咨询与建议

限定检索结果

文献类型

  • 2,407 篇 会议
  • 1,329 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,773 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,299 篇 工学
    • 1,633 篇 计算机科学与技术...
    • 1,341 篇 软件工程
    • 622 篇 信息与通信工程
    • 365 篇 控制科学与工程
    • 300 篇 生物工程
    • 288 篇 电气工程
    • 229 篇 生物医学工程(可授...
    • 220 篇 电子科学与技术(可...
    • 180 篇 光学工程
    • 160 篇 机械工程
    • 160 篇 网络空间安全
    • 136 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 115 篇 动力工程及工程热...
    • 107 篇 交通运输工程
    • 104 篇 核科学与技术
    • 102 篇 仪器科学与技术
  • 1,346 篇 理学
    • 602 篇 数学
    • 473 篇 物理学
    • 327 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 154 篇 化学
    • 113 篇 系统科学
  • 691 篇 管理学
    • 432 篇 管理科学与工程(可...
    • 293 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 218 篇 医学
    • 161 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
  • 129 篇 法学
    • 107 篇 社会学
  • 67 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 172 篇 accuracy
  • 141 篇 deep learning
  • 105 篇 feature extracti...
  • 100 篇 hadron colliders
  • 98 篇 machine learning
  • 89 篇 computational mo...
  • 88 篇 training
  • 84 篇 convolutional ne...
  • 73 篇 real-time system...
  • 66 篇 support vector m...
  • 63 篇 predictive model...
  • 61 篇 artificial intel...
  • 56 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 46 篇 cloud computing
  • 46 篇 data models
  • 44 篇 semantics
  • 44 篇 security

