咨询与建议

限定检索结果

文献类型

  • 1,718 篇 会议
  • 1,250 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 2,986 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,519 篇 工学
    • 1,071 篇 计算机科学与技术...
    • 857 篇 软件工程
    • 330 篇 信息与通信工程
    • 271 篇 控制科学与工程
    • 164 篇 电气工程
    • 156 篇 生物工程
    • 129 篇 生物医学工程(可授...
    • 124 篇 网络空间安全
    • 118 篇 电子科学与技术(可...
    • 104 篇 核科学与技术
    • 98 篇 仪器科学与技术
    • 97 篇 机械工程
    • 97 篇 安全科学与工程
    • 89 篇 光学工程
    • 82 篇 动力工程及工程热...
    • 75 篇 交通运输工程
  • 1,144 篇 理学
    • 577 篇 物理学
    • 395 篇 数学
    • 191 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 82 篇 化学
  • 496 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 190 篇 工商管理
    • 165 篇 图书情报与档案管...
  • 204 篇 医学
    • 149 篇 临床医学
    • 122 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
  • 116 篇 法学
    • 99 篇 社会学
  • 88 篇 教育学
    • 80 篇 教育学
  • 72 篇 经济学
    • 72 篇 应用经济学
  • 62 篇 农学
  • 21 篇 文学
  • 6 篇 军事学
  • 1 篇 哲学

主题

  • 107 篇 accuracy
  • 103 篇 deep learning
  • 99 篇 machine learning
  • 65 篇 training
  • 62 篇 internet of thin...
  • 60 篇 real-time system...
  • 55 篇 feature extracti...
  • 53 篇 computational mo...
  • 52 篇 hadron colliders
  • 50 篇 higgs bosons
  • 47 篇 predictive model...
  • 43 篇 optimization
  • 43 篇 artificial intel...
  • 42 篇 cloud computing
  • 42 篇 machine learning...
  • 39 篇 data models
  • 38 篇 computer science
  • 38 篇 security
  • 38 篇 students
  • 38 篇 technological in...

机构

  • 368 篇 department for p...
  • 346 篇 institute of phy...
  • 329 篇 institute of phy...
  • 305 篇 faculty of scien...
  • 294 篇 department of ph...
  • 290 篇 department of ph...
  • 283 篇 kirchhoff-instit...
  • 282 篇 department of ph...
  • 273 篇 department of ph...
  • 272 篇 department of ph...
  • 263 篇 graduate school ...
  • 261 篇 department of ph...
  • 257 篇 department of ph...
  • 254 篇 instituto de fís...
  • 254 篇 marian smoluchow...
  • 246 篇 fakultät für phy...
  • 243 篇 west university ...
  • 240 篇 departamento de ...
  • 236 篇 universidade fed...
  • 231 篇 dipartimento di ...

作者

  • 240 篇 c. alexa
  • 240 篇 c. amelung
  • 238 篇 g. bella
  • 238 篇 d. calvet
  • 236 篇 j. strandberg
  • 235 篇 j. m. izen
  • 235 篇 y. tayalati
  • 235 篇 v. chiarella
  • 235 篇 f. siegert
  • 234 篇 n. orlando
  • 234 篇 g. spigo
  • 228 篇 y. abulaiti
  • 227 篇 r. ströhmer
  • 227 篇 m. rijssenbeek
  • 227 篇 s. jin
  • 227 篇 g. gaudio
  • 226 篇 m. klein
  • 225 篇 f. deliot
  • 225 篇 s. mohapatra
  • 225 篇 i. van vulpen

