咨询与建议

限定检索结果

文献类型

  • 4,232 篇 会议
  • 1,910 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 6,182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,846 篇 工学
    • 2,790 篇 计算机科学与技术...
    • 2,291 篇 软件工程
    • 979 篇 信息与通信工程
    • 632 篇 控制科学与工程
    • 454 篇 生物工程
    • 390 篇 电气工程
    • 337 篇 电子科学与技术(可...
    • 319 篇 生物医学工程(可授...
    • 286 篇 机械工程
    • 280 篇 光学工程
    • 229 篇 网络空间安全
    • 190 篇 化学工程与技术
    • 178 篇 动力工程及工程热...
    • 177 篇 仪器科学与技术
    • 168 篇 安全科学与工程
    • 150 篇 交通运输工程
  • 2,080 篇 理学
    • 1,013 篇 数学
    • 648 篇 物理学
    • 494 篇 生物学
    • 344 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 193 篇 化学
  • 1,126 篇 管理学
    • 670 篇 管理科学与工程(可...
    • 507 篇 图书情报与档案管...
    • 255 篇 工商管理
  • 296 篇 医学
    • 234 篇 临床医学
    • 222 篇 基础医学(可授医学...
    • 145 篇 公共卫生与预防医...
    • 125 篇 药学(可授医学、理...
  • 204 篇 法学
    • 167 篇 社会学
  • 108 篇 农学
  • 105 篇 经济学
  • 71 篇 教育学
  • 36 篇 文学
  • 28 篇 军事学
  • 13 篇 艺术学

主题

  • 209 篇 accuracy
  • 177 篇 deep learning
  • 154 篇 computational mo...
  • 153 篇 feature extracti...
  • 140 篇 machine learning
  • 119 篇 training
  • 100 篇 hadron colliders
  • 99 篇 convolutional ne...
  • 97 篇 data models
  • 94 篇 predictive model...
  • 94 篇 real-time system...
  • 94 篇 semantics
  • 91 篇 support vector m...
  • 86 篇 data mining
  • 85 篇 computer applica...
  • 85 篇 optimization
  • 79 篇 internet of thin...
  • 77 篇 artificial intel...
  • 69 篇 security
  • 68 篇 wireless sensor ...

