咨询与建议

限定检索结果

文献类型

  • 4,186 篇 会议
  • 1,922 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 6,148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,821 篇 工学
    • 2,774 篇 计算机科学与技术...
    • 2,266 篇 软件工程
    • 961 篇 信息与通信工程
    • 618 篇 控制科学与工程
    • 451 篇 生物工程
    • 380 篇 电气工程
    • 329 篇 电子科学与技术(可...
    • 319 篇 生物医学工程(可授...
    • 286 篇 机械工程
    • 282 篇 光学工程
    • 224 篇 网络空间安全
    • 191 篇 化学工程与技术
    • 179 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 165 篇 安全科学与工程
    • 148 篇 交通运输工程
  • 2,070 篇 理学
    • 1,006 篇 数学
    • 647 篇 物理学
    • 492 篇 生物学
    • 339 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 192 篇 化学
  • 1,118 篇 管理学
    • 661 篇 管理科学与工程(可...
    • 502 篇 图书情报与档案管...
    • 254 篇 工商管理
  • 292 篇 医学
    • 230 篇 临床医学
    • 223 篇 基础医学(可授医学...
    • 140 篇 公共卫生与预防医...
    • 125 篇 药学(可授医学、理...
  • 202 篇 法学
    • 165 篇 社会学
  • 106 篇 农学
  • 103 篇 经济学
  • 69 篇 教育学
  • 36 篇 文学
  • 28 篇 军事学
  • 13 篇 艺术学

主题

  • 207 篇 accuracy
  • 180 篇 deep learning
  • 155 篇 computational mo...
  • 149 篇 feature extracti...
  • 137 篇 machine learning
  • 121 篇 training
  • 100 篇 hadron colliders
  • 99 篇 convolutional ne...
  • 96 篇 data models
  • 95 篇 predictive model...
  • 94 篇 semantics
  • 92 篇 real-time system...
  • 90 篇 support vector m...
  • 86 篇 data mining
  • 85 篇 computer applica...
  • 81 篇 optimization
  • 78 篇 internet of thin...
  • 77 篇 artificial intel...
  • 69 篇 security
  • 68 篇 wireless sensor ...

