咨询与建议

限定检索结果

文献类型

  • 9,075 篇 会议
  • 6,742 篇 期刊文献
  • 155 册 图书

馆藏范围

  • 15,972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,903 篇 工学
    • 5,250 篇 计算机科学与技术...
    • 4,063 篇 软件工程
    • 1,704 篇 信息与通信工程
    • 1,405 篇 电子科学与技术(可...
    • 1,268 篇 电气工程
    • 1,155 篇 控制科学与工程
    • 1,038 篇 光学工程
    • 850 篇 生物工程
    • 807 篇 生物医学工程(可授...
    • 663 篇 化学工程与技术
    • 657 篇 材料科学与工程(可...
    • 501 篇 仪器科学与技术
    • 490 篇 机械工程
    • 471 篇 动力工程及工程热...
    • 254 篇 网络空间安全
  • 6,351 篇 理学
    • 3,030 篇 物理学
    • 2,578 篇 数学
    • 1,082 篇 生物学
    • 854 篇 化学
    • 852 篇 统计学(可授理学、...
    • 456 篇 系统科学
    • 291 篇 地球物理学
  • 1,977 篇 管理学
    • 1,207 篇 管理科学与工程(可...
    • 833 篇 图书情报与档案管...
    • 623 篇 工商管理
  • 865 篇 医学
    • 705 篇 临床医学
    • 603 篇 基础医学(可授医学...
    • 373 篇 药学(可授医学、理...
    • 330 篇 公共卫生与预防医...
  • 394 篇 法学
    • 348 篇 社会学
  • 252 篇 经济学
  • 226 篇 农学
  • 146 篇 教育学
  • 52 篇 文学
  • 31 篇 军事学
  • 26 篇 艺术学
  • 10 篇 哲学
  • 5 篇 历史学

主题

  • 646 篇 computer science
  • 273 篇 deep learning
  • 266 篇 computational mo...
  • 222 篇 accuracy
  • 220 篇 feature extracti...
  • 214 篇 educational inst...
  • 200 篇 machine learning
  • 185 篇 internet of thin...
  • 177 篇 support vector m...
  • 167 篇 application soft...
  • 162 篇 computer archite...
  • 156 篇 data mining
  • 141 篇 neural networks
  • 141 篇 optimization
  • 137 篇 predictive model...
  • 132 篇 artificial intel...
  • 130 篇 bandwidth
  • 117 篇 routing
  • 117 篇 real-time system...
  • 115 篇 throughput

机构

  • 348 篇 department of ph...
  • 245 篇 department of ph...
  • 244 篇 faculty of scien...
  • 240 篇 department for p...
  • 233 篇 west university ...
  • 232 篇 department of mo...
  • 230 篇 department of ph...
  • 229 篇 infn e laborator...
  • 220 篇 department of ph...
  • 218 篇 department of el...
  • 202 篇 cavendish labora...
  • 197 篇 research center ...
  • 193 篇 kirchhoff-instit...
  • 174 篇 oliver lodge lab...
  • 162 篇 physikalisches i...
  • 161 篇 fakultät für phy...
  • 154 篇 department physi...
  • 152 篇 infn sezione di ...
  • 150 篇 graduate school ...
  • 138 篇 institute of phy...

作者

  • 169 篇 c. alexa
  • 169 篇 g. bella
  • 169 篇 d. calvet
  • 169 篇 c. amelung
  • 168 篇 y. tayalati
  • 168 篇 v. chiarella
  • 168 篇 f. siegert
  • 167 篇 j. strandberg
  • 167 篇 n. orlando
  • 167 篇 g. spigo
  • 166 篇 j. m. izen
  • 164 篇 a. dimitrievska
  • 162 篇 f. deliot
  • 159 篇 r. ströhmer
  • 156 篇 m. rijssenbeek
  • 154 篇 y. tu
  • 153 篇 s. jin
  • 152 篇 g. gaudio
  • 149 篇 y. abulaiti
  • 147 篇 s. mohapatra

