咨询与建议

限定检索结果

文献类型

  • 6,061 篇 会议
  • 907 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 7,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,442 篇 工学
    • 3,471 篇 计算机科学与技术...
    • 2,909 篇 软件工程
    • 1,320 篇 信息与通信工程
    • 670 篇 控制科学与工程
    • 478 篇 生物工程
    • 436 篇 电气工程
    • 433 篇 电子科学与技术(可...
    • 329 篇 生物医学工程(可授...
    • 305 篇 光学工程
    • 271 篇 机械工程
    • 233 篇 仪器科学与技术
    • 211 篇 动力工程及工程热...
    • 170 篇 化学工程与技术
    • 160 篇 安全科学与工程
    • 159 篇 交通运输工程
    • 132 篇 建筑学
  • 2,120 篇 理学
    • 1,193 篇 数学
    • 537 篇 物理学
    • 496 篇 生物学
    • 376 篇 统计学(可授理学、...
    • 242 篇 系统科学
    • 163 篇 化学
  • 1,165 篇 管理学
    • 698 篇 管理科学与工程(可...
    • 516 篇 图书情报与档案管...
    • 357 篇 工商管理
  • 294 篇 医学
    • 256 篇 临床医学
    • 234 篇 基础医学(可授医学...
    • 141 篇 公共卫生与预防医...
    • 141 篇 药学(可授医学、理...
  • 200 篇 法学
    • 149 篇 社会学
  • 145 篇 农学
  • 117 篇 教育学
  • 109 篇 经济学
  • 25 篇 文学
  • 16 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 197 篇 accuracy
  • 190 篇 feature extracti...
  • 154 篇 computational mo...
  • 145 篇 training
  • 115 篇 computer science
  • 114 篇 deep learning
  • 111 篇 real-time system...
  • 105 篇 data mining
  • 101 篇 support vector m...
  • 95 篇 servers
  • 94 篇 predictive model...
  • 93 篇 machine learning
  • 86 篇 artificial intel...
  • 84 篇 data models
  • 83 篇 cloud computing
  • 82 篇 internet of thin...
  • 81 篇 protocols
  • 79 篇 semantics
  • 78 篇 computer archite...
  • 78 篇 quality of servi...

机构

  • 115 篇 dept. of compute...
  • 85 篇 dept. of informa...
  • 76 篇 institute of inf...
  • 60 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 41 篇 dept. of compute...
  • 37 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 28 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 22 篇 school of automa...
  • 22 篇 dept. of compute...
  • 21 篇 graduate institu...
  • 20 篇 dept. of compute...
  • 20 篇 dept. of compute...
  • 19 篇 dept. of informa...
  • 17 篇 dept. of compute...
  • 17 篇 dept. of compute...

作者

  • 46 篇 lorenzo bruzzone
  • 25 篇 li kuan-ching
  • 22 篇 jian-jhih kuo
  • 20 篇 libertario demi
  • 20 篇 yen-lin chen
  • 19 篇 ren-hung hwang
  • 18 篇 mei-hui wang
  • 18 篇 chen yen-lin
  • 18 篇 luca turchet
  • 16 篇 francesca bovolo
  • 16 篇 chang-shing lee
  • 16 篇 hwang ren-hung
  • 15 篇 kwon soonhak
  • 15 篇 jia-ching wang
  • 15 篇 hung yi-ping
  • 14 篇 lee yue-shi
  • 14 篇 bae hae-young
  • 13 篇 horng shi-jinn
  • 13 篇 watabe hirokazu
  • 13 篇 wu eric hsiao-ku...

