咨询与建议

限定检索结果

文献类型

  • 31,668 篇 会议
  • 4,989 篇 期刊文献
  • 259 册 图书
  • 1 篇 科技报告

馆藏范围

  • 36,917 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,995 篇 工学
    • 16,618 篇 计算机科学与技术...
    • 13,955 篇 软件工程
    • 6,092 篇 信息与通信工程
    • 3,596 篇 控制科学与工程
    • 2,787 篇 电子科学与技术(可...
    • 2,732 篇 电气工程
    • 2,462 篇 生物工程
    • 2,031 篇 生物医学工程(可授...
    • 1,617 篇 光学工程
    • 1,400 篇 机械工程
    • 1,264 篇 仪器科学与技术
    • 1,257 篇 动力工程及工程热...
    • 1,058 篇 化学工程与技术
    • 879 篇 安全科学与工程
    • 742 篇 交通运输工程
  • 11,825 篇 理学
    • 6,418 篇 数学
    • 3,228 篇 物理学
    • 2,697 篇 生物学
    • 2,120 篇 统计学(可授理学、...
    • 1,412 篇 系统科学
    • 1,134 篇 化学
  • 5,972 篇 管理学
    • 3,448 篇 管理科学与工程(可...
    • 2,819 篇 图书情报与档案管...
    • 1,917 篇 工商管理
  • 1,692 篇 医学
    • 1,470 篇 临床医学
    • 1,376 篇 基础医学(可授医学...
    • 906 篇 药学(可授医学、理...
    • 699 篇 公共卫生与预防医...
  • 1,086 篇 法学
    • 880 篇 社会学
  • 682 篇 经济学
    • 682 篇 应用经济学
  • 510 篇 农学
  • 464 篇 教育学
  • 162 篇 文学
  • 78 篇 军事学
  • 42 篇 艺术学
  • 6 篇 哲学
  • 4 篇 历史学

