咨询与建议

限定检索结果

文献类型

  • 6,022 篇 会议
  • 904 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 6,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,419 篇 工学
    • 3,454 篇 计算机科学与技术...
    • 2,892 篇 软件工程
    • 1,317 篇 信息与通信工程
    • 663 篇 控制科学与工程
    • 477 篇 生物工程
    • 434 篇 电气工程
    • 432 篇 电子科学与技术(可...
    • 326 篇 生物医学工程(可授...
    • 301 篇 光学工程
    • 268 篇 机械工程
    • 233 篇 仪器科学与技术
    • 209 篇 动力工程及工程热...
    • 168 篇 化学工程与技术
    • 159 篇 安全科学与工程
    • 158 篇 交通运输工程
    • 132 篇 建筑学
  • 2,113 篇 理学
    • 1,189 篇 数学
    • 535 篇 物理学
    • 495 篇 生物学
    • 374 篇 统计学(可授理学、...
    • 242 篇 系统科学
    • 163 篇 化学
  • 1,160 篇 管理学
    • 694 篇 管理科学与工程(可...
    • 515 篇 图书情报与档案管...
    • 355 篇 工商管理
  • 290 篇 医学
    • 252 篇 临床医学
    • 231 篇 基础医学(可授医学...
    • 141 篇 药学(可授医学、理...
    • 138 篇 公共卫生与预防医...
  • 200 篇 法学
    • 149 篇 社会学
  • 144 篇 农学
  • 115 篇 教育学
  • 109 篇 经济学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 191 篇 accuracy
  • 188 篇 feature extracti...
  • 150 篇 computational mo...
  • 146 篇 training
  • 115 篇 computer science
  • 109 篇 deep learning
  • 108 篇 real-time system...
  • 105 篇 data mining
  • 100 篇 support vector m...
  • 94 篇 predictive model...
  • 93 篇 servers
  • 93 篇 machine learning
  • 87 篇 artificial intel...
  • 83 篇 cloud computing
  • 81 篇 internet of thin...
  • 81 篇 data models
  • 80 篇 protocols
  • 78 篇 quality of servi...
  • 78 篇 semantics
  • 77 篇 computer archite...

机构

  • 115 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 40 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 28 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 graduate institu...
  • 22 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 19 篇 dept. of informa...
  • 18 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...

作者

  • 46 篇 lorenzo bruzzone
  • 25 篇 li kuan-ching
  • 22 篇 jian-jhih kuo
  • 20 篇 libertario demi
  • 20 篇 yen-lin chen
  • 19 篇 ren-hung hwang
  • 18 篇 mei-hui wang
  • 18 篇 luca turchet
  • 16 篇 francesca bovolo
  • 16 篇 chang-shing lee
  • 16 篇 hwang ren-hung
  • 15 篇 chen yen-lin
  • 15 篇 kwon soonhak
  • 15 篇 jia-ching wang
  • 15 篇 hung yi-ping
  • 14 篇 bae hae-young
  • 13 篇 lee yue-shi
  • 13 篇 horng shi-jinn
  • 13 篇 watabe hirokazu
  • 13 篇 wu eric hsiao-ku...

