咨询与建议

限定检索结果

文献类型

  • 6,022 篇 会议
  • 904 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 6,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,419 篇 工学
    • 3,454 篇 计算机科学与技术...
    • 2,892 篇 软件工程
    • 1,317 篇 信息与通信工程
    • 663 篇 控制科学与工程
    • 477 篇 生物工程
    • 434 篇 电气工程
    • 432 篇 电子科学与技术(可...
    • 326 篇 生物医学工程(可授...
    • 301 篇 光学工程
    • 268 篇 机械工程
    • 233 篇 仪器科学与技术
    • 209 篇 动力工程及工程热...
    • 168 篇 化学工程与技术
    • 159 篇 安全科学与工程
    • 158 篇 交通运输工程
    • 132 篇 建筑学
  • 2,113 篇 理学
    • 1,189 篇 数学
    • 535 篇 物理学
    • 495 篇 生物学
    • 374 篇 统计学(可授理学、...
    • 242 篇 系统科学
    • 163 篇 化学
  • 1,160 篇 管理学
    • 694 篇 管理科学与工程(可...
    • 515 篇 图书情报与档案管...
    • 355 篇 工商管理
  • 290 篇 医学
    • 252 篇 临床医学
    • 231 篇 基础医学(可授医学...
    • 141 篇 药学(可授医学、理...
    • 138 篇 公共卫生与预防医...
  • 200 篇 法学
    • 149 篇 社会学
  • 144 篇 农学
  • 115 篇 教育学
  • 109 篇 经济学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 191 篇 accuracy
  • 188 篇 feature extracti...
  • 150 篇 computational mo...
  • 146 篇 training
  • 115 篇 computer science
  • 109 篇 deep learning
  • 108 篇 real-time system...
  • 105 篇 data mining
  • 100 篇 support vector m...
  • 94 篇 predictive model...
  • 93 篇 servers
  • 93 篇 machine learning
  • 87 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 internet of thin...
  • 81 篇 data models
  • 80 篇 protocols
  • 78 篇 quality of servi...
  • 78 篇 semantics
  • 77 篇 computer archite...

机构

  • 115 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 40 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 28 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 graduate institu...
  • 22 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 19 篇 dept. of informa...
  • 18 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...

作者

  • 46 篇 lorenzo bruzzone
  • 25 篇 li kuan-ching
  • 22 篇 jian-jhih kuo
  • 20 篇 libertario demi
  • 20 篇 yen-lin chen
  • 19 篇 ren-hung hwang
  • 18 篇 mei-hui wang
  • 18 篇 luca turchet
  • 16 篇 francesca bovolo
  • 16 篇 chang-shing lee
  • 16 篇 hwang ren-hung
  • 15 篇 chen yen-lin
  • 15 篇 kwon soonhak
  • 15 篇 jia-ching wang
  • 15 篇 hung yi-ping
  • 14 篇 bae hae-young
  • 13 篇 lee yue-shi
  • 13 篇 horng shi-jinn
  • 13 篇 watabe hirokazu
  • 13 篇 wu eric hsiao-ku...

