咨询与建议

限定检索结果

文献类型

  • 113,837 篇 会议
  • 52,630 篇 期刊文献
  • 1,508 册 图书

馆藏范围

  • 167,975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,918 篇 工学
    • 65,838 篇 计算机科学与技术...
    • 53,181 篇 软件工程
    • 25,490 篇 信息与通信工程
    • 16,485 篇 控制科学与工程
    • 14,558 篇 电气工程
    • 13,860 篇 电子科学与技术(可...
    • 11,815 篇 生物工程
    • 9,404 篇 生物医学工程(可授...
    • 8,394 篇 光学工程
    • 6,951 篇 机械工程
    • 5,963 篇 化学工程与技术
    • 5,857 篇 动力工程及工程热...
    • 5,618 篇 仪器科学与技术
    • 4,986 篇 材料科学与工程(可...
    • 4,535 篇 网络空间安全
    • 4,167 篇 安全科学与工程
  • 56,808 篇 理学
    • 27,083 篇 数学
    • 19,484 篇 物理学
    • 13,405 篇 生物学
    • 8,823 篇 统计学(可授理学、...
    • 6,446 篇 化学
    • 6,325 篇 系统科学
  • 25,913 篇 管理学
    • 16,141 篇 管理科学与工程(可...
    • 10,802 篇 图书情报与档案管...
    • 7,579 篇 工商管理
  • 9,392 篇 医学
    • 7,812 篇 临床医学
    • 7,050 篇 基础医学(可授医学...
    • 4,364 篇 药学(可授医学、理...
    • 4,080 篇 公共卫生与预防医...
  • 4,903 篇 法学
    • 3,991 篇 社会学
  • 3,020 篇 经济学
  • 2,435 篇 农学
  • 1,600 篇 教育学
  • 867 篇 文学
  • 360 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,974 篇 accuracy
  • 4,270 篇 deep learning
  • 3,962 篇 feature extracti...
  • 3,618 篇 machine learning
  • 3,540 篇 computational mo...
  • 3,123 篇 training
  • 2,519 篇 support vector m...
  • 2,411 篇 convolutional ne...
  • 2,370 篇 internet of thin...
  • 2,308 篇 real-time system...
  • 2,305 篇 predictive model...
  • 2,145 篇 optimization
  • 1,973 篇 artificial intel...
  • 1,906 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,691 篇 neural networks
  • 1,613 篇 computer archite...
  • 1,588 篇 security
  • 1,547 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 926 篇 department of co...
  • 842 篇 department of el...
  • 741 篇 university of ch...
  • 679 篇 department of el...
  • 675 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 232 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 156,021 篇 英文
  • 10,140 篇 其他
  • 1,863 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering and Infotmation Technology"
167975 条 记 录,以下是4931-4940 订阅
排序:
Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS
收藏 引用
computer Systems science & engineering 2023年 第8期46卷 1707-1721页
作者: Alaknanda S.Patil G.Sundari Arun Kumar Sivaraman Department of Electronics and Communication Sathyabama Institute of Science and TechnologyChennaiTamil Nadu600119India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase t... 详细信息
来源: 评论
Capsule Network Approach for Image Classification  4th
Capsule Network Approach for Image Classification
收藏 引用
4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, ICMISC 2023
作者: Marjit Singh, Moirangthem Kumar Sarkar, Nayan Department of Computer Science and Engineering North Eastern Regional Institute of Science and Technology Arunachal Pradesh Itanagar India
Numerous deep learning (DL) models based on convolutional neural network (CNN) have been developed for image classification. Though the CNN models attained outstanding performance, its architecture contains certain li... 详细信息
来源: 评论
Brain Tumor Detection Using Xception Model
Brain Tumor Detection Using Xception Model
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and technology, ACROSET 2024
作者: Philip, Joshwa Joy Rani, Ruchi Kumar, Sumit School of Computer Engineering and Technology Dr Vishwanath Karad Mit World Peace University Department of Computer Science and Engineering Pune India School of Computer Engineering and Technology Dr Vishwanath Karad Mit World Peace University Department of Computer Engineering and Technology Pune India Department of Electronics and Telecommunication Maharashtra Pune India
Numerous morphological and histological characteristics of brain tumors make diagnosis and treatment very challenging. Traditional diagnosis methods often depend on the analysis of medical images, which can lead to un... 详细信息
来源: 评论
Delay-Constrained Multicast Throughput Maximization in MEC Networks for High-Speed Railways  19th
Delay-Constrained Multicast Throughput Maximization in MEC ...
收藏 引用
19th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2023
作者: Xu, Junyi Wei, Zhenchun Yuan, Xiaohui Lyu, Zengwei Feng, Lin Han, Jianghong School of Computer Science and Information Technology Hefei University of Technology Hefei China Department of Computer Science and Engineering University of North Texus DentonTX United States
Multi-access Edge Computing presents a compelling solution for delivering seamless connectivity to computing services. In this study, we aim to optimize multicast throughput to ensure high-quality experiences for pass... 详细信息
来源: 评论
Formation Control of Heterogeneous Multi-Agent Systems Under Fixed and Switching Hierarchies
收藏 引用
IEEE Access 2024年 12卷 97868-97882页