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 infn sezione di ...
  • 123 篇 charles universi...
  • 123 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 121 篇 department of ph...
  • 120 篇 university of de...
  • 118 篇 rwth aachen univ...
  • 117 篇 imperial college...
  • 116 篇 department of ph...
  • 108 篇 università di ca...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,015 篇 英文
  • 1,083 篇 其他
  • 104 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Computer Technology and Application"
6182 条 记 录,以下是401-410 订阅
排序:
Vision Transformer in Oral Cancer Detection
Vision Transformer in Oral Cancer Detection
收藏 引用
2023 International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2023
作者: Agarwal, Pinky Gupta, Naman Bharadwaj, Yashita Yadav, Anju Mathur, Pratistha Manipal University Jaipur Computer Application Jaipur India Jaipur India Manipal University Jaipur Information Technology Jaipur India
Oral cancer is a malignancy that can manifest in multiple areas of the mouth, including the tongue, lips, oral mucosa, gums, floor of the mouth, and other soft tissues. Despite the development of advanced diagnostic a... 详细信息
来源: 评论
Music Emotion Prediction based on Hybrid Approach Combining Lyrical and Acoustic Approaches  6
Music Emotion Prediction based on Hybrid Approach Combining ...
收藏 引用
6th International Conference on Intelligent Computing and Control Systems, ICICCS 2022
作者: Bisht, Shristi Kanakia, Harshil T. Thakur, Pallavi Sardar Patel Institute of Technology Master of Computer Application Department Mumbai India
With the advancements in multimedia technology in recent years, research on music is getting more significant and popular. It is necessary to study the relationship between music lyrics and the emotion of a user. Musi... 详细信息
来源: 评论
Research on Visible Light Equipment Image Data Enhancement technology Based on Generative Model
Research on Visible Light Equipment Image Data Enhancement T...
收藏 引用
International Conference on Big Data and Information Analytics (BigDIA)
作者: Youchen Wang Zhen Luan Zongkai Tian Huayi Zou Qi Liu Yuting Yang Beijing Institute of Computer Technology and Application Beijing China
Visible light remote sensing imaging technology is an important tool for detecting and analyzing equipment. Massive image data is crucial for training and verifying automatic equipment recognition models. Although the... 详细信息
来源: 评论
A Brute-Force Attack Detection Method Based on the Combination of Artificial Neural Network and Auto Encoder
A Brute-Force Attack Detection Method Based on the Combinati...
收藏 引用
Cloud Computing, Big Data applications and Software Engineering (CBASE), International Conference on
作者: Xiaojun Ma Qingyuan Li Xiaofei Wang Quan Wen Yingming Zeng Beijing Institute of Computer Technology and Application Beijing China
The ongoing advancement of information technology has led to the emergence of a multitude of network attack methodologies and techniques. As a prevalent form of network attack, it is imperative to undertake targeted r... 详细信息
来源: 评论
Distributed Aperture Coherent Synthesis Method based on Two-stage Compensation  2
Distributed Aperture Coherent Synthesis Method based on Two-...
收藏 引用
2nd IEEE International Conference on Signal, Information and Data Processing, ICSIDP 2024
作者: Liu, Zhongwei Zhou, Dongming Xiang, Rongrong Chen, Jie Wu, Tianhang Ding, Tianyu Liu, Xiaochuan Gao, Hongwei Beihang University School of Electronic and Information Engineering Beijing China School of Information and Electronics Beijing Institute of Technology Radar Research Lab Beijing China Beijing Institute of Computer Technology and Application Department of Data Technology and Application Beijing China Beijing Institute of Radio Measurement Radar R&d Center Beijing China
To solve the problem that it is difficult to accurately estimate the coherent parameters of distributed aperture radar under the condition of low signal-to-noise ratio, a distributed coherent synthesis method based on... 详细信息
来源: 评论
Radioactive Waste Repackaging Methods Based on Genetic Algorithms and Simulation for Reactor Decommissioning  5
Radioactive Waste Repackaging Methods Based on Genetic Algor...
收藏 引用
5th International Conference on computer, Big Data and Artificial Intelligence, ICCBD+AI 2024
作者: Wu, Tong Wang, Deying Chen, Fengjuan Zhang, Nan Yang, Fan Wang, Jiaqi Xu, Meng Computer Application Institute of Nuclear Industry Beijing China Beijing University of Technology Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing China
After going through the lifecycle of design, construction, and operation, nu-clear reactors need go to decommissioning phase according to requirement of nuclear regulator or need of environmental protection. Decommiss... 详细信息
来源: 评论
A DoS Attack Detection System Based on CNN and BiLSTM for Internet of Vehicles
A DoS Attack Detection System Based on CNN and BiLSTM for In...
收藏 引用
Information Systems and Computing technology (ISCTech), International Conference on
作者: Bin Wang Ying Shang Fangming Wang Yingming Zeng Beijing Institute of Computer Technology and Application Beijing China
As the Internet of Vehicles (IoV) becomes established and continues to develop, its reliability and security assurance is becoming increasingly important. Denial of Service (DoS) attacks, characterized by ease of impl... 详细信息
来源: 评论
Multi-stage Dental Visual Detection Based on YOLOv8: Dental 3D CBCT  2nd
Multi-stage Dental Visual Detection Based on YOLOv8: Dental...
收藏 引用
2nd International ToothFairy2: Multi-Structure Segmentation in CBCT Volumes, ToothFairy 2024, 3D Teeth Landmarks Detection Challenge, 3DTeethLand 2024, Semi-supervised Teeth Segmentation, STS 2024 held in conjunction with the 27th International Conference on Medical Image Computing and computer-Assisted Intervention, MICCAI 2024
作者: Zheng, Zhihao Ma, Dongdong He, Lian Cheng, Miao Liu, Jianhao Chengdu Institute of Computer Application Chinese Academy of Science Sichuan Chengdu610041 China School of Computer Science and Technology University of Chinese Academy of Science Beijing100049 China Shenzhen CBPM-KEXIN Banking Technology Company Limited Guangdong Shenzhen518206 China
With the popularity of panoramic X-ray imaging (PXI) and cone beam computed tomography (CBCT) in dental treatment planning and comprehensive prognostic assessment, the demand for effective tooth segmentation is growin... 详细信息
来源: 评论
Intelligent Malware Detection Using Sentence Transformer and Hybrid Deep Learning Architecture  10
Intelligent Malware Detection Using Sentence Transformer and...
收藏 引用
10th International Conference on Signal Processing and Communication, ICSC 2025
作者: Kumar, Sanjeev Sapru, Yudhishthira Sapru, Sugandha Janet, B. Centre for Development of Advanced Computing Cyber Security Technology Division Mohali India Indian Computer Emergency Response Team CERT-In Delhi India Pggc Panjab University Department of Mathematics Chandigarh India National Institute of Technology Department of Computer Application Tiruchirappalli India
The complex evasion techniques adopted by the malware creator make signature-based malware detection approaches unable to detect unknown malware attacks. This study proposes a new malware detection and classification ... 详细信息
来源: 评论
PD-YOLO:Colon Polyp Detection Model Based on Enhanced Small-Target Feature Extraction
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 913-928页
作者: Yicong Yu Kaixin Lin Jiajun Hong Rong-Guei Tsai Yuanzhi Huang New Engineering Industry College Putian UniversityPutian351100China Engineering Research Center of Big Data Application in Private Health Medicine(Putian University) Fujian Province UniversityPutian351100China Computer College Guangdong University of Science&TechnologyDongguan523668China
In recent years,the number of patientswith colon disease has increased *** polyps are the precursor lesions of colon *** not diagnosed in time,they can easily develop into colon cancer,posing a serious threat to patie... 详细信息
来源: 评论