机构

  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 charles universi...
  • 124 篇 zhejiang univers...
  • 123 篇 department of ph...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...
  • 118 篇 imperial college...
  • 115 篇 department of ph...
  • 109 篇 università di ca...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,690 篇 英文
  • 364 篇 其他
  • 98 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Computer Technology and Application"
6148 条 记 录,以下是81-90 订阅
排序:
Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecture  5th
Anonymous and Practical Multi-factor Authentication for Mo...
收藏 引用
5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022
作者: Cao, Haiyan Xie, Yong Department of Computer Technology and Application Qinghai University Xining China
At present, password authentication technology using single-server architecture has been widely used in practice. However, it cannot resist internal privilege attack, dictionary guessing attack, and other attacks. To ... 详细信息
来源: 评论
Zero-Shot Object Detection Using YOLO
Zero-Shot Object Detection Using YOLO
收藏 引用
2024 IEEE International Conference on Information technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Anushiya, R. France, K. Hindustan Institute of Technology and Science Department of Computer Application Chennai India Hindustan Institute of Technology and Science Department of Computer Applications Chennai India
Zero-shot object detection is an emerging approach that aims to detect unseen object categories by leveraging the knowledge from known categories. In this study, we propose a novel zero-shot object detection framework... 详细信息
来源: 评论
Air Quality Prediction Using Supervised Machine Learning Techniques  6th
Air Quality Prediction Using Supervised Machine Learning Tec...
收藏 引用
6th International Conference on Information and Communication technology for Intelligent Systems, ICTIS 2021
作者: Shrivastava, Atul Lal Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application MMMUT Gorakhpur India
To maintain good air quality, the observation of pollution levels framework estimates a variety of air contaminants in various locations. In the current circumstances, it is the most desirable concern. The release of ... 详细信息
来源: 评论
Detecting Deceptive News in Social Media Using Supervised Machine Learning Techniques  6th
Detecting Deceptive News in Social Media Using Supervised Ma...
收藏 引用
6th International Conference on Information and Communication technology for Intelligent Systems, ICTIS 2021
作者: Malviya, Anshita Dwivedi, Rajendra Kumar Department of Information Technology & Computer Application MMMUT Gorakhpur India
Our society has witnessed numerous incidents concerning fake *** media has always played a significant role in its *** with notorious mindsets often are the generators and spreaders of such *** mischievous people spre... 详细信息
来源: 评论
Segment Anything Model (SAM) to Segment lymphocyte from Blood Smear Images  3
Segment Anything Model (SAM) to Segment lymphocyte from Bloo...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Patil, Ashwini P. Hiremath, Manjunatha Department of Computer Science India Cmr Institute of Technology Department of Computer Application Bengaluru India Department of Computer Science Bengaluru India
Automated lymphocyte segmentation from smear images plays an important role in disease diagnosis and monitoring, aiding in the assessment of immune system function and pathology detection. This study proposes an appro... 详细信息
来源: 评论
Simulation and Evaluation of Mental Sand Table based on Virtual Reality  3
Simulation and Evaluation of Mental Sand Table based on Virt...
收藏 引用
3rd International Conference on Consumer Electronics and computer Engineering, ICCECE 2023
作者: Xie, Sijia Liu, Zhiqiang Tang, Chuanqian Chen, Yanruyu Qinghai University Computer Technology and Application Department Xining China
In view of the low popularity rate of traditional mental sand table, insufficient site resources can not meet the problems of multiple people at the same time, based on virtual reality technology to achieve the real s... 详细信息
来源: 评论
"Nyctophy": Assessing the effectiveness of serious game for nyctophobia based on virtual reality by usability and heart rate monitoring  9th
"Nyctophy": Assessing the effectiveness of serious game for ...
收藏 引用
9th International Conference on computer Science and Computational Intelligence, ICCSCI 2024
作者: Ardiyanto, Elshad Ryan Alexander, Patrick Putra, Edyth Novian Ramdhan, Dimas Game Application & Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
Nyctophobia is a phobia of the dark and is common among children but also found in adults. While the phobia itself is commonly known, the diversity of its treatment is still minimal. As technology has reached its high... 详细信息
来源: 评论
Machine Learning-Driven Economic Modeling for Enhanced Unemployment Rate Prediction and Analysis  16
Machine Learning-Driven Economic Modeling for Enhanced Unemp...
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Arora, Rakhi Dixit, Nitin Sihare, Muskan Kinger, Shreshtha Shivhare, Sneha Kulshreshtha, Komal Institute of Technology & Management Computer Science and Engineering Gwalior India Masters of Computer Application Vikrant University Gwalior India
This study presents a comprehensive analysis of economic modeling using Python, specifically focusing on the prediction of unemployment rates. In response to the growing significance of data-driven decision-making in ... 详细信息
来源: 评论
Multi-class Classification Approach for Smart Intrusion Attack Detection Using AI and ML Classifiers  8th
Multi-class Classification Approach for Smart Intrusion Atta...
收藏 引用
8th International Conference on Information and Communication technology for Intelligent Systems, ICTIS 2024
作者: Rathod, Dushyantsinh B. Patel, Yesha Jethava, Archana Gohel, Namrata Suthar, Dhruvi Prajapati, Ramesh Rathod, Ghanshyam Computer Engineering Department Ahmedabad Institute of Technology Gujarat Ahmedabad India Department of CSE Faculty of Engineering and Technology GLS University Gujarat Ahmedabad India Computer Engineering Department Shree Swaminarayan Institute of Technology Gujarat Gandhinagar India Department of Computer Application Parul Institute of Computer Application Baroda India
Due to increased network traffic and security concerns, intrusion detection system (IDS) research has received a lot of attention in computer science. Advanced intrusion detection systems have arbitrary incursion cate... 详细信息
来源: 评论
Using Machine Learning to Identify Autism Spectrum Disorder Across All Ages  2
Using Machine Learning to Identify Autism Spectrum Disorder ...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Kumar, Anil Jaiswal, Umesh Chandra Madan Mohan Malaviya University of Technology Information Technology & Computer Application U.P Gorakhpur India
Autism spectrum disorder (ASD) is a neurodevelopmental condition affecting children's societal and cognitive skills, leading to recurring behaviors, limited interests, communiqué challenges, and difficulties ... 详细信息
来源: 评论