咨询与建议

限定检索结果

文献类型

  • 10,861 篇 会议
  • 4,347 篇 期刊文献
  • 210 册 图书

馆藏范围

  • 15,418 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,806 篇 工学
    • 6,746 篇 计算机科学与技术...
    • 5,461 篇 软件工程
    • 2,089 篇 信息与通信工程
    • 1,563 篇 控制科学与工程
    • 999 篇 生物工程
    • 915 篇 电气工程
    • 823 篇 生物医学工程(可授...
    • 680 篇 电子科学与技术(可...
    • 665 篇 机械工程
    • 560 篇 网络空间安全
    • 489 篇 光学工程
    • 487 篇 动力工程及工程热...
    • 485 篇 安全科学与工程
    • 422 篇 仪器科学与技术
    • 394 篇 化学工程与技术
  • 4,686 篇 理学
    • 2,571 篇 数学
    • 1,158 篇 生物学
    • 1,027 篇 物理学
    • 779 篇 统计学(可授理学、...
    • 601 篇 系统科学
    • 433 篇 化学
  • 3,194 篇 管理学
    • 2,163 篇 管理科学与工程(可...
    • 1,274 篇 工商管理
    • 1,128 篇 图书情报与档案管...
  • 1,029 篇 医学
    • 837 篇 临床医学
    • 730 篇 基础医学(可授医学...
    • 543 篇 公共卫生与预防医...
    • 395 篇 药学(可授医学、理...
  • 664 篇 法学
    • 556 篇 社会学
  • 570 篇 经济学
    • 564 篇 应用经济学
  • 308 篇 农学
  • 268 篇 教育学
  • 76 篇 文学
  • 35 篇 军事学
  • 17 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 546 篇 computer science
  • 478 篇 accuracy
  • 440 篇 deep learning
  • 348 篇 machine learning
  • 343 篇 internet of thin...
  • 302 篇 computational mo...
  • 297 篇 data mining
  • 263 篇 support vector m...
  • 252 篇 real-time system...
  • 251 篇 predictive model...
  • 248 篇 information mana...
  • 239 篇 feature extracti...
  • 221 篇 artificial intel...
  • 209 篇 optimization
  • 190 篇 training
  • 164 篇 medical services
  • 162 篇 reliability
  • 160 篇 convolutional ne...
  • 154 篇 neural networks
  • 149 篇 authentication

机构

  • 101 篇 centre of resear...
  • 74 篇 lovely professio...
  • 68 篇 department of co...
  • 65 篇 department of co...
  • 54 篇 department of co...
  • 53 篇 department of ph...
  • 52 篇 infn sezione di ...
  • 52 篇 faculty of scien...
  • 51 篇 department of ph...
  • 51 篇 department for p...
  • 50 篇 department of mo...
  • 50 篇 infn e laborator...
  • 50 篇 department of co...
  • 49 篇 west university ...
  • 47 篇 research center ...
  • 44 篇 kirchhoff-instit...
  • 40 篇 department of ph...
  • 39 篇 department of ph...
  • 39 篇 departament de f...
  • 39 篇 graduate school ...

作者

  • 71 篇 chin-chen chang
  • 47 篇 bona m.
  • 47 篇 bachacou h.
  • 45 篇 bressler s.
  • 42 篇 bellos p.
  • 37 篇 tzung-pei hong
  • 35 篇 ananiev v.
  • 33 篇 ramya maranan
  • 31 篇 chang chin-chen
  • 30 篇 bloch i.
  • 28 篇 melanie lourens
  • 27 篇 kimura n.
  • 27 篇 mohit tiwari
  • 26 篇 brau b.
  • 26 篇 bomben m.
  • 26 篇 annovi a.
  • 26 篇 lourens melanie
  • 25 篇 brock i.
  • 24 篇 mastroberardino ...
  • 24 篇 barillari t.