语言

  • 6,730 篇 英文
  • 225 篇 其他
  • 60 篇 中文
  • 19 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science& Information Engineering"
7040 条 记 录,以下是631-640 订阅
排序:
Automated Bengali Sign Language Character Classification with Deep Learning Techniques
Automated Bengali Sign Language Character Classification wit...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Tahmina Akter Tanjim Mahmud Tikle Barua Sultana Rokeya Naher Mohammad Shahadat Hossain Karl Andersson Dept. of Computer Science and Engineering Port City International University Chittagong Bangladesh Dept. of Computer Science and Engineering Rangamati Science and Technology University Rangamati Bangladesh Dept. of Computer Science and Engineering University of Information Technology and Sciences Dhaka Bangladesh Dept. of Computer Science and Engineering University of Chittagong Chittagong Bangladesh Cybersecurity Laboratory Luleå University of Technology Luleå Sweden
Recognition of Bengali sign language characters is crucial for facilitating communication for the deaf and hard-of-hearing population in Bengali-speaking regions, which encompass approximately 430 million people world... 详细信息
来源: 评论
A Multi-Routing Paths’ Exploration Algorithm for Multi-paired Communicating Vehicles’ Data Transmission Offloading using the Multi-access Edge Computing Architecture
A Multi-Routing Paths’ Exploration Algorithm for Multi-pair...
收藏 引用
Communication Systems (ECCS), European Conference on
作者: Chung-Ming Huang Cheng-Han Tsai Dept. of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan
This work proposed a novel method for multiple communicating paired vehicles’ data transmission offloading using the Multi-access Edge Computing (MEC) technique. When two paired communicating vehicles are communicati... 详细信息
来源: 评论
DragFly: Joint Threat Object Detection And UAV Trajectory Planning in Hostile Environments
DragFly: Joint Threat Object Detection And UAV Trajectory Pl...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Akkapatch Thouchamongkol Hong-Yi Chen Yan-Hao Wang Quan Tran Dinh Dai Van-Linh Nguyen Dept. of Computer Science and Information Engineering National Chung Cheng University Chiayi Taiwan
Unmanned Aerial Vehicles (UAVs) have a wide range of capacities, including surveillance, rescue missions, geographi-cal mapping, and military uses. This work focuses on combining computer vision with route planning me... 详细信息
来源: 评论
Improvisation of QoS in SDN-Frame Work for UAV Networks Using Dijkstra Shortest Path Routing Algorithm  1
Improvisation of QoS in SDN-Frame Work for UAV Networks Usin...
收藏 引用
1st IEEE International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics, AIKIIE 2023
作者: Mathapati, Mahantesh Nandihal, Priya Mishra, Priti Kotagi, Veeranna Dept.of Cse Bengaluru India Dayananda Sagar Academy of Technology and Management Dept of Computer Science and Engineering Bangalore India Information Science and Engineering Atria Institute of Technology Bengaluru India Nitte Meenakshi Institute of Technology Dept. of Ise Bengaluru India
This work presents a unique SDN-based Dijkstra shortest path routing algorithm for QoS improvisation in UAV Networks. It discusses the various problems pertaining to the networking of unmanned aerial vehicles in disas... 详细信息
来源: 评论
High Stability Marine Pollution Detection Model based on a Drone Platform
High Stability Marine Pollution Detection Model based on a D...
收藏 引用
International Conference on Wireless and Optical Communications ( WOCC)
作者: Lin Po-Lun Xiu-Zhi Chen Yen-Lin Chen Dept. of Computer Science & Information Engineering National Taipei University of Technology Taipei Taiwan
Currently, unmanned aerial vehicles (UAVs) have a wide range of applications. One such application is the detection of marine pollution, for which numerous methods have been proposed. While validation on public datase... 详细信息
来源: 评论
All-or-Nothing Concurrent Entanglement Routing
All-or-Nothing Concurrent Entanglement Routing
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Ching-Ting Wei Kai-Xu Zhan Po-Wei Huang Wei-Ting Chang Jian-Jhih Kuo Dept. of Computer Science and Information Engineering National Chung Cheng University Chiayi Taiwan
Establishing entangled links by entangling and swapping can enable end-to-end teleportation, avoiding eavesdropping and facilitating the critical applications, such as quantum key distribution (QKD) service. For these... 详细信息
来源: 评论
A Novel Data Hiding Scheme based on Block Features Enhanced AMBTC  23
A Novel Data Hiding Scheme based on Block Features Enhanced ...
收藏 引用
Proceedings of the 2023 4th Asia Service sciences and Software engineering Conference
作者: Chia-Chen Lin Hizrawan Dwi Oka Enting Zhu Dept. of Computer Science and Information Engineering National Chin-Yi University of Technology Taiwan
In this paper, we first improve Chen et al.’s ternary representation-based Absolute Moment Block Truncation Coding (AMBTC), then we combine block features and AMBTC to design our novel block feature enhanced-AMBTC-ba... 详细信息
来源: 评论
The Comparison of Three Types’ Resource Allocation Approaches for Scalable Video Coding (SVC)-Based Multimedia's Multicast Broadcast Service (MBS)
The Comparison of Three Types’ Resource Allocation Approach...
收藏 引用
Electrics and computer (INTCEC), Interdisciplinary Conference on
作者: Chung-Ming Huang Shao-Chieh Hsu Dept. of Computer Science and Information Engineering National Chen Kung University Tainan Taiwan
This work proposes the Utility-centric Scalable Video Coding (SVC)-based radio Resource Allocation (U-S-RA) method for Vehicular Users (VUs) using the no subgrouping approach for multimedia's Multicast Broadcast S... 详细信息
来源: 评论
Cybersecurity Threat Detection Using Deep Learning and Anomaly Detection Techniques
Cybersecurity Threat Detection Using Deep Learning and Anoma...
收藏 引用
Knowledge engineering and Communication Systems (ICKECS), International Conference on
作者: T. Rajendran N Mohamed Imtiaz K Jagadeesh Balaji Sampathkumar Department of Computer Science and Engineering Rajalakshmi Institute of Technology Chennai India Dept. of Information Science and Engineering Nagarjuna College of Engineering and Technology Bangalore India Dept. of Computer Science and Engineering Sri Venkateswaraa College of Technology Chennai India Dept. of Computer Science and Engineering Akshaya College of Engineering and Technology Coimbatore India
Through the use of combined deep learning and anomaly detection approaches, this research investigates the area of cybersecurity threat detection. The study proves the framework’s extraordinary success in recognizing... 详细信息
来源: 评论
Self Organized Anchor Group based Routing Protocol for IoT Initial Setup  17
Self Organized Anchor Group based Routing Protocol for IoT I...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Gupta, Naveen Kumar Aggarwal, Apeksha Yadav, Rama Shankar Kumar Nagaria, Rajendra Dr B R Ambedkar National Institute of Technology Jalandhar Center of Energy and Environment Dept. of Information Technology Jalandhar India Jaypee Institute of Information Technology Dept. of CSE and IT Noida India Motilal Nehru National Institute of Technology Allahabad Department of Computer Science and Engineering Prayagraj India Motilal Nehru National Institute of Technology Allahabad Department of Electronics and Comm. Engineering Prayagraj India
Geographical routing approach relies on local geographic information and performs multi-hop routing with the help of local decisions. The nodes are represented by 3D coordinates as some real IoT networks may be deploy... 详细信息
来源: 评论