咨询与建议

限定检索结果

文献类型

  • 22,002 篇 会议
  • 3,560 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,770 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,818 篇 工学
    • 11,160 篇 计算机科学与技术...
    • 9,365 篇 软件工程
    • 4,315 篇 信息与通信工程
    • 2,522 篇 控制科学与工程
    • 2,156 篇 电子科学与技术(可...
    • 2,145 篇 电气工程
    • 1,539 篇 生物工程
    • 1,319 篇 生物医学工程(可授...
    • 1,129 篇 光学工程
    • 1,029 篇 机械工程
    • 883 篇 仪器科学与技术
    • 835 篇 动力工程及工程热...
    • 744 篇 化学工程与技术
    • 627 篇 安全科学与工程
    • 525 篇 交通运输工程
    • 470 篇 材料科学与工程(可...
  • 8,230 篇 理学
    • 4,538 篇 数学
    • 2,413 篇 物理学
    • 1,706 篇 生物学
    • 1,378 篇 统计学(可授理学、...
    • 915 篇 系统科学
    • 763 篇 化学
  • 4,000 篇 管理学
    • 2,395 篇 管理科学与工程(可...
    • 1,838 篇 图书情报与档案管...
    • 1,252 篇 工商管理
  • 1,082 篇 医学
    • 947 篇 临床医学
    • 881 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
    • 451 篇 公共卫生与预防医...
  • 712 篇 法学
    • 560 篇 社会学
  • 444 篇 经济学
  • 346 篇 教育学
  • 315 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 681 篇 accuracy
  • 529 篇 feature extracti...
  • 477 篇 deep learning
  • 473 篇 computational mo...
  • 376 篇 support vector m...
  • 370 篇 training
  • 365 篇 computer science
  • 320 篇 internet of thin...
  • 284 篇 machine learning
  • 280 篇 real-time system...
  • 278 篇 computer archite...
  • 235 篇 predictive model...
  • 221 篇 routing
  • 220 篇 reliability
  • 219 篇 optimization
  • 212 篇 data mining
  • 210 篇 neural networks
  • 207 篇 convolutional ne...
  • 199 篇 throughput
  • 194 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 83 篇 université de st...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 79 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 91 篇 kalekin o.
  • 91 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 89 篇 calvo d.
  • 89 篇 coleiro a.
  • 82 篇 gal t.
  • 81 篇 bozza c.
  • 80 篇 chen a.
  • 77 篇 gozzini s.r.
  • 76 篇 dallier r.
  • 75 篇 huang f.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 58 篇 celli s.
  • 57 篇 boettcher m.
  • 54 篇 aly z.
  • 53 篇 dornic d.