语言

  • 2,378 篇 英文
  • 593 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Technologies in Management and Education and Computer Science"
2986 条 记 录,以下是921-930 订阅
排序:
3D-CNN Architecture to Improve the Classification Accuracy of the Real-Time Images from IOT Devices
3D-CNN Architecture to Improve the Classification Accuracy o...
收藏 引用
Disruptive technologies (ICDT), International Conference on
作者: Kiran Kumar C B. Aruna Devi Lakshmana Phaneendra Maguluri Mahaveer Singh Naruka Data Science Codecraft Technologies Bangalore Karnataka India Department of Electronics and Communication Engineering Dr.NGP Institute of Technology Coimbatore Tamil Nadu India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Guntur AP India GL Bajaj Institute of Technology and Management Greater Noida India
The classification of real time images from the fast data capturing devices in Internet of Things (IoT) environment is a critical task. It requires suitable processing and development of a model for increased accuracy...
来源: 评论
DEEP LEARNING APPLICATION for IMAGE ENHANCEMENT  9
DEEP LEARNING APPLICATION for IMAGE ENHANCEMENT
收藏 引用
9th International Conference "Distributed Computing and Grid technologies in science and education", GRID 2021
作者: Elaraby, Ahmed Elansary, Ismail Nechaevskiy, Andrey Department of Computer Science Faculty of Computers and Information South Valley University Qena83523 Egypt Modern Academy for Computer Science and Management Technology Cairo Egypt Meshcheryakov Laboratory of Information Technologies Joint Institute for Nuclear Research Joliot-Curie 6 Dubna 141980 Russia
Recently, deep learning has obtained a central position toward our daily life automation and delivered considerable improvements as compared to traditional algorithms of machine learning. Enhancing of image quality is... 详细信息
来源: 评论
Monitoring AI-Modified Content at Scale: A Case Study on the Impact of ChatGPT on AI Conference Peer Reviews
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Weixin Izzo, Zachary Zhang, Yaohui Lepp, Haley Cao, Hancheng Zhao, Xuandong Chen, Lingjiao Ye, Haotian Liu, Sheng Huang, Zhi McFarland, Daniel A. Zou, James Y. Department of Computer Science Stanford University United States Machine Learning Department NEC Labs America United States Department of Electrical Engineering Stanford University United States Graduate School of Education Stanford University United States Department of Management Science and Engineering Stanford University United States Department of Computer Science UC Santa Barbara United States Department of Biomedical Data Science Stanford University United States Department of Sociology Stanford University United States Graduate School of Business Stanford University United States
We present an approach for estimating the fraction of text in a large corpus which is likely to be substantially modified or produced by a large language model (LLM). Our maximum likelihood model leverages expert-writ... 详细信息
来源: 评论
Building Device Models Using LLMs for Requirements Simulation in Smart Homes
Building Device Models Using LLMs for Requirements Simulatio...
收藏 引用
IEEE International Requirements Engineering Conference Workshops (REW)
作者: Shi Chen Xiaohong Chen Zhi Jin Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Key Laboratory of High-Confidence Software Technologies Peking University Ministry of Education China Department of Computer Science and Technology Peking University Beijing China
The implementation of model-based requirements simulations in smart homes is an effective strategy that allows users to comprehend the execution impact of their personalized needs before deployment. This necessitates ... 详细信息
来源: 评论
EtherClue:Digital investigation of attacks on Ethereum smart contracts
收藏 引用
Blockchain(Research and Applications) 2021年 第4期2卷 12-29页
作者: Simon Joseph Aquilina Fran Casino Mark Vella Joshua Ellul Constantinos Patsakis Department of Computer Science University of MaltaMsidaMSD 2080Malta Department of Informatics University of PiraeusPiraeus18534Greece Information Management Systems Institute Athena Research CenterMarousi15125Greece Centre for Distributed Ledger Technologies University of MaltaMsidaMSD 2080Malta
Programming errors in Ethereum smart contracts can result in catastrophic financial losses from stolen *** vulnerability detectors can prevent vulnerable contracts from being deployed,this does not mean that such cont... 详细信息
来源: 评论
A Secure and Efficient Key management for Intrusion Detection In Cloud Storage Based On PLS And SVM Model
A Secure and Efficient Key Management for Intrusion Detectio...
收藏 引用
2024 International Conference on Integration of Emerging technologies for the Digital World, ICIETDW 2024
