咨询与建议

限定检索结果

文献类型

  • 18,846 篇 会议
  • 14,333 篇 期刊文献
  • 450 册 图书

馆藏范围

  • 33,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,879 篇 工学
    • 11,706 篇 计算机科学与技术...
    • 9,397 篇 软件工程
    • 4,219 篇 信息与通信工程
    • 3,250 篇 控制科学与工程
    • 3,037 篇 电气工程
    • 2,708 篇 电子科学与技术(可...
    • 2,161 篇 生物工程
    • 1,804 篇 生物医学工程(可授...
    • 1,766 篇 机械工程
    • 1,713 篇 化学工程与技术
    • 1,482 篇 光学工程
    • 1,391 篇 动力工程及工程热...
    • 1,306 篇 仪器科学与技术
    • 1,303 篇 材料科学与工程(可...
    • 737 篇 土木工程
    • 729 篇 交通运输工程
  • 12,981 篇 理学
    • 5,524 篇 数学
    • 5,327 篇 物理学
    • 2,577 篇 生物学
    • 1,769 篇 化学
    • 1,769 篇 统计学(可授理学、...
    • 1,260 篇 系统科学
  • 4,932 篇 管理学
    • 3,249 篇 管理科学与工程(可...
    • 1,819 篇 图书情报与档案管...
    • 1,587 篇 工商管理
  • 1,918 篇 医学
    • 1,589 篇 临床医学
    • 1,363 篇 基础医学(可授医学...
    • 827 篇 药学(可授医学、理...
    • 725 篇 公共卫生与预防医...
  • 842 篇 法学
    • 720 篇 社会学
  • 663 篇 经济学
  • 507 篇 农学
  • 399 篇 教育学
  • 93 篇 文学
  • 58 篇 艺术学
  • 57 篇 军事学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 803 篇 deep learning
  • 715 篇 accuracy
  • 568 篇 machine learning
  • 483 篇 computer science
  • 445 篇 internet of thin...
  • 431 篇 feature extracti...
  • 396 篇 artificial intel...
  • 387 篇 training
  • 385 篇 computational mo...
  • 377 篇 support vector m...
  • 319 篇 optimization
  • 287 篇 predictive model...
  • 229 篇 convolutional ne...
  • 219 篇 data models
  • 212 篇 real-time system...
  • 211 篇 covid-19
  • 206 篇 reliability
  • 188 篇 computer archite...
  • 185 篇 simulation
  • 182 篇 reinforcement le...

机构

  • 1,096 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 979 篇 physikalisches i...
  • 974 篇 oliver lodge lab...
  • 644 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 604 篇 infn sezione di ...
  • 600 篇 infn sezione di ...
  • 574 篇 university of ch...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 iccub universita...
  • 537 篇 department of ph...
  • 535 篇 school of physic...
  • 519 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 508 篇 school of physic...

作者

  • 266 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 242 篇 g. bella
  • 241 篇 j. strandberg
  • 239 篇 c. amelung
  • 237 篇 d. calvet
  • 237 篇 bellee v.
  • 234 篇 g. spigo
  • 232 篇 bowcock t.j.v.
  • 231 篇 blake t.
  • 231 篇 s. chen
  • 230 篇 f. siegert
  • 228 篇 brundu d.
  • 220 篇 betancourt c.
  • 218 篇 borsato m.
  • 218 篇 amato s.
  • 216 篇 r. ströhmer