语言

  • 6,801 篇 英文
  • 112 篇 其他
  • 60 篇 中文
  • 19 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Information Engineering"
6998 条 记 录,以下是181-190 订阅
排序:
Advancements in Quantum Machine Learning and Quantum Deep Learning: A Comprehensive Review of Algorithms, Challenges, and Future Directions
Advancements in Quantum Machine Learning and Quantum Deep Le...
收藏 引用
2023 IEEE International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security, iQ-CCHESS 2023
作者: Priyanka, G.S. Venkatesan, M. Prabhavathy, P. Nit Puducherry Dept. of Computer Science & Engineering Karaikal India Vit University Dept. of Information Technology Vellore India
At the nexus of quantum computing and machine learning, quantum machine learning (QML) and quantum deep learning (QDL) have emerged as promising fields. By enhancing computational capabilities and addressing challengi... 详细信息
来源: 评论
Prioritization of Medical Image Security Features: Fuzzy AHP Approaches  6
Prioritization of Medical Image Security Features: Fuzzy AHP...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Kumar, Satish Devi, Mausmi Singh, Sunil Chaurasia, Pawan Kumar Khan, Raees Ahmad BBA University Dept. of Information Technology Lucknow India PSIT Dept. of Computer Science & Engineering AKTU Lucknow India
Medical images are sensitive data about patients, hospitals, healthcare sector and, therefore, require secure transmission to protect their privacy. To ensure the security of medical image transmission, three essentia... 详细信息
来源: 评论
Blockchain-based Access Control Model for Student Academic Record with Authentication  7
Blockchain-based Access Control Model for Student Academic R...
收藏 引用
7th International Conference on Intelligent Computing and Control Systems, ICICCS 2023
作者: Maheswari, M. Prasath, S. Rajesh, R. Ramalakshmi, D. Sathyabama Institute of Science and Technology Dept. of Computer Science and Engineering Chennai India Sathyabama Institute of Science and Technology Dept. of Information Technology Chennai India
Schools and Institutions maintain student's records and certificates for future needs like verification and credit transfer. These procedures are carried out manually to ensure that documents and the data are vali... 详细信息
来源: 评论
XNLI 2.0: Improving XNLI dataset and performance on Cross Lingual Understanding (XLU)  8
XNLI 2.0: Improving XNLI dataset and performance on Cross Li...
收藏 引用
8th IEEE International Conference for Convergence in Technology, I2CT 2023
作者: Kumar Upadhyay, Ankit Kumar Upadhya, Harsit JSS Academy of Technical Education Dept. of Computer Science and Engineering Bengaluru India JSS Academy of Technical Education Dept. of Information Science and Engineering Bengaluru India
Natural Language Processing systems are heavily dependent on the availability of annotated data to train practical models. Primarily, models are trained on English datasets. In recent times, significant advances have ... 详细信息
来源: 评论
A Comparative Study in Pedestrian Detection for Autonomous Driving Systems
A Comparative Study in Pedestrian Detection for Autonomous D...
收藏 引用
2022 OPJU International Technology Conference on Emerging Technologies for Sustainable Development, OTCON 2022
作者: Ramchandani, Monica Sahu, Satya Prakash Dewangan, Deepak Kumar National Institute of Technology Dept. of Information Technology Raipur India Tiet Dept. of Computer Science and Engineering Punjab India
Technology development has altered how people live. Intelligent vehicles are being developed as a result of technological advancements in the automobile industry. Pedestrians are the most vulnerable road users, accoun... 详细信息
来源: 评论
Enhancing Cabbage Plant Protection: CNN Algorithm for Insect Identification
Enhancing Cabbage Plant Protection: CNN Algorithm for Insect...
收藏 引用
2024 International Conference on information Technology Research and Innovation, ICITRI 2024
作者: Senjaya, Remi Musa, Purnawarman Sularsih, Puji Novrina, Novrina Aryunani, Witari Suhartini, Suhartini Gunadarma University dept. of Informatics Engineering Depok Indonesia Gunadarma University dept. of Electrical Engineering Depok Indonesia Gunadarma University dept. of Information Technology Depok Indonesia Gunadarma University dept. of Computer Science Depok Indonesia
People frequently find it straightforward to identify insects that feed on cabbage plants based on the insects' characteristics. However, challenges arise when employing a computer for precise bug categorization a... 详细信息
来源: 评论
Enhancing wireless sensor network longevity and security: A quad-leach approach
Enhancing wireless sensor network longevity and security: A ...
收藏 引用
2024 IEEE International Conference on Emerging Technologies in computer science for Interdisciplinary Applications, ICETCS 2024
作者: Lohith, J.J. Shreya, S. Hamsa Priya, J.L. B.M.S. College of Engineering Dept. of Computer Science and Engineering Bangalore India D.S.C.E. Dept. of Information Science and Engineering Bangalore India B.M.S. College of Engineering Dept. of Electronics and Telecommunications Bangalore India
Researchers have increasingly focused on Wireless Sensor Networks (WSNs) in recent years, recognizing their versatile applications. The primary focus within WSNs is enhancing network longevity for efficient resource u... 详细信息
来源: 评论
Enhancing Credit Card Fraud Detection through LSTM-Based Sequential Analysis with Early Stopping  2
Enhancing Credit Card Fraud Detection through LSTM-Based Seq...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Jhansi Ida, S. Balasubadra, K. Skandarsini, R.R. Lakshmi Narayanaa, T. RMK Engineering College Dept. of Computer Science and Business Systems Thiruvallur India RMD Engineering College Department of Information Technology Thiruvallur India
There is still a serious problem with credit card fraud in the world of financial transactions, requiring innovative solutions to effectively detect and halt illicit behavior. This research presents a unique method of... 详细信息
来源: 评论
Simplifying Structure and Pattern in Complex Social Networks Using Graph Isomorphism  14
Simplifying Structure and Pattern in Complex Social Networks...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Arunakumari, B.N. Kshama, S.B. Swasti, S. Sameeksha, B.H. Puri, Sonia Rubini, P.A. Bms Institute of Technology and Management Dept. of Computer Science and Engineering Bengaluru India Bms Institute of Technology and Management Dept. of Information Science and Engineering Bengaluru India
In recent years, networks have grown in size and complexity, traditional network testing methods have become time-consuming and inefficient. As a result, there is a need for more efficient and reliable network testing... 详细信息
来源: 评论
Sarcasm Detection in Libyan Arabic Dialects Using Natural Language Processing Techniques  4
Sarcasm Detection in Libyan Arabic Dialects Using Natural La...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer engineering, MI-STA 2024
作者: Alakrot, Azalden Dogman, Aboagela Ammer, Fathi Yefren College of Medical Technology Dept. of Information Technology Yefren Libya Libyan Academy for Postgraduate Studies Dept. of Electrical and Computer Engineering Al Zentan Libya University of Zawia Dept. of Computer Science Azawia Libya
Sarcasm is often used to convey the opposite of what is actually said (positive words, negative meaning). It is a type of humor that relies on the listener or reader to understand the intended meaning of the words. Sa... 详细信息
来源: 评论