咨询与建议

限定检索结果

文献类型

  • 68,027 篇 会议
  • 31,868 篇 期刊文献
  • 837 册 图书

馆藏范围

  • 100,732 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 62,029 篇 工学
    • 43,925 篇 计算机科学与技术...
    • 35,730 篇 软件工程
    • 17,110 篇 信息与通信工程
    • 9,943 篇 控制科学与工程
    • 7,498 篇 电气工程
    • 7,324 篇 电子科学与技术(可...
    • 7,056 篇 生物工程
    • 4,967 篇 生物医学工程(可授...
    • 4,682 篇 机械工程
    • 4,433 篇 光学工程
    • 3,450 篇 仪器科学与技术
    • 3,141 篇 动力工程及工程热...
    • 2,907 篇 化学工程与技术
    • 2,603 篇 网络空间安全
    • 2,522 篇 安全科学与工程
    • 2,341 篇 交通运输工程
  • 32,376 篇 理学
    • 17,321 篇 数学
    • 9,019 篇 物理学
    • 7,827 篇 生物学
    • 5,624 篇 统计学(可授理学、...
    • 3,773 篇 系统科学
    • 3,056 篇 化学
  • 17,429 篇 管理学
    • 10,798 篇 管理科学与工程(可...
    • 7,363 篇 图书情报与档案管...
    • 4,611 篇 工商管理
  • 4,858 篇 医学
    • 4,082 篇 临床医学
    • 3,658 篇 基础医学(可授医学...
    • 2,249 篇 药学(可授医学、理...
    • 2,074 篇 公共卫生与预防医...
  • 2,811 篇 法学
    • 2,199 篇 社会学
  • 1,721 篇 经济学
  • 1,426 篇 农学
  • 1,226 篇 教育学
  • 470 篇 文学
  • 286 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,662 篇 feature extracti...
  • 2,336 篇 accuracy
  • 2,239 篇 deep learning
  • 2,117 篇 computer science
  • 1,981 篇 computational mo...
  • 1,925 篇 training
  • 1,875 篇 machine learning
  • 1,461 篇 data mining
  • 1,314 篇 internet of thin...
  • 1,313 篇 optimization
  • 1,304 篇 support vector m...
  • 1,187 篇 information tech...
  • 1,165 篇 predictive model...
  • 1,100 篇 educational inst...
  • 1,095 篇 wireless sensor ...
  • 971 篇 artificial intel...
  • 957 篇 neural networks
  • 938 篇 real-time system...
  • 936 篇 semantics
  • 928 篇 security

机构

  • 689 篇 school of comput...
  • 514 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 266 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 219 篇 faculty of scien...
  • 216 篇 physics division...
  • 201 篇 school of comput...
  • 200 篇 department of co...
  • 194 篇 department of ph...
  • 185 篇 department of ph...
  • 175 篇 college of compu...
  • 173 篇 departamento de ...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 256 篇 m. klein
  • 253 篇 r. ströhmer
  • 243 篇 y. tayalati
  • 242 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 224 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 197 篇 d. guest
  • 190 篇 s. jin