作者: Suresh Kumar, A. Rajesh Kumar, A. Manoranjithem, V. Ramakrishna, B. Gottumukkala, Prasanthi Thulasimani, T. Rathinam Technical Campus Department of Computer Science and Engineering Coimbatore India N.S.N. College of Engineering and Technology Department of CSE Tamil Nadu India Kalasalingam Academy of Research and Education India CVR College of Engineering Department of Emerging Technologies (CSE-DS) Telangana India Gokaraju Rangaraju Institute of Engineering and Technology Department of Information Technology Hyderabad India Bannari Amman Institute of Technology Department of Mathematics Erode India
Cloud computing, a novel way of storing and processing data, has become an essential tool for many individuals very soon. With the proliferation of AI and big data, it is now standard practice in manufacturing to empl... 详细信息
来源: 评论
A Discrete-Time Image Hiding Algorithm Transform Using Wavelet and SHA-512
A Discrete-Time Image Hiding Algorithm Transform Using Wavel...
收藏 引用
Technological Advancements in Computational sciences (ICTACS), International Conference on
作者: Santosh Kumar Savya Sachi Neetu Avnish Kumar Abhishek Jain M.S.R. Prasad CSE-IOT Noida Institute of Engineering and Technology Greater Noida Department of Information Technology Lalit Narayan Mishra College of Business Management Muzaffarpur Bihar India College of Smart Computing COER University Roorkee U.K. India Department of Computer Science and Engineering Glocal University Saharanpur Department of Computer Science and Engineering Uttranchal University Dehradun U.K. India Department of Computer Science & Engineering Koneru Lakshmaiah Education Foundation Guntur AP India
Steganography is an ancient technique used to conceal information within another medium, enhancing security alongside cryptographic methods. This paper's steganography approach revolves around concealing data with...
来源: 评论
Decentralized and Lightweight Cross-Chain Transaction Scheme Based on Proxy Re-signature  23
Decentralized and Lightweight Cross-Chain Transaction Scheme...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Zou, Huiying Duan, Jia Liu, Xi Ren, Wei Li, Tao Zheng, Xianghan Choo, Kim-Kwang Raymond Hunan Engineering Research Center of Geographic Information Security and Application The Third Surveying and Mapping Institute of Hunan Province Hunan China China University of Geosciences School of Computer Science Wuhan China Sichuan University Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Casm State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology of Mnr Beijing China Fuzhou University College of Computer and Big Data China Sanya College School of Information and Intelligent Engineering China University of Texas at San Antonio Department of Information Systems and Cyber Security San Antonio United States
With the widespread application of digital assets and the rapid development of blockchain technology, achieving secure and efficient transactions between different blockchain networks has become an urgent challenge. E... 详细信息
来源: 评论
Novel Enthusiasm Evaluating Method for Code Programming Curriculum
Novel Enthusiasm Evaluating Method for Code Programming Curr...
收藏 引用
7th International Conference on Applied System Innovation, ICASI 2021
作者: Wu, JainShing Chien, Ting-Hsuan Yang, Chin-Yi Chien, Li-Ren Department of Computer Science and Information Management Providence University Taichung City Taiwan 18 DICE Education Technology Co. Ltd Taichung City Taiwan National Chung Cheng University Department of Computer Science and Information Engineering Taichung City Taiwan
In order to improve the logical ability of all youths, the governments of different countries have set the code programming curriculum in high school as one of their education policies. Hence, some programming aid sof... 详细信息
来源: 评论
Deep Learning Based Intelligent and Sustainable Smart Healthcare Application in Cloud-Centric IoT
收藏 引用
computers, Materials & Continua 2021年 第2期66卷 1987-2003页
作者: K.V.Praveen P.M.Joe Prathap S.Dhanasekaran I.S.Hephzi Punithavathi P.Duraipandy Irina V.Pustokhina Denis A.Pustokhin Department of Information Technology St.Peters College of Engineering and TechnologyChennai600054India Department of Information Technology RMD Engineering CollegeChennai601206India Department of Computer Science and Engineering Kalasalingam Academy of Research and EducationKrishnankoil626128India Department of Computer Science and Engineering Sphoorthy Engineering CollegeHyderabad501510India Department of Electrical and Electronics Engineering J B Institute of Engineering and TechnologyHyderabad500075India Department of Entrepreneurship and Logistics Plekhanov Russian University of EconomicsMoscow117997Russia Department of Logistics State University of ManagementMoscow109542Russia
Recent developments in information technology can be attributed to the development of smart cities which act as a key enabler for next-generation intelligent systems to improve security,reliability,and *** healthcare ... 详细信息
来源: 评论