咨询与建议

限定检索结果

文献类型

  • 26,966 篇 会议
  • 4,059 篇 期刊文献
  • 209 册 图书

馆藏范围

  • 31,234 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,086 篇 工学
    • 12,765 篇 计算机科学与技术...
    • 10,633 篇 软件工程
    • 5,544 篇 信息与通信工程
    • 3,211 篇 控制科学与工程
    • 2,952 篇 电子科学与技术(可...
    • 2,846 篇 电气工程
    • 1,837 篇 生物工程
    • 1,586 篇 生物医学工程(可授...
    • 1,445 篇 光学工程
    • 1,335 篇 机械工程
    • 1,255 篇 仪器科学与技术
    • 1,149 篇 动力工程及工程热...
    • 956 篇 化学工程与技术
    • 753 篇 安全科学与工程
    • 703 篇 交通运输工程
    • 603 篇 材料科学与工程(可...
    • 599 篇 建筑学
  • 9,745 篇 理学
    • 5,116 篇 数学
    • 3,078 篇 物理学
    • 1,987 篇 生物学
    • 1,611 篇 统计学(可授理学、...
    • 1,135 篇 系统科学
    • 964 篇 化学
  • 4,683 篇 管理学
    • 2,930 篇 管理科学与工程(可...
    • 2,030 篇 图书情报与档案管...
    • 1,513 篇 工商管理
  • 1,318 篇 医学
    • 1,145 篇 临床医学
    • 1,054 篇 基础医学(可授医学...
    • 674 篇 药学(可授医学、理...
  • 829 篇 法学
    • 653 篇 社会学
  • 543 篇 经济学
  • 458 篇 农学
  • 376 篇 教育学
  • 144 篇 文学
  • 68 篇 军事学
  • 28 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 951 篇 accuracy
  • 703 篇 feature extracti...
  • 586 篇 deep learning
  • 566 篇 computational mo...
  • 530 篇 training
  • 447 篇 support vector m...
  • 418 篇 real-time system...
  • 387 篇 internet of thin...
  • 335 篇 predictive model...
  • 335 篇 machine learning
  • 314 篇 convolutional ne...
  • 304 篇 computer science
  • 296 篇 reliability
  • 263 篇 computer archite...
  • 239 篇 routing
  • 237 篇 neural networks
  • 234 篇 optimization
  • 212 篇 wireless communi...
  • 210 篇 image segmentati...
  • 204 篇 monitoring

机构

  • 84 篇 institute of inf...
  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 75 篇 tno technical sc...
  • 68 篇 université de st...
  • 66 篇 università di ca...
  • 66 篇 nikhef national ...
  • 61 篇 dept. of informa...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 dept. of electri...
  • 51 篇 dept. of compute...
  • 49 篇 university würzb...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 79 篇 boumaaza j.
  • 78 篇 díaz a.f.
  • 78 篇 coleiro a.
  • 78 篇 gozzini s.r.
  • 76 篇 dallier r.
  • 69 篇 anguita m.
  • 67 篇 huang f.
  • 51 篇 kulikovskiy v.
  • 46 篇 boettcher m.
  • 45 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.

