咨询与建议

限定检索结果

文献类型

  • 22,024 篇 会议
  • 3,556 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,788 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,814 篇 工学
    • 11,149 篇 计算机科学与技术...
    • 9,355 篇 软件工程
    • 4,296 篇 信息与通信工程
    • 2,504 篇 控制科学与工程
    • 2,155 篇 电子科学与技术(可...
    • 2,140 篇 电气工程
    • 1,539 篇 生物工程
    • 1,321 篇 生物医学工程(可授...
    • 1,135 篇 光学工程
    • 1,029 篇 机械工程
    • 884 篇 仪器科学与技术
    • 835 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 624 篇 安全科学与工程
    • 524 篇 交通运输工程
    • 468 篇 材料科学与工程(可...
    • 445 篇 建筑学
  • 8,215 篇 理学
    • 4,524 篇 数学
    • 2,416 篇 物理学
    • 1,705 篇 生物学
    • 1,374 篇 统计学(可授理学、...
    • 916 篇 系统科学
    • 760 篇 化学
  • 3,990 篇 管理学
    • 2,397 篇 管理科学与工程(可...
    • 1,826 篇 图书情报与档案管...
    • 1,258 篇 工商管理
  • 1,072 篇 医学
    • 948 篇 临床医学
    • 882 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
  • 713 篇 法学
    • 561 篇 社会学
  • 445 篇 经济学
  • 346 篇 教育学
  • 316 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 685 篇 accuracy
  • 531 篇 feature extracti...
  • 478 篇 deep learning
  • 475 篇 computational mo...
  • 377 篇 support vector m...
  • 372 篇 training
  • 365 篇 computer science
  • 319 篇 internet of thin...
  • 288 篇 real-time system...
  • 285 篇 machine learning
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 reliability
  • 221 篇 routing
  • 219 篇 optimization
  • 212 篇 data mining
  • 211 篇 neural networks
  • 208 篇 convolutional ne...
  • 199 篇 throughput
  • 195 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 82 篇 tno technical sc...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 68 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 90 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 75 篇 dallier r.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 boettcher m.
  • 57 篇 celli s.
  • 54 篇 aly z.
  • 52 篇 dornic d.