语言

  • 6,801 篇 英文
  • 112 篇 其他
  • 60 篇 中文
  • 19 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Information Engineering"
6998 条 记 录,以下是241-250 订阅
排序:
Rapid Construction of Diode Models Based on Physical Mechanism and Machine Learning  12
Rapid Construction of Diode Models Based on Physical Mechani...
收藏 引用
12th International Conference on Awareness science and Technology, iCAST 2023
作者: Lin, Kun-Wei Li, Jia-Wei Jian, Wei-Chen Jiang, Zheng-Han Lu, Hsin-Hou dept. Computer Science and Information Engineering Chaoyang University of Technology Taichung Taiwan dept. Electrical Engineering National Cheng-Kung University Tainan Taiwan
Diodes are crucial components in electronics, with applications ranging from rectification to sensing. Traditional modeling methods are time-consuming due to manual parameter extraction. In this study, two machine lea... 详细信息
来源: 评论
Predict of the Hidden Drug Interactions Based on Similarity Utilizing the Knowledge Graph
Predict of the Hidden Drug Interactions Based on Similarity ...
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Elfiky, Mariam Gamal Ghoniemy, Samy Eldin, Ahmed Sharaf University of Hertfordshire hosted by Gaf Dept. of Information Technology Management for Business Cairo Egypt Galala University Faculty of Computer Science and Engineering Cairo Egypt Sinai University Faculty of Information Technology and Computer Science Cairo Egypt
Drug-drug interactions (DDIs) can significantly impact treatment outcomes by causing adverse effects or reducing therapeutic efficacy. Whereas many DDIs are already known, there are numerous hidden interactions. There... 详细信息
来源: 评论
Innovative Approaches to Dental Age Estimation: A Comprehensive Review of CNN Technologies and Ethical Issue  5
Innovative Approaches to Dental Age Estimation: A Comprehens...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Shyni, I. Domilin Sheeja Herobin Rani, C. Sheeba, I. Rexiline Mahizha, S.I. Dmi Engineering College Dept. Of Computer Science and Engineering Aralvoimozhi India St.Xavier's Catholic College of Engineering Dept. Of Electronics and Communication Engineering Nagercoil India Sathyabama Institute of Technology and Science Dept. Of Electronics and Communication Engineering Chennai India St.Xavier's Catholic College of Engineering Dept. Of Information Technology Nagercoil India
Estimating dental age is crucial in multiple disciplines, such as forensic science, orthodontics, and pediatric dentistry. Traditional methods, while effective, often involve manual processes and subjective judgment. ... 详细信息
来源: 评论
Quantum Resistance Blockchain Algorithm using QHF and Novel Consensus Mechanism
Quantum Resistance Blockchain Algorithm using QHF and Novel ...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Paul, Soumyadip Mazumdar, Mausumi Maitra Chakraborty, Sarit Government College of Engineering & Ceramic Technology Dept. of Information Technology Kolkata700010 India Government College of Engineering and Leather Technology Department of Computer Science and Engineering Kolkata700106 India
The emergence of quantum computing poses a significant threat to the security of traditional blockchain systems, which rely heavily on classical cryptographic algorithms. To safeguard the integrity and reliability of ... 详细信息
来源: 评论
Explore the Impact of Quantum Computing to Enhance Cryptographic Protocols and Network Security Measures  5
Explore the Impact of Quantum Computing to Enhance Cryptogra...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Ambika, S. Balaji, V. Rajasekaran, R.Thalapathi Periyasamy, P.N. Kamal, N. E. G. S. Pillay Engineering College Department of Information Technology Tamil Nadu Nagapattinam India Chennai India Saveetha School of Engineering Simats Dept. of Computer Science and Engineering Chennai India Hindusthan Institute of Technology Department of Computer Science and Engineering India Grt Institute of Engineering and Technology Dept. of Computer Science and Engineering Tamil Nadu Tiruttani India
The revolutionary effects of quantum computing on security procedures for networks and cryptographic protocols are the focus of this study. Our research shows that conventional cryptographic algorithms are susceptible... 详细信息
来源: 评论
Internet of Things(IoT) security: Approaches and existing solutions
Internet of Things(IoT) security: Approaches and existing so...
收藏 引用
2023 TRON Symposium, TRONSHOW 2023
作者: Upadhyay, Vatsala Vaish, Abhishek Kokila, J. Indian Institute of Information Technology Allahabad Dept. of Information Technology Prayagraj211015 India Indian Institute of Information Technology Trichy Dept. of Computer Science and Engineering Tiruchirappalli620012 India
The world has become dependent on using the Internet of Things(IoT) owing to its unique features - sensing the environment, acting upon the results obtained by sensors, connecting a network of devices for communicatio... 详细信息
来源: 评论
Near-Optimal Swapping and Purifying Strategy for All-Optical-Switching Entanglement Routing
Near-Optimal Swapping and Purifying Strategy for All-Optical...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Huang, Shao-Min Hsu, Tang-Ming Du, Jing-Jhih Kuo, Jian-Jhih Wang, Chih-Yu Academia Sinica Research Center for Information Technology Innovation Taipei City Taiwan National Chung Cheng University Dept. of Computer Science and Information Engineering Chiayi Taiwan
Entangled pairs serve as the cornerstone for secure data transmission. All-optical-switching technology on nodes enables the entangling signals to bypass nodes and build ultra-long entangled pairs. Nevertheless, entan... 详细信息
来源: 评论
A Comparative Analysis of ML Algorithms to Improve Crop Productivity Prediction
A Comparative Analysis of ML Algorithms to Improve Crop Prod...
收藏 引用
2023 International Conference on Disruptive Technologies, ICDT 2023
作者: Nigam, Anushree Jain, Divyanshu Talan, Manish Singh Singh, S.K. Umrao, Sandhya Galgotias College of Engineering and Technology Dept. of Information Technology Greater Noida India Noida Institute of Engineering and Technology Dept. of Computer Science Engineering Greater Noida India
According to numerous calculations, the global food output must significantly increase by 2050. Additionally, water levels have been declining, and there is a shortage of usable agricultural land. The first step to in... 详细信息
来源: 评论
Quantum Error Correction Based Entanglement Routing in Socially-Aware Quantum Networks
Quantum Error Correction Based Entanglement Routing in Socia...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Huang, Shao-Min Chien, Ming-Huang Wen, Ting-Yuan Wang, Qian-Jing Kuo, Jian-Jhih National Chung Cheng University Dept. of Computer Science and Information Engineering Chiayi Taiwan Academia Sinica Research Center for Information Technology Innovation Taipei City Taiwan
Quantum teleportation enables high-security communications via quantum entanglement. However, decoherence, signal decay, and environmental interference may cause imperfect entangled pairs with low fidelity. Such entan...
来源: 评论
Authorizable Tripartite Entanglement Routing via 3-GHZ State in Quantum Networks
Authorizable Tripartite Entanglement Routing via 3-GHZ State...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Huang, Shao-Min Wei, Ching-Ting Zhan, Kai-Xu Le Touze, Juliette Chou Kuo, Jian-Jhih Wang, Chih-Yu National Chung Cheng University Dept. of Computer Science and Information Engineering Chiayi Taiwan Academia Sinica Research Center for Information Technology Innovation Taipei City Taiwan
Traditional end-to-end entanglement typically operates between two parties. However, such a setup may fall short when three parties are involved. GHZ states, a multi-qubit entangled state, provide an approach to such ... 详细信息
来源: 评论