语言

  • 24,769 篇 英文
  • 607 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25770 条 记 录,以下是4881-4890 订阅
排序:
Spatially-Sensitive Affine-Invariant Image Descriptors
Spatially-Sensitive Affine-Invariant Image Descriptors
收藏 引用
11th European Conference on computer Vision
作者: Bronstein, Alexander M. Bronstein, Michael M. BBK Technologies Ltd. United States Dept. of Electrical Engineering Tel Aviv University Israel Dept. of Computer Science Technion Israel Institute of Technology Israel
Invariant image descriptors play an important role in many computer vision and pattern recognition problems such as image search and retrieval. A dominant paradigm today is that of "bags of features", a repr... 详细信息
来源: 评论
Towards Sustainable Economic Zones with UAV-assisted Real-time Energy Replenishment in Wireless Rechargeable Sensor Networks  17
Towards Sustainable Economic Zones with UAV-assisted Real-ti...
收藏 引用
17th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023
作者: Goyal, Riya Tomar, Abhinav Singal, Gaurav Netaji Subhas University of Technology Dept. of Computer Science and Eng. New Delhi Dwarka India
An economic zone is bound to have continuous monitoring and control by an autonomous surveillance system for better production competency and security. Wireless Rechargeable Sensor Networks (WRSNs) have gained popular... 详细信息
来源: 评论
Performing Real-Time Network Attacks on Smart Weather Monitoring Device Using Kali Linux  1
Performing Real-Time Network Attacks on Smart Weather Monito...
收藏 引用
1st IEEE Bangalore Humanitarian technology Conference, B-HTC 2020
作者: Rao, Vidya Prema, K.V. Manipal Institute of Technology Manipal Academy of Higher Education Dept. of Computer Science and Engineering Manipal India
The advancement of applications in Internet-of-Things (IoT) has taken its share in smart farming and smart agriculture. The devices used in IoT can sense, process and communicate the data across the Internet to the us... 详细信息
来源: 评论
Emergence of human interaction by dynamic acquiring user's evaluation tendency
IEEJ Transactions on Electronics, Information and Systems
收藏 引用
IEEJ Transactions on Electronics, Information and Systems 2014年 第2期134卷 303-311+17页
作者: Sakuma, Takuto Kato, Shohei Dept. of Computer Science and Engineering Graduate School of Engineering Nagoya Institute of Technology Gokiso-cho Showa-ku Nagoya-city Aichi 466-8555 Japan
Research on human interaction is done actively in recently years, and activity of robot is expected in various scenes. For example, the robot which guides facilities while regarding communication as a human being or t... 详细信息
来源: 评论
Machine Learning Techniques for Identifying Child Abusive Texts in Online Platforms  15
Machine Learning Techniques for Identifying Child Abusive Te...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Mahmud, Tanjim Akter, Tahmina Uddin, Mohammad Kamal Aziz, Mohammad Tarek Hossain, Mohammad Shahadat Andersson, Karl Rangamati Science and Technology University Department of Computer Science and Engineering Rangamati4500 Bangladesh Port City International University Dept. of Computer Science and Engineering Chittagong Bangladesh Chittagong University of Engineering & Technology Department of Computer Science and Engineering Chittagong Bangladesh University of Chittagong Dept. of Computer Science and Engineering Chittagong4331 Bangladesh Luleå University of Technology Cybersecurity Laboratory Luleå97187 Sweden
This study addresses the critical issue of child abuse in digital communications by developing advanced machine learning and deep learning models for detecting child abusive texts in the Bengali language on online pla... 详细信息
来源: 评论
Opportunistic Mobile Networks  1
收藏 引用
丛书名: computer Communications and Networks
1000年
作者: Sudip Misra Barun Kumar Saha Sujata Pal
This textbook reviews the theory, applications, and latest breakthroughsin Delay Tolerant Networks (DTNs). Presenting a specific focus on OpportunisticMobile Networks (OMNs), the text considers the influence of human ... 详细信息
来源: 评论
A PubMed Meta search engine based on biomedical entity mining  25
A PubMed Meta search engine based on biomedical entity minin...
收藏 引用
25th International Workshop on Database and Expert Systems Applications, DEXA 2014
作者: Kanavos, Andreas Theodoridis, Evangelos Tsakalidis, Athanasios Computer Engineering and Informatics Department University of Patras Greece Informatics Engineering Dept. Technological Educational Institute of Central Greece Computer Technology Institute and Press Greece
Biomedical knowledge stored in the web is increasing significantly as most of the biomedical research papers are published online. Biomedical entity extraction is a crucial procedure for efficient text analysis and re... 详细信息
来源: 评论
AraBEM at WANLP 2022 Shared Task: Propaganda Detection in Arabic Tweets  7
AraBEM at WANLP 2022 Shared Task: Propaganda Detection in Ar...
收藏 引用
7th Arabic Natural Language Processing Workshop, WANLP 2022 held with EMNLP 2022
作者: Refaee, Eshrag A. Ahmed, Basem H. Saad, Motaz K. Faculty of Computer Sciences Jazan University Saudi Arabia Dept. of computer science Alaqsa University Palestine Faculty of Info Technology The Islamic University of Gaza Palestine
Propaganda is information or ideas that an organised group or government spreads to influence peoples' opinions, especially by not giving all the facts or secretly emphasising only one way of looking at the points... 详细信息
来源: 评论
An audio watermarking algorithm for audio authentication
An audio watermarking algorithm for audio authentication
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
作者: Zhao, Hong Shen, Dongsheng Dept. of Computer Science Key Laboratory of Information Security Technology Zhangzhou Normal University Zhangzhou China
A semi-fragile watermarking algorithm for copyright protection and content authentication is proposed in this paper. The features of the proposed algorithm are as follows: 1) The watermark dept. can be adaptively adju... 详细信息
来源: 评论
I-NXGeVita: IoMT based ubiquitous health monitoring system using deep neural networks  3
I-NXGeVita: IoMT based ubiquitous health monitoring system u...
收藏 引用
3rd IEEE International Conference on Recent Trends in Electronics, Information and Communication technology, RTEICT 2018
作者: Maxime Konan, Derroh Amany Patel, Warish Parul Institute of Engineering and Technology Parul University Dept. of Computer Science and Engineering Vadodara Gujarat India
Internet of Things is a new emerging technology by which devices can communicate using internet. The proposed work (i-NXGeVita), Intelligent Next Generation Vital Signs Monitoring System, states that how to apply Inte... 详细信息
来源: 评论