咨询与建议

限定检索结果

文献类型

  • 12,178 篇 会议
  • 9,022 篇 期刊文献
  • 210 册 图书

馆藏范围

  • 21,410 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,112 篇 工学
    • 8,566 篇 计算机科学与技术...
    • 6,931 篇 软件工程
    • 2,963 篇 信息与通信工程
    • 2,190 篇 控制科学与工程
    • 1,795 篇 电气工程
    • 1,647 篇 生物工程
    • 1,581 篇 电子科学与技术(可...
    • 1,343 篇 生物医学工程(可授...
    • 1,217 篇 光学工程
    • 992 篇 机械工程
    • 930 篇 化学工程与技术
    • 822 篇 动力工程及工程热...
    • 802 篇 仪器科学与技术
    • 710 篇 材料科学与工程(可...
    • 592 篇 网络空间安全
    • 564 篇 安全科学与工程
    • 534 篇 交通运输工程
  • 8,130 篇 理学
    • 3,626 篇 数学
    • 3,168 篇 物理学
    • 1,879 篇 生物学
    • 1,247 篇 统计学(可授理学、...
    • 1,007 篇 化学
    • 839 篇 系统科学
  • 3,397 篇 管理学
    • 2,246 篇 管理科学与工程(可...
    • 1,283 篇 图书情报与档案管...
    • 1,031 篇 工商管理
  • 1,457 篇 医学
    • 1,217 篇 临床医学
    • 1,070 篇 基础医学(可授医学...
    • 644 篇 公共卫生与预防医...
    • 640 篇 药学(可授医学、理...
  • 631 篇 法学
  • 433 篇 经济学
  • 343 篇 农学
  • 273 篇 教育学
  • 65 篇 文学
  • 44 篇 军事学
  • 35 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 636 篇 deep learning
  • 533 篇 accuracy
  • 448 篇 machine learning
  • 394 篇 internet of thin...
  • 370 篇 computational mo...
  • 309 篇 feature extracti...
  • 276 篇 real-time system...
  • 261 篇 training
  • 248 篇 computer science
  • 246 篇 support vector m...
  • 229 篇 predictive model...
  • 205 篇 optimization
  • 189 篇 neural networks
  • 185 篇 convolutional ne...
  • 177 篇 artificial intel...
  • 165 篇 computer archite...
  • 161 篇 reliability
  • 159 篇 image segmentati...
  • 143 篇 scalability
  • 140 篇 wireless communi...

机构

  • 150 篇 department of co...
  • 136 篇 department of co...
  • 128 篇 university of sc...
  • 99 篇 institute of com...
  • 92 篇 tianfu cosmic ra...
  • 91 篇 university of ch...
  • 88 篇 department of ph...
  • 86 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 infn sezione di ...
  • 79 篇 infn sezione di ...
  • 79 篇 hebei normal uni...
  • 76 篇 national centre ...
  • 76 篇 state key labora...
  • 75 篇 yunnan observato...
  • 67 篇 college of compu...
  • 66 篇 università di ca...
  • 63 篇 tno technical sc...
  • 61 篇 center for quant...
  • 58 篇 karnataka bangal...

作者

  • 108 篇 bastieri d.
  • 107 篇 niyato dusit
  • 88 篇 ferrara g.
  • 88 篇 ardid m.
  • 87 篇 calvo d.
  • 86 篇 chen a.
  • 80 篇 li xin
  • 76 篇 gal t.
  • 76 篇 bozza c.
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 73 篇 díaz a.f.
  • 72 篇 boumaaza j.
  • 69 篇 jiang k.
  • 68 篇 kalekin o.
  • 68 篇 coleiro a.
  • 67 篇 kuleshov d.
  • 65 篇 li cheng
  • 65 篇 liu d.
  • 64 篇 chen m.j.

