咨询与建议

限定检索结果

文献类型

  • 6,135 篇 会议
  • 952 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 7,141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,407 篇 工学
    • 3,421 篇 计算机科学与技术...
    • 2,884 篇 软件工程
    • 1,197 篇 信息与通信工程
    • 660 篇 控制科学与工程
    • 487 篇 生物工程
    • 484 篇 电气工程
    • 453 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 302 篇 光学工程
    • 265 篇 机械工程
    • 204 篇 动力工程及工程热...
    • 192 篇 仪器科学与技术
    • 187 篇 化学工程与技术
    • 186 篇 安全科学与工程
    • 173 篇 交通运输工程
    • 137 篇 建筑学
  • 2,176 篇 理学
    • 1,187 篇 数学
    • 565 篇 物理学
    • 521 篇 生物学
    • 374 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 180 篇 化学
  • 1,225 篇 管理学
    • 746 篇 管理科学与工程(可...
    • 543 篇 图书情报与档案管...
    • 393 篇 工商管理
  • 327 篇 医学
    • 284 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 168 篇 药学(可授医学、理...
    • 161 篇 公共卫生与预防医...
  • 213 篇 法学
    • 154 篇 社会学
  • 135 篇 教育学
  • 129 篇 经济学
  • 116 篇 农学
  • 32 篇 文学
  • 15 篇 军事学
  • 5 篇 艺术学

主题

  • 244 篇 accuracy
  • 196 篇 feature extracti...
  • 152 篇 deep learning
  • 145 篇 computational mo...
  • 137 篇 machine learning
  • 123 篇 training
  • 117 篇 predictive model...
  • 112 篇 support vector m...
  • 112 篇 real-time system...
  • 110 篇 internet of thin...
  • 103 篇 cloud computing
  • 97 篇 visualization
  • 88 篇 data mining
  • 87 篇 security
  • 84 篇 software
  • 83 篇 semantics
  • 83 篇 artificial intel...
  • 81 篇 neural networks
  • 80 篇 monitoring
  • 79 篇 optimization

机构

  • 52 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 25 篇 dept. of informa...
  • 23 篇 dept. of compute...
  • 22 篇 school of automa...
  • 20 篇 university of th...
  • 18 篇 school of comput...
  • 17 篇 institute of inf...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of informa...
  • 14 篇 school of comput...
  • 14 篇 dept. of informa...
  • 14 篇 research center ...
  • 14 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 13 篇 tsinghua nationa...
  • 13 篇 dept. of informa...
  • 13 篇 dept. of compute...
  • 13 篇 chitkara univers...
  • 13 篇 turku centre for...

作者

  • 22 篇 huang minlie
  • 20 篇 yen-lin chen
  • 18 篇 xiaojiang du
  • 15 篇 fotiadis dimitri...
  • 14 篇 chen yen-lin
  • 14 篇 guru prasad m.s.
  • 14 篇 jiwani nasmin
  • 14 篇 nasmin jiwani
  • 14 篇 chang chih-hung
  • 13 篇 horng shi-jinn
  • 13 篇 mohammad s. obai...
  • 12 篇 hossain shahriar
  • 12 篇 lorenzo bruzzone
  • 12 篇 sudip misra
  • 12 篇 xiu-zhi chen
  • 12 篇 lee trong-yen
  • 11 篇 nikumani choudhu...
  • 11 篇 ketan gupta
  • 11 篇 jian-jhih kuo
  • 11 篇 sanjaikanth e va...

