咨询与建议

限定检索结果

文献类型

  • 6,166 篇 会议
  • 952 篇 期刊文献
  • 54 册 图书

馆藏范围

  • 7,172 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,423 篇 工学
    • 3,434 篇 计算机科学与技术...
    • 2,898 篇 软件工程
    • 1,198 篇 信息与通信工程
    • 663 篇 控制科学与工程
    • 489 篇 生物工程
    • 483 篇 电气工程
    • 453 篇 电子科学与技术(可...
    • 383 篇 生物医学工程(可授...
    • 304 篇 光学工程
    • 266 篇 机械工程
    • 205 篇 动力工程及工程热...
    • 190 篇 仪器科学与技术
    • 188 篇 化学工程与技术
    • 186 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 139 篇 建筑学
  • 2,183 篇 理学
    • 1,191 篇 数学
    • 566 篇 物理学
    • 523 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 180 篇 化学
  • 1,230 篇 管理学
    • 750 篇 管理科学与工程(可...
    • 544 篇 图书情报与档案管...
    • 395 篇 工商管理
  • 330 篇 医学
    • 287 篇 临床医学
    • 272 篇 基础医学(可授医学...
    • 168 篇 药学(可授医学、理...
    • 163 篇 公共卫生与预防医...
  • 213 篇 法学
    • 154 篇 社会学
  • 137 篇 教育学
  • 129 篇 经济学
  • 119 篇 农学
  • 32 篇 文学
  • 15 篇 军事学
  • 5 篇 艺术学

主题

  • 248 篇 accuracy
  • 198 篇 feature extracti...
  • 157 篇 deep learning
  • 147 篇 computational mo...
  • 137 篇 machine learning
  • 123 篇 training
  • 117 篇 predictive model...
  • 114 篇 real-time system...
  • 113 篇 support vector m...
  • 111 篇 internet of thin...
  • 104 篇 cloud computing
  • 98 篇 visualization
  • 88 篇 data mining
  • 87 篇 security
  • 85 篇 software
  • 83 篇 semantics
  • 82 篇 artificial intel...
  • 81 篇 neural networks
  • 80 篇 optimization
  • 80 篇 monitoring

机构

  • 52 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 25 篇 dept. of informa...
  • 23 篇 dept. of compute...
  • 22 篇 school of automa...
  • 20 篇 university of th...
  • 18 篇 school of comput...
  • 17 篇 institute of inf...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of informa...
  • 15 篇 dept. of compute...
  • 14 篇 school of comput...
  • 14 篇 dept. of informa...
  • 14 篇 research center ...
  • 14 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 13 篇 tsinghua nationa...
  • 13 篇 dept. of informa...
  • 13 篇 dept. of compute...
  • 13 篇 chitkara univers...

作者

  • 22 篇 huang minlie
  • 20 篇 yen-lin chen
  • 18 篇 xiaojiang du
  • 17 篇 chen yen-lin
  • 15 篇 fotiadis dimitri...
  • 14 篇 guru prasad m.s.
  • 14 篇 jiwani nasmin
  • 14 篇 nasmin jiwani
  • 14 篇 chang chih-hung
  • 13 篇 horng shi-jinn
  • 13 篇 mohammad s. obai...
  • 12 篇 hossain shahriar
  • 12 篇 lorenzo bruzzone
  • 12 篇 sudip misra
  • 12 篇 lee trong-yen
  • 11 篇 nikumani choudhu...
  • 11 篇 ketan gupta
  • 11 篇 jian-jhih kuo
  • 11 篇 sanjaikanth e va...
  • 11 篇 lu chih-wei

