咨询与建议

限定检索结果

文献类型

  • 22,137 篇 会议
  • 3,563 篇 期刊文献
  • 208 册 图书

馆藏范围

  • 25,908 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,877 篇 工学
    • 11,192 篇 计算机科学与技术...
    • 9,391 篇 软件工程
    • 4,314 篇 信息与通信工程
    • 2,519 篇 控制科学与工程
    • 2,162 篇 电子科学与技术(可...
    • 2,142 篇 电气工程
    • 1,541 篇 生物工程
    • 1,323 篇 生物医学工程(可授...
    • 1,144 篇 光学工程
    • 1,032 篇 机械工程
    • 884 篇 仪器科学与技术
    • 838 篇 动力工程及工程热...
    • 745 篇 化学工程与技术
    • 626 篇 安全科学与工程
    • 525 篇 交通运输工程
    • 470 篇 材料科学与工程(可...
    • 453 篇 建筑学
  • 8,248 篇 理学
    • 4,541 篇 数学
    • 2,425 篇 物理学
    • 1,709 篇 生物学
    • 1,386 篇 统计学(可授理学、...
    • 917 篇 系统科学
    • 760 篇 化学
  • 4,015 篇 管理学
    • 2,415 篇 管理科学与工程(可...
    • 1,835 篇 图书情报与档案管...
    • 1,268 篇 工商管理
  • 1,077 篇 医学
    • 952 篇 临床医学
    • 886 篇 基础医学(可授医学...
    • 574 篇 药学(可授医学、理...
  • 716 篇 法学
    • 563 篇 社会学
  • 447 篇 经济学
  • 348 篇 教育学
  • 320 篇 农学
  • 110 篇 文学
  • 73 篇 军事学
  • 26 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 718 篇 accuracy
  • 538 篇 feature extracti...
  • 497 篇 deep learning
  • 489 篇 computational mo...
  • 381 篇 support vector m...
  • 381 篇 training
  • 365 篇 computer science
  • 320 篇 internet of thin...
  • 293 篇 real-time system...
  • 287 篇 machine learning
  • 281 篇 computer archite...
  • 247 篇 predictive model...
  • 227 篇 reliability
  • 222 篇 routing
  • 221 篇 convolutional ne...
  • 220 篇 optimization
  • 211 篇 data mining
  • 208 篇 neural networks
  • 200 篇 throughput
  • 198 篇 image segmentati...

机构

  • 85 篇 dept. of compute...
  • 84 篇 institut univers...
  • 84 篇 université de st...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 82 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 80 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 67 篇 university würzb...
  • 66 篇 università di ca...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university of jo...
  • 48 篇 university moham...
  • 44 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 university of gr...

作者

  • 95 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 90 篇 coleiro a.
  • 89 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 bozza c.
  • 80 篇 chen a.
  • 78 篇 gozzini s.r.
  • 76 篇 huang f.
  • 75 篇 dallier r.
  • 72 篇 anguita m.
  • 63 篇 enzenhöfer a.
  • 60 篇 kulikovskiy v.
  • 59 篇 boettcher m.
  • 57 篇 celli s.
  • 53 篇 aly z.
  • 52 篇 dornic d.

