咨询与建议

限定检索结果

文献类型

  • 422,782 篇 会议
  • 158,097 篇 期刊文献
  • 3,608 册 图书
  • 103 篇 学位论文

馆藏范围

  • 584,588 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 339,696 篇 工学
    • 228,430 篇 计算机科学与技术...
    • 186,557 篇 软件工程
    • 81,896 篇 信息与通信工程
    • 52,904 篇 控制科学与工程
    • 44,479 篇 电气工程
    • 43,693 篇 电子科学与技术(可...
    • 38,776 篇 生物工程
    • 28,577 篇 生物医学工程(可授...
    • 25,764 篇 光学工程
    • 24,267 篇 机械工程
    • 18,958 篇 化学工程与技术
    • 18,433 篇 仪器科学与技术
    • 17,538 篇 动力工程及工程热...
    • 14,296 篇 材料科学与工程(可...
    • 12,125 篇 安全科学与工程
    • 11,301 篇 交通运输工程
    • 10,938 篇 网络空间安全
  • 185,844 篇 理学
    • 94,473 篇 数学
    • 57,873 篇 物理学
    • 43,272 篇 生物学
    • 30,427 篇 统计学(可授理学、...
    • 21,692 篇 系统科学
    • 19,904 篇 化学
  • 86,097 篇 管理学
    • 51,721 篇 管理科学与工程(可...
    • 37,935 篇 图书情报与档案管...
    • 24,537 篇 工商管理
  • 26,030 篇 医学
    • 21,936 篇 临床医学
    • 19,857 篇 基础医学(可授医学...
    • 12,680 篇 药学(可授医学、理...
  • 15,411 篇 法学
    • 12,592 篇 社会学
  • 9,461 篇 经济学
  • 7,455 篇 农学
  • 6,285 篇 教育学
  • 2,643 篇 文学
  • 1,321 篇 军事学
  • 839 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,547 篇 computer science
  • 13,664 篇 computational mo...
  • 13,643 篇 accuracy
  • 13,399 篇 feature extracti...
  • 11,386 篇 deep learning
  • 11,297 篇 training
  • 10,418 篇 machine learning
  • 7,931 篇 data mining
  • 7,833 篇 predictive model...
  • 7,502 篇 support vector m...
  • 7,348 篇 computer archite...
  • 7,218 篇 optimization
  • 6,785 篇 neural networks
  • 6,740 篇 wireless sensor ...
  • 6,571 篇 data models
  • 6,503 篇 real-time system...
  • 6,372 篇 costs
  • 6,321 篇 algorithm design...
  • 6,296 篇 convolutional ne...
  • 6,183 篇 protocols

机构

  • 2,448 篇 school of comput...
  • 2,179 篇 school of comput...
  • 2,134 篇 chitkara univers...
  • 2,034 篇 school of comput...
  • 1,767 篇 school of comput...
  • 1,668 篇 department of co...
  • 1,458 篇 school of comput...
  • 1,408 篇 school of comput...
  • 1,316 篇 department of co...
  • 1,307 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,282 篇 school of comput...
  • 1,145 篇 school of comput...
  • 1,105 篇 department of el...
  • 1,101 篇 college of compu...
  • 981 篇 university of ch...
  • 966 篇 department of ph...
  • 966 篇 school of comput...
  • 950 篇 college of compu...
  • 943 篇 cavendish labora...

作者

  • 413 篇 niyato dusit
  • 314 篇 liu yang
  • 278 篇 yang yang
  • 244 篇 barter w.
  • 231 篇 j. wang
  • 231 篇 s. chen
  • 228 篇 wang wei
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung

