咨询与建议

限定检索结果

文献类型

  • 6,022 篇 会议
  • 904 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 6,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,419 篇 工学
    • 3,454 篇 计算机科学与技术...
    • 2,892 篇 软件工程
    • 1,317 篇 信息与通信工程
    • 663 篇 控制科学与工程
    • 477 篇 生物工程
    • 434 篇 电气工程
    • 432 篇 电子科学与技术(可...
    • 326 篇 生物医学工程(可授...
    • 301 篇 光学工程
    • 268 篇 机械工程
    • 233 篇 仪器科学与技术
    • 209 篇 动力工程及工程热...
    • 168 篇 化学工程与技术
    • 159 篇 安全科学与工程
    • 158 篇 交通运输工程
    • 132 篇 建筑学
  • 2,113 篇 理学
    • 1,189 篇 数学
    • 535 篇 物理学
    • 495 篇 生物学
    • 374 篇 统计学(可授理学、...
    • 242 篇 系统科学
    • 163 篇 化学
  • 1,160 篇 管理学
    • 694 篇 管理科学与工程(可...
    • 515 篇 图书情报与档案管...
    • 355 篇 工商管理
  • 290 篇 医学
    • 252 篇 临床医学
    • 231 篇 基础医学(可授医学...
    • 141 篇 药学(可授医学、理...
    • 138 篇 公共卫生与预防医...
  • 200 篇 法学
    • 149 篇 社会学
  • 144 篇 农学
  • 115 篇 教育学
  • 109 篇 经济学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 191 篇 accuracy
  • 188 篇 feature extracti...
  • 150 篇 computational mo...
  • 146 篇 training
  • 115 篇 computer science
  • 109 篇 deep learning
  • 108 篇 real-time system...
  • 105 篇 data mining
  • 100 篇 support vector m...
  • 94 篇 predictive model...
  • 93 篇 servers
  • 93 篇 machine learning
  • 87 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 internet of thin...
  • 81 篇 data models
  • 80 篇 protocols
  • 78 篇 quality of servi...
  • 78 篇 semantics
  • 77 篇 computer archite...

机构

  • 115 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 40 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 28 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 graduate institu...
  • 22 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 19 篇 dept. of informa...
  • 18 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...

作者

  • 46 篇 lorenzo bruzzone
  • 25 篇 li kuan-ching
  • 22 篇 jian-jhih kuo
  • 20 篇 libertario demi
  • 20 篇 yen-lin chen
  • 19 篇 ren-hung hwang
  • 18 篇 mei-hui wang
  • 18 篇 luca turchet
  • 16 篇 francesca bovolo
  • 16 篇 chang-shing lee
  • 16 篇 hwang ren-hung
  • 15 篇 chen yen-lin
  • 15 篇 kwon soonhak
  • 15 篇 jia-ching wang
  • 15 篇 hung yi-ping
  • 14 篇 bae hae-young
  • 13 篇 lee yue-shi
  • 13 篇 horng shi-jinn
  • 13 篇 watabe hirokazu
  • 13 篇 wu eric hsiao-ku...