语言

  • 24,787 篇 英文
  • 608 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25788 条 记 录,以下是4621-4630 订阅
排序:
Robust Beamforming for Intelligent Reflecting Surface Aided Dual-Functional Radar-Communication System
Robust Beamforming for Intelligent Reflecting Surface Aided ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Zixuan Ye Dongqi Luo Jihong Zhu Dept. of Computer Science and Technology Tsinghua University Beijing China Dept. of Precision Instrument Tsinghua University Beijing China
Intelligent reflecting surface (IRS) has recently gained significant academic interest as a prospective contender for improving wireless communication system coverage and spectral efficiency. This paper investigates a... 详细信息
来源: 评论
Recent Developments and Methods of Cloud Data Security in Post-Quantum Perspective
Recent Developments and Methods of Cloud Data Security in Po...
收藏 引用
2021 International Conference on Artificial Intelligence and Smart Systems, ICAIS 2021
作者: Ilias, Shaik Mohammed Ceronmani Sharmila, V. Hindustan Institute of Technology and Science Dept. of Computer Science and Engineering Chennai India
Cloud computing has changed the paradigm of using computing resources. It has shifted from traditional storage and computing to Internet based computing leveraging economy of scale, cost saving, elimination of data re... 详细信息
来源: 评论
Image based and Point Cloud based Methods for 3D View Reconstruction in Real-time Environment
Image based and Point Cloud based Methods for 3D View Recons...
收藏 引用
IEEE Annual Computing and Communication Workshop and Conference (CCWC)
作者: Arya Agrawal Teena Sharma Nishchal K. Verma Shantaram Vasikarla School of Computer Science and Engineering Vellore Institute of Technology Vellore India Mehta Family School of Data Science and Artificial Intelligence Indian Institute of Technology Guwahati India Dept. of Electrical Engineering Indian Institute of Technology Kanpur India Dept. of Computer Science California State University Northridge CA
3D view reconstruction in a real-time unknown environment poses several challenges to vision-based applications. Herein, this paper outlines real-time experimental results and analysis of 3D view reconstruction method...
来源: 评论
Presence-Aware Smart Office  7
Presence-Aware Smart Office
收藏 引用
7th International Conference on Advanced Computing and Communication Systems, ICACCS 2021
作者: Kuruvila, John Mathew, Jobin C Antony, Roshan Joseph Shaji, Syam Zacariah Thomas, Arun Sahrdaya College of Engineering and Technology Dept. of Computer Science and Engineering Kerala India
The world is now more connected than it has ever been. Billions of smartphones, laptops, servers and other devices communicate with each other over the internet every second of every day. One place where IoT devices c... 详细信息
来源: 评论
Intelligent Face Detection and Recognition System
Intelligent Face Detection and Recognition System
收藏 引用
2021 International Conference on Intelligent Technologies, CONIT 2021
作者: Sikder, Juel Chakma, Ratna Chakma, Rana Jyoti Das, Utpol Kanti Rangamati Science and Technology University Dept. of Computer Science and Engineering Rangamati Bangladesh
Face detection applications currently can use machine learning and equations for better identification of human faces in an image or video. In several types of applications such as recognition of face application that... 详细信息
来源: 评论
Cartoonize Images using TinyML Strategies with Transfer Learning
Cartoonize Images using TinyML Strategies with Transfer Lear...
收藏 引用
2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2021
作者: Acharjee, Jashaswimalya Deb, Suman National Institute of Technology Agartala Dept. of Computer Science and Engineering Agartala India
The gradual advancements towards the development of Deep Neural Networks has ultimately led to the development of certain specialised hardware for the application of such Networks with superior performance. But, many ... 详细信息
来源: 评论
An Al-Based Security System Using computer Vision and NLP Conversion System  3
An Al-Based Security System Using Computer Vision and NLP Co...
收藏 引用
3rd International Conference on Sustainable Technologies for Industry 4.0, STI 2021
作者: Karim, Md. Rajaul Chowdhury, Punam Rahman, Latifur Kazary, Sumaya Dhaka University of Engineering and Technology Dept. of Computer Science and Engineering Gazipur Bangladesh
In this 21st century, ensuring the security of a place is one of the most crucial things. We have to use either manual or semi-autonomous entrances and human security guards in most of the security systems. Many sophi... 详细信息
来源: 评论
Advancements in Quantum Machine Learning and Quantum Deep Learning: A Comprehensive Review of Algorithms, Challenges, and Future Directions
Advancements in Quantum Machine Learning and Quantum Deep Le...
收藏 引用
Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security (iQ-CCHESS), International Conference on
作者: G S Priyanka M Venkatesan P Prabhavathy Dept. of Computer Science & Engineering NIT Puducherry Karaikal India Dept. of Information Technology VIT University Vellore India
At the nexus of quantum computing and machine learning, quantum machine learning (QML) and quantum deep learning (QDL) have emerged as promising fields. By enhancing computational capabilities and addressing challengi...
来源: 评论
Identification of phishing urls using machine learning  2
Identification of phishing urls using machine learning
收藏 引用
2nd International Conference on Mathematical Sciences, ICMS 2020
作者: Vineeth Krishna, C. Narayana Swamy, C. Viji Amutha Mary, A. Selvan, Mercy Paul Dept. of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Phishing is a typical assault on unsuspecting individuals by making them to reveal their one-of-a-kind data utilizing fake sites. The target of phishing site URLs is to purloin the individual data like client name, pa... 详细信息
来源: 评论
Taxonomy of Proactive Detection Methods of Drunk Driving for Enhancing Traffic Safety
Taxonomy of Proactive Detection Methods of Drunk Driving for...
收藏 引用
IEEE International Symposium on Embedded Multicore Socs (MCSoC)
作者: Richard Preston Swiley Razan Alsulieman Ahmed Sherif Mohamed Elsersy Kasem Khalil School of Computing Sciences and Computer Engineering University of Southern Mississippi MS USA Computer and Information Systems Dept. Higher Colleges of Technology AlAin Abu Dhabi UAE Electrical and Computer Engineering Department University of Mississippi MS USA
Drunk driving continues to be a substantial public health issue, leading to a multitude of accidents and deaths on a global scale. Conventional techniques for identifying drunk driving, such as breathalyzers and field... 详细信息
来源: 评论