咨询与建议

限定检索结果

文献类型

  • 87,590 篇 会议
  • 14,749 篇 期刊文献
  • 688 册 图书
  • 34 篇 科技报告

馆藏范围

  • 103,061 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66,106 篇 工学
    • 46,525 篇 计算机科学与技术...
    • 38,644 篇 软件工程
    • 16,734 篇 信息与通信工程
    • 10,122 篇 控制科学与工程
    • 8,793 篇 电气工程
    • 8,732 篇 电子科学与技术(可...
    • 5,910 篇 生物工程
    • 4,756 篇 生物医学工程(可授...
    • 4,215 篇 光学工程
    • 3,881 篇 机械工程
    • 3,314 篇 动力工程及工程热...
    • 3,268 篇 仪器科学与技术
    • 2,741 篇 化学工程与技术
    • 2,059 篇 安全科学与工程
    • 1,858 篇 建筑学
    • 1,853 篇 材料科学与工程(可...
    • 1,836 篇 交通运输工程
  • 34,224 篇 理学
    • 20,047 篇 数学
    • 9,217 篇 物理学
    • 6,544 篇 生物学
    • 6,040 篇 统计学(可授理学、...
    • 3,946 篇 系统科学
    • 2,892 篇 化学
  • 15,988 篇 管理学
    • 9,055 篇 管理科学与工程(可...
    • 7,730 篇 图书情报与档案管...
    • 5,119 篇 工商管理
  • 3,739 篇 医学
    • 3,256 篇 临床医学
    • 3,055 篇 基础医学(可授医学...
    • 1,993 篇 药学(可授医学、理...
  • 2,869 篇 法学
    • 2,406 篇 社会学
  • 1,750 篇 经济学
  • 1,459 篇 教育学
  • 1,192 篇 农学
  • 422 篇 文学
  • 258 篇 军事学
  • 112 篇 艺术学
  • 39 篇 哲学
  • 19 篇 历史学

主题

  • 2,246 篇 accuracy
  • 2,154 篇 computational mo...
  • 1,946 篇 feature extracti...
  • 1,892 篇 computer science
  • 1,674 篇 training
  • 1,429 篇 deep learning
  • 1,260 篇 machine learning
  • 1,121 篇 real-time system...
  • 1,089 篇 computer archite...
  • 1,084 篇 predictive model...
  • 1,057 篇 support vector m...
  • 1,042 篇 data mining
  • 985 篇 optimization
  • 906 篇 neural networks
  • 876 篇 semantics
  • 873 篇 data models
  • 787 篇 artificial intel...
  • 768 篇 wireless sensor ...
  • 758 篇 monitoring
  • 753 篇 internet of thin...

机构

  • 112 篇 dept. of electri...
  • 90 篇 institute of inf...
  • 84 篇 dept. of compute...
  • 83 篇 north-west unive...
  • 82 篇 dept. of compute...
  • 81 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 65 篇 dept. of compute...
  • 61 篇 dept. of electr....
  • 57 篇 dept. of electri...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of electri...
  • 52 篇 school of automa...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 42 篇 infn lnf via enr...
  • 39 篇 dept. of compute...
  • 37 篇 in2p3 lpc campus...
  • 35 篇 dept. of informa...

作者

  • 94 篇 ardid m.
  • 93 篇 ferrara g.
  • 87 篇 calvo d.
  • 80 篇 chen a.
  • 62 篇 ahmad jalal
  • 60 篇 kulikovskiy v.
  • 51 篇 gal t.
  • 42 篇 bozza c.
  • 41 篇 gagliardini s.
  • 40 篇 benoit d.m.
  • 40 篇 eddymaoui a.
  • 39 篇 labalme m.
  • 36 篇 androulakis g.
  • 32 篇 de palma m.
  • 29 篇 sharma neha
  • 28 篇 zhang lei
  • 27 篇 david reigosa
  • 26 篇 kougianos elias
  • 26 篇 marojevic vuk
  • 26 篇 li xin