语言

  • 20,162 篇 英文
  • 1,097 篇 其他
  • 164 篇 中文
  • 8 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computing and Engineering Technology"
21410 条 记 录,以下是4891-4900 订阅
排序:
A Comparison of COVID-19 Detection using Deep Learning Methods
A Comparison of COVID-19 Detection using Deep Learning Metho...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: S. Pradeep Kumar Suganiya Murugan B. Rubini Electrical and Electronics Engineering Vels Institute of Science Technology and Advanced Studies Chennai Department of Computing Technologies SRM Institute of Science and Technology Chennai
The recognition of covid-19 is major confront in today’s world, specified as sudden increase in spreading of the disease. Hence, identifying this infection in earlier phase facilitates medicinal fields such as doctor... 详细信息
来源: 评论
An Efficient Brain tumor classification using CNN and transfer learning
An Efficient Brain tumor classification using CNN and transf...
收藏 引用
Advances in computing, Communication and Applied Informatics (ACCAI), International Conference on
作者: P. Sasikumar Srikanth Cherukuvada P Balmurugan P Vijay Anand S. Brindasri R. Nareshkumar Department of Artificial Intelligence and Machine Learning Sphoorthy Engineering College Nadergul Hyderabad Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Bowrampet Hyderabad Telangana Department of Computer Science and Engineering MLR Institute of Technology Hyderabad Department of Artificial Intelligence and Data Science CMR Institute of Technology Bengaluru India Department of Computer Science Hindustan Institute of Technology and Science Padur Chennai India Department of Networking and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai
The proper detection of brain tumors as quickly as possible and the administration of efficient therapy are both necessary steps in the process of curing patients. The complexities of tumor morphology, such as size, l... 详细信息
来源: 评论
Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset
收藏 引用
International Journal of Intelligent Networks 2023年 第1期4卷 202-210页
作者: Chui, Kwok Tai Gupta, Brij B. Chaurasia, Priyanka Arya, Varsha Almomani, Ammar Alhalabi, Wadee Department of Electronic Engineering and Computer Science School of Science and Technology Hong Kong Metropolitan University Hong Kong Taichung 413 Taiwan Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan School of Computing Engineering and Intelligent Systems Ulster University United Kingdom Department of Business Administration Asia University Taiwan School of Information Technology Skyline University College SharjahP.O. Box 1797 United Arab Emirates Al- Balqa Applied University Jordan Immersive Virtual Reality Research Group King Abdulaziz University Jeddah21589 Saudi Arabia Symbiosis International University Pune India Lebanese American University Beirut1102 Lebanon Birkbeck University of London United Kingdom Chandigarh University Chandigarh India
The Internet plays a crucial role in our daily routines. Ensuring cybersecurity to Internet users will provide a safe online environment. Automatic network intrusion detection (NID) using machine learning algorithms h... 详细信息
来源: 评论
Selecting of Pet Adopters using C4.5 Decision Tree Model Algorithm  2
Selecting of Pet Adopters using C4.5 Decision Tree Model Alg...
收藏 引用
2nd International Conference in Information and computing Research, iCORE 2022
作者: Albia, Criza Jean D. Origines, Domingo Davao Del sur State College Davao del Sur Philippines Institute of Computing Engineering Technology Davao Del sur State College Assistant Professor Information Technology Department Davao Del Sur Digos Philippines
This study aims to select pet adopters based from the model created from the C4.5 decision tree algorithm to address the proper way for adoption of a pet through online examination. This study uses the method of the C... 详细信息
来源: 评论
A Survey on Usage of Multimedia Databases for Emotion Elicitation: A Quantitative Report on How Content Diversity Can Improve Performance
A Survey on Usage of Multimedia Databases for Emotion Elicit...
收藏 引用
Proceedings of the International Convention MIPRO
作者: M. Horvat P. Jerčić Department of Applied Computing Faculty of Electrical Engineering and Computing University of Zagreb Zagreb Croatia Graz University of Technology Institute of Interactive Systems and Data Science Graz Austria
