咨询与建议

限定检索结果

文献类型

  • 8,247 篇 期刊文献
  • 7,688 篇 会议
  • 213 册 图书

馆藏范围

  • 16,148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,433 篇 工学
    • 4,851 篇 计算机科学与技术...
    • 3,758 篇 软件工程
    • 1,702 篇 电子科学与技术(可...
    • 1,615 篇 电气工程
    • 1,508 篇 信息与通信工程
    • 1,221 篇 控制科学与工程
    • 987 篇 材料科学与工程(可...
    • 882 篇 化学工程与技术
    • 868 篇 生物工程
    • 780 篇 光学工程
    • 673 篇 生物医学工程(可授...
    • 653 篇 机械工程
    • 596 篇 仪器科学与技术
    • 566 篇 动力工程及工程热...
    • 505 篇 核科学与技术
    • 434 篇 力学(可授工学、理...
    • 349 篇 冶金工程
  • 7,918 篇 理学
    • 4,259 篇 物理学
    • 3,065 篇 数学
    • 1,076 篇 生物学
    • 1,060 篇 统计学(可授理学、...
    • 1,010 篇 化学
    • 561 篇 系统科学
    • 323 篇 地球物理学
  • 1,865 篇 管理学
    • 1,211 篇 管理科学与工程(可...
    • 704 篇 图书情报与档案管...
    • 619 篇 工商管理
  • 739 篇 医学
    • 600 篇 临床医学
    • 498 篇 基础医学(可授医学...
    • 292 篇 药学(可授医学、理...
  • 328 篇 法学
  • 256 篇 经济学
  • 191 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 330 篇 deep learning
  • 321 篇 computer science
  • 259 篇 machine learning
  • 206 篇 computational mo...
  • 188 篇 accuracy
  • 166 篇 feature extracti...
  • 160 篇 optimization
  • 153 篇 internet of thin...
  • 134 篇 neural networks
  • 133 篇 data mining
  • 129 篇 artificial intel...
  • 124 篇 predictive model...
  • 124 篇 real-time system...
  • 123 篇 support vector m...
  • 122 篇 computational in...
  • 116 篇 hadrons
  • 104 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,111 篇 cavendish labora...
  • 1,045 篇 department of ph...
  • 999 篇 physikalisches i...
  • 994 篇 oliver lodge lab...
  • 628 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 570 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 556 篇 iccub universita...
  • 546 篇 school of physic...
  • 533 篇 school of physic...
  • 532 篇 h.h. wills physi...
  • 531 篇 imperial college...
  • 525 篇 nikhef national ...
  • 523 篇 stfc rutherford ...
  • 522 篇 university of ch...
  • 516 篇 infn laboratori ...
  • 504 篇 physik-institut ...
  • 502 篇 infn sezione di ...
  • 501 篇 infn sezione di ...

作者

  • 292 篇 barter w.
  • 264 篇 a. gomes
  • 263 篇 beiter a.
  • 254 篇 bellee v.
  • 253 篇 c. alexa
  • 252 篇 c. amelung
  • 252 篇 blake t.
  • 251 篇 j. m. izen
  • 251 篇 g. bella
  • 251 篇 j. strandberg
  • 251 篇 d. calvet
  • 249 篇 g. spigo
  • 248 篇 brundu d.
  • 246 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 239 篇 s. chen
  • 238 篇 betancourt c.
  • 235 篇 borsato m.
  • 231 篇 y. tayalati
  • 230 篇 amato s.

