咨询与建议

限定检索结果

文献类型

  • 3,765 篇 会议
  • 1,659 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 5,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,313 篇 工学
    • 2,296 篇 计算机科学与技术...
    • 1,899 篇 软件工程
    • 850 篇 信息与通信工程
    • 524 篇 控制科学与工程
    • 402 篇 电气工程
    • 393 篇 生物工程
    • 340 篇 电子科学与技术(可...
    • 298 篇 生物医学工程(可授...
    • 263 篇 光学工程
    • 252 篇 机械工程
    • 205 篇 化学工程与技术
    • 199 篇 网络空间安全
    • 173 篇 安全科学与工程
    • 168 篇 仪器科学与技术
    • 167 篇 动力工程及工程热...
    • 149 篇 材料科学与工程(可...
    • 147 篇 交通运输工程
  • 1,888 篇 理学
    • 885 篇 数学
    • 664 篇 物理学
    • 428 篇 生物学
    • 307 篇 统计学(可授理学、...
    • 219 篇 化学
    • 177 篇 系统科学
  • 962 篇 管理学
    • 614 篇 管理科学与工程(可...
    • 403 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 270 篇 医学
    • 206 篇 临床医学
    • 204 篇 基础医学(可授医学...
    • 137 篇 公共卫生与预防医...
  • 165 篇 法学
    • 135 篇 社会学
  • 100 篇 农学
  • 85 篇 经济学
  • 47 篇 教育学
  • 37 篇 文学
  • 27 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 204 篇 accuracy
  • 174 篇 deep learning
  • 140 篇 feature extracti...
  • 132 篇 computational mo...
  • 126 篇 training
  • 124 篇 machine learning
  • 100 篇 hadron colliders
  • 100 篇 convolutional ne...
  • 99 篇 predictive model...
  • 91 篇 support vector m...
  • 91 篇 real-time system...
  • 90 篇 data models
  • 78 篇 security
  • 77 篇 artificial intel...
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 68 篇 data mining
  • 68 篇 cloud computing
  • 63 篇 reliability
  • 61 篇 semantics