Affective picture databases provide a standardized set of images to elicit controlled and consistent emotional responses in research participants. They are a valuable tool for studying various emotion-related phenomen...
来源: 评论
Securing Smart Homes Using Hybrid Stacking Ensemble Deep Learning-Enabled Framework  2
Securing Smart Homes Using Hybrid Stacking Ensemble Deep Lea...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Moubayed, Abdallah Injadat, MohammadNoor Abdellatif Mohamed, Tamer Mohamed Almatarneh, Sattam Al-Mashagbeh, Malak Aljaidi, Mohammad School of Computing and Augmented Intelligence Arizona State University GilbertAZ United States Lebanese American University Electrical and Computer Engineering Department Byblos Lebanon Western University Electrical and Computer Engineering Department LondonON Canada Zarqa University Data Science and Artificial Intelligence Department Zarqa Jordan School of Engineering Applied Science and Technology Canadian University Dubai Dubai United Arab Emirates Zarqa University Cyber Security Department Zarqa Jordan Zarqa University Computer Science Department Zarqa Jordan
The added deployment of Internet-of-Things (IoT) devices in various environments has led to people increasingly adding this technology to their homes to make them more comfortable and have a more convenient living env... 详细信息
来源: 评论
Bilinear Graph Neural Network-Enhanced Web Services Classification  23
Bilinear Graph Neural Network-Enhanced Web Services Classifi...
收藏 引用
23rd IEEE International Conference on High Performance computing and Communications, 7th IEEE International Conference on Data Science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Zhang, Lulu Cao, Buqing Peng, Mi Qing, Yueying Kang, Guosheng Liu, Jianxun Fletcher, Kenneth K. School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory of Service Computing and New Software Service Technology Xiangtan China University of Massachusetts Boston Department of Computer Science Boston United States
With the growing number of Web services, classifying Web services accurately and efficiently has become a challenging problem. Effective service classification is conducive to improving the quality of service discover... 详细信息
来源: 评论
Real-Time Disease Classification in Coffee Plants with Coral Developer Board Mini
Real-Time Disease Classification in Coffee Plants with Coral...
收藏 引用
Agrosystem engineering, technology & Applications (AGRETA), IEEE International Conference on
作者: Mohammad Hamzah Warsi Hermawan Nugroho Haider Abbas AlMurib Tay Fei Siang Sivaraman Eswaran Department of Electrical and Electronic Engineering University of Nottingham Malaysia Semenyih Malaysia Faculty of Engineering Computing and Science Swinburne University of Technology Sarawak Campus Sarawak Malaysia Department of Electrical and Computer Engineering Curtin University Malaysia Miri Malaysia
Coffee significantly contributes to the socioeconomic development of numerous countries. However, coffee production faces several challenges, including the detrimental effects of coffee leaf diseases, which impact cro... 详细信息
来源: 评论
Wi-Wheat+:Contact-free wheat moisture sensing with commodity WiFi based on entropy
收藏 引用
Digital Communications and Networks 2023年 第3期9卷 698-709页
作者: Weidong Yang Erbo Shen Xuyu Wang Shiwen Mao Yuehong Gong Pengming Hu College of Information Science and Engineering Henan University of TechnologyZhengzhou450001China Henan Key Laboratory of Grain Photoelectric Detection and Control Zhengzhou450001China College of International Education Kaifeng UniversityKaifengHenan475004China Knight Foundation School of Computing&Information Sciences Florida International UniversityMiamiFL33199USA Department of Electrical and Computer Engineering Auburn UniversityAuburnAL36849-5201USA
In this paper,we propose a contact-free wheat moisture monitoring system,termed Wi-Wheatþ,to address the several limitations of the existing grain moisture detection technologies,such as time-consuming process,ex... 详细信息
来源: 评论
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
收藏 引用
Computers, Materials & Continua 2022年 第9期72卷 6061-6077页
作者: Muhammad Akram Muhammad Waseem Iqbal Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science The Institute of Management Sciences(PAK-AIMS)Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
In cipher algorithms,the encryption and decryption are based on the same *** are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwis... 详细信息
来源: 评论