语言

  • 14,142 篇 英文
  • 1,859 篇 其他
  • 144 篇 中文
  • 8 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16148 条 记 录,以下是1631-1640 订阅
排序:
APriCoT: Action Primitives based on Contact-state Transition for In-Hand Tool Manipulation
arXiv
收藏 引用
arXiv 2024年
作者: Saito, Daichi Kanehira, Atsushi Sasabuchi, Kazuhiro Wake, Naoki Takamatsu, Jun Koike, Hideki Ikeuchi, Katsushi Department of Computer Science Tokyo Institute of Technology Tokyo Japan Applied Robotics Research Microsoft RedmondWA United States
In-hand tool manipulation is an operation that not only manipulates a tool within the hand (i.e., in-hand manipulation) but also achieves a grasp suitable for a task after the manipulation. This study aims to achieve ... 详细信息
来源: 评论
The Least Square QR Method Improves Extreme Learning Machine
The Least Square QR Method Improves Extreme Learning Machine
收藏 引用
2023 IEEE World Conference on applied Intelligence and Computing, AIC 2023
作者: Subramani, Chinnamuthu Kuppili, Venkatanareshbabu Keshavamurthy, B.N. Jagannath, Ravi Prasad K. Prashanth, Gurusiddappa R. National Institute of Technology Goa Department of Applied Sciences Goa Ponda403401 India National Institute of Technology Goa Department of Computer Science and Engineering Goa Ponda403401 India National Institute of Technology Goa Department of Electronics and Communication Engineering Goa Ponda403401 India
The Extreme Learning Machine (ELM) is a fast and straightforward learning algorithm designed for single hidden layer feed-forward neural networks (SLFNs). The ELM randomly assigns input weights and calculates the outp... 详细信息
来源: 评论
Sentiment Analysis in Social Media Marketing: Leveraging Natural Language Processing for Customer Insights  8th
Sentiment Analysis in Social Media Marketing: Leveraging Nat...
收藏 引用
8th International Conference on Information and Communication technology for Competitive Strategies, ICTCS 2023
作者: Singh, Kamred Udham Kumar, Ankit Kumar, Gaurav Choudhury, Tanupriya Singh, Teekam Kotecha, Ketan School of Computing Graphic Era Hill University Dehradun India Department of Computer Engineering and Applications GLA University Uttar Pradesh Mathura India CSE Department Symbiosis Institute of Technology Symbiosis International University Lavale Campus Pune411045 India Department of Computer Science and Engineering Graphic Era Deemed to Be University Dehradun India Symbiosis Centre for Applied Artificial Intelligence Symbiosis Institute of Technology Symbiosis International University Pune411045 India
In this day and age of online marketing, social media platforms have evolved into essential tools for companies to use in order to communicate with their consumers, as well as to advertise the goods and services they ... 详细信息
来源: 评论
Real-time testing of vision-based systems for AGVs with ArUco markers
Real-time testing of vision-based systems for AGVs with ArUc...
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Filus, Katarzyna Sobczak, Lukasz Domanska, Joanna Domanski, Adam Cupek, Rafal Institute of Theoretical and Applied Informatics Polish Academy of Sciences Gliwice Poland Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Gliwice Poland
Automated Ground Vehicles (AGVs) use deep-learning-based vision systems to perceive the surrounding environment and extract relevant information about it. Although deep learning models offer high capabilities, they re... 详细信息
来源: 评论
Intelligent Intrusion Detection System Based on Blockchain technology  1
Intelligent Intrusion Detection System Based on Blockchain T...
收藏 引用
1st IEEE Afro-Mediterranean Conference on Artificial Intelligence, AMCAI 2023
作者: Bessaad, Ferdaws Ktata, Farah Barika Kalboussi, Khalil Ben Higher Institute of Computer Science and Communication Techniques H.Sousse Sousse Tunisia MIRACL HIGHER INSTITUTE of APPLIED SCIENCES and TECHNOLOGY of SOUSSE Sousse Tunisia LAMIH POLYTECHNIC UNIVERSITY of HAUT de FRANCE Valenciennes France
computer networks are increasingly vulnerable to security disruptions such as congestion, malicious access, and attacks. Intrusion Detection Systems (IDS) play a crucial role in identifying and mitigating these threat... 详细信息
来源: 评论
The Optimum Switching Bilateral of Various Mix Noise Filters to reduce Medical X-Ray Images
The Optimum Switching Bilateral of Various Mix Noise Filters...
收藏 引用
International Electrical Engineering Congress (iEECON)
作者: Kriengkri Langampol Akara Prayote Wilaiporn Lee Kanabadee Srisomboon Department of Computer Engineering Faculty of Engineering Rajamangala University of Technology Phra Nakhon Thailand Department of Computer and Information Science Faculty of Applied Science King Mongkut's University of Technology North Bangkok Thailand Department of Electrical and Computer Engineering Faculty of Engineering King Mongkut's University of Technology North Bangkok Thailand
In the past few years, image processing has been widely adopted for symptom diagnosis of medical application. To achieve accurate analysis, the medical applications require high quality image for applying to the sympt... 详细信息
来源: 评论
Embedding Color Watermark by Adjusting DCT using RGB Gray Scale Watermarking  1
Embedding Color Watermark by Adjusting DCT using RGB Gray Sc...
收藏 引用
1st IEEE International Conference on Emerging Trends in Industry 4.0, ETI 4.0 2021
作者: Gupta, Neha Bhansali, Ashok Symbiosis University of Applied Sciences School of Computer Science and Information Technology Indore India OP Jindal University Computer Science Engineering Raigarh India
Digital Watermarking with PSO and Fuzzy Logic is an attempt to find suitable location using PSO and Fuzzy Logic by looking at the surrounding pixels and adaptively adjusting the pixel intensity values to encode the wa... 详细信息
来源: 评论
Web Extension for Phishing URL Identification  3
Web Extension for Phishing URL Identification
收藏 引用
3rd International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2022
作者: Kiruthi Whasan, W.R. Khiran Khumhaar, W.R. Reddy, Kalluri Raviteja Dhanalakshmi, R. Kapilan Radhakrishnan, P. Kcg College of Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Applied Computing University of Wales Trinity Saint David United Kingdom
Phishing attacks have been the most consistent and emerging cyber-attack among other social engineering attacks. In spite of several strict mechanisms and policies to identify and avoid phishing websites, new techniqu... 详细信息
来源: 评论
Deep Learning Techniques to Detect Learning Disabilities Among children using Handwriting  3
Deep Learning Techniques to Detect Learning Disabilities Amo...
收藏 引用
3rd International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2022
作者: Vilasini, V. Banu Rekha, B. Sandeep, V. Charan Venkatesh, Vishnu Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Tamil Nadu Coimbatore India Psg College of Technology Department of Biomedical Engineering Tamil Nadu Coimbatore India
In today's world, we come across children facing certain disabilities which pose as obstacles and hinder their academic growth. Some of these disabilities are explicitly visible to the common eye, whereas some are... 详细信息
来源: 评论
Recurrent Autoencoder with Sequence-Aware Encoding  21st
Recurrent Autoencoder with Sequence-Aware Encoding
收藏 引用
21st International Conference on Computational science, ICCS 2021
作者: Susik, Robert Institute of Applied Computer Science Lódź University of Technology Lódź Poland
Recurrent Neural Networks (RNN) received a vast amount of attention last decade. Recently, the architectures of Recurrent AutoEncoders (RAE) found many applications in practice. RAE can extract the semantically valuab... 详细信息
来源: 评论