咨询与建议

限定检索结果

文献类型

  • 6,166 篇 会议
  • 952 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 7,172 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,423 篇 工学
    • 3,434 篇 计算机科学与技术...
    • 2,898 篇 软件工程
    • 1,198 篇 信息与通信工程
    • 663 篇 控制科学与工程
    • 489 篇 生物工程
    • 483 篇 电气工程
    • 453 篇 电子科学与技术(可...
    • 383 篇 生物医学工程(可授...
    • 304 篇 光学工程
    • 266 篇 机械工程
    • 205 篇 动力工程及工程热...
    • 190 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 186 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 139 篇 建筑学
  • 2,183 篇 理学
    • 1,191 篇 数学
    • 566 篇 物理学
    • 523 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 180 篇 化学
  • 1,230 篇 管理学
    • 750 篇 管理科学与工程(可...
    • 544 篇 图书情报与档案管...
    • 395 篇 工商管理
  • 330 篇 医学
    • 287 篇 临床医学
    • 272 篇 基础医学(可授医学...
    • 168 篇 药学(可授医学、理...
    • 163 篇 公共卫生与预防医...
  • 213 篇 法学
    • 154 篇 社会学
  • 137 篇 教育学
  • 129 篇 经济学
  • 119 篇 农学
  • 32 篇 文学
  • 15 篇 军事学
  • 5 篇 艺术学

主题

  • 248 篇 accuracy
  • 198 篇 feature extracti...
  • 157 篇 deep learning
  • 147 篇 computational mo...
  • 137 篇 machine learning
  • 123 篇 training
  • 117 篇 predictive model...
  • 114 篇 real-time system...
  • 113 篇 support vector m...
  • 111 篇 internet of thin...
  • 104 篇 cloud computing
  • 98 篇 visualization
  • 88 篇 data mining
  • 87 篇 security
  • 85 篇 software
  • 83 篇 semantics
  • 82 篇 artificial intel...
  • 81 篇 neural networks
  • 80 篇 optimization
  • 80 篇 monitoring

机构

  • 52 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 25 篇 dept. of informa...
  • 23 篇 dept. of compute...
  • 22 篇 school of automa...
  • 20 篇 university of th...
  • 18 篇 school of comput...
  • 17 篇 institute of inf...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of informa...
  • 15 篇 dept. of compute...
  • 14 篇 school of comput...
  • 14 篇 dept. of informa...
  • 14 篇 research center ...
  • 14 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 13 篇 tsinghua nationa...
  • 13 篇 dept. of informa...
  • 13 篇 dept. of compute...
  • 13 篇 chitkara univers...

作者

  • 22 篇 huang minlie
  • 20 篇 yen-lin chen
  • 18 篇 xiaojiang du
  • 17 篇 chen yen-lin
  • 15 篇 fotiadis dimitri...
  • 14 篇 guru prasad m.s.
  • 14 篇 jiwani nasmin
  • 14 篇 nasmin jiwani
  • 14 篇 chang chih-hung
  • 13 篇 horng shi-jinn
  • 13 篇 mohammad s. obai...
  • 12 篇 hossain shahriar
  • 12 篇 lorenzo bruzzone
  • 12 篇 sudip misra
  • 12 篇 lee trong-yen
  • 11 篇 nikumani choudhu...
  • 11 篇 ketan gupta
  • 11 篇 jian-jhih kuo
  • 11 篇 sanjaikanth e va...
  • 11 篇 lu chih-wei