语言

  • 29,407 篇 英文
  • 1,270 篇 其他
  • 374 篇 中文
  • 108 篇 日文
  • 77 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Engineering and Information Technology"
31234 条 记 录,以下是651-660 订阅
排序:
An Introduction of Explainable Artificial Intelligence to Winter Sports Performance Analysis
An Introduction of Explainable Artificial Intelligence to Wi...
收藏 引用
2023 IEEE International Workshop on Sport, technology and Research, STAR 2023
作者: Odong, Lawrence A. Bouquet, Paolo University of Trento Dept. of Information Engineering and Computer Science Trento Italy
In recent years, the utilization of machine learning techniques has revolutionized performance analysis in the field of sports. However, a crucial drawback of these algorithms is their inherent black box nature, which... 详细信息
来源: 评论
Resource Allocation Optimization in 5G Networks Using Variational Quantum Regressor  1
Resource Allocation Optimization in 5G Networks Using Variat...
收藏 引用
1st International Conference on Quantum Communications, Networking, and Computing, QCNC 2024
作者: Pathak, Param Oad, Vidhi Prajapati, Aditya Innan, Nouhaila Sardar Vallabhbhai Patel Institute of Technology Dept. of Computer Engineering India Vishwakarma Government Engineering College Dept. of Electronics and Communication India Dhirubhai Ambani Institute of Information and Communication Technology Dept. of Information and Communication Technology India Quantum Physics and Magnetism Team LPMC Faculty of Sciences Ben M'sick Hassan II University of Casablanca Morocco
Quantum Machine Learning (QML) is a powerful tool for addressing complex telecommunications challenges. As 5G technology continues to evolve, our research provides a roadmap for integrating QML into the resource alloc... 详细信息
来源: 评论
Investigating the Effectiveness of Artificial Intelligence in Watermarking and Steganography for Digital Media Security  21
Investigating the Effectiveness of Artificial Intelligence i...
收藏 引用
21st International Multi-Conference on Systems, Signals and Devices, SSD 2024
作者: Abdalwahid, Shadan M.J.A Hashim, Wassan Adnan Saeed, Mohammed Ganim Altaie, Sarmad A. Kareem, Shahab Wahhab Engineering College Erbil Polytechnic University Information System Engineering Dept. Erbil Iraq AIQAlam University College Medical Instruments Techniques Dept Kirkuk Iraq Dohuk Polytechnic University Department of Information Technology Dohuk Iraq University of Technology Computer Engineering Department Baghdad Iraq Erbil Technical Engineering College Erbil Polytechnic University Information System Engineering Dept. Erbil Iraq
Watermarking and Steganography are methods of embedding digital information within images or other media, such as text or audio, for the purpose of Copyright Protection or covert communication. This field of study is ... 详细信息
来源: 评论
Secure Authentication in Smart Home Environment Using SGX and Biometrics: Survey  1
Secure Authentication in Smart Home Environment Using SGX an...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Rajeh, Zahra M. Alhomdy, Sharaf A. Thabit, Fursan Dept. Inforamtion Technology Sana’a University Sana’a Yemen Dept. Computer Engineering Ege University İzmir Turkey
Recently, our lifestyles have evolved to be smarter, with various devices becoming available for daily activities, such as smartphones, smart watches, smart lighting, and smart cameras. A smart home, also known as a c... 详细信息
来源: 评论
Immersive networked music performance systems: identifying latency factors
Immersive networked music performance systems: identifying l...
收藏 引用
2023 Immersive and 3D Audio: from Architecture to Automotive, I3DA 2023
作者: Turchet, Luca Tomasetti, Matteo University of Trento Dept. of Information Engineering and Computer Science Trento Italy
Music playing with binaural systems has thus far received remarkably little attention by the research community. Such an activity is particularly relevant for the case of networked music performances (NMPs), where geo... 详细信息
来源: 评论
Leveraging Sentiment Analysis and Negation Phrase Identification for Mitigating information Overload in E-commerce  3
Leveraging Sentiment Analysis and Negation Phrase Identifica...
收藏 引用
3rd IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2023
作者: Ranganatha, K. Rao, Abhishek S. Shilpa, B. Nayak, Vasanth Shet, Nakul N Canara Engineering College Dept. of Information Science & Engineering Benjanapadavu India NMAM Institute of Technology Dept. of Information Science & Engineering Nitte India
In the era of e-commerce, online reviews have become crucial for both consumers and merchants. However, the overwhelming volume of reviews has resulted in information Overload (10). To address this, we employ Sentimen... 详细信息
来源: 评论
AttRes-UNet: A Dual-Model Approach for Brain Tumor Segmentation  4
AttRes-UNet: A Dual-Model Approach for Brain Tumor Segmentat...
收藏 引用
4th International Conference on Advancement in Electronics and Communication engineering, AECE 2024
作者: Kolekar, Samruddhi Maheshkumar Yadav, Agnesh Chandra Yadav, Suchita Dash, Daba Prasad Thaper Institue of Engineering and Technology Dept. Electrical Engineering Patiala India India Instite of Technology Patna Dept. Electrical Engineering Patna India Bennett University Dept. of Computer Science and Engineering Gr. Noida India
Accurate segmentation of brain tumors in MRI images is crucial for diagnosis, treatment planning, and disease monitoring. Traditional manual segmentation methods are time- consuming and prone to variability, while sta... 详细信息
来源: 评论
Investigating the Impact of Heuristic Algorithms on Cyberthreat Detection  2
Investigating the Impact of Heuristic Algorithms on Cyberthr...
收藏 引用
2nd International Conference on Advances in Computation, Communication and information technology, ICAICCIT 2024
作者: Kalla, Dinesh Mohammed, Abdul Sajid Boddapati, Venkata Nagesh Jiwani, Nasmin Kiruthiga, T. Dept. of Computer Science Colorado Technical University CharlotteNC United States Dept of School of Computer and Information Sciences University of the Cumberlands Kentucky United States Dept. of Computer Science Microsoft CharlotteNC United States Dept. of Information Technology University of The Cumberlands WilliamsburgKY United States Department of ECE Vetri Vinayaha College of Engineering and Technology Tamil Nadu Trichy India
This paper investigates the effect of heuristic algorithms on cybersecurity hazard detection and mitigation. To be able to do so, the authors analyze the performance of two heuristics-based algorithms-the simple Heuri... 详细信息
来源: 评论
Effect of Hyper-Parameter Tuning on the Performance of Augmented Random Search  1
Effect of Hyper-Parameter Tuning on the Performance of Augme...
收藏 引用
1st International Conference on Informatics, ICI 2022
作者: Rana, Misha Kumar, Nimesh Sharma, Himanshi Pandey, Kavita Jaypee Institute of Information Technology Dept. of Computer Science & Engineering and Information Technology Noida India
Recently, researchers working in the field of Artificial Intelligence have been keen on finding new algorithms that provide optimal results. One such reinforcement learning algorithm is the Augmented Random Search. Th... 详细信息
来源: 评论
A Comprehensive Survey on Automotive Hacking  1
A Comprehensive Survey on Automotive Hacking
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Maodah, Khawla A. Alhomdy, Sharaf A. Thabit, Fursan Dept. Inforamtion Technology Sana’a University Sana’a Yemen Dept. Computer Engineering Ege University İzmir Turkey
Using cutting-edge technologies in automobiles has increased concerns about car hacking. Network connections like Bluetooth, Wi-Fi, and 4G LTE have expanded the attack surface. The weaknesses in hardware and software ... 详细信息
来源: 评论