咨询与建议

限定检索结果

文献类型

  • 30,047 篇 会议
  • 4,659 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 34,941 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,687 篇 工学
    • 15,657 篇 计算机科学与技术...
    • 13,159 篇 软件工程
    • 5,775 篇 信息与通信工程
    • 3,434 篇 控制科学与工程
    • 2,675 篇 电子科学与技术(可...
    • 2,626 篇 电气工程
    • 2,332 篇 生物工程
    • 1,880 篇 生物医学工程(可授...
    • 1,525 篇 光学工程
    • 1,345 篇 机械工程
    • 1,216 篇 动力工程及工程热...
    • 1,199 篇 仪器科学与技术
    • 1,014 篇 化学工程与技术
    • 848 篇 安全科学与工程
    • 712 篇 交通运输工程
  • 11,140 篇 理学
    • 6,033 篇 数学
    • 3,053 篇 物理学
    • 2,562 篇 生物学
    • 2,003 篇 统计学(可授理学、...
    • 1,317 篇 系统科学
    • 1,088 篇 化学
  • 5,582 篇 管理学
    • 3,263 篇 管理科学与工程(可...
    • 2,591 篇 图书情报与档案管...
    • 1,804 篇 工商管理
  • 1,587 篇 医学
    • 1,371 篇 临床医学
    • 1,278 篇 基础医学(可授医学...
    • 835 篇 药学(可授医学、理...
    • 663 篇 公共卫生与预防医...
  • 1,027 篇 法学
    • 824 篇 社会学
  • 636 篇 经济学
    • 636 篇 应用经济学
  • 481 篇 农学
  • 439 篇 教育学
  • 154 篇 文学
  • 76 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,077 篇 accuracy
  • 832 篇 feature extracti...
  • 829 篇 computational mo...
  • 709 篇 deep learning
  • 680 篇 computer science
  • 671 篇 training
  • 508 篇 support vector m...
  • 508 篇 real-time system...
  • 502 篇 machine learning
  • 430 篇 predictive model...
  • 407 篇 internet of thin...
  • 350 篇 convolutional ne...
  • 347 篇 computer archite...
  • 344 篇 data models
  • 327 篇 reliability
  • 307 篇 optimization
  • 287 篇 data mining
  • 274 篇 routing
  • 256 篇 wireless sensor ...
  • 246 篇 image segmentati...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 tno technical sc...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 65 篇 dept. of informa...
  • 63 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 49 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 47 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 70 篇 huang f.
  • 70 篇 dallier r.
  • 64 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,053 篇 英文
  • 1,478 篇 其他
  • 308 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Engineering Program and Dept. of Computer Science"
34941 条 记 录,以下是4831-4840 订阅
排序:
Development of a Secured and Low-budget Biometric Electronic Voting Machine for Bangladesh  2
Development of a Secured and Low-budget Biometric Electronic...
收藏 引用
2nd International Conference on Robotics, Electrical and Signal Processing Techniques, ICREST 2021
作者: Ahmed, Md. Shihab Uddin Rouf, Nirjhor Tahmidur Hasan, A N M Shahebul Hasan, Md Abid Rozario, Omi Evance Faiyaz Rahman, A.A.M. Al Saleh, Sheikh Raihan Aditto, Shadman Shakib Dept. of Computer Science and Engineering Dhaka Bangladesh
One of the fundamental goals of 'Digital Bangladesh ' is ensuring people's democracy, human rights, transparency, and delivering government services through the maximum use of modern technologies. However,... 详细信息
来源: 评论
Examining Amazon Customer Reviews using PySpark and AWS: A Data Lake Approach
Examining Amazon Customer Reviews using PySpark and AWS: A D...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Remya S Abburi Sai Karthik Maddala H S M Krishna Karthik Marasani Jayasurya Samudrala Yashwanth Dept. of Computer Science and Engineering Amrita Vishwa Vidyapeetham
In the contemporary world, big data analysis with PySpark and AWS has become quite handy. Large multinational companies, including Walmart, trivago, and countless others are using big data. And with the assistance of ...
来源: 评论
Hybrid Deep Learning Approach for Nonfunctional Software Requirements Classifications  3
Hybrid Deep Learning Approach for Nonfunctional Software Req...
收藏 引用
3rd International Conference on Communication, Computing and Digital Systems, C-CODE 2023
作者: Rahman, Kiramat Ghani, Anwar Ahmad, Rashid Sajjad, Syed Haseeb International Islamic University Dept. of Software Engineering Islamabad Pakistan Big Data Research Center Jeju National University Jeju Korea Republic of Inernational Islamic University Dept. of Computer Science Islamabad Pakistan
This paper explores the concept of algorithmic hybridization, which involves combining various machine learning (ML) algorithms to enhance performance by utilizing the benefits of both simultaneously. This study prese... 详细信息
来源: 评论
From Pixels to Diagnosis: Convolutional Neural Networks in Tuberculosis Screening
From Pixels to Diagnosis: Convolutional Neural Networks in T...
收藏 引用
International Conference on Electrical engineering and Information & Communication Technology (ICEEICT)
作者: Tanvir Mahtab Zihan Abduz Zami Mohiuddin Ahmed Rakibul Islam Fahim Ahmed Dept. of Computer Science & Engineering Rajshahi University of Engineering & Technology Rajshahi Bangladesh Dept. of CSE UIU Dhaka Bangladesh
Tuberculosis (TB) is a chronic lung disease that constitutes one of the top 10 global causes of death. Timely and precise identification of TB is critical, as untreated cases can pose life-threatening risks. Tradition... 详细信息
来源: 评论
Fingerprint Recognition System Based on XGBoost Matching Algorithm for Forensic Analysis  2