作者: Shamrooz Aslam, Muhammad Bilal, Hazrat Chang, Wen-Jer Yahya, Abid Anjum Badruddin, Irfan Kamangar, Sarfaraz Hussien, Mohamed China University of Mining and Technology Artificial Intelligence Research Institute Xuzhou221116 China University of Science and Technology of China Department of Automation Hefei230026 China Department of Marine Engineering Keelung202 Taiwan Botswana International University of Science and Technology Department of Electrical Computer and Telecommunications Engineering Palapye Botswana King Khalid University College of Engineering Department of Mechanical Engineering Abha Saudi Arabia King Khalid University Faculty of Science Department of Chemistry Abha61413 Saudi Arabia
Modern information technology is driving the rapid development of the information and automation industry through the combination of computer technology, communication technology, and control technology. Inspired by n... 详细信息
来源: 评论
Optimistic Multi-Agent Policy Gradient  41
Optimistic Multi-Agent Policy Gradient
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhao, Wenshuai Zhao, Yi Li, Zhiyuan Kannala, Juho Pajarinen, Joni Department of Electrical Engineering and Automation Aalto University Finland School of Computer Science and Engineering University of Electronic Science and Technology of China China Department of Computer Science Aalto University Finland University of Oulu Finland
Relative overgeneralization (RO) occurs in cooperative multi-agent learning tasks when agents converge towards a suboptimal joint policy due to overfitting to suboptimal behaviors of other *** methods have been propos... 详细信息
来源: 评论
AntiMicrobial Resistance Prediction Using Advanced Image Encoding Techniques  1
AntiMicrobial Resistance Prediction Using Advanced Image Enc...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Ghadekar, Premanand Jaggi, Arjun Swain, Debabrata Ghadekar, Aryan Vishwakarma Institute of Technology Department of Information Technology Pune India HCLTech CA United States Pandit Deendayal Energy University Department of Computer Science and Engineering Gandhinagar India Vishwakarma Institute of Technology Department of Computer Engineering Pune India
Antimicrobial resistance (AMR) is one of the significant problems in the health sector and requires resources to create and develop accurate forecasting systems capable of recognizing resistant microbes and their trea... 详细信息
来源: 评论
EmoCNN: Unleashing Human Emotions with Customized CNN Using Different Optimizers  2
EmoCNN: Unleashing Human Emotions with Customized CNN Using ...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Sahana, M. Umesh, Praneetha Kodipalli, Ashwini Rao, Trupthi Department of Computer Science & Engineering Global Academy of Technology Bangalore India Department of Artificial Intelligence & Data Science Global Academy of Technology Bangalore India
A key development towards enhancing computer-human interaction is emotion recognition. This publication describes a technique called EmoCNN, which uses deep learning techniques to precisely identify and classify human... 详细信息
来源: 评论
Enhanced ML Based Content-Based Image Retrieval for Mobile Devices
Enhanced ML Based Content-Based Image Retrieval for Mobile D...
收藏 引用
2024 International Conference on Artificial Intelligence and Emerging technology, Global AI Summit 2024
作者: Meenakshi, K.M. Singh, Kirti Dilip Batta, Priya Chauhan, Rakhi Bhargava, Deepshikha Lohani, Bhanu Prakash Amity School of Engineering & Technology Amity University Greater Noida India Chandigarh University Department of Computer Science & Engineering Mohali India Geeta University Department of Computer Science & Engineering Haryana Panipat India
Image retrieval systems based on content can be developed for mobile applications that provide users with a seamless and efficient way to search for images based on their content. The development of CBIR systems for m... 详细信息
来源: 评论
Ransomware Detection Utilizing Ensemble Based Interpretable Deep Learning Model  2
Ransomware Detection Utilizing Ensemble Based Interpretable ...
收藏 引用
2nd International Conference on Power, Electrical, Electronics and Industrial Applications, PEEIACON 2024
作者: Chisty, Tanjir Alam Rahman Rahman, Md. Mahbubur University of Professionals Department of Information and Communication Technology Bangladesh Dhaka Bangladesh Military Institute of Science and Technology Department of Computer Science and Engineering Dhaka Bangladesh
Ransomware, a form of malicious software, encrypts victim data and renders it inaccessible until a ransom is paid. Different ransomware variants employ various tactics to avoid detection during their attacks. Understa... 详细信息
来源: 评论