咨询与建议

限定检索结果

文献类型

  • 31,159 篇 会议
  • 4,913 篇 期刊文献
  • 244 册 图书

馆藏范围

  • 36,316 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,638 篇 工学
    • 16,120 篇 计算机科学与技术...
    • 13,476 篇 软件工程
    • 5,972 篇 信息与通信工程
    • 3,700 篇 控制科学与工程
    • 2,866 篇 电子科学与技术(可...
    • 2,856 篇 电气工程
    • 2,362 篇 生物工程
    • 1,940 篇 生物医学工程(可授...
    • 1,589 篇 光学工程
    • 1,488 篇 机械工程
    • 1,338 篇 动力工程及工程热...
    • 1,275 篇 仪器科学与技术
    • 1,157 篇 化学工程与技术
    • 905 篇 安全科学与工程
    • 775 篇 交通运输工程
    • 678 篇 建筑学
  • 11,662 篇 理学
    • 6,265 篇 数学
    • 3,255 篇 物理学
    • 2,585 篇 生物学
    • 2,081 篇 统计学(可授理学、...
    • 1,350 篇 系统科学
    • 1,218 篇 化学
  • 5,837 篇 管理学
    • 3,458 篇 管理科学与工程(可...
    • 2,685 篇 图书情报与档案管...
    • 1,877 篇 工商管理
  • 1,679 篇 医学
    • 1,430 篇 临床医学
    • 1,330 篇 基础医学(可授医学...
    • 872 篇 药学(可授医学、理...
    • 721 篇 公共卫生与预防医...
  • 1,070 篇 法学
    • 862 篇 社会学
  • 676 篇 经济学
  • 497 篇 农学
  • 444 篇 教育学
  • 183 篇 文学
  • 80 篇 军事学
  • 43 篇 艺术学
  • 1 篇 哲学