机构

  • 185 篇 institute of com...
  • 134 篇 yerevan physics ...
  • 131 篇 national and kap...
  • 131 篇 centro brasileir...
  • 131 篇 istanbul technic...
  • 129 篇 university of sp...
  • 129 篇 indian institute...
  • 128 篇 universidad iber...
  • 127 篇 brunel universit...
  • 126 篇 università di to...
  • 126 篇 academy of scien...
  • 126 篇 infn sezione di ...
  • 125 篇 charles universi...
  • 125 篇 zhejiang univers...
  • 124 篇 department of ph...
  • 123 篇 infn sezione di ...
  • 122 篇 university of de...
  • 120 篇 imperial college...
  • 120 篇 rwth aachen univ...
  • 118 篇 department of ph...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,152 篇 英文
  • 230 篇 其他
  • 82 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Application"
5464 条 记 录,以下是91-100 订阅
排序:
Smart cities and the IoT: an in-depth analysis of global research trends and future directions
收藏 引用
Discover Internet of Things 2024年 第1期4卷 19页
作者: Bhardwaj, Vivek Anooja, A. Vermani, Lovkesh Singh Sunita Dhaliwal, Balwinder Kaur School of Computer Science and Engineering Manipal University Jaipur Rajasthan Jaipur India School of Computer Application JECRC University Rajasthan Jaipur India Multani Mal Modi College Punjab Patiala India Department of Computer Science and Engineering Lovely Professional University Punjab Phagwara India
Extensive scientific investigation is necessary because every government wants to construct smart cities. This is why examining how researchers approach this area of study is critical. This study investigates global r... 详细信息
来源: 评论
Efficient net-based deep learning: A deep-fake image detection  3
Efficient net-based deep learning: A deep-fake image detecti...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Singh, Rohan Sharma, Dilip Kumar Kumar Jain, Praphula Gla University Department of Computer Science and Engineering Mathura India Gla University Department of Computer Engineering and Application Mathura India Mits Gwalior Department of Computer Science and Engineering MP India
With the substantial volume of social media data generated daily and the concurrent emergence of powerful multimedia modification techniques, detecting manipulations in photographs and videos has become an important t... 详细信息
来源: 评论
Exploring Deep Learning Techniques for Sentiment Analysis on IMDb Movie Reviews Dataset
Exploring Deep Learning Techniques for Sentiment Analysis on...
收藏 引用
2024 International Conference on Big Data Analytics in Bioinformatics, DABCon 2024
作者: Sharma, Madhav Saini, Hukum Chand Sikarwal, Pushpendra Kumar Jaipur India Department of Engineering and Technology Jaipur India Department of Computer Application Jaipur India
Deep learning methods have changed the way we deal with natural language processing (NLP), and now our models can generate Textual Data almost as well like humans, but it was recent advances that introduced these revo... 详细信息
来源: 评论
Principle research of word vector representation in natural language processing
Principle research of word vector representation in natural ...
收藏 引用
2022 International Conference on Electronic Information engineering and computer Science, EIECS 2022
作者: Kang, Shijia Kong, Linggang Luo, Bin Zheng, Cuifang Wu, Jiaju Institute of Computer Application China Academy of Engineering Physics Mianyang China
Natural language processing is a research direction in many fields such as linguistics, computer science, and data fusion of study. The representation of word vector is a method to map words into the real vector space... 详细信息
来源: 评论
Traffic Verification Based on API Function Control in IIoT Service Cluster  11
Traffic Verification Based on API Function Control in IIoT S...
收藏 引用
2023 IEEE 11th International Conference on Information, Communication and Networks, ICICN 2023
作者: Xu, Sibo Yin, Mingyong Hu, Teng Li, Junhao Li, Hang Deng, Kai Institute of Computer Application China Academy of Engineering Physics Mianyang China
Typically, traffic within a cluster of IIoT (Industrial Internet of Things) services is secure by default. However, accidental access by privileged users inside the cluster, compromised services, and malicious request... 详细信息
来源: 评论
Sentiment Analysis for Movie Reviews on Social Media based on Sentiment Lexicon and Deep Learning  15
Sentiment Analysis for Movie Reviews on Social Media based o...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Jakhar, Yogesh Kumar Mishra, Nidhi Department of Computer Application University of Engineering & Management Jaipur India Amity University Noida India
Now days, with the fast improvement in internet technology and social media network, user give his/her feedback on many things and companies also asked to give feedback about their services as product or service deliv... 详细信息
来源: 评论
Enterprise Intranet Threat Intelligence Processing Framework Based on Open Source Community  7
Enterprise Intranet Threat Intelligence Processing Framework...
收藏 引用
7th IEEE Information Technology and Mechatronics engineering Conference, ITOEC 2023
作者: Zeng, Wenjing Lu, Peng Wang, Hao Lou, Fang China Academy of Engineering Physics Institute of Computer Application Mianyang China
Network attack tactics, techniques, procedures, and IOC are being updated more and more rapidly. Defenders need to obtain such threat intelligence in a timely manner, to identify whether the enterprise intranet is und... 详细信息
来源: 评论
A Text Similarity Calculation Method with Feature Weighted Fusion  8
A Text Similarity Calculation Method with Feature Weighted F...
收藏 引用
8th International Conference on Communication, Image and Signal Processing, CCISP 2023
作者: Duan, Yubing Wang, Hejun Deng, Kai Institute of Computer Application China Academy of Engineering Physics Mianyang China
Text similarity calculation is an important component of many text mining techniques. Most of the existing studies only consider model fusion of textual features or semantic features, which are not suitable for long t... 详细信息
来源: 评论
The Design of Postgresql's Security Protection Scheme  7
The Design of Postgresql's Security Protection Scheme
收藏 引用
7th IEEE Information Technology and Mechatronics engineering Conference, ITOEC 2023
作者: Lu, Peng Lou, Fang China Academy of Engineering Physics Institute of Computer Application Mianyang China
Postgresql is a widely used open source database, but it pays more attention to its general functions and performance, and the data security protection measures are seriously insufficient. Aiming at the problems of da... 详细信息
来源: 评论
Virtual Assistant Using Deep Learning Techniques  7
Virtual Assistant Using Deep Learning Techniques
收藏 引用
7th IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2023
作者: Nithin Anupama Kumar, S. Rv College of Engineering Department of Master of Computer Application Bangalore India
An application programme known as a virtual assistant, is as an AI based digital assistant, that can recognize natural language voice commands and carry out the user's requests. The goal of this work is to use dee... 详细信息
来源: 评论