咨询与建议

限定检索结果

文献类型

  • 22,150 篇 会议
  • 3,542 篇 期刊文献
  • 209 册 图书

馆藏范围

  • 25,901 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,856 篇 工学
    • 11,170 篇 计算机科学与技术...
    • 9,359 篇 软件工程
    • 4,303 篇 信息与通信工程
    • 2,516 篇 控制科学与工程
    • 2,157 篇 电子科学与技术(可...
    • 2,132 篇 电气工程
    • 1,540 篇 生物工程
    • 1,323 篇 生物医学工程(可授...
    • 1,142 篇 光学工程
    • 1,028 篇 机械工程
    • 882 篇 仪器科学与技术
    • 834 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 626 篇 安全科学与工程
    • 525 篇 交通运输工程
    • 469 篇 材料科学与工程(可...
    • 446 篇 建筑学
  • 8,234 篇 理学
    • 4,525 篇 数学
    • 2,421 篇 物理学
    • 1,707 篇 生物学
    • 1,385 篇 统计学(可授理学、...
    • 917 篇 系统科学
    • 759 篇 化学
  • 4,001 篇 管理学
    • 2,399 篇 管理科学与工程(可...
    • 1,836 篇 图书情报与档案管...
    • 1,259 篇 工商管理
  • 1,077 篇 医学
    • 952 篇 临床医学
    • 887 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
  • 714 篇 法学
    • 562 篇 社会学
  • 444 篇 经济学
  • 348 篇 教育学
  • 320 篇 农学
  • 110 篇 文学
  • 72 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 723 篇 accuracy
  • 540 篇 feature extracti...
  • 501 篇 deep learning
  • 491 篇 computational mo...
  • 386 篇 training
  • 383 篇 support vector m...
  • 365 篇 computer science
  • 323 篇 internet of thin...
  • 299 篇 real-time system...
  • 288 篇 machine learning
  • 282 篇 computer archite...
  • 247 篇 predictive model...
  • 227 篇 reliability
  • 222 篇 routing
  • 221 篇 convolutional ne...
  • 220 篇 optimization
  • 209 篇 data mining
  • 207 篇 neural networks
  • 200 篇 throughput
  • 195 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 84 篇 université de st...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 80 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 67 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 90 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 75 篇 dallier r.
  • 72 篇 anguita m.
  • 61 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 60 篇 boettcher m.
  • 58 篇 celli s.
  • 53 篇 aly z.
  • 52 篇 dornic d.