语言

  • 6,790 篇 英文
  • 275 篇 其他
  • 70 篇 中文
  • 30 篇 日文
  • 7 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Information Technology and Graphics"
7172 条 记 录,以下是201-210 订阅
排序:
Unified Object Detection Model for Image Style Convertible Modalities
Unified Object Detection Model for Image Style Convertible M...
收藏 引用
2023 International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023
作者: Li, Mu-Chuan Chen, Xiu-Zhi Chen, Yen-Lin National Taipei University of Technology Dept. of Computer Science & Information Engineering Taipei Taiwan
Object detection is an important task in computer vision. In earlier studies, object detection mostly works on single-modal. But recently, in order to improve detection efficiency, researchers start adding more modals... 详细信息
来源: 评论
A Study of the ADHD-200 Repository for Attention Deficit Categorization Using Deep Neural Networks  5
A Study of the ADHD-200 Repository for Attention Deficit Cat...
收藏 引用
5th IEEE International Conference on Advances in Electronics, computers and Communications, ICAECC 2023
作者: Mengi, Mehak Malhotra, Deepti Central University of Jammu Dept. of Computer Science & Information Technology Samba181143 India
Attention Deficit Hyperactivity Disorder(ADHD) is a socio-behavioral disorder, affecting nearly 1% of people worldwide. Presently, the only traditional approach for diagnosing ADHD is standardized tests which prolong ... 详细信息
来源: 评论
Applying the Genetic Algorithm Concept for Determining the Inheritance Relationship between Objects in Object Oriented Languages  3
Applying the Genetic Algorithm Concept for Determining the I...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2023
作者: Amarif, Mabroukah Sebha University of Libya Faculty of Information Technology Dept. of Computer Sciences Sebha Libya
The object-oriented programming model is based on the concept of objects where data is linked to their operations within a specific classification named as a class. The class is usually used to describe a number of sp... 详细信息
来源: 评论
Dynamic Asset Allocation Using Trading Agent
Dynamic Asset Allocation Using Trading Agent
收藏 引用
2023 International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023
作者: You, Shingchern D. Liu, Chien-Hung Yen, Ching-Cheng National Taipei Universiyt of Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
We study the use of PPO (Proximal Policy Optimization) algorithm for trading ETFs belonging to different asset classes. The studied asset classes include common stocks, bonds, REIT (Real Estate Investment Trust), gold... 详细信息
来源: 评论
A Survey on Eliminating Botnet and Intrusion Attacks through Machine Learning
A Survey on Eliminating Botnet and Intrusion Attacks through...
收藏 引用
2023 Innovations in Power and Advanced Computing Technologies, i-PACT 2023
作者: Faseela, M.H. Manjith, B.C. Dept. Computer Science and Engineering Indian Institute of Information Technology Kerala Kottayam India
With the rising linkage and dependence on computer networks, the threat of intrusions and botnets has become a critical concern for organizations and those involved. Malicious actors are in control of unauthorized acc... 详细信息
来源: 评论
Detection of Pre Shoplifting Suspicious Behavior Using Deep Learning  16
Detection of Pre Shoplifting Suspicious Behavior Using Deep ...
收藏 引用
16th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2024
作者: Shrestha, Sujan Taniguchi, Yoji Tanaka, Tetsuo Graduate school of Engineering Kanagawa Institute of Tehnology Course of Information and computer sciences Atsugi Japan Daiichi Institute of Technology Artificial Intelligence and Data Science Department of Information Tokyo Japan Kanagawa Institute of Technology Faculty of Information Technology Dept. of Information and Computer Sciences Atsugi Japan
Shoplifting presents a significant challenge for retailers, leading to substantial financial losses and security concerns. Current surveillance systems effectively identify shoplifting incidents postoccurrence;however... 详细信息
来源: 评论
Hybrid Framework for Parking Slot Allocation Using Double Auction and Cooperative Game Theory in Fog-Based Systems  3
Hybrid Framework for Parking Slot Allocation Using Double Au...
收藏 引用
3rd International Conference on Intelligent Systems, Advanced Computing, and Communication, ISACC 2025
作者: Bairi, Pijush Swain, Sujata Bandyopadhyay, Anjan Kalinga Institute of Industrial Technology School of Computer Engineering Bhubaneswar India Haldia Institute of Technology Dept. of Information Technology Haldia India
The rapid growth of urban transportation necessitates innovative strategies for efficient parking management. Fog-based smart parking systems help reduce latency and improve resource use, but challenges remain in achi... 详细信息
来源: 评论
Benchmarking the Elliptic Curve Digital Signature Algorithm and RSA in Key Signing and Verification Operations with Parallelism
Benchmarking the Elliptic Curve Digital Signature Algorithm ...
收藏 引用
2023 Congress in computer Science, computer Engineering, and Applied Computing, CSCE 2023
作者: Dimitoglou, George Jim, Carol Hood College Dept. of Computer Science & Information Technology FrederickMD United States
Cryptographic techniques play a crucial role in securing information, and selecting an appropriate cryptographic technique involves considering factors such as encryption strength and computational overhead. Asymmetri... 详细信息
来源: 评论
A Novel Data Hiding Scheme based on Block Features Enhanced AMBTC  4
A Novel Data Hiding Scheme based on Block Features Enhanced ...
收藏 引用
4th Asia Service Sciences and Software Engineering Conference, ASSE 2023
作者: Lin, Chia-Chen Oka, Hizrawan Dwi Zhu, Enting Dept. of Computer Science and Information Engineering National Chin-Yi University of Technology Taiwan
In this paper, we first improve Chen et al.'s ternary representation-based Absolute Moment Block Truncation Coding (AMBTC), then we combine block features and AMBTC to design our novel block feature enhanced-AMBTC... 详细信息
来源: 评论
Image Encryption using Modified RC4 Algorithm  3
Image Encryption using Modified RC4 Algorithm
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2023
作者: Hasan, Mahmoud H. S. Alasmarya Islamic University College of Information Technology Dept. Computer Science Zliten Libya
In this paper, we propose a new method for image encryption based on a modified RC4 stream cipher algorithm that scrambles image pixels before applying the XOR encryption function. We compare the performance of the pr... 详细信息
来源: 评论