语言

  • 14,281 篇 英文
  • 1,057 篇 其他
  • 89 篇 中文
  • 9 篇 日文
  • 3 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Management Engineering Computer Science Course"
15418 条 记 录,以下是4991-5000 订阅
排序:
Detection of Pre Shoplifting Suspicious Behavior Using Deep Learning
Detection of Pre Shoplifting Suspicious Behavior Using Deep ...
收藏 引用
IIAI International Conference on Advanced Applied Informatics (IIAIAAI)
作者: Sujan Shrestha Yoji Taniguchi Tetsuo Tanaka Course of Information and computer sciences Graduate school of Engineering Kanagawa Institute of Tehnology Atsugi Japan Department of Information Artificial Intelligence and Data Science Daiichi Institute of Technology Tokyo Japan Dept. of Information and Computer Sciences Faculty of Information Technology Kanagawa Institute of Technology Atsugi Japan
Shoplifting presents a significant challenge for retailers, leading to substantial financial losses and security concerns. Current surveillance systems effectively identify shoplifting incidents postoccurrence; howeve... 详细信息
来源: 评论
Copy and Move Forged Image Detection by Deep Learning
Copy and Move Forged Image Detection by Deep Learning
收藏 引用
Communication & Computing (WCONF), World Conference on
作者: Yogesh Kumar Sharma Senthil Athithan Savya Sachi Ajay Kumar Singh Arpit Jain Suman Devi Department of Computer Science & Engineering Koneru Lakshmaiah Education Foundation Greenfield Vaddeswaram Guntur AP Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of information technology Lalit Narayan Mishra College of Business Management Muzaffarpur Bihar India Allenhouse Institute of Technology Kanpur India Department of Computer Science & Engineering Koneru Lakshmaiah Education Foundation Greenfield Vaddeswaram Guntur A.P. India Department of Computer Science and Engineering Chaudhary Devi Lal University Sirsa Haryana India
Copy-Move forgery detection (CMFD) is one of the most active study topics in blind image forensics. Most known algorithms are based on block and key-point approaches or a mix. Recently, various deep convolutional neur...
来源: 评论
Breaking the Familiarity Bias: Employing Virtual Reality Environments to Enhance Team Formation and Inclusion  25
Breaking the Familiarity Bias: Employing Virtual Reality Env...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Fernandez-Espinosa, Mariana Clouse, Kara Sellars, Dylan Tong, Danny Bsales, Michael Alcindor, Sophonie Hubbard, Timothy D Villano, Michael Gómez-Zará, Diego University of Notre Dame Notre DameIN United States Management & Organization University of Notre Dame Notre DameIN United States Department of Psychology University of Notre Dame Notre DameIN United States Computer Science and Engineering University of Notre Dame Notre DameIN United States
Team closeness provides the foundations of trust and communication, contributing to teams' success and viability. However, newcomers often struggle to be included in a team since incumbents tend to interact more w... 详细信息
来源: 评论
Report Based Face Detection and Recognition  7
Report Based Face Detection and Recognition
收藏 引用
7th Annual International Conference on Network and Information Systems for computers, ICNISC 2021
作者: Ahmed, Hameer Li, Hengjian Dharejo, Fayaz Hussain Laghari, Asif Ali Karim, Shahid University of Jinan Department of Information Science and Engineering Jinan China University of Chinese Academy of Sciences Computer Network Information Center Chinese Academy of Sciences Beijing China Sindh Madressautal Islam University Department of Computer Science Pakistan Barani Institute of Management Science Department of Computer Science Rawalpindi Pakistan
Face recognition is a computer dynamic that determines the position and size of a human face in a digital image. This study suggests a system that will help you recognize students' faces, know entrance times, and ... 详细信息
来源: 评论
Exploring Consumer Behavior in E-Commerce with AI Personalization and Market Trends Analysis Models
Exploring Consumer Behavior in E-Commerce with AI Personaliz...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Gaurav Kumar G. Devayani C Saraswathi R. Melba Kani Sandeep Dongre M. S. Mohamed Mallick School of Computer Application Lovely Professional University Phagwara India Department of Computer Science and Business Systems M.Kumarasamy College of Engineering Karur India School of Management Studies Bannari Amman Institute of Technology Erode India Master of Business Administration Mar Ephraem college of Engineering and Technology Kanyakumari India Symbiosis Institute of Business Management (SIBM) Constituent of Symbiosis International (Deemed University) Nagpur India Department of Computer Science Engineering Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology (Deemed to be University) Chennai India