语言

  • 6,875 篇 英文
  • 159 篇 其他
  • 70 篇 中文
  • 30 篇 日文
  • 7 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Information Technology and Graphics"
7141 条 记 录,以下是91-100 订阅
排序:
Reconsider Time Series Analysis for Insider Threat Detection
Reconsider Time Series Analysis for Insider Threat Detection
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Chen, Chia-Cheng Pao, Hsing-Kuo National Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
Insider threat detection (ITD) presents a significant challenge in cybersecurity, particularly within large and complex organizations. Traditionally, ITD has been overshadowed by the focus of external threats, resulti... 详细信息
来源: 评论
Enhanced Adaptive Video Streaming for Resource-Constrained UAVs through Dynamic Region-of-Interest Tile Swapping  10
Enhanced Adaptive Video Streaming for Resource-Constrained U...
收藏 引用
10th International Conference on Applied System Innovation, ICASI 2024
作者: Hsu, Tz-Heng Ju, Rui-Han Horng, Gwo-Jiun Southern Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Tainan Taiwan
Real-time video transmission via unmanned aerial vehicles (UAVs) is significantly impacted by latency issues. Using Region of Interest (ROI) tile segmentation methods, video streaming techniques can dynamically adjust... 详细信息
来源: 评论
Navigating the Horizon Towards 6G Wireless Communication Networks
Navigating the Horizon Towards 6G Wireless Communication Net...
收藏 引用
2024 IEEE SmartBlock4Africa, SmartBlock4Africa 2024
作者: Akinwunmi, Damilare Uche, Obinna Sokunbi, Onevemi Akinwumi, Hannah Awodele, Oludele Ajaegbu, Chigozirim Babcock University Dept. of Computer Science Ilishan-Remo Nigeria Babcock University Dept. of Information Technology Ilishan-Remo Nigeria
Sixth generation (6G) wireless communication is the next frontier. Researchers and business professionals are already focusing on the sixth generation of wireless technology, even though 5G is still being deployed glo... 详细信息
来源: 评论
Unleashing Password Potential: VAEs vs GANs in a Password Guessing Duel
Unleashing Password Potential: VAEs vs GANs in a Password Gu...
收藏 引用
2024 IEEE International Conference on computer Vision and Machine Intelligence, CVMI 2024
作者: Salve, Siddhant Punn, Narinder Singh Dewangan, Deepak Kumar Agarwal, Sonali ABV-IIITM Dept. of Computer Science and Engg. Gwalior India Iiit Allahabad Dept. of Information Technology Prayagraj India
Insecure passwords remain a persistent vulnerability in cybersecurity. This study investigates the potential of employing Variational Autoencoders (VAEs) and Generative Adversarial Networks (GANs) as tools for generat... 详细信息
来源: 评论
Expressing Liminality in Data within the Context of Deep Learning  5
Expressing Liminality in Data within the Context of Deep Lea...
收藏 引用
5th International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2024
作者: Mehmeti, Fatjon Elmazi, Donald Kulla, Elis IT University Metropolitan Tirana Dept. of Computer Science Tirana Albania Fukuoka Institute of Technology Dept. of Information Management Fukuoka Japan
In this paper we describe the concept of Liminality and how it manifests in Feature Spaces of Data during processes of Deep Learning, with particular focus on data during transition, transformation and other states wh... 详细信息
来源: 评论
LSB based Image Steganography with Password-Protected SMTP Transmission  2
LSB based Image Steganography with Password-Protected SMTP T...
收藏 引用
2nd IEEE Global Conference on Communications and information Technologies, GCCIT 2024
作者: Prakash, Mangali Bhanu Kumar, E. Ravi Anitha, Banavath Bansilal, Boda Mukkamall, Babu Reddy Sanjana, Gudipati Pranaya Vardhaman College Of Engineering Dept. of Information Technology Hyderabad India Krishna University Machilipatnam Dept. of Computer Application Machilipatnam India
Picture steganography plays a crucial role in secure communication by discreetly altering images for various purposes such as data authentication, privacy protection, and watermarking. However, traditional methods oft... 详细信息
来源: 评论
An Efficient Detection of Floating Marine Debris using Deep Learning Techniques
An Efficient Detection of Floating Marine Debris using Deep ...
收藏 引用
2024 IEEE Bangalore Humanitarian technology Conference, B-HTC 2024
作者: Pandey, Prachi Guru Prasad, M.S. Mayank, Kumar Gowda, Mahima M Prashanth Kumar, S.P. Karthik, D.U. Dept. of Computer Science and Engg. Dehradun India REVA University School of Computing and Information Technology Bengaluru India Acharya Institute of Technology Dept. of Computer Science and Engg. Bengaluru India Nitte Meenakshi Institute of Technology Dept. of Information Science and Engg. Bengaluru India
Growing concerns about the environmental consequences of floating debris in aquatic ecosystems have underscored the need for the development of efficient and automated methods for debris classification and monitoring.... 详细信息
来源: 评论
Harnessing Big Data for Economic Transformation in a Digitalized World  3
Harnessing Big Data for Economic Transformation in a Digital...
收藏 引用
3rd International Conference on Creative Communication and Innovative technology, ICCIT 2024
作者: Tarigan, Riswan Efendi Triyono Mahyuni Agustian, Harry Nurfaizi, Rifky Zahra, Achani Rahmania Az Pelita Harapan University Dept. of Information Systems Tangerang Indonesia University of Raharja Dept. of Information Technology Tangerang Indonesia University of Mataram Dept. of Teacher Training and Education Science Mataram Indonesia Sesindo Dept. of Computer Systems Tangerang Indonesia Bosindo Dept. of Information Technology Tangerang Indonesia Pandawan Sejahtera Indonesia Dept. of Information Systems Tangerang Indonesia
Air is essential to life and health, with oxygen (20.94%) and the ozone layer protecting against ultraviolet radiation. Depletion of oxygen reduces the ozone layer, increasing UV exposure. Good air quality is crucial ... 详细信息
来源: 评论
Enhancing Network Intrusion Detection in a Limited Labeled Data Scenario: An Active Learning Approach
Enhancing Network Intrusion Detection in a Limited Labeled D...
收藏 引用
2024 IEEE International Conference on Computing, Applications and Systems, COMPAS 2024
作者: Hossain, Md Sharafat Hossain, Md Al Amin Sikdar, Md Shahin Islam, Md Saiful Bangladesh University of Engineering and Technology Institute of Information and Communication Technology Dhaka Bangladesh Selcuk University Dept. of Information Technology Engineering Konya Turkey Prime University Dept. of Computer Science and Engineering Dhaka Bangladesh
The Internet was originally developed to facilitate easier communication through digital devices. It has made our lives easier by providing means for communication and delivering digital resources anywhere and at any ... 详细信息
来源: 评论
Assessing the Accuracy of Regression and Classification Models in Air Quality Prediction  5
Assessing the Accuracy of Regression and Classification Mode...
收藏 引用
5th IEEE International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2025
作者: Vishwakarma, Harsh Kumar Guru Prasad, M.S. Mittal, Vanshika Mittal, Mudit Naik, PavanKumar Chandrappa, S. Dept. of Computer Science and Engg. Dehradun India School of Computing and Information Technology Reva University Bangalore India Dept. of Computer Science and Engg. Bengaluru India
This research paper addresses the pressing issue of air quality monitoring and prediction using machine learning algorithms. With a dataset comprising pollutant levels from various states, we employed a comprehensive ... 详细信息
来源: 评论