咨询与建议

限定检索结果

文献类型

  • 68,150 篇 会议
  • 31,886 篇 期刊文献
  • 840 册 图书

馆藏范围

  • 100,876 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 61,982 篇 工学
    • 43,806 篇 计算机科学与技术...
    • 35,579 篇 软件工程
    • 17,055 篇 信息与通信工程
    • 9,908 篇 控制科学与工程
    • 7,433 篇 电气工程
    • 7,333 篇 电子科学与技术(可...
    • 7,057 篇 生物工程
    • 4,957 篇 生物医学工程(可授...
    • 4,683 篇 机械工程
    • 4,369 篇 光学工程
    • 3,443 篇 仪器科学与技术
    • 3,139 篇 动力工程及工程热...
    • 2,920 篇 化学工程与技术
    • 2,601 篇 网络空间安全
    • 2,514 篇 安全科学与工程
    • 2,336 篇 交通运输工程
  • 32,281 篇 理学
    • 17,291 篇 数学
    • 9,011 篇 物理学
    • 7,825 篇 生物学
    • 5,643 篇 统计学(可授理学、...
    • 3,764 篇 系统科学
    • 3,067 篇 化学
  • 17,365 篇 管理学
    • 10,756 篇 管理科学与工程(可...
    • 7,342 篇 图书情报与档案管...
    • 4,594 篇 工商管理
  • 4,835 篇 医学
    • 4,059 篇 临床医学
    • 3,640 篇 基础医学(可授医学...
    • 2,248 篇 药学(可授医学、理...
    • 2,063 篇 公共卫生与预防医...
  • 2,808 篇 法学
    • 2,200 篇 社会学
  • 1,721 篇 经济学
  • 1,411 篇 农学
  • 1,222 篇 教育学
  • 468 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,683 篇 feature extracti...
  • 2,388 篇 accuracy
  • 2,259 篇 deep learning
  • 2,116 篇 computer science
  • 2,012 篇 computational mo...
  • 1,935 篇 training
  • 1,878 篇 machine learning
  • 1,465 篇 data mining
  • 1,341 篇 internet of thin...
  • 1,329 篇 optimization
  • 1,314 篇 support vector m...
  • 1,185 篇 information tech...
  • 1,170 篇 predictive model...
  • 1,101 篇 educational inst...
  • 1,098 篇 wireless sensor ...
  • 998 篇 artificial intel...
  • 979 篇 real-time system...
  • 964 篇 neural networks
  • 949 篇 security
  • 929 篇 semantics

机构

  • 694 篇 school of comput...
  • 516 篇 school of comput...
  • 475 篇 maharishi school...
  • 351 篇 department of co...
  • 276 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 school of comput...
  • 254 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 217 篇 faculty of scien...
  • 202 篇 school of comput...
  • 201 篇 department of co...
  • 196 篇 department of ph...
  • 187 篇 department of ph...
  • 174 篇 departamento de ...
  • 173 篇 college of compu...
  • 164 篇 maharishi school...
  • 160 篇 department of co...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 261 篇 h. a. gordon
  • 257 篇 m. klein
  • 253 篇 r. ströhmer
  • 244 篇 y. tayalati
  • 244 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 224 篇 m. rijssenbeek
  • 202 篇 f. pastore
  • 202 篇 n. orlando
  • 199 篇 d. guest
  • 190 篇 s. jin