语言

  • 6,801 篇 英文
  • 112 篇 其他
  • 60 篇 中文
  • 19 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Information Engineering"
6998 条 记 录,以下是221-230 订阅
排序:
A Security Aware Lighting Control System for Public Open Spaces: An IoT Powered Approach
A Security Aware Lighting Control System for Public Open Spa...
收藏 引用
2023 International Conference on Computational Intelligence, Networks and Security, ICCINS 2023
作者: Firdhous, Mohamed Fazil Mohamed Elbreiki, Walid Abdullahi, Ibrahim Briki, Wesam Arlimatti, Shivaleela University of Moratuwa Dept. of Information Technology Moratuwa Sri Lanka College of Computer Technology Dept. of Computer Science Benghazi Libya Ibrahim Badamasi Babangida University Dept. of Computer Science Niger State Lapai Nigeria Higher Institute of Engineering Technologies Dept. of Computer Science Benghazi Libya Dr. D y Patil Prathisthan's College of Engineering Dept. of Computer Science and Engineering Maharashtra Kolhapur India
Cities world over are becoming more congested as people moving into them for better living conditions. Such fast migration towards cities puts heavy demands on city resources. One of the resources that suffers an impa... 详细信息
来源: 评论
Study and Analysis of MultiChain Native Asset  10
Study and Analysis of MultiChain Native Asset
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Kharjana, Mebanjop Sahana, Subhas Chandra Saha, Goutam North-Eastern Hill University Dept. of Information Technology Meghalaya Shillong India National Institute of Technology Dept. of Computer Science & Engineering West Bengal Durgapur India
MultiChain native assets were blockchain-based dig-ital assets created, managed, and traded on its network. Such blockchain assets were ensured to be transparent, secured, and trusted. Different applications used Mult... 详细信息
来源: 评论
Automatic Recognition of Driving Events based on Deep Learning  6
Automatic Recognition of Driving Events based on Deep Learni...
收藏 引用
6th International Symposium on computer, Consumer and Control, IS3C 2023
作者: Chen, Jui-Chi Lian, Zhen-You Chiang, Hsin-You Huang, Chung-Lin Chuang, Cheng-Hung Asia University Dept. of Computer Science and Information Engineering Taiwan National Chin-Yi University of Technology Dept. of Artificial Intelligence and Computer Engineering Taiwan National Tsing Hua University Dept. of Electrical Engineering Taiwan
In recent years, there has been a rapid development of intelligent driving assistance systems. Although most vehicles nowadays are equipped with driving assistance systems, the number of car accidents continues to ris... 详细信息
来源: 评论
User needs in the Musical Metaverse: a case study with electroacoustic musicians
User needs in the Musical Metaverse: a case study with elect...
收藏 引用
International Conference on New Interfaces for Musical Expression, NIME 2024
作者: Boem, Alberto Tomasetti, Matteo Gabriele, Alessio Di Scipio, Agostino Turchet, Luca Dept. of Information Engineering and Computer Science University of Trento Trento Italy Dept. of Electronic Music Conservatorio Statale di Musica "A. Casella" L’Aquila Italy
The Musical Metaverse (MM) is expected to pave the way for a new era of musical activities in immersive, and technology-mediated environments. However, research on the MM is still in its infancy. Until now, the attent... 详细信息
来源: 评论
A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants  5
A Systematic Study on Ransomware Attack: Types, Phases and R...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Krishna Prasad, D.S. Prasanna Kumar, H.R. Dept. of Computer & Communication Engineering. Karnataka574110 India Visvesvaraya Technological University Belagavi590018 India Pes Institute of Technology and Management Dept. of Information Science and Engineering Shivamogga India
The rise of ransomware attacks presents a major cybersecurity threat, leading to considerable financial losses and disrupting crucial operations across diverse sectors. In-dept. research on the field of ransomware ass... 详细信息
来源: 评论
Anodyne for Piracy by Hue Anatomization  2
Anodyne for Piracy by Hue Anatomization
收藏 引用
2nd IEEE International Conference on Data, Decision and Systems, ICDDS 2023
作者: Srinivasan, K N Pranav Sujatha, D.N. New Horizon College of Engineering Dept. of Information Science and Engineering Bangalore India B M S College of Engineering Dept. of Computer Applications Bangalore India
Piracy is a malignant and deleterious parasite in the world of digital content. Here we are specific to piracy that occurs in movies through cam recorders and mobiles. Our solution aims to find the source of piracy am... 详细信息
来源: 评论
Improved Algorithms for the Capacitated Team Orienteering Problem  24
Improved Algorithms for the Capacitated Team Orienteering Pr...
收藏 引用
24th Symposium on Algorithmic Approaches for Transportation Modelling, Optimization, and Systems, ATMOS 2024
作者: D’Angelo, Gianlorenzo D’Emidio, Mattia Delfaraz, Esmaeil Di Stefano, Gabriele Gran Sasso Science Institute L’Aquila Italy Dept. of Information Engineering Computer Science and Mathematics University of L’Aquila L’Aquila Italy
We study the Capacitated Team Orienteering Problem, where a fleet of vehicles with capacities have to meet customers with known demands and prizes for a single commodity. The objective is to maximize the total prize a... 详细信息
来源: 评论
Evaluation and Comparison of Facial Recognition Technology in Drawn Portraits  13
Evaluation and Comparison of Facial Recognition Technology i...
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Chang, Cheng Fanjiang, Yong-Yi Hung, Chi-Huang Chen, Jung-Hua Phung, Kiem-Trinh Trieu, Van-Duc Fu Jen Catholic University Graduate Institute of Applied Science and Engineering New Taipei City Taiwan Fu Jen Catholic University Graduate Institute of Applied Science and Engineering Dept. of Computer Science and Information Engineering New Taipei City Taiwan Fu Jen Catholic University Lee-Ming Institute of Technology Graduate Institute of Applied Science and Engineering Dept. of Information Technology New Taipei Taiwan Fu Jen Catholic University Dept. of Computer Science and Information Engineering New Taipei City Taiwan Lee-Ming Institute of Technology Dept. Electronical Engineering New Taipei City Taiwan
Numerous studies have proposed various methods and applications for facial recognition. In camera-equipped environments, these methods can easily identify real faces. However, recognizing faces on printed or Portrait ... 详细信息
来源: 评论
Cloud Data Security Using Hybrid Encryption with Blockchain  8th
Cloud Data Security Using Hybrid Encryption with Blockchain
收藏 引用
8th International Conference on Emerging Research in Computing, information, Communication and Applications, ERCICA 2023
作者: Soundappan, Kalaiselvi Shenoy, Govind Sreekar MSC- Computer Science Liverpool John Moors University Chennai India Dept. of Information Science Engineering Nitte Meenakshi Institute of Technology Bengaluru India
Securing cloud computing is a significant challenge for the cloud services sector. If someone is using the cloud to store data, choosing an encryption method that would not slow things down too much while providing a ... 详细信息
来源: 评论
Steganographic Encryption and Decryption Using Duality Preserving GANs  22
Steganographic Encryption and Decryption Using Duality Prese...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Shah, Aaryak Kamal, Alok Kumar Neeraj Dept. of Information Technology ABV-IIITM Gwalior Gwalior India Dept. of Electrical/Electronics ABV-IIITM Gwalior Gwalior India Dept. of Computer Science and Engineering Mahindra University Hyderabad India
Image steganography has been a significant research area in the security sphere. The core idea revolves around embedding secret messages in existing images (covers) such that the resultant image displays no noticeable... 详细信息
来源: 评论