咨询与建议

限定检索结果

文献类型

  • 22,020 篇 会议
  • 3,551 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,779 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,806 篇 工学
    • 11,145 篇 计算机科学与技术...
    • 9,352 篇 软件工程
    • 4,295 篇 信息与通信工程
    • 2,503 篇 控制科学与工程
    • 2,155 篇 电子科学与技术(可...
    • 2,136 篇 电气工程
    • 1,539 篇 生物工程
    • 1,320 篇 生物医学工程(可授...
    • 1,132 篇 光学工程
    • 1,028 篇 机械工程
    • 883 篇 仪器科学与技术
    • 834 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 623 篇 安全科学与工程
    • 523 篇 交通运输工程
    • 468 篇 材料科学与工程(可...
    • 445 篇 建筑学
  • 8,211 篇 理学
    • 4,523 篇 数学
    • 2,413 篇 物理学
    • 1,704 篇 生物学
    • 1,374 篇 统计学(可授理学、...
    • 916 篇 系统科学
    • 760 篇 化学
  • 3,990 篇 管理学
    • 2,397 篇 管理科学与工程(可...
    • 1,826 篇 图书情报与档案管...
    • 1,258 篇 工商管理
  • 1,072 篇 医学
    • 948 篇 临床医学
    • 882 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
  • 713 篇 法学
    • 561 篇 社会学
  • 445 篇 经济学
  • 346 篇 教育学
  • 316 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 685 篇 accuracy
  • 531 篇 feature extracti...
  • 478 篇 deep learning
  • 475 篇 computational mo...
  • 377 篇 support vector m...
  • 372 篇 training
  • 365 篇 computer science
  • 319 篇 internet of thin...
  • 288 篇 real-time system...
  • 285 篇 machine learning
  • 279 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 reliability
  • 221 篇 routing
  • 219 篇 optimization
  • 212 篇 data mining
  • 211 篇 neural networks
  • 208 篇 convolutional ne...
  • 199 篇 throughput
  • 195 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 84 篇 université de st...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 80 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 68 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 49 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 90 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 76 篇 dallier r.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 59 篇 boettcher m.
  • 57 篇 celli s.
  • 54 篇 aly z.
  • 52 篇 dornic d.