语言

  • 24,473 篇 英文
  • 1,042 篇 其他
  • 295 篇 中文
  • 75 篇 日文
  • 21 篇 朝鲜文
  • 3 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. Computer Technology and Computer Graphics"
25908 条 记 录,以下是4981-4990 订阅
Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things
Secure Deduplication with Dynamic Key Management in Fog Enab...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Jay Dave Nikumani Choudhury Utkarsh Tiwari Samyu Kamtam Kudapa Sai Rohith Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India
Fog computing is an extension of cloud computing and presents additional devices called fog devices near IoT devices providing services on behalf of cloud servers. Although fog computing brings several advantages, rap...
来源: 评论
A Machine Learning based Approach to Detect Phishing Attack
A Machine Learning based Approach to Detect Phishing Attack
收藏 引用
Advances in Computing, Communication Control and Networking (ICAC3N), International Conference on
作者: Naman Jain Prateek Jaiswal Sanyam Sharma Kavita Sharma Vishnu Sharma Galgotias College of Engineering and Technology Dept. of Computer Science and Engineering (CSE) Greater Noida India
Phishing is a well-known cybercrime that is increasing rapidly day by day. Phishing involves sending emails with suspicious links or their attachments that can accomplish a number of tasks and includes credentials or ... 详细信息
来源: 评论
Leveraging Supplementary Information for Multi-Modal Fake News Detection
Leveraging Supplementary Information for Multi-Modal Fake Ne...
收藏 引用
International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
作者: Chia-Chun Ho Bi-Ru Dai Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan
When natural disasters such as floods, earthquakes, terrorist attacks, and industrial accidents occur, first responders, news agencies, and victims increasingly use social media platforms as primary communication chan...
来源: 评论
Breathing+: A Game-based System for Enhancing Respiratory Training and Motivation
Breathing+: A Game-based System for Enhancing Respiratory Tr...
收藏 引用
IEEE International Conference on Knowledge Innovation and Invention (ICKII)
作者: Chang Yu Lin Edward T.-H. Chu Dept. of Computer Science and Information Engineering National Yunlin University of Science and Technology Yunlin Taiwan
Breathing difficulties, such as shortness of breath or rapid breathing, can significantly harm health and diminish the quality of life. Breathing exercises are widely recognized for their effectiveness in resolving su...
来源: 评论
CTVAE: Current Task Variational Auto-Encoder with Dynamic Ensemble Loss for Few-Shot Learning
CTVAE: Current Task Variational Auto-Encoder with Dynamic En...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Hao-Chin Su Yi-Ling Chen Dept. of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan
Few-shot learning is a challenging task in which a classifier needs to quickly adapt to new classes. These new classes are unseen in the training stage, and there are only very few samples (e.g., five images) provided...
来源: 评论
Lumpy Skin Disease Detection Using GUI Based Deep Learning Model in Cattle
Lumpy Skin Disease Detection Using GUI Based Deep Learning M...
收藏 引用
Ubiquitous Computing and Intelligent Information Systems (ICUIS), International Conference on
作者: Manjunath L Naikar Anupama S Nandeppanavar Medha Kudari Dept. of Master of Computer Applications K.L.E. Institute of Technology Hubballi India
Cattle are susceptible to the extremely contagious viral infection known as Lumpy Skin Disease (LSD), which results in skin lesions and substantial financial losses for the livestock industry. Visual Geometry Group 16...
来源: 评论
Impact of Inadequate Mg Activation on Dynamic Threshold Voltage of Schottky-type $p$-GaN Gate HEMTs
Impact of Inadequate Mg Activation on Dynamic Threshold Volt...
收藏 引用
International Symposium on Power Semiconductor Devices and Ics (ISPSD)
作者: Jiahui Sun Zheyang Zheng Li Zhang Yat Hon Ng Ji Shu Tao Chen Kevin J. Chen Dept. of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong China
To further reduce the forward gate current of Schottky-type $p$ -GaN gate HEMTs, inadequate Mg activation in $p$ -GaN is deployed in this work, which tends to convert the conventional $p$ -GaN into insulating GaN w...
来源: 评论
Distance Security Measures of Intuitionistic Fuzzy Set for Steganographic System
SSRN
收藏 引用
SSRN 2023年
作者: Ouyang, Chunjuan Zeng, Huan Liu, Huan Peng, Shuo Dept. of Computer Science and Technology College of Electronic and Information Engineering Jinggangshan University Ji’an China
Distance measure can measure the difference between intuitionistic fuzzy sets. According to the indeterminacy of steganography communication, the statistical features of cover and stego image are regarded as two intui... 详细信息
来源: 评论
A Case Study of Detecting HULK-based DDoS Traffic with Random Forest Classifier
A Case Study of Detecting HULK-based DDoS Traffic with Rando...
收藏 引用
IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)
作者: Yi-Xian Cai Tsu-Chen Chang Chih-Chiang Wang Dept. of Computer Science and Information Engineering National Kaohsiung University of Science and Technology Kaohsiung Taiwan
Modern network administration desires to have early detection of DDoS traffic before damages occur. Nevertheless, as Internet traffic grows over years, it becomes more challenging to detect DDoS traffic in an efficien...
来源: 评论
Movie Recommendation System by Using Collaborative Filtering and Louvain Algorithm
Movie Recommendation System by Using Collaborative Filtering...
收藏 引用
IEEE Region 10 Humanitarian technology Conference (R10-HTC)
作者: Rupal Verma Anjali Diwan Dept. of Computer Science and Engineering Bhilai Institute of Technology Durg India Dept. of CE-AI Marwadi University Gujarat India
This is the era of modern technology, where we are all surrounded and influenced b y technology. T he essay highlights the significance o f recommendation systems i n our technology-driven era and specifically focuses...
来源: 评论