语言

  • 93,878 篇 英文
  • 5,220 篇 其他
  • 1,647 篇 中文
  • 77 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 德文
  • 10 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Information Technology"
100732 条 记 录,以下是4591-4600 订阅
排序:
Building Crack Detection Using CNN and Class Activation Mapping
Building Crack Detection Using CNN and Class Activation Mapp...
收藏 引用
2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Applications, ICAIQSA 2024
作者: Keerthana, Bodduru Devi, Jathuka Aruna Madhuri, Surisetty Rao, Marada Srinivasa Rao, Koduganti Venkata Geethika, P.S.S. Anil Neerukonda Institute of Technology and Sciences Department of Information Technology Andhra Prades Visakhapatnam India Andhra Prades Visakhapatnam India Vignan Institite of Engineering for Women Department of Information Technology Andhra Prades Visakhapatnam India MVGR College of Engineering Department of Information Technology Andhra Prades Vizianagaram India Guru Nanak Institutions Technical Campus Department of Computer Science and Engineering Hyderabad India
As the population increases, further structures are being erected to meet the demands of the populace. Nonetheless, this surge in development presents the challenge of guaranteeing that each edifice fulfills the aspir... 详细信息
来源: 评论
Exploring Feature Extraction for Image Segmentation Methods in Critical Tumor Detection
Exploring Feature Extraction for Image Segmentation Methods ...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Upadhyay, Ramakant Rastogi, Shreshta Bandhu Mehta, Deepak Sanskriti University Department of Computer Science Engineering Uttar Pradesh Mathura India College of Engineering Teetthanker Mahaveer University Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
this technical summary affords an exploration of function extraction for photo segmentation techniques to discover a critical tumor detection approach using forest Mapping. A segmentation technique is a critical step ... 详细信息
来源: 评论
Reimagining Mutual information for Defense against Data Leakage in Collaborative Inference  38
Reimagining Mutual Information for Defense against Data Leak...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Duan, Lin Sun, Jingwei Jia, Jinyuan Chen, Yiran Gorlatova, Maria Department of Electrical and Computer Engineering Duke University United States College of Information Sciences and Technology Pennsylvania State University United States
Edge-cloud collaborative inference empowers resource-limited IoT devices to support deep learning applications without disclosing their raw data to the cloud server, thus protecting user's data. Nevertheless, prio...
来源: 评论
Dynamic Data Masking by Two-Step Encryption
Dynamic Data Masking by Two-Step Encryption
收藏 引用
2023 Innovations in Intelligent Systems and Applications Conference, ASYU 2023
作者: Adak, M. Fatih Kose, Zehra Nur Akpinar, Mustafa Sakarya University Computer Engineering Department Sakarya Turkey Computer and Information Science Higher Colleges of Technology Sharjah United Arab Emirates
Data masking and encryption are crucial techniques in ensuring the security and privacy of sensitive information. This provides a robust layer of protection by transforming data into an unreadable format using cryptog... 详细信息
来源: 评论
Implementing Machine Learning Techniques to Enhance Real-Time Data Analysis Services  3
Implementing Machine Learning Techniques to Enhance Real-Tim...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Jaisudha, J. Dhabliya, Dharmesh Narasimhayya, B.E. Singh, Akhilendra Pratap Sinha, Sanjay Kumar Vashisht, Nitish Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Computer Science and Engineering Faculty of Engineering and Technology Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India
System learning techniques have emerged to automatically extract data from massive volumes of statistics and enable predictive analytics. Gadget-gaining knowledge has, in particular, been applied to records-driven rea... 详细信息
来源: 评论
Image Encryption Using Chaotic Logistic and DNA Encoding  5
Image Encryption Using Chaotic Logistic and DNA Encoding
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Kumar, G. Kiran Anila, M. Chandrika, C. Priyanka, M. Jayaram, D. Mohan, A. Chaitanya Bharathi Institute of Technology Department of Computer Science and Engineering Gandipet Telangana Hyderabad India Chaitanya Bharathi Institute of Technology Department of Information Technology Gandipet Telangana Hyderabad India
With a rapid development in technology and digital communication, there is a need of high speed with strong secured systems. In every sector, data is communicated in various formats, among them, images are one. It is ... 详细信息
来源: 评论
Analyzing Multilayer Perception Architectures for Reinforcement Learning
Analyzing Multilayer Perception Architectures for Reinforcem...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Upadhyay, Ramakant Pipersenia, Arun Kumar Nidhya, M.S. Sanskriti University Department of Computer Science Engineering Uttar Pradesh Mathura India College of Engineering Teetthanker Mahaveer University Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
Reinforcement learning (RL) is a famous and influential technique for fixing complicated problems in synthetic intelligence. But it typically calls for considerable records and computational assets to be effective. A ... 详细信息
来源: 评论
Protecting Data Mobility in Cloud Networks Using Metadata Security
收藏 引用
computer Systems Science & engineering 2022年 第7期42卷 105-120页
作者: R.Punithavathi M.Kowsigan R.Shanthakumari Miodrag Zivkovic Nebojsa Bacanin Marko Sarac Department of Information Technology M.Kumarasamy College of EngineeringKarur639113India Department of Computer Science and Engineering School of ComputingSRM Institute of TechnologyKattankulathur CampusChennai603203India Department of Information Technology Kongu Engineering CollegeErode638060India Singidunum University Belgrade11000Serbia
At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement *** mobility in cloud environments uses protection protocols and algorithms to ... 详细信息
来源: 评论
Enhancing Smart City and IoT Solutions with Deep Residual Bi-LSTM Model
Enhancing Smart City and IoT Solutions with Deep Residual Bi...
收藏 引用
2023 International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023
作者: Madumidha, S. Chander Rao, S. Poorna Yadav, Sameer Hashmi, Syed Ghyasuddin Ahmad, Jorair Syed, Ziauddin Sri Krishna College of Technology Department of Information Technology Tamilnadu India Geethanjali College of Engineering and Technology Eee Department Telangana Hyderabad India University of Allahabad Department of Commerce and Business Administration Uttar Pradesh Prayagraj India College of Computer Science & Information Technology Jazan University Department of Information Technology & Security Jazan Saudi Arabia Information Technology & Security College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia College of Computer Science and Information Technology Jazan University Department of Computer Science Jazan Saudi Arabia
There is a limitless supply of useful information and services made available by IoT devices connected to the internet. The Internet of Things (IoT) refers to the vast network of interconnected devices seen in a smart... 详细信息
来源: 评论
An Algorithm for Modified Minimum Length Sliding k Transmitter Problem  10
An Algorithm for Modified Minimum Length Sliding k Transmitt...
收藏 引用
10th International Conference on Networking Systems and Security, NSysS 2023
作者: Al-Mahmud, Mohammad Saidur Rahman, Md. Graph Drawing and Information Visualization Laboratory Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Dhaka1205 Bangladesh
Advancement in wireless technology, artificial intelligence and robotics introduces different problems on coverage or visibility in different architectural shapes. Usually, architectural shapes are represented by two ... 详细信息
来源: 评论