语言

  • 24,785 篇 英文
  • 601 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25779 条 记 录,以下是4441-4450 订阅
排序:
Analytical Study of the Features and Parameters of Off-Angle Iris Image vs. Deep Learning Model
Analytical Study of the Features and Parameters of Off-Angle...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Aghiad Khedr Suleiman Darin Shafek Mahmoud Mahfuri Mohammad Khishe Ali Saeed Sameh Ghwanmeh Cybersecurity and Cloud Computing Technologies Engineering Dept. Alma'moon University College Baghdad iraq Computer Engineering Techniques Dept. Alma'moon University College Baghdad iraq Computer and information Technology Department International University for Science and Technology Innovation Center for Artificial Intelligence Applications Yuan Ze University Taiwan Jadara research center Jadara University Jordan Computer Center Northern Technical University Ninevah Iraq Computer Science Dept College of Computer Information Technology American University in the Emirates
This paper presents an analytical study and a technique for extracting the features of a common case of images of the iris called off-angle iris which was taken for persons identification systems. The main problem whe... 详细信息
来源: 评论
A Comparative Study of Machine Learning Methods for Intrusion Detection
A Comparative Study of Machine Learning Methods for Intrusio...
收藏 引用
International Conf on Electrical and Electronic Engineering (ICEEE)
作者: Fadi N. Sibai Abu Asaduzzaman Ahmad Sibai Electrical & Computer Engineering Dept. Gulf University for Science and Technology Mishref Kuwait Electrical & Computer Engineering Dept. Wichita State University Wichita Kansas U.S.A. Computer Science Dept. University of South Florida Tampa FL U.S.A.
In this work, we applied 8 machine learning (ML) techniques to detect intrusions, namely, neural networks, kNN, SVM, random forest, trees, AdaBoost, naive Bayes, and stochastic gradient descent SGD. Using the NSL-KDD ...
来源: 评论
A Satisfibility based Watermarking Approach for Hardware Security in High Level Synthesis
A Satisfibility based Watermarking Approach for Hardware Sec...
收藏 引用
IEEE India Conference (INDICON)
作者: Ashwin Cs Vipul Poddar Suchismita Roy Dept. of Computer Science & Engineering National Institute of Technology Durgapur India Dept. of Electrical Engineering National Institute of Technology Durgapur India
In today’s world Time-To-Market (TTM) plays a very important role in the success of any given chip. To reduce the TTM, many manufacturers rely on reusable IP cores. These reusable Intellectual Property(IP) cores may ...
来源: 评论
Scope of IoT in Emerging Engineering technology during Online Education  14
Scope of IoT in Emerging Engineering Technology during Onlin...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Veeraiah, Vivek Kotti, Jayasri Jain, Vipin Sharma, Tripti Saini, Sumit Gupta, Ankur Adichunchanagiri University Dept. of R & D Computer Science Karnataka Mandya India Gmr Institute of Technology Dept. of Cse AP Vizianagaram India Teerthanker Mahaveer University Dept. of Management Uttar Pradesh Moradabad India Rungta College of Engineering & Technology Department of Cse Chhattisgarh Bhilai India Central University of Haryana School of Engineering & Technology Haryana Mahendergarh India Vaish College of Engineering Department of Cse Haryana Rohtak India
Physical objects with built-in sensors, processors, software, and other technologies that can communicate with one another and share data via the web are what the IoT refers to. Diverse devices that may cause security... 详细信息
来源: 评论
Comparative Analysis of Extractive Summarization Using NLP
Comparative Analysis of Extractive Summarization Using NLP
收藏 引用
Intelligent Computing and Emerging Communication Technologies (ICEC), International Conference on
作者: Ashutosh Ray Anjana Mishra Bisal Sahoo Hrudaya Kumar Tripathy Dept. Of Computer Science and Engineering C.V. Raman Global University Bhubaneswar Odisha India School of Computer Engineering Kalinga Institute of Industrial Technology Bhubaneswar India
The step-by-step method of constructing a short, easy-to-read, understandable, and contextual summary of an extensive text document is called text summarization. The principal role is to acquire the correct amount of ... 详细信息
来源: 评论
Sustainable Cultural Tourism Strategy and Promotion: An ICT Management Platform
Sustainable Cultural Tourism Strategy and Promotion: An ICT ...
收藏 引用
International Conference on Application of Information and Communication Technologies (AICT)
作者: Kashyap Raiyani Shabnam Pasandideh Sajib Ahmed Pedro Pereira João Martins Dept. Electrical and Computer Engineering Center of Technology and Systems-UNINOVA NOVA School of Science and Technology NOVA University Lisbon Caparica Portugal
Cultural Tourism (CT) is a significant element of today’s economy, accounting for around 37% of the total tourist industry and expanding at a pace of over 15% each year. This function and economic impact can benefit ... 详细信息
来源: 评论
Traffic Volume Prediction Based on Weather Parameters
Traffic Volume Prediction Based on Weather Parameters
收藏 引用
Women in Innovation, technology & Entrepreneurship (ICWITE), IEEE International Conference for
作者: Harshvardhan Kendre Mandar Karmarkar Harsh Karadbhajne Neha Kamtalwar Abha Marathe Computer Engineering Department Vishwakarma Institute of Technology Pune India Dept. of E & TC Engineering Vishwakarma Institute of Technology Pune India
With increase in number of vehicles, traffic congestion is on rise. It leads to a multitude of problems in urban areas. Commuters experience unpredictable travel times, resulting in delays, stress, and inefficiency. I...
来源: 评论
Term Deposit Customer Prediction: A Blending Approach Using Bank Marketing Data
Term Deposit Customer Prediction: A Blending Approach Using ...
收藏 引用
IEEE Students' Conference on Electrical, Electronics and computer Science (SCEECS)
作者: Rahul Prasad Mohit Choubey R. K. Baghel Aaditya Naruka Cluster of Computer Science UPES Dehradun India Dept. of ECE Maulana Azad National Institute of Technology Bhopal India Dept. of SE Poornima University Jaipur India
The global COVID-19 pandemic led to a significant economic downturn, severely impacting financial systems and economies around the world. Widespread lockdowns and travel restrictions disrupted supply chains, forced bu... 详细信息
来源: 评论
Multimodal Data-Driven Classification of Mental Disorders: A Comprehensive Approach to Diagnosing Depression, Anxiety, and Schizophrenia
arXiv
收藏 引用
arXiv 2025年
作者: Singh, Himanshi Tiwari, Sadhana Agarwal, Sonali Chandra, Ritesh Sonbhadra, Sanjay Kumar Singh, Vrijendra Dept. of Information Technology IIIT Allahabad Uttar Pradesh Prayagraj India Dept. of Computer Science and Engg. Siksha’O’ Anusandhan University Odisha Bhubaneswar India
This study investigates the potential of multimodal data integration, which combines electroencephalogram (EEG) data with sociodemographic characteristics like age, sex, education, and intelligence quotient (IQ), to d... 详细信息
来源: 评论
RAMBO — Robotic Anthropomorphic Manipulator for Bimanual Operations
RAMBO — Robotic Anthropomorphic Manipulator for Bimanual Op...
收藏 引用
IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC)
作者: Nuno Ribeiro Luís Louro Paulo Vicente Pedro Ribeiro Daniel Rodrigues Pedro Dias Emanuel Sousa Sérgio Monteiro Estela Bicho Industrial Electronics Dept ALGORITMI Center University of Minho Guimarães Portugal Center for Computer Graphics Human-Technology Interaction and Robotics Dept University of Minho Guimarães Portugal
This paper presents the development of an anthropomorphic robot designed for collaborative research alongside the Kuka LBR iiwa R820 robotic arm for the research project I-CATER. The primary objectives were designing ... 详细信息
来源: 评论