Online retailers must monitor and respond to changing consumer trends to stay competitive. AI-driven customization's revolutionary impact on market trends is the focus of this study on online buying and customer b... 详细信息
来源: 评论
Hydraulic System Failure Prediction Method with Limited Failure Data
Hydraulic System Failure Prediction Method with Limited Fail...
收藏 引用
International Symposium on computer, Consumer and Control (IS3C)
作者: Cheng-Hui Chen Yung-Kuan Chan Shyr-Shen Yu Department of Computer Science and Engineering National Chung Hsing University Taichung Taiwan Department of Management Information Systems National Chung Hsing University Taichung Taiwan
Hydraulic systems in production equipment are relatively complex, involving various time series sensor data, such as operating sound frequencies and hydraulic pressure. However, fault prediction generally faces the bo...
来源: 评论
Comparative analysis of moral decision-making and trust dynamics: human reasoning vs. ChatGPT-3 narratives
收藏 引用
AI and Ethics 2024年 1-14页
作者: Rehman, Umair Shah, Muhammad Umair Iqbal, Farkhund Fatima, Ramsha Department of Computer Science Western University London Canada Department of Management Sciences Faculty of Engineering University of Waterloo London Canada College of Technological Innovation Zayed University Dubai United Arab Emirates Graduate School of Education University of Pennsylvania Philadelphia USA
As artificial intelligence (AI) becomes increasingly integrated into everyday decision-making, so does the influence of large language models like ChatGPT. While AI systems generate moral judgments, there may be disti...
来源: 评论
Improved Attack Detection and Analysis in IoT Environment Data Derived from Intrusion Detection Systems
Improved Attack Detection and Analysis in IoT Environment Da...
收藏 引用
Communications and Information Technologies (GCCIT), Global Conference on
作者: Mahesh Manchanda Dharmesh Dhabliya K. Ranjith Singh Suhas Gupta Srisainath R Yashoda L Computer Science and Engineering Graphic Era Hill University Dehradun Graphic Era Deemed to be University Dehradun Uttarakhand India Department of Information Technology Vishwakarma Institute of Technology Pune India Department of Computer Science Karpagam Academy of Higher Education Coimbatore Centre of Research Impact and Outcome Chitkara University Rajpura Punjab India Department of Mechanical Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai School of Management - UG Management JAIN (Deemed to be University) Bangalore Karnataka
The interconnection and communication capabilities of many smart gadgets are made possible by the Internet of Things. Despite the practical advantages of the Internet of Things (IoT), it is susceptible to new forms of... 详细信息
来源: 评论
A new (p;q)- rung orthopair fuzzy SIR method with a multi-criteria decision-making approach
收藏 引用
Granular Computing 2024年 第2期9卷
作者: Shahzadi, Gulfam Luqman, Anam Shahzadi, Sundas Deveci, Muhammet Department of Mathematics University of Management and Technology Sialkot Campus Pakistan Division of Science and Technology Department of Mathematics University of Education Lahore Pakistan Department of Industrial Engineering Turkish Naval Academy National Defence University Istanbul Tuzla34942 Turkey Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
In comparison to Fermatean, Pythagorean, and intuitionistic fuzzy sets, (p,q)-rung orthopair fuzzy sets have a wider range of displaying membership grades and can therefore provide more uncertain situations. In this w... 详细信息
来源: 评论
Implementation of ABC & WOA-Based Security Defense Mechanism for Distributed Denial of Service Attacks
Implementation of ABC & WOA-Based Security Defense Mechanism...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Suman Devi Yogesh Kumar Sharma Senthil Athithan Savya Sachi Ajay Kumar Singh Arpit Jain Department of Computer Science and Engineering Chaudhary Devi Lal University Sirsa Haryana India Department of Computer Science & Engineering Koneru Lakshmaiah Education Foundation Guntur AP Department of Computer Science & Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of Information Technology Lalit Narayan Mishra College of Business Management Muzaffarpur Bihar India Allen House Institute of Technology India
computer systems are vulnerable to information theft as a result of the extensive use of the internet, which has caused an increase in security defence mechanisms. In order to overcome these theft various approaches h...
来源: 评论