Fingerprint Recognition System Based on XGBoost Matching Alg...
收藏 引用
2nd IEEE International Conference on Data science and Network Security, ICDSNS 2024
作者: Adnan, Myasar Mundher Priyanka, K. Lande, Ayapal Swamy, Illa Mahesh Kumar Revathi, R. College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute of Technology Dept. of Ise Bengaluru India School of Computer Science & Artificial Intelligence Sr University Warangal India Anurag University Department of Information Technology Hyderabad India Karpagam Academy of Higher Education Department of Computer Science Echanari Coimbatore India
In modern era, fingerprint authentication systems are used for easy and low-cost establishment of security which are mostly computationally complex and inaccurate. Therefore, this research utilizes highly efficient te... 详细信息
来源: 评论
Enhancing Security in Cloud Registration with Multi Dimensional Features Fusion  5
Enhancing Security in Cloud Registration with Multi Dimensio...
收藏 引用
5th International Conference on Information Management and Machine Intelligence, ICIMMI 2023
作者: Mutha, Rakhi Reddy Gantla, Harish Pandey, Sunil Kr Sayeed Ahmad, Sayed Ahuja, Vandana Bhattacherjee, Abhishek Mamodiya, Udit Dept. of Information Technology Amity University Rajasthan Jaipur India Department of Computer Science and Engineering Vignan Institute of Technology and Science Hyderabad India Department of Information Technology Institute of Technology & Science Uttar Pradesh Ghaziabad India School of Engineering and Computing De Montfort University Dubai United Arab Emirates Dept. of CSE Swami Vivekanand Institute of Engineering and Technology Punjab Ramnagar India Department of Computer Science Engineering Lovely Professional University Punjab India Poornima University Jaipur India
Data mining uses artificial intelligence and other methods to extract hidden potential information from large data sets, which provides an effective way to obtain valuable knowledge from a large amount of information.... 详细信息
来源: 评论
Plant Disease Detection using Region-Based Convolutional Neural Network
arXiv
收藏 引用
arXiv 2023年
作者: Rehana, Hasin Ibrahim, Muhammad Ali, Md. Haider Dept. of Computer Science and Engineering University of Dhaka Bangladesh
Agriculture plays an important role in the food and economy of Bangladesh. The rapid growth of population over the years also has increased the demand for food production. One of the major reasons behind low crop prod... 详细信息
来源: 评论
Õ(n+poly(k))-time Algorithm for Bounded Tree Edit Distance  63
Õ(n+poly(k))-time Algorithm for Bounded Tree Edit Distance
收藏 引用
63rd IEEE Annual Symposium on Foundations of computer science, FOCS 2022
作者: Das, Debarati Gilbert, Jacob Hajiaghayi, Mohammad Taghi Kociumaka, Tomasz Saha, Barna Saleh, Hamed Pennsylvania State University Dept. of Computer Science and Engineering State CollegePA United States University of Maryland Dept. of Computer Science College ParkMD United States Max Planck Institute for Informatics Saarland Informatics Campus Saarbrücken Germany University of California San Diego Halicioglu Data Science Institute Dept. of Computer Science and Engineering San DiegoCA United States
Computing the edit distance of two strings is one of the most basic problems in computer science and combinatorial optimization. Tree edit distance is a natural generalization of edit distance in which the task is to ... 详细信息
来源: 评论
A Machine Learning Method for Detecting Behavior-Based Malware  5
A Machine Learning Method for Detecting Behavior-Based Malwa...
收藏 引用
5th International Conference on Inventive Research in Computing Applications, ICIRCA 2023
作者: Venkatarao, Javvaji Deeban Chakravarthy, V. Ramya, Singaraju Siva Prasad, V. Cherukuvada, Srikanth Soujanya, Annaram Sree Vidyanikethan Engineering College Dept. of Computer Science and Engineering Tirupati517 102 India Srm Institute of Science and Technology Department of Computing Technologies Chennai India School of Computing Srm Institute of Science and Technology Department of Computing Technologies Chennai India Mohan Babu University Dept. of Ai&ml Tirupati India School of Computing Srm Institute of Scienceand Technology Department of Networking and Communications Chennai India Cvr College of Engineering Department of Computer Science and Engineering Telangana India
While malware has posed a danger to businesses for years, advances in malware detection have lagged. Malware can cause damage to a system by starting unneeded services, which increases the system's workload and pr... 详细信息
来源: 评论
Adding a Tail in Classes of Perfect Graphs
arXiv
收藏 引用
arXiv 2023年
作者: Mpanti, Anna Nikolopoulos, Stavros D. Palios, Leonidas Dept. of Computer Science and Engineering University of Ioannina Greece
Consider a graph G which belongs to a graph class C. We are interested in connecting a node w ∈ V (G) to G by a single edge uw where u ∈ V (G);we call such an edge a tail. As the graph resulting from G after the add... 详细信息
来源: 评论