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 charles universi...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 122 篇 irfu cea univers...
  • 121 篇 infn sezione di ...
  • 120 篇 university of de...
  • 120 篇 department of ph...
  • 118 篇 imperial college...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,148 篇 英文
  • 584 篇 其他
  • 45 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3773 条 记 录,以下是1111-1120 订阅
排序:
Design of data processing scheme of 5G terminal protocol conformance test system
Design of data processing scheme of 5G terminal protocol con...
收藏 引用
Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), International Conference on
作者: Cao Jingyao Amit Yadav Asif Khan Abhishek Pratap Sah School of Computer and Software Chengdu Neusoft University Chengdu China College of Engineering IT and Environment Charles Darwin University NT Australia Department of Computer Application Integral University Lucknow India School of Management Science and Engineering University of Electronic Science and Technology of China Chengdu China
Considering the fact that the test case runs abnormally and the test case execution fails during the development and debugging of the 5G terminal protocol conformance test system. Here useful approach is implemented b...
来源: 评论
Music Generation using Time Distributed Dense Stateful Char-RNNs  7
Music Generation using Time Distributed Dense Stateful Char-...
收藏 引用
7th IEEE International conference for Convergence in Technology, I2CT 2022
作者: Banerjee, Shobhan Rath, Manas Swain, Tanmaya Samant, Tapaswini Birla Institute of Technology and Science - Pilani Rajasthan India Kalinga Institute of Industrial Technology School of Computer Application Bhubaneswar India Kalinga Institute of Industrial Technology School of Electronics Engineering Bhubaneswar India
Sequence generation is one of the state-of-the-art topics in recent days, where given a sequence of inputs, the aim is to generate a similar sequence of outputs in a given context. The applications range from sentence... 详细信息
来源: 评论
Cascade Temporal Convolutional Network for Multitask Learning
Cascade Temporal Convolutional Network for Multitask Learnin...
收藏 引用
International Conference on Artificial Intelligence and Big Data (ICAIBD)
作者: Huiyun Zhang Heming Huang Henry Han Department of Computer Science School of Engineering and Computer Science Baylor University USA School of Computer Science Qinghai Normal University Xining China School of Computer Science Qinghai Normal University The State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining China
Multi-task learning (MTL) is a powerful technique in machine learning that enables the simultaneous training of multiple tasks. In this paper, we propose a novel MTL approach for the recognition of emotions, speakers,...
来源: 评论
Efficient Human Detection in Real- Time Using Vision Transformers: Balancing Performance and Latency for Security and Autonomous applications
Efficient Human Detection in Real- Time Using Vision Transfo...
收藏 引用
Next Generation Communication & Information Processing (INCIP), International Conference on
作者: Jeremiah Ocheni Immanuel Johnraja Jebadurai Getzi Jeba Leelipushpam Paulraj Difference Finbarrs Dept. of Computer Science and Engineering Karunya Institute of Technology and Sciences Coimbatore Tamil Nadu India Dept. of Business Admin and Computer Application Rathinam College of Arts and Sciences Coimbatore Tamil Nadu India
With applications in security and surveillance, au-tonomous driving, human-computer interaction, the application of Vision Transformers (ViTs) is a major breakthrough in deep learning techniques, outperforming more co... 详细信息
来源: 评论
The Open Source Threat Intelligence Relational Dataset and Its Optimal Implementation
The Open Source Threat Intelligence Relational Dataset and I...
收藏 引用
Innovation in Technology (APCIT), Asia Pacific Conference on
作者: Yaru Yang Junyu Li Ronghua Zhang Abhishek Pratap Sah Amit Yadav Asif Khan Department of Computer and Software Chengdu Neusoft University Chengdu China School of Management Science and Engineering University of Electronic Science and Technology of China Chengdu China College of Engineering IT and Environment Charles Darwin University NT Australia Department of Computer Application Integral University Lucknow India
Threat intelligence provides a platform for cybersecurity engineers for attack traceability, which provides substantial knowledge database logs to defend against future security threats. Threat intelligence relationsh... 详细信息
来源: 评论
A Comparative Analysis of Cloud based Services Platform  6
A Comparative Analysis of Cloud based Services Platform
收藏 引用
6th Smart Cities Symposium, SCS 2022
作者: Bajaj, Karan Sharma, Bhisham Singh, Raman Kumar, Mukesh Chowdhury, Subrata Department of Computer Science & Engineering Chitkara University School of Engineering and Technology Chitkara University Himachal Pradesh India School of Computing Engineering and Physical Sciences University of the West of Scotland Lanarkshire United Kingdom School of Computer Application Lovely Professional University Punjab Phagwara India MCA Department Sri Venkateswara College of Engineering and Technology India
Data processing at high speeds and storage solutions on a massive scale are two things that are becoming increasingly important as a result of the proliferation of new start-up companies and the vast volume of data th... 详细信息
来源: 评论
Stream Attention Based U-Net for L3DAS23 Challenge  48
Stream Attention Based U-Net for L3DAS23 Challenge
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Wang, Honglong Fu, Yanjie Li, Junjie Ge, Meng Wang, Longbiao Qian, Xinyuan Tianjin University Tianjin Key Laboratory of Cognitive Computing and Application College of Intelligence and Computing Tianjin China The Chinese University of Hong Kong Shenzhen China Co. Ltd Tianjin China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China
Machine learning applications of 3D audio are gaining increasing interest in recent years. In this paper, we propose a stream attention based U-Net to remove background noise and reverberation based on ICASSP Signal P... 详细信息
来源: 评论
Hybrid CNN-RNN Models for Multimodal Analysis of Autism Spectrum Disorder Neuroimaging  3
Hybrid CNN-RNN Models for Multimodal Analysis of Autism Spec...
收藏 引用
3rd IEEE International Conference on Automation and Computation, AUTOCOM 2025
作者: Varshney, Rajat Kishor Katiyar, Alok Johri, Prashant School of Computing Science & Engineering Galgotias University Greater Noida203201 India School of Computing Science & Engineering Galgotias University Greater Noida203201 India School of Computer Application & Technology Galgotias University Greater Noida203201 India
ASD is a developmental disorder in the neurological category and has numerous and diverse symptoms. Diagnosis is still problematic because symptoms of parkinsonism are diverse, and the dimensionality of the neuroimagi... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Model Based on Siamese Network  7th
Smart Contract Vulnerability Detection Model Based on Siames...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Chen, Weijie Guo, Ran Wang, Guopeng Zhang, Lejun Qiu, Jing Su, Shen Liu, Yuan Xu, Guangxia Chen, Huiling College of Information Engineering Yangzhou University Yangzhou225127 China Cyberspace Institute Advanced Technology Guangzhou University Guangzhou510006 China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of Education Beijing100039 China Department of Computer Science and Artificial Intelligence Wenzhou University Wenzhou325035 China
Blockchain is experiencing the transition from the first generation to the second generation, and smart contract is the symbol of the second generation blockchain. Under the background of the explosive growth of the s... 详细信息
来源: 评论
Utilizing Anomaly Detection Methods for Identifying Fraudulent Activities in Credit Card Transactions  1
Utilizing Anomaly Detection Methods for Identifying Fraudule...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Prasad, N. Siva Rama Krishna Gangopadhyay, Amit Prabakaran, R. Mishra, Nilamadhab Prasad, D. Shyam Kapoor, Sneha Saveetha School of Engineering Dept. of CSE Chennai India Mohan Babu University Dept. of ECE Tirupati India Arignar Anna Institute of Science and Technology Dept. of Computer Application India VIT Bhopal University Dept. of CSE Bhopal India CVR College of Engineering Dept. of Electronics and Instrumentation Engineering Hyderabad India Swami Vivekanand Subharti University Dept of CSE Meerut India
Anomaly detection involves identifying unusual occurrences that could signal potential issues, such as security breaches, system failures, financial fraud, structural defects, or medical errors. In the context of digi... 详细信息
来源: 评论