语言

  • 13,414 篇 英文
  • 2,439 篇 其他
  • 137 篇 中文
  • 11 篇 日文
  • 6 篇 法文
  • 5 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Institute for Advanced Computer Studies"
15972 条 记 录,以下是521-530 订阅
排序:
An Agent-Based Basic Educational Model for the Children with ASD Using Persuasive Technology
An Agent-Based Basic Educational Model for the Children with...
收藏 引用
2022 International Conference for Advancement in Technology, ICONAT 2022
作者: Hasan, Nazmul Nene, Manisha J. Defence Institute of Advanced Technology Computer Science and Engineering Department Pune India
Children with Autism Spectrum Disorder (ASD) suffer most in communication and behavioral aspect which hampers their regular basic education and cognitive development. Technological development enhanced a lot in every ... 详细信息
来源: 评论
DropAttack: A Random Dropped Weight Attack Adversarial Training for Natural Language Understanding
收藏 引用
IEEE/ACM Transactions on Audio Speech and Language Processing 2024年 32卷 364-373页
作者: Ni, Shiwen Li, Jiawen Yang, Min Kao, Hung-Yu Chinese Academy of Sciences Shenzhen Institute of Advanced Technology Shenzhen518000 China Guangdong Ocean University Maritime College Zhanjiang524000 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701401 Taiwan
Adversarial training has been proven to be a powerful regularization technique to improve language models. In this work, we propose a novel random dropped weight attack adversarial training method (DropAttack) for nat... 详细信息
来源: 评论
Forensic Analysis of Windows 11 Prefetch Artifact  4
Forensic Analysis of Windows 11 Prefetch Artifact
收藏 引用
4th IEEE Bombay Section Signature Conference, IBSSC 2022
作者: Budhrani, Akash Singh, Upasna Singh, Bhupendra Defense Institute of Advanced Technology Computer Science and Engineering Department Pune India
The Operating System creates numerous objects to improve its efficiency and user experience and such objects are called artifacts. These artifacts record crucial data about the user activity. Such artifacts are the st... 详细信息
来源: 评论
Enhancing Lung Cancer Detection Accuracy through the Integration of Ant Colony Optimization and Neural Network
Enhancing Lung Cancer Detection Accuracy through the Integra...
收藏 引用
2024 International Conference on Emerging Innovations and advanced Computing, INNOCOMP 2024
作者: Bhati, Sunita Singh, Jagendra Shelke, Nitin Arvind Nagda, Vinita Sahu, Hemant Bhatt, Monica JECRC University Jaipur India School of Computer Science Engineering & Technology Bennett University Greater Noida India Mohan Lal Sukhadia University Department of Computer Science Udaipur India Department of CS & IT Udaipur India Geetanjali Institute of Technical Studies Udaipur India
The combination of machine learning algorithms and optimization techniques shows great potential in lung cancer detection. The current study explores the use of Convolutional Neural Networks (CNN) and VGG16 models wit... 详细信息
来源: 评论
Rectifying Irregular Boundaries Stereoscopic Images Using Deep Learning and Evolutionary Algorithms  22
Rectifying Irregular Boundaries Stereoscopic Images Using De...
收藏 引用
22nd IEEE International Multi-Conference on Systems, Signals and Devices, SSD 2025
作者: Wahsh, Muntasser A. Hussain, Zainab M. Informatics Institute for Postgraduate Studies (IIPS) Department of Computer Science Baghdad Iraq Al-Iraqia University Department of Political Science Baghdad Iraq
Application of stereoscopic technology has increased significantly in several industries, including the media and entertainment sectors, medical imaging, and virtual reality. However, the overall viewing experience an... 详细信息
来源: 评论
Real-Time Eyes Monitoring System Using OpenCV Autonomous filtering using RNN  3
Real-Time Eyes Monitoring System Using OpenCV Autonomous fil...
收藏 引用
3rd International Conference for Advancement in Technology, ICONAT 2024
作者: Prajapati, Dhruvansh Joshi, Jaynil Das, Nibedita Satapathy, Santosh Pandit Deendayal Energy University Information & Communication Technology Gujarat Gandhinagar India Institute of Advanced Research Department of Computer Science and Engineering Gujarat Gandhinagar India
This paper introduces a novel Real-Time Eye Gazing and Monitoring System aimed at objectively and continuously assessing individuals across various environmental conditions. Addressing the challenge of accurate perfor... 详细信息
来源: 评论
Photovoltaic Module Parameter Estimation by Using Wild Horse Optimizer  3
Photovoltaic Module Parameter Estimation by Using Wild Horse...
收藏 引用
3rd International Conference on Machine Learning and Data Engineering, ICMLDE 2024
作者: Kumar, Anuj Sharma, Tina Singh, Manoj K. Pant, Sangeeta Sharma, Hitesh Kumar Pune411044 India Department of Mathematics Birla Institute of Technology and Science Pilani India School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Pune412115 India School of Computer Science University of Petroleum & Energy Studies Dehradun248007 India
The development of highly accurate models is essential for optimizing the performance and efficiency of photovoltaic (PV) modules, which are integral to renewable energy systems. In this context, metaheuristic algorit... 详细信息
来源: 评论
Abstractive Text Summarization Using Attention-based Stacked LSTM  5
Abstractive Text Summarization Using Attention-based Stacked...
收藏 引用
5th International Conference on Computational Intelligence and Communication Technologies, CCICT 2022
作者: Singh, Mimansha Yadav, Vrinda Centre for Advanced Studies Department of Computer Science and Engineering Uttar Pradesh Lucknow226031 India
Every day, the amount of textual data created increases exponentially, both in terms of complexity and volume. Massive amounts of information are generated by social media, news articles, emails, text messages and oth... 详细信息
来源: 评论
Drone/UAVs Surveillance feeds Video Object Recognition Using Transfer Learning  1
Drone/UAVs Surveillance feeds Video Object Recognition Using...
收藏 引用
1st International Conference on Futuristic Technologies, INCOFT 2022
作者: Kumar, Sushil Kumar, C.R.S. Defense Institute of Advanced Technology Computer Science and Engineering Department Pune India
The objective of this research is to demonstrate the use of a convolutional neural network (CNN) for object detection (OD) on drone videos (CNN). The goal of the study is to determine how well the YOLO V3 (Y-V3) and f... 详细信息
来源: 评论
Forensic Techniques to Detect Hidden Data in Alternate Data Streams in NTFS  4
Forensic Techniques to Detect Hidden Data in Alternate Data ...
收藏 引用
4th IEEE Bombay Section Signature Conference, IBSSC 2022
作者: Hermon, Rahul Singh, Upasna Singh, Bhupendra Defense Institute of Advanced Technology Computer Science and Engineering Department Pune India
Alternate Data Streams (ADS) have been a feature of the New Technology File System (NTFS) since its introduction in 1993. Alternate Data Streams (ADS) were introduced to address compatibility within the existing Opera... 详细信息
来源: 评论