主题

  • 1,116 篇 accuracy
  • 865 篇 feature extracti...
  • 864 篇 computational mo...
  • 728 篇 deep learning
  • 720 篇 training
  • 700 篇 computer science
  • 526 篇 support vector m...
  • 526 篇 real-time system...
  • 522 篇 machine learning
  • 453 篇 predictive model...
  • 429 篇 internet of thin...
  • 364 篇 convolutional ne...
  • 359 篇 data models
  • 349 篇 computer archite...
  • 341 篇 reliability
  • 314 篇 data mining
  • 311 篇 optimization
  • 289 篇 routing
  • 272 篇 artificial intel...
  • 263 篇 wireless sensor ...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 74 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 58 篇 dept. of informa...
  • 57 篇 nikhef national ...
  • 56 篇 dept. of compute...
  • 55 篇 dept. of compute...
  • 55 篇 dept. of informa...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 49 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 86 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 83 篇 chen a.
  • 80 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 79 篇 boumaaza j.
  • 73 篇 coleiro a.
  • 72 篇 gozzini s.r.
  • 68 篇 huang f.
  • 61 篇 dallier r.
  • 53 篇 anguita m.
  • 51 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 34,933 篇 英文
  • 1,548 篇 其他
  • 329 篇 中文
  • 63 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. Informatics Engineering of Computer Science"
36917 条 记 录,以下是61-70 订阅
排序:
Automated Identification of Pneumonia Employing Convolution Neural Networks and the VGG-16 Model  1
Automated Identification of Pneumonia Employing Convolution ...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Srivastava, Anamika Gupta, Anuj Kaushik, Deepti Gupta, Neha Chadha, Shikha Chauhan, Rosey Noida Institute Of Engineering Technology Dept. of Computer Science & Engineering Gerater Noida India Sharda Unviersity Dept. of Computer Science & Engineering Gerater Noida India School of Engineering and Technology IIMT University Dept. of Computer Science and Engineering U.P Meerut India ABES Engineering College Dept. of Computer Science UP Ghaziabad India
Pneumonia, an inflammatory lung disease, impacts the small air sacs known as alveoli and is typically caused by the bacteria Streptococcus pneumonia. Symptoms commonly include a combination of productive or dry cough,... 详细信息
来源: 评论
Leveraging Artificial Intelligence for Active Cyber Defense Against to Advanced Persistent Threats to Homeland Security
Leveraging Artificial Intelligence for Active Cyber Defense ...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Özbay, Recep Yavanoǧlu, Uraz Graduate School of Informatics Gazi University Dept. Of Computer Forensics Ankara Turkey Gazi University Faculty of Engineering Dept. of Computer Engineering Ankara Turkey
Increasing cyber threats have rendered traditional security solutions such as firewalls and intrusion-detection/prevention systems insufficient in providing adequate protection against advanced persistent threats to h... 详细信息
来源: 评论
EXAMINING CRITICAL FACTORS IN FCA-SAPO FRAMEWORK: A QUALITATIVE AND QUANTITATIVE STUDY ON THE ADOPTION OF FOG COMPUTING IN SAUDI ARABIAN PUBLIC ORGANISATIONS BY IT EMPLOYEES  18
EXAMINING CRITICAL FACTORS IN FCA-SAPO FRAMEWORK: A QUALITAT...
收藏 引用
18th International Conferences IADIS Information Systems 2025 and 23rd International Conference on e-Society 2025
作者: Alyami, Mohammed Beloff, Natalia White, Martin Dept. of Informatics University of Sussex Brighton United Kingdom Dept. of Computer Science Jazan University Jazan Saudi Arabia
Fog computing is a rapidly evolving domain within information technology and enterprise computing, providing organisations with the opportunity to greatly improve efficiency and productivity. This is particularly pert... 详细信息
来源: 评论
A Comprehensive Analysis on Skin Cancer Classification Using Transfer Learning  3
A Comprehensive Analysis on Skin Cancer Classification Using...
收藏 引用
3rd International Conference on Advancement in Electrical and Electronic engineering, ICAEEE 2024
作者: Renu, Israt Zerin Haque, Md. Momenul Paul, Subrata Kumer Mou, Mahmuda Shirin Rahman, Md Nahid Gupta, Sudipta Sen Paul, Rakhi Rani Rabindra Maitree University Dept. of Computer Science and Engineering Kushtia7000 Bangladesh Qadirabad Dept. of Computer Science and Engineering Dayarampur Natore6431 Bangladesh University of Rajshahi Dept. of Computer Science and Engineering Rajshahi6205 Bangladesh
Skin cancer, a prevalent and potentially life-threatening disease, necessitates accurate and timely diagnosis for effective treatment. In addressing this critical healthcare challenge, this research proposes a novel a... 详细信息
来源: 评论
A Transformer-Based Model for Image Caption Generation with Memory Enhancement
A Transformer-Based Model for Image Caption Generation with ...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Ome, Shadika Afroze Azhar, Tanvir Asaduzzaman East Delta University Dept. of Computer Science & Engineering Chattogram Bangladesh Chittagong University of Engineering & Technology Dept. of Computer Science & Engineering Chattogram Bangladesh
This study proposes a convolution-free transformer-based method for generating accurate descriptions of images. A Vision Transformer is utilized as the primary encoder, replacing traditional CNN, and a Meshed Memory T... 详细信息
来源: 评论
The Rational Construction of a Wheeler DFA  35
The Rational Construction of a Wheeler DFA
收藏 引用
35th Annual Symposium on Combinatorial Pattern Matching, CPM 2024
作者: Manzini, Giovanni Policriti, Alberto Prezza, Nicola Riccardi, Brian Dept. of Computer Science University of Pisa Italy Dept. of Mathematics Computer Science and Physics University of Udine Italy Dept. of Environmental Sciences Informatics and Statistics Ca’ Foscari University of Venice Italy Dept. of Informatics Systems and Communication University of Milano-Bicocca Italy
Deterministic Finite Wheeler Automata are a natural generalisation to regular languages of the theory of compressed data structures originated by the introduction of the Burrows-Wheeler transform. Indeed, if we can fi... 详细信息
来源: 评论
Non-Intrusive Alert For Drivers With Fatigue  4
Non-Intrusive Alert For Drivers With Fatigue
收藏 引用
4th IEEE Asian Conference on Innovation in Technology, ASIANCON 2024
作者: Amrutha, K. Shreekumar, T. Resmi, K.R. Vineetha, K.R. Dept. of Computer Science Bangalore India Mite Dept of Computer Science and Engineering Mangalore India
Fatigue during driving significantly impairs a driver's reaction time, awareness, and decision-making abilities, leading to an increased risk of accidents. Recognising and mitigating driver fatigue is crucial for ... 详细信息
来源: 评论
An Effective Method to Detect DHCP Starvation Attack using Port Scanning
An Effective Method to Detect DHCP Starvation Attack using P...
收藏 引用
2023 International Conference on Next-Generation Computing, IoT and Machine Learning, NCIM 2023
作者: Jony, Asaduzzaman Miah, Abu Saleh Musa Islam, Muhammad Nazrul Dept. of Computer Science and Engineering Dhaka Bangladesh The University of Aizu Dept. of Computer Science and Engineering Aizuwakamatsu Japan Dept. of Computer Science and Engineering Dhaka Bangladesh
Nowadays, the DHCP starvation attack is a crucial attack that denied the services for the legitimate network user where the attacker mainly occupies all the IP addresses in the DHCP server pool. Most of the existing s... 详细信息
来源: 评论
Chatbot Based on Emotions Using Deep Learning  1
Chatbot Based on Emotions Using Deep Learning
收藏 引用
1st International Conference on Optimization Techniques for Learning, ICOTL 2023
作者: Nirupa, V. Renuka, G.B. Naga Lakshmi, B. Sumanth Kumar, C.P. Rudra Sekhar Reddy, A. Paramesh, J. Dept. of Computer Science & Engineering Madanapalle India Dept. of Computer Science & Engineering Anantapur India
Human emotions are unpredictable as they change very frequently. Human emotions areinvoluntary mental states of feelings and are accompanied by physiological changes. Emotions which can be detected through the facial ... 详细信息
来源: 评论
Classification and Prediction of Alzheimer's Disease using Deep Learning  7
Classification and Prediction of Alzheimer's Disease using D...
收藏 引用
7th International Conference on Intelligent Computing and Control Systems, ICICCS 2023
作者: Brindha, D. Ebenezer, V. Selvaraj, E. Jackson Bevin Geoff, D.M. Dileep, B. Bethina Nambi, M. Thirumalai Dept. of Computer Science and Engineering Coimbatore India Dept. of Computer Science and Engineering Coimbatore India
This study has proposed a novel technique for performing object detection and image classification with a Convolutional Neural Network (CNN) architecture. Nevertheless, employing a 2D CNN architecture to identify a lo... 详细信息
来源: 评论