语言

  • 31,200 篇 英文
  • 1,979 篇 其他
  • 263 篇 中文
  • 180 篇 日文
  • 14 篇 德文
  • 12 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 朝鲜文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Design Faculty of Engineering and Technology"
33629 条 记 录,以下是4951-4960 订阅
排序:
Tamper-forgery Image Detection in Security Digital Image: A Review
Tamper-forgery Image Detection in Security Digital Image: A ...
收藏 引用
Blockchain and Distributed Systems Security (ICBDS), IEEE International Conference on
作者: Nilesh N. Thorat Prashant Dhotre Nilesh Kulal Aarti P Pimpalkar Vijaya S. Patil Sachin M. Kolekar Computer Science & Engineering Department MIT School of Computing MIT Art Design and Technology University Pune Information Technology Department MIT School of Computing MIT Art Design and Technology University Pune
Concerns with image security exist in every sector that uses digital photographs. Historically, public safety and forensics have depended on images from the crime scene, biometric photos, suspect photos, and other sou... 详细信息
来源: 评论
An Ensemble Framework for Dropout Prediction in Online Learning
An Ensemble Framework for Dropout Prediction in Online Learn...
收藏 引用
2022 IEEE International Conference on Knowledge engineering and Communication Systems, ICKES 2022
作者: Srinivasan, Sruthi Dewan, M. Ali Akber School of Computer Science and Engineering Vellore Institute of Technology Chennai India School of Computing and Information Systems Athabasca University Faculty of Sceinece and Technology AB Canada
Online learning has gained traction over recent years, especially since online education has become more widespread. However, it comes with its own set of challenges of which high dropout is still a major one. Identif... 详细信息
来源: 评论
An Explainable Machine Learning-Based Phishing Website Detection using Gradient Boosting
An Explainable Machine Learning-Based Phishing Website Detec...
收藏 引用
2024 International Conference on Information technology Research and Innovation, ICITRI 2024
作者: Prayogo, Rizal Dwi Alfisyahrin, Alvin Rizqi Gambetta, Windy Karimah, Siti Amatullah Nambo, Hidetaka Kanazawa University Division of Electrical Engineering and Computer Science Graduate School of Natural Science and Technology Kanazawa Japan Telkom University School of Computing Bandung Indonesia Kanazawa University Faculty of Transdisciplinary Sciences Institute of Philosophy in Interdisciplinary Sciences Kanazawa Japan Institut Teknologi Bandung School of Electrical Engineering and Informatics Bandung Indonesia
As the need for achieving optimal performance in prediction models, several recent and complex models have been developed. However, many of these models operate as black boxes, providing little insight into their pred... 详细信息
来源: 评论
Converter design For Self-Power Sensor Of Medical Equipments  8
Converter Design For Self-Power Sensor Of Medical Equipments
收藏 引用
8th International Conference on Electrical, Electronics and Information engineering, ICEEIE 2023
作者: Aripriharta Aprilia, Tiwi Ananda Purwatiningsih, Ayu Yazid, Muhammad Omar, Saodah Binti Hong, Gwo Jiun Department of Electrical Engineering Malang Indonesia Universitas Negeri Malang Department of Electrical Engineering Malang Indonesia Institut Teknologi Sepuluh Nopember Faculty of Intelligent Electrical and Information Technology Surabaya Indonesia Faculty of Engineering Pulau Pinang Malaysia Southren Taiwan University Department of Computer Science and Information Engineering Tainan City Taiwan
The system for collecting wasted energy and converted into electrical energy is called an energy harvesting system. This paper focuses on the application of a boost converter to harvest leg muscle energy using a perma... 详细信息
来源: 评论
Application of Adaptive Modulation Strategies for Enhancing Peak Bit Rates in High-Speed Fiber Optic Communication Networks  3
Application of Adaptive Modulation Strategies for Enhancing ...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Futane, Pravin R. Yadav, Rakesh Kumar Khurana, Saniya Shankar, Amar Kar, Abhijeet Ashok, V. Vishwakarma Institute of Information Technology Department of Information Technology Pune India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Food Technology Faculty of Engineering and Technology Karnataka Bangalore India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Prince Shri Venkateshwara Padmavathy Engineering College Department of Mechanical Engineering Chennai127 India
Optical communication networks suffer from excessive peak bit quotes today's the physical and environmental constraints present day fiber optic cables. Adaptive modulation techniques offer a potential approach to ... 详细信息
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
The Power of PDF-to-Audio Summaries in Modern Learning
The Power of PDF-to-Audio Summaries in Modern Learning
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), International Conference on
作者: Dhanshri Kawde Sameer Mendhe Department of Computer Science and Engineering Faculty of Engineering and Technology Datta Meghe Institute of Higher Education and Research Sawangi Wardha Maharashtra India
PDF -to-audio based summarization technology is designed to enhance information accessibility and efficiency by transforming long written reports into short, audible summaries. AI, NLP, and TTS technologies that have ... 详细信息
来源: 评论
A Large Scale Dataset for Fire Detection and Segmentation in Indoor Spaces
A Large Scale Dataset for Fire Detection and Segmentation in...
收藏 引用
2022 International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2022
作者: Maric, Petar Arlovic, Matej Balen, Josip Vdovjak, Kresimir Damjanovic, Davor Faculty of Electrical Engineering Computer Science and Information Technology Osijek J. J. Strossmayer University of Osijek Osijek Croatia
Fire represents a dangerous event, especially in inhabited areas where it can cause extensive economical damage, as well as take human lives, and therefore early fire detection is of utmost importance and requires car... 详细信息
来源: 评论
An optimized facial recognition model for identifying criminal activities using deep learning strategy
收藏 引用
International Journal of Information technology (Singapore) 2023年 第7期15卷 3907-3921页
作者: Gokulakrishnan, S. Chakrabarti, Prasun Hung, Bui Thanh Shankar, S. Siva Artificial Intelligence Laboratory Faculty of Information Technology Ton Duc Thang University Ho Chi Minh City Viet Nam Deputy Provost ITM SLS Baroda University Gujarat Vadodara India Department of Computer Science and Engineering KG Reddy College of Engineering and Technology (Autonomous) Telangana Hyderabad India
The most important research field in the current period is facial recognition and detection. Furthermore, facial expression recognition applications are essential in various research areas such as criminal investigati... 详细信息
来源: 评论
Speech Detection and Comparison using Different Feature Extraction Method for Correct Verification  3
Speech Detection and Comparison using Different Feature Extr...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Upadhyay, Shrikant Kumar, Binod Singh, Rajan Alam, Md. Irfan Kumari, Barkha Hinz, Binita Roshima Mlr Insitute of Technology Department of Electronics and Communication Engineeing Hyderabad India Jharkhand Rai University Facultyt of Cse & It Ranchi India Mlr Institute of Technology Department of Electronics and Communication Engineering Hyderabad India Jharkhand Rai University Faculty of Cse & It Ranchi India Pune India Rtc Institute of Technology Department of Computer Science and Engineering-Cyber Security Ranchi India
Mental status through physical appearance identification is not possible as it does not give complete status of any human. Using voice and considering quality extraction of talked it is quite easy to predict the menta... 详细信息
来源: 评论