos Santos Ligayo Ryan Reyes Michelle C. Reyes Jovencio Merin Yolanda D. Austria College of Engineering Batangas State University - TNEU Batangas City Philippines Digital Transformation Center Batangas State University - TNEU Batangas City Philippines School of Graduate Studies Sulu State College Sulu Philippines College of Engineering Quezon City University Quezon City Philippines Dept. of Electrical Engineering Technological University of the Philippines Manila Philippines General Education Department FEU Nicanor Reyes Medical Foundation Quezon City Philippines Dept of Computer Engineering Adamson University Manila Philippines
This study explores the application of deep learning and machine vision methods to identify defect-free, circular bangles. The main objective is to improve quality control in the manufacturing of bangles. The study in... 详细信息
来源: 评论