咨询与建议

限定检索结果

文献类型

  • 33,330 篇 会议
  • 5,137 篇 期刊文献
  • 271 册 图书

馆藏范围

  • 38,738 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23,831 篇 工学
    • 17,230 篇 计算机科学与技术...
    • 14,496 篇 软件工程
    • 6,363 篇 信息与通信工程
    • 3,832 篇 控制科学与工程
    • 2,915 篇 电子科学与技术(可...
    • 2,821 篇 电气工程
    • 2,609 篇 生物工程
    • 2,096 篇 生物医学工程(可授...
    • 1,646 篇 光学工程
    • 1,509 篇 机械工程
    • 1,357 篇 仪器科学与技术
    • 1,348 篇 动力工程及工程热...
    • 1,105 篇 化学工程与技术
    • 964 篇 安全科学与工程
    • 798 篇 交通运输工程
  • 12,119 篇 理学
    • 6,500 篇 数学
    • 3,289 篇 物理学
    • 2,862 篇 生物学
    • 2,166 篇 统计学(可授理学、...
    • 1,491 篇 系统科学
    • 1,175 篇 化学
  • 6,226 篇 管理学
    • 3,667 篇 管理科学与工程(可...
    • 2,870 篇 图书情报与档案管...
    • 1,985 篇 工商管理
  • 1,822 篇 医学
    • 1,564 篇 临床医学
    • 1,459 篇 基础医学(可授医学...
    • 945 篇 药学(可授医学、理...
    • 785 篇 公共卫生与预防医...
  • 1,182 篇 法学
    • 965 篇 社会学
  • 715 篇 经济学
    • 715 篇 应用经济学
  • 559 篇 农学
  • 475 篇 教育学
  • 184 篇 文学
  • 92 篇 军事学
  • 45 篇 艺术学
  • 1 篇 哲学

主题

  • 1,229 篇 accuracy
  • 974 篇 feature extracti...
  • 931 篇 computational mo...
  • 839 篇 deep learning
  • 782 篇 training
  • 768 篇 computer science
  • 629 篇 real-time system...
  • 617 篇 machine learning
  • 603 篇 support vector m...
  • 528 篇 predictive model...
  • 487 篇 internet of thin...
  • 437 篇 convolutional ne...
  • 415 篇 data models
  • 366 篇 reliability
  • 346 篇 computer archite...
  • 340 篇 data mining
  • 328 篇 optimization
  • 306 篇 routing
  • 304 篇 artificial intel...
  • 303 篇 wireless sensor ...