语言

  • 88,021 篇 英文
  • 11,250 篇 其他
  • 1,691 篇 中文
  • 77 篇 日文
  • 22 篇 斯洛文尼亚文
  • 19 篇 德文
  • 18 篇 法文
  • 10 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 2 篇 土耳其文
  • 1 篇 荷兰文
  • 1 篇 波兰文
检索条件"机构=Computer Engineering and Information Technology"
100876 条 记 录,以下是4471-4480 订阅
排序:
Comparison of Different Neural Network Architectures for Cardiac Arrest Risk Prediction  5th
Comparison of Different Neural Network Architectures for Car...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Rahman, Mohammed Ziaur Mishra, Awakash Ojha, Ananta Goswami, Shubhashish School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India
Using a realistic dataset based on the United Kingdom clinical exercise studies Datalink, various architectures are evolved and evaluated to decide the simplest for predicting the risk of cardiac arrest. The architect... 详细信息
来源: 评论
Exploring the Benefits of Deep Learning for Data Science Practices  15
Exploring the Benefits of Deep Learning for Data Science Pra...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Sharma, Mohit Kumar Kumar, Ritesh Sinha, Deepak Kumar Senthilkumar, K.K. Dhabliya, Dharmesh Ahluwalia, Gunveen Vivekananda Global University Department of Electrical Engineering Jaipur India Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Ramnagar District562112 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India
With the growing occurrence of records technology and analytics, Deep studying has become an effective device within the records technology field. Deep mastering is a subset of artificial Intelligence that uses algori... 详细信息
来源: 评论
Combining CNN and SVM for High-Precision Wheat Disease Classification using Leaf Image Analysis  2
Combining CNN and SVM for High-Precision Wheat Disease Class...
收藏 引用
2nd IEEE Global Conference on Communications and information Technologies, GCCIT 2024
作者: Jain, Anuj Kumar Jain, Sonam Kaur, Urvinder Dahiya, Atisha Bhandari, Rahul Goel, Sandeep Chandigarh University Department of Cse Punjab Mohali India Panipat Institute of Engineering and Technology Department of Computer Applications Haryana Samalkha India Panipat Institute of Engineering and Technology Department of Information Technology Haryana Samalkha India
This study presents a novel classification algorithm designed to accurately identify plant diseases using leaf image analysis. The model employs a hybrid architecture containing a CNN (Convolutional Neural Network) an... 详细信息
来源: 评论
Applying Natural Language Processing for Detecting Cybersecurity Threats Using Sentimental Analysis Techniques  5th
Applying Natural Language Processing for Detecting Cybersecu...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Mishra, Awakash Ganesh, D. Sharma, Apurva Vignesh, R. Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper examines the ability to use herbal Language Processing (NLP) and Sentiment evaluation strategies to detect cybersecurity threats. We describe the traditional tactics and present-day tendencies in cybersecur... 详细信息
来源: 评论
Investigating the Use of Multi-Sourced Input Data for Time Series Algorithms Applied to Hyper Spectral Imagery  5th
Investigating the Use of Multi-Sourced Input Data for Time S...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Raj, Shanthi Pichandi Ananda Mishra, Awakash D, Preethi Sivaraman, Himani School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India
This paper examines the efficacy of merging multi-sourced enter records into time series algorithms for analyzing hyperspectral imagery. Combining entered information from different resources (e.g., from Radar, Landsa... 详细信息
来源: 评论
Fuzzy-NMS: Improving 3D Object Detection With Fuzzy Classification in NMS
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-15页
作者: Wang, Li Zhang, Xinyu Zhao, Fachuan Wu, Chuze Wang, Yichen Song, Ziying Yang, Lei Xu, Bin Li, Jun Ge, Shuzhi Sam School of Machanical Engineering Beijing Institute of Technology Beijing China School of Vehicle and Mobility Tsinghua University Beijing China School of Computer and Information Technology Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China Department of Electrical and Computer Engineering Interactive Digital Media Institute Social Robotics Laboratory National University of Singapore Singapore
Non-maximum suppression (NMS) is an essential post-processing module in many 3D object detection frameworks to remove overlapping candidate bounding boxes. However, an overreliance on classification scores and difficu... 详细信息
来源: 评论
Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic
收藏 引用
Journal of Safety Science and Resilience 2024年 第1期5卷 91-101页
作者: Sachin Dhawan Hemanta Kumar Bhuyan Subhendu Kumar Pani Vinayakumar Ravi Rashmi Gupta Arun Rana Alanoud Al Mazroa Dorset College King George BlvdSurreyBritish ColumbiaCanada Department of Information Technology Vignan’s Foundation for ScienceTechnology and Research(Deemed to be University)Andhra PradeshIndia Krupajal Computer Academy Biju Patnaik University of Technology(BPUT)Rourkela 751002India Center for Artificial Intelligence Prince Mohammad Bin Fahd UniversityKhobarSaudi Arabia NSUT East Campus(Formerly AIACTRDelhi 110031India(Affiliated to Guru Gobind Singh Inderaprastha University))Dwarka 110078India Department of Computer Science and Engineering Galgotias College of Engineering and Technology Greater Noida 201310Uttar PradeshIndia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman University(PNU)P.O.Box 84428Riyadh 11671Saudi Arabia
The exponential growth in communication networks,data technology,advanced libraries,and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as ***,thi... 详细信息
来源: 评论
Exploring Data as Quantum Bits: Analysis of Quantum Image Encoding Patterns for NISQ era
Exploring Data as Quantum Bits: Analysis of Quantum Image En...
收藏 引用
2023 IEEE International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security, iQ-CCHESS 2023
作者: Gopakumar, Parvathy Rubell Marion Lincy, G. Indian Institute of Information Technology Kottayam Department of Computer Science and Engineering Kerala Pala Kottayam India
The generall efficiency of a computational system, be it simple or complex, presentation of the data plays a crucial role in getting the most out of it. Classical information theory, quantum mechanics, and computer sc... 详细信息
来源: 评论
Traceability and Prevention System Construction of Network Attacks Driven by Big Data
Traceability and Prevention System Construction of Network A...
收藏 引用
2023 IEEE International Conference on Paradigm Shift in information Technologies with Innovative Applications in Global Scenario, ICPSITIAGS 2023
作者: Liu, Benfa School of Computer and Information Engineering Wuhan Railway Vocational College of Technology Wuhan Hubei430205 China
The traditional mode of defending against DDoS attacks forms a distributed and strongly coupled system by integrating data processing and control logic into network devices. This system structure can improve the relia... 详细信息
来源: 评论
Application of Waning Immunity Index Model using Spiking Neural Networks for COVID-19 Pandemic in the geographic context of India  2
Application of Waning Immunity Index Model using Spiking Neu...
收藏 引用
2nd IEEE International Conference on Advances in Computing, Communication and Applied Informatics, ACCAI 2023
作者: Senthil Velan, S. Rubini, P. Sivaranjani, S. Cmr Institute of Technology Information Science and Engineering Bengaluru India Cmr University Computer Science and Engineering Soet Bengaluru India Computer Science and Engineering Mvj College of Engineering Bengaluru India
Spiking Neural Networks (SNN) are biologically inspired networks working on the principle of communication triggered while crossing of threshold potentials. During the COVID-19 pandemic, immunity has been acquired by ... 详细信息
来源: 评论