语言

  • 560,082 篇 英文
  • 17,605 篇 其他
  • 6,809 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 60 篇 德文
  • 39 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Engineering and Computer Science"
584590 条 记 录,以下是4451-4460 订阅
排序:
Brain Tumor Detection using Hyper Parameter Tuning and Transfer Learning  1
Brain Tumor Detection using Hyper Parameter Tuning and Trans...
收藏 引用
1st IEEE International Conference on Contemporary Computing and Communications, InC4 2023
作者: Nasar, Noureen Thiruthuvanathan, Michael Moses Pauls, Alen Computer Science and Engineering Bengaluru India
Brain Tumor is the development of abnormal cells in our brain. There are cancerous and noncancerous brain tumors. Because they can press against healthy brain tissue or spread there, brain tumors are harmful. The earl... 详细信息
来源: 评论
A novel large kernel two-branch semantic segmentation network  24
A novel large kernel two-branch semantic segmentation networ...
收藏 引用
4th International Conference on Signal Processing and Communication Technology, SPCT 2024
作者: Zhang, Xinrui Fu, Peng School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing China
For semantic branching in a two-branch network structure, it is crucial to quickly improve the feeling field, in addition, the feature fusion interaction of two-branching needs to take into account the structural and ... 详细信息
来源: 评论
Secure Access Control of Cloud Data Using DNA Computing  5
Secure Access Control of Cloud Data Using DNA Computing
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Kumar, Tarun Kumar, Prabhat Namasudra, Suyel National Institute of Technology Department of Computer Science and Engineering Bihar Patna India National Institute of Technology Department of Computer Science and Engineering Tripura Agartala India
With the exponential development in the usage of cloud data storage across a variety of applications, developing effective access control measures to secure sensitive user data has become critical. This research prese... 详细信息
来源: 评论
A novel method using matrix coding on-chain and sharing multimedia data for improved usability and reliability
收藏 引用
Multimedia Tools and Applications 2024年 第40期83卷 87727-87748页
作者: Yang, Lizhu Qin, Yong School of Computer Science and Engineering Guangzhou Institute of Science and Technology Guangzhou China School of Cyberspace Security Dongguan University of Technology Dongguan China
Blockchain technology has the characteristics of non-tampering and forgery, traceability, and so on, which have good application advantages for the storage of multimedia data. So we propose a novel method using matrix... 详细信息
来源: 评论
Autoencoder-Based Architecture for Identification and Mitigating Phishing URL Attack in IoT Using DNN
收藏 引用
Journal of The Institution of Engineers (India): Series B 2023年 第6期104卷 1227-1240页
作者: Gopal, S.B. Poongodi, C. Nanthiya, D. Kirubakaran, T. Kulavishnusaravanan, B. Logeshwar, D. Department of Electronics and Communication Engineering Kongu Engineering College Perundurai India Department of Computer Science and Engineering Vivekanandha College of Engineering for Women Namakkal India Department of Computer Technology-UG Kongu Engineering College Perundurai India
As a new and potentially devastating form of cyberattack, ‘Phishing’ URLs pose a risk to users by impersonating legitimate websites in an effort to obtain sensitive information such as usernames, passwords, and fina... 详细信息
来源: 评论
An EETR Approach for Therapeutic Response Prediction Using Gene Expression and Drug Properties  3rd
An EETR Approach for Therapeutic Response Prediction Using G...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Selvi Rajendran, P. Jawahar, Janiel Computer Science and Engineering School of Computing Hindustan Institute of Technology and Science Chennai India
In recent years, the role of computational methods such as machine learning and deep learning has evolved to help better understand an individual’s response to drugs. Through advancements in the discipline of precisi... 详细信息
来源: 评论
Cognitive Wellness Assessment: A Comprehensive Review of Deep Learning and Machine Learning Approaches for Mental Stress Detection in the Digital Age  14
Cognitive Wellness Assessment: A Comprehensive Review of Dee...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Panda, Madhusmita Sharma, Arun Jaiswal, Garima Indira Gandhi Delhi Technical University for Women Computer Science Engineering New Delhi India Bennett University Computer Science Engineering Greater Noida India
Mental stress is a big problem nowadays, particularly in young people. The age group that was formerly seen as the most carefree is presently experiencing a great deal of stress. Increased stress in today's world ... 详细信息
来源: 评论
Quantum Algorithm for Online Exp-concave Optimization  41
Quantum Algorithm for Online Exp-concave Optimization
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: He, Jianhao Liu, Chengchang Liu, Xutong Li, Lvzhou Lui, John C.S. Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
We explore whether quantum advantages can be found for the zeroth-order feedback online exp-concave optimization problem, which is also known as bandit exp-concave optimization with multi-point feedback. We present qu... 详细信息
来源: 评论
A Comprehensive Analysis of Poisoning Attack and Defence Strategies in Machine Learning Techniques  5
A Comprehensive Analysis of Poisoning Attack and Defence Str...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Surekha, M. Sagar, Anil Kumar Khemchandani, Vineeta Sharda University Computer Science and Engineering Uttar Pradesh Greater Noida India Galgotias University Computer Science and Engineering Uttar Pradesh Greater Noida India
Machine learning (ML) models have achieved remarkable success in various domains making them indispensable tools for critical applications. However, their susceptibility to adversarial attacks, particularly poisoning ... 详细信息
来源: 评论
Neural Style Transfer: A Comparative Study  15
Neural Style Transfer: A Comparative Study
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Suryamritha, M. Balaji, Varshini Kannan, Srinidhi Singh, Tripty Sharma, Mansi Amrita School of Computing Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering Bangalore India University Dept. of Computer Science and Engineering India
Neural Style Transfer (NST) has emerged as a powerful technique for artistic image synthesis by fusing the base image with style source. In this study, we present a comparative analysis of NST using popular convolutio... 详细信息
来源: 评论