主题

  • 1,129 篇 accuracy
  • 865 篇 feature extracti...
  • 851 篇 computational mo...
  • 766 篇 deep learning
  • 691 篇 training
  • 688 篇 computer science
  • 548 篇 real-time system...
  • 546 篇 machine learning
  • 524 篇 support vector m...
  • 455 篇 predictive model...
  • 421 篇 internet of thin...
  • 367 篇 convolutional ne...
  • 363 篇 data models
  • 355 篇 computer archite...
  • 342 篇 reliability
  • 316 篇 optimization
  • 292 篇 data mining
  • 277 篇 routing
  • 257 篇 wireless sensor ...
  • 252 篇 artificial intel...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 76 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 62 篇 nikhef national ...
  • 59 篇 dept. of compute...
  • 59 篇 dept. of informa...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 school of automa...
  • 53 篇 leiden universit...
  • 48 篇 dept. of compute...
  • 48 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 44 篇 dept. of compute...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 79 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 71 篇 dallier r.
  • 69 篇 huang f.
  • 64 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 31,050 篇 英文
  • 4,770 篇 其他
  • 318 篇 中文
  • 119 篇 日文
  • 71 篇 朝鲜文
  • 6 篇 斯洛文尼亚文
  • 4 篇 德文
  • 3 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. Computer Science and System Engineering"
36316 条 记 录,以下是4651-4660 订阅
排序:
A Review on Deep Learning Based Question Answering with Natural Language Processing in Healthcare
A Review on Deep Learning Based Question Answering with Natu...
收藏 引用
Knowledge engineering and Communication systems (ICKECS), International Conference on
作者: Abdul Saleem Javeed C Gopala Krishnan Dept. of Computer Science & Engineering GITAM School of Technology Bengaluru INDIA
Over the Internet, an efficient approach and promising solution to retrieve significant information envisages the beginning of Question Answering systems (QAS). Because of data sources availability, the deep learning ... 详细信息
来源: 评论
Unraveling Patterns in Healthcare Fraud through Comprehensive Analysis
Unraveling Patterns in Healthcare Fraud through Comprehensiv...
收藏 引用
International Conference on Computing for Sustainable Global Development (INDIACom)
作者: Khushi E Chirchi B Kavya Dept. of Computer Science and Engineering Dayananda Sagar University Bangalore India
This study addresses healthcare provider fraud in Medicare, employing advanced machine learning models on a diverse dataset to predict potential fraud. The goal is to contribute insights for effective fraud detection ...
来源: 评论
Improving IJTAG Test Efficiency and Security
Improving IJTAG Test Efficiency and Security
收藏 引用
2022 International Symposium on VLSI Design, Automation and Test, VLSI-DAT 2022
作者: Wang, Sying-Jyan Shih, Yen-Chang Li, Katherine Shu-Min Lin, Chen-Yeh Chong, Song-Kong National Chung Hsing University Dept. Computer Science Engineering Taichung Taiwan National Sun Yat-sen University Dept. Computer Science Engineering Kaohsiung Taiwan Cybersecurity Technology Institute Institute for Information Industry Taipei Taiwan
The IEEE Std. 1687 (IJTAG) provides a more efficient and flexible mechanism to access embedded instruments in complex system-on-chips (SoC). Embedded instruments are mainly used for testing, debugging, diagnosing, and... 详细信息
来源: 评论
Blockchain Based Credit system to Increase the Creditability through Carbon Offset Level
Blockchain Based Credit System to Increase the Creditability...
收藏 引用
Computing, Power and Communication Technologies (IC2PCT), IEEE International Conference on
作者: A Padmavathi G Charan Reddy Gauri Santhosh Dept. of Computer Science and Engineering Amrita Vishwa Vidyapeetham Chennai India
Our country has relied significantly on agriculture as its main source of income for several decades. The demand for food and crops is growing due to the growing population, which offers the agriculture sector tremend...
来源: 评论
Key Vertex Pairs Extraction for Graph Classification Based on Probability Distribution Learning
Key Vertex Pairs Extraction for Graph Classification Based o...
收藏 引用
International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
作者: Jianming Huang Hiroyuki Kasai Dept. of Computer Science and Communication Engineering WASEDA University Tokyo Japan
Graph classification is a hot topic of machine learning for graph-structured data, and it is also a very potential and valuable research. However, the difficulty of graph classification is challenging and special, whi...
来源: 评论
Network Intrusion Detection system Using Decision Tree and KNN Algorithm
Network Intrusion Detection System Using Decision Tree and K...
收藏 引用
Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), 2020 International Conference on
作者: Km Shivani Singh Khundrapam Johnson Singh Dept. of Computer Science and Engineering National Institute of Technology Imphal Manipur
The complexity of attacks is increasing, making it increasingly difficult to effectively discover breaches. A network intrusion detection system is needed to handle the aforementioned problem. An automated software pr...
来源: 评论
An Adaptive Nature-Inspired Paticle Bee Colony Deep Neural Network Technique for Event Detection in Video Sequences
An Adaptive Nature-Inspired Paticle Bee Colony Deep Neural N...
收藏 引用
Cognitive, Green and Ubiquitous Computing (IC-CGU), International Conference on
作者: Kumud Sachdeva Jasminder Kaur Sandhu Rakesh Sahu Dept. of Computer Science Engineering Chandigarh University Gharuan Punjab India
Classifying and detecting difficult video events based on visual modalities remains an uncertain problem. Conventional video presentation approaches ineffectively extract each modality, hindering video event detection... 详细信息
来源: 评论
Physical Layer Authentication via Underwater Acoustic Multipath Channel Crafting
Physical Layer Authentication via Underwater Acoustic Multip...
收藏 引用
OCEANS
作者: Davide Eccher Paolo Casari Dept. of Information Engineering and Computer Science University of Trento Trento Italy
With the increasing number of actors in the under-water environment and the development of new applications, such as large-scale monitoring and autonomous underwater vehicle control, securing underwater communications... 详细信息
来源: 评论
Streamlining Livestock Surveillance: YOLOv8 Approach to Cattle Body Segmentation
Streamlining Livestock Surveillance: YOLOv8 Approach to Catt...
收藏 引用
Intelligent systems for Cybersecurity (ISCS), International Conference on
作者: Bharti Chugh Pushepndra Kumar Upendra Mishra Himanshi Chaudhary dept. of Computer science and engineering KIET Group of institutions Ghaziabad India
This research paper introduces an innovative approach to optimize livestock surveillance by employing YOLOv8 for cattle body segmentation. The study attained a mAP(50), mean Average Precision of 0.598 and 0.464 and mA... 详细信息
来源: 评论
Gaze into the Pattern: Characterizing Spatial Patterns with Internal Temporal Correlations for Hardware Prefetching
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Zixiao Wu, Chentao Gu, Yunfei Jia, Ranhao Li, Jie Guo, Minyi Dept. of Computer Science and Engineering Shanghai Jiao Tong University China
Hardware prefetching is one of the most widely-used techniques for hiding long data access latency. To address the challenges faced by hardware prefetching, architects have proposed to detect and exploit the spatial l... 详细信息
来源: 评论