语言

  • 23,073 篇 英文
  • 2,461 篇 其他
  • 272 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25901 条 记 录,以下是4851-4860 订阅
Are Fictitious Nodes Needed at All?
SSRN
收藏 引用
SSRN 2023年
作者: Schweitzer, Nadav Cohen, Liad Hirst, Tirza Dvir, Amit Stulman, Ariel Ariel Cyber Innovation Center Dept. of Computer Science Ariel University Israel Department of Computer Science Jerusalem College of Technology Jerusalem Israel
Mobile ad-hoc networks (manets) are everywhere. They are the basis for many current technologies (including vanets, iot, etc.), and used in multiple domains (including military, disaster zones, etc.). For them to func... 详细信息
来源: 评论
Multidisease Prediction and Causality Analysis with Hospital Management System
Multidisease Prediction and Causality Analysis with Hospital...
收藏 引用
Applied Artificial Intelligence and Computing (ICAAIC), International Conference on
作者: Abhro Kumar Roy Subham Gayen P Renukadevi Dept. Of Computer Science and Engineering (C. Tech Department) SRM Institute of Science and Technology KTR Chennai Computer Science and Engineering (C. Tech Department) SRM Institute of Science and Technology KTR Chennai
In healthcare domain, the demand for efficient diagnosis and hospital management systems has increased unprecedentedly. This research study proposes a novel Symptom Checker integrated with a Multidisease Hospital Mana... 详细信息
来源: 评论
Persuasive: A Node Isolation Attack Variant for Olsr-Based Manets and its Mitigation
SSRN
收藏 引用
SSRN 2023年
作者: Schweitzer, Nadav Cohen, Liad Dvir, Amit Stulman, Ariel Department of Computer Science Jerusalem College of Technology Jerusalem Israel Ariel Cyber Innovation Center Dept. of Computer Science Ariel University Israel
Mobile ad hoc networks (manets) are self-creating, self-configuring, self-healing, decentralized adaptive networks. The Optimized Link State Routing protocol (olsr) is one of four base routing protocols for use in ad ... 详细信息
来源: 评论
Reducing Client-Side Cost in Secure Inner Product Evaluations
Reducing Client-Side Cost in Secure Inner Product Evaluation...
收藏 引用
International Conference on Information Networking
作者: Changhee Hahn Dongyoung Koo Junbeom Hur dept. Electrical and Information Engineering Seoul National University of Science and Technology South Korea dept. Convergence Security Hansung University South Korea dept. Computer Science and Engineering Korea University South Korea
In the era of ubiquitous data collection and analysis, preserving privacy while utilizing data, such as inner product evaluations, poses a significant challenge. One such method is inner product functional encryption ... 详细信息
来源: 评论
Identification of Children with ADHD from EEG Signals Based on Entropy Measures and Support Vector Machine
Identification of Children with ADHD from EEG Signals Based ...
收藏 引用
European Workshop on Visual Information Processing (EUVIP)
作者: Md. Maniruzzaman Md. Al Mehedi Hasan Taro Suzuki Jungpil Shin School of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan Dept. of Computer Science & Engineering Rajshahi University of Engineering and Technology Rajshahi Bangladesh
Attention deficit hyperactivity disorder (ADHD) is one of the major psychiatric and neurodevelopment disorders that affects 11% of children worldwide. Moreover, the prevalence of ADHD has rapidly increased over time w...
来源: 评论
AI Based Monitoring System for Social Engineering  3
AI Based Monitoring System for Social Engineering
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Yapa, K. Udara, S.W.I. Wijayawardane, U.P.B. Kularatne, K.N.P. Navaratne, N.M.P.P. Dharmaphriya, W. G. V. U Sri Lanka Institute of Information Technology Dept. of Computer System Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Dept. of Computer Science and Software Engineering Malabe Sri Lanka
Social media is one of the most predominantly used online platforms by individuals across the world. However, very few of these social media users are educated about the adverse effects of obliviously using social med... 详细信息
来源: 评论
An effective steganographic technique for hiding the image data using the LSB technique
Cyber Security and Applications
收藏 引用
Cyber Security and Applications 2025年 3卷
作者: Panigrahi, Rasmita Padhy, Neelamadhab School of Engineering and Technology Dept. of Computer Science and Engineering GIET University Gunupur Odisha Gobriguda India
Steganography is the art and science of writing secret messages so that neither the sender nor the intended recipient knows there is a hidden message. Data hiding is the art of hiding data for various reasons, such as... 详细信息
来源: 评论
Assessing the Efficacy of Distributed Ledger technology for Immutable Data Logging and Fraud Prevention in IoT Retail Applications
Assessing the Efficacy of Distributed Ledger Technology for ...
收藏 引用
2024 International Conference on Advances in Computing Research on Science Engineering and technology, ACROSET 2024
作者: Ponnrajakumari, M. Elanangai, V. Ramprasad, S.R. Velpula, Vijaya Kumar Bhagyalakshmi, L. Prabha, A.G. Velammal Engineering College Dept. of Ece Chennai India St. Peter's Institute of Higher Education and Research. Avadi Department of Electrical and Electronics Engineering Chennai India School of Computing Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Mlr Institute of Technology Dept of Ece Hyderabad India Rajalakshmi Engineering College Dept. of Ece Chennai India
This paper presents a comprehensive framework for assessing the efficacy of Distributed Ledger technology (DLT) in IoT retail applications. The framework integrates five key algorithms: Data Validation Algorithm (DVA)... 详细信息
来源: 评论
The YOLOv8 Edge: Harnessing Custom Datasets for Superior Real-Time Detection  18
The YOLOv8 Edge: Harnessing Custom Datasets for Superior Rea...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Ahmed, Tafreed Maaz, Ahmad Mahmood, Danyaal Abideen, Zain Ul Arshad, Usama Ali, Raja Hashim BCMaterials Basque Center for Materials Applications & Nanostructure Basque Country Leioa Spain Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany
YOLO has become a central real-time object detection system for robotics, driverless cars, and video monitoring applications. Developing a custom object detection solution that can detect specific objects in real-time... 详细信息
来源: 评论
A New Rhythm in A1: Convolutional Neural Networks for Music Genre Classification  18
A New Rhythm in A1: Convolutional Neural Networks for Music ...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Javed, Huzaifa Arshad, Usama Abideen, Zain Ul Ali, Raja Hashim BCMaterials Basque Center for Materials Applications & Nanostructure Basque Country Leioa Spain Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany
Despite the significance of music genre classification in audio identification, it remains under-explored within AI research. This tool is crucial for personalized music recommendations and similar music detection. We... 详细信息
来源: 评论