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 71 篇 tno technical sc...
  • 66 篇 università di ca...
  • 63 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 nikhef national ...
  • 53 篇 dept. of informa...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 47 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 boumaaza j.
  • 78 篇 díaz a.f.
  • 78 篇 coleiro a.
  • 70 篇 gozzini s.r.
  • 68 篇 huang f.
  • 61 篇 dallier r.
  • 54 篇 anguita m.
  • 51 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,337 篇 英文
  • 962 篇 其他
  • 337 篇 中文
  • 54 篇 日文
  • 47 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept of Computer Engineering and Computer Science"
38738 条 记 录,以下是4931-4940 订阅
排序:
A Hierarchical BRAM/URAM Buffer for SNN
A Hierarchical BRAM/URAM Buffer for SNN
收藏 引用
Computing and Machine Intelligence (ICMI), International Conference on
作者: Rasha Karakchi Dept. Computer Science and Engineering University of South Carolina Columbia SC
Applications such facial recognition, social networking and automated translation are well-known by their exponential growth in size and level of complexity. Such applications are the real-world examples of machine le... 详细信息
来源: 评论
Deep Learning-based Image Classification Framework for Rice Leaf Disease Detection: A Systematic Implementation Approach with Comparative Analysis
Deep Learning-based Image Classification Framework for Rice ...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Joy Chakra Bortty Gouri Shankar Chakraborty Tamjid Ahmed Sourav Das Polok Tanvir Ahmed Taki Partha Saha Department of Computer Science Westcliff University Irvine California USA Dept. of Computer Science and Engineering Lovely Professional University Phagwara Punjab India
Approximately half of the population of the world consumes rice every day as their daily diet. In Asia, rice is the main ingredient of the meal. However, various diseases influence the production of rice being harmed.... 详细信息
来源: 评论
Survey on Online Learning Applications in Multi-UAV Networks
Survey on Online Learning Applications in Multi-UAV Networks
收藏 引用
International Conference on Information and Communication Technology Convergence (ICTC)
作者: Jaemin Kim Hyosu Kim Jeongyeup Paek Yongseok Son Hyung Tae Lee Sungrae Cho Dept. of Computer Science and Engineering Chung-Ang University Seoul Korea
This paper provides a comprehensive review of the application of online learning techniques in multi-UAV systems, highlighting their role in enhancing autonomy and efficiency in dynamic environments. Key areas of focu... 详细信息
来源: 评论
TraceChainBD: Securing Supply Chains from Counterfeiting in Bangladesh with Blockchain and IoT Integration
TraceChainBD: Securing Supply Chains from Counterfeiting in ...
收藏 引用
International Conference on Innovations in science, engineering and Technology (ICISET)
作者: Sagar Karmoker Md. Adib Khan Sanjida Alam Lamia Mobinul Ahasan Tanjid Shahriar Sadman Dihan Nur Adnan Chowdhury Anik Dept. of Computer Science and Engineering East West University Dhaka Bangladesh
The scheme uses blockchain technology in Bangladesh’s supply chain to eliminate counterfeit products, improve tax compliance, and build consumer trust. By ensuring product authenticity, it safeguards brand reputation... 详细信息
来源: 评论
Quantum Anomalous Hall Effect-Based Variation Robust Binary Content Addressable Memory  66
Quantum Anomalous Hall Effect-Based Variation Robust Binary ...
收藏 引用
2023 IEEE 66th International Midwest Symposium on Circuits and Systems, MWSCAS 2023
作者: Islam, Md Mazharul Hutchins, Jack Alam, Shamiul Hossain, Md Shafayat Jaiswal, Akhilesh Aziz, Ahmedullah University of Tennessee Department of Electrical Engineering and Computer Science KnoxvilleTN37996 United States Princeton University Dept. of Physics PrincetonNJ08544 United States University of Southern California Deptartment of Electrical and Computer Engineering Los AngelesCA90089 United States
Electronic devices can no longer afford dimensional downscaling due to the fundamental physical limit which motivates device researchers to look for a completely new technological paradigm. Cryogenic devices are curre... 详细信息
来源: 评论
ImportChainBD: Blockchain Solutions for Transparent and Accountable Imported Cosmetic Products
ImportChainBD: Blockchain Solutions for Transparent and Acco...
收藏 引用
Blockchain and Distributed Systems Security (ICBDS), IEEE International Conference on
作者: Md. Adib Khan Sagar Karmoker Ummay Khadiza Rumpa Habibur Rahman Md. Sabbir Hossain Nur Adnan Chowdhury Anik Mahamudul Hasan Dept. of Computer Science and Engineering East West University Dhaka Bangladesh
To improve the supply-chain management system of Bangladesh for imported cosmetic products this paper proposes a blockchain-based solution. One of the major goals of this project is to increase the tax compliance of t... 详细信息
来源: 评论
Securing Layers: The Synergy of Mix Networks and Shamir's Secret Sharing in Onion Routing
Securing Layers: The Synergy of Mix Networks and Shamir's Se...
收藏 引用
Intelligent Data Communication Technologies and Internet of Things (IDCIoT), International Conference on
作者: Aniketh Vasudev Jambha Dutta Swetchana Karru Sushrutha Shinu M. Rajagopal Dept. of Computer Science and Engineering Amrita School of Computing Bengaluru India
In the contemporary digital landscape, where online privacy and security face escalating challenges due to evolving cyber threats, this investigation uncovers vulnerabilities within traditional security measures. The ...
来源: 评论
A Deep Learning Approach to Gun Detection in Surveillance System using YOLOv9
A Deep Learning Approach to Gun Detection in Surveillance Sy...
收藏 引用
Control Instrumentation System Conference (CISCON)
作者: Lucy Sumi Shouvik Dey Dept. of Computer Science & Engineering National Institute of Technology Nagaland India
The escalating firearm related crimes including open firing, robbery, suicides, mass shootings, homicides, threatening at gun point, etc. has underscored the growing importance of timely detection of weapons. This pap... 详细信息
来源: 评论
Phishing Website Detection Using Machine Learning  7
Phishing Website Detection Using Machine Learning
收藏 引用
7th IEEE International conference for Convergence in Technology, I2CT 2022
作者: Mandadi, Adarsh Boppana, Saikiran Ravella, Vishnu Kavitha, R. Vel Tech Rangarajan Dr Sagunthala R & D Institute of Science and Technology Dept of Computer Science and Engineering Chennai India
Phishing is an internet scam in which an attacker sends out fake messages that look to come from a trusted source. A URL or file will be included in the mail, which when clicked will steal personal information or infe... 详细信息
来源: 评论
Distinguish Between Obese and Normal Body Types Through Gait Analysis Using Classification Models
Distinguish Between Obese and Normal Body Types Through Gait...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Jae-Sik Yi Ji Hun Han Min Jeong Kim Youn-Sik Hong Dept. of Computer Science and Engineering Incheon National University Incheon Korea
For gait analysis, an IMU sensor was mounted on the knee and gait related data was collected. Various gait parameters such as gait time, stance swing ratio, heel strike, and toe off can be extracted from the dataset. ...
来源: 评论