语言

  • 6,790 篇 英文
  • 275 篇 其他
  • 70 篇 中文
  • 30 篇 日文
  • 7 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Information Technology and Graphics"
7172 条 记 录,以下是241-250 订阅
排序:
OBDTL: Under Water Object Classification Using Transfer Learning  4
OBDTL: Under Water Object Classification Using Transfer Lear...
收藏 引用
4th International Conference on computer, Communication, Control and information technology, C3IT 2024
作者: Roy, Sarthak Ghosh, Partha Goto, Takaaki Sen, Mainak Techno India University Computer Sc. & Engg. Dept. West Bengal Kolkata India Academy of Technology Adisaptagram Dept. of Computer Science & Engg. India Toyo University Dept. of Information Sciences and Arts Saitama Japan
Underwater object classification is a critical task in domains such as marine research, underwater exploration, maintenance of underwater structures and deep-sea oil industries etc. Accurate detection of underwater ob... 详细信息
来源: 评论
A Case Study of Detecting HULK-based DDoS Traffic with Random Forest Classifier
A Case Study of Detecting HULK-based DDoS Traffic with Rando...
收藏 引用
2023 International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023
作者: Cai, Yi-Xian Chang, Tsu-Chen Wang, Chih-Chiang National Kaohsiung University of Science and Technology Dept. of Computer Science and Information Engineering Kaohsiung Taiwan
Modern network administration desires to have early detection of DDoS traffic before damages occur. Nevertheless, as Internet traffic grows over years, it becomes more challenging to detect DDoS traffic in an efficien... 详细信息
来源: 评论
Steganalysis on Dual-Layer Security of Messages Using Steganography and Cryptography  15
Steganalysis on Dual-Layer Security of Messages Using Stegan...
收藏 引用
15th International Conference on information technology and Electrical Engineering, ICITEE 2023
作者: Shamsi, Zeba Saha, Anish Kumar Patgiri, Ripon Singh, Khoirom Motilal Singh, Laiphrakpam Dolendro National Institute of Technology Dept. of Computer Science and Engineering Assam Silchar788010 India Indian Institute of Information Technology Dept. of Computer Science and Engineering Manipur Senapati795002 India
Recently, Bansal et al. proposed a dual-layer message security technique using steganography and cryptography. An index table maps each text data to an index point and an elliptic curve point. The text data are encryp... 详细信息
来源: 评论
Self-supervised Federated Learning for Anomaly Detection
Self-supervised Federated Learning for Anomaly Detection
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Eng, Tze-Qian Pao, Hsing-Kuo Liao, Chi-Chen National Taiwan University of Science and Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
Federated learning-based strategy can confirm data privacy, as well as other related ones like split learning and differential privacy. When enjoying secured data sharing, we also worry that the data privacy preservin... 详细信息
来源: 评论
Ensuring Electronic Health Record (EHR) Privacy using Zero Knowledge Proofs (ZKP) and Secure Encryption Schemes on Blockchain  5
Ensuring Electronic Health Record (EHR) Privacy using Zero K...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Ranaweera, T.A.V.Y. Hewage, H.N.H. Hapuhinna, H.K.D.W.M.C.B. Preethilal, K.L.K.T. Senarathne, Amila Ruggahakotuwa, Laneesha Sri Lanka Institute of Information Technology Dept. Computer Systems Engineering Malabe Sri Lanka
In the haste of EHR digitization, the protection of patient data becomes paramount, casting a spotlight on small healthcare clinics grappling with the threats of an ever more interconnected healthcare sector. That is ... 详细信息
来源: 评论
Malware Detection across Clusters
Malware Detection across Clusters
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Manjushree, C.V. Nandakumar, A.N. Vemana Institute of Technology Dept. of Information Science & Engineering India City Engineering College Dept. of Computer Science & Engineering India
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba... 详细信息
来源: 评论
A Deep Learning-based MobileNet Model for Effectively Classifying the White Blood Cancerous Microscopic Images  14
A Deep Learning-based MobileNet Model for Effectively Classi...
收藏 引用
14th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2023
作者: Srivastava, Neha Singh, Sunil Kumar Dept. of Computer Science and Information Technology Mahatma Gandhi Central University Bihar Motihari India
Traditional machine and deep learning-based techniques effectively utilise advanced medical image analysis (MIA) to improve prediction accuracy and enable optimal planning and diagnosis. This work aims to create an au... 详细信息
来源: 评论
Deep Learning-Based Image Analysis for Detecting Nutrient Deficiencies of Tomato Plants  5
Deep Learning-Based Image Analysis for Detecting Nutrient De...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Nirasha Jayasiri, K.C. Chandrasiri, Sanjeevi Rupasinghe, Shalini Karunanayake, K.O. Rivindu Uthayachandran, Abineshh Zihara, M.I. Fathima Sri Lanka Institute of Information Technology Dept. of Computer Science and Software Engineering Sri Lanka
Tomato is one of the most popular crops worldwide. The success of a tomato crop is highly dependent on the health of the plants. Nutrient deficiency surveillance is typically conducted through visual inspections, whic... 详细信息
来源: 评论
KinderEye: Kindergarten Child Performance Monitoring System  9
KinderEye: Kindergarten Child Performance Monitoring System
收藏 引用
9th International Conference on computer and Communication Engineering, ICCCE 2023
作者: Rathnayaka, B. Rabel, W.T.S. Namasingha, C.N.W. Hettiarachchi, H.D. Hansika, Mahaadikara M.D.J.T. Wellalage, Sasini Nuwanthika Sri Lanka Institute of Information Technology Dept. of Computer Systems Engineering Malabe Sri Lanka
Kindergarten is the most important beginning of a child's formal education. Since the brain is rapidly developing in early childhood, a lack of brain development at kindergarten can create a weak foundation for le... 详细信息
来源: 评论
Secure and Efficient Key Management for Deduplicated Cloud Storage Systems  16
Secure and Efficient Key Management for Deduplicated Cloud S...
收藏 引用
16th International Conference on Security of information and Networks, SIN 2023
作者: Dave, Jay Kanodia, Anshul Srivastava, Raj Singh, Kushagra Hegde, Prithvi Desai, Hitaishi Birla Institute of Technology & Science Dept. of Computer Science & Information Systems Hyderabad Pilani India
Deduplication is a ubiquitous compression technique for cloud storage servers. It reduces storage and bandwidth requirements by avoiding duplicate copies of data. However, developing an encryption scheme for deduplica... 详细信息
来源: 评论