语言

  • 98,316 篇 英文
  • 3,376 篇 其他
  • 974 篇 中文
  • 262 篇 朝鲜文
  • 118 篇 日文
  • 13 篇 德文
  • 9 篇 土耳其文
  • 7 篇 法文
  • 6 篇 西班牙文
  • 4 篇 斯洛文尼亚文
  • 3 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
检索条件"机构=Computer Science and Computer Engineering Dept."
103061 条 记 录,以下是191-200 订阅
排序:
Design and Development of Expense App
Design and Development of Expense App
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and Technology, ACROSET 2024
作者: Girdhar, Gunit Kumar, Sachin Bhardwaj, Anuj Sharma, Megha Chandigarh University Dept. of Computer Science & Engineering Mohali India
With the help of Expense Tracker, you can easily and intuitively manage your revenue and costs while keeping track of your everyday, weekly, monthly, and annual spending. Users may choose the kind of expenditure, add ... 详细信息
来源: 评论
A Rubric-Centric Approach for Automated Test Correction Utilizing RAG and Fine Tuning  4
A Rubric-Centric Approach for Automated Test Correction Util...
收藏 引用
4th International Conference on Technological Advancements in Computational sciences, ICTACS 2024
作者: Harshavardhan, G. Singh, Kulvinder Chandigarh University Dept. of Computer Science & Engineering Punjab India
Assessments are a popular method to quantify a person's knowledge, skill, or cognitive ability. However, to grade such assessments, particularly subjective questions requires a significant amount of time and effor... 详细信息
来源: 评论
BeTS: Abstractive Text Summarization with Transfer Learning  2
BeTS: Abstractive Text Summarization with Transfer Learning
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Bhardwaj, Meher Ethari, Hrishikesh Charan, Annepu Sai Singh Moirangthem, Dennis Iiit Manipur Dept. of Computer Science and Engineering Imphal India
We introduce BeTS, which stands for Bert Transformer Summarizer, an abstractive summarization model that is built using transfer learning. Our model consists of a pre-trained BERT encoder and a generative transformer ... 详细信息
来源: 评论
Performance Comparison of Machine Learning Algorithms for Parkinson's Disease Detection  14
Performance Comparison of Machine Learning Algorithms for Pa...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Gupta, Ipsha Vashisth, Dhwani Garg, Rakesh Amity University Dept. of Computer Science and Engineering UP India
Parkinson's Disease affects the neural system and can be detected using biomarkers, physiological and motor disruptions exhibited by patients. Several advancements and research on Machine Learning approaches have ... 详细信息
来源: 评论
Machine Learning - Driven Approaches for Detection and Analysis of Phishing attacks: A Robust Framework for Cybersecurity  7
Machine Learning - Driven Approaches for Detection and Analy...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Sarvan, N.D.S.S. Sai Ram Reddy, Venkata Jain, Darshan Rakesh, Guntupalli Anguraj, Dinesh Kumar Kl University Dept. of Computer Science Engineering Guntur India
Phishing is the attempt to trick someone into disclosing confidential and private information by using internet communication, such as bank account details, passwords, credit/debit card details, and usernames. The acc... 详细信息
来源: 评论
Optimizing Kidney Stone Detection with Vision Transformers and CNNs: A Transfer Learning Strategy
Optimizing Kidney Stone Detection with Vision Transformers a...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Kulkarni, Supritha Suhaas Rao, S. Chopra, Tushar Kumar Yeshwanth, S.P. Bhanushree, K.J. Suneetha, K.R. Bangalore Institute of Technology Dept. of Computer Science and Engineering Bengaluru India
Kidney stones are a common and impactful urological condition, with timely and accurate diagnosis being critical to prevent complications such as renal damage and avoid invasive treatments. This study explores the use... 详细信息
来源: 评论
A Review on Cosmetic Product Recommendation Using Deep Learning  4
A Review on Cosmetic Product Recommendation Using Deep Learn...
收藏 引用
4th International Conference on Soft Computing for Security Applications, ICSCSA 2024
作者: Chouhan, Ruchika Barde, Snehlata Sage University Dept. of Computer Science Engineering Indore India
Cosmetic products play an important role in every one's life. Cosmetic products also called as makeup are substance that is applied on the body especially on face. The modern lifestyle can be demanding, leaving li... 详细信息
来源: 评论
Harnessing Transformative Potential of UAV-Based AI-Powered Data Analysis for Emission Monitoring  6
Harnessing Transformative Potential of UAV-Based AI-Powered ...
收藏 引用
6th International Conference on Computational Intelligence and Networks, CINE 2024
作者: Namdev, Mayank Dholaria, Jay Rathi, Meet Manipal University Dept. of Computer Science Engineering Jaipur India
With the growing pressure to reduce environmental pollution, the combination of Unmanned Aerial Vehicles (UAVs) and Artificial Intelligence (AI) offers a viable path forward for modernizing emission monitoring. This r... 详细信息
来源: 评论
A Study on Deep Fake Face Detection Techniques  3
A Study on Deep Fake Face Detection Techniques
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Arya, Mudit Priyanshu Upwan Akash Goyal, Umang Chawla, Simran Chandigarh University Dept. of Computer Science and Engineering Punjab India
Advanced technology and the widespread use of deep fake technology has rendered the digital landscape vulnerable to deceptive manipulations, particularly through the creation of synthetic face images. This comprehensi... 详细信息
来源: 评论
Cybersecurity Threat Detection Using Deep Learning and Anomaly Detection Techniques
Cybersecurity Threat Detection Using Deep Learning and Anoma...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Rajendran, T. Mohamed Imtiaz, N. Jagadeesh, K. Sampathkumar, Balaji Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai India Nagarjuna College of Engineering and Technology Dept. of Information Science and Engineering Bangalore India Sri Venkateswaraa College of Technology Dept. of Computer Science and Engineering Chennai India Akshaya College of Engineering and Technology Dept. of Computer Science and Engineering Coimbatore India
Through the use of combined deep learning and anomaly detection approaches, this research investigates the area of cybersecurity threat detection. The study proves the framework's extraordinary success in recogniz... 详细信息
来源: 评论