咨询与建议

限定检索结果

文献类型

  • 17,948 篇 会议
  • 3,045 篇 期刊文献
  • 192 册 图书

馆藏范围

  • 21,185 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,680 篇 工学
    • 8,877 篇 计算机科学与技术...
    • 7,424 篇 软件工程
    • 3,499 篇 信息与通信工程
    • 2,040 篇 控制科学与工程
    • 1,698 篇 电子科学与技术(可...
    • 1,673 篇 电气工程
    • 1,416 篇 生物工程
    • 1,149 篇 生物医学工程(可授...
    • 971 篇 光学工程
    • 835 篇 机械工程
    • 729 篇 仪器科学与技术
    • 700 篇 动力工程及工程热...
    • 632 篇 化学工程与技术
    • 550 篇 安全科学与工程
    • 456 篇 交通运输工程
    • 396 篇 材料科学与工程(可...
  • 6,688 篇 理学
    • 3,482 篇 数学
    • 2,006 篇 物理学
    • 1,553 篇 生物学
    • 1,110 篇 统计学(可授理学、...
    • 735 篇 系统科学
    • 647 篇 化学
  • 3,195 篇 管理学
    • 1,917 篇 管理科学与工程(可...
    • 1,459 篇 图书情报与档案管...
    • 1,001 篇 工商管理
  • 1,005 篇 医学
    • 870 篇 临床医学
    • 808 篇 基础医学(可授医学...
    • 501 篇 药学(可授医学、理...
    • 454 篇 公共卫生与预防医...
  • 613 篇 法学
    • 491 篇 社会学
  • 376 篇 经济学
  • 285 篇 农学
  • 237 篇 教育学
  • 88 篇 文学
  • 55 篇 军事学
  • 20 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 692 篇 accuracy
  • 511 篇 deep learning
  • 456 篇 feature extracti...
  • 449 篇 computational mo...
  • 342 篇 support vector m...
  • 336 篇 real-time system...
  • 325 篇 training
  • 299 篇 internet of thin...
  • 299 篇 computer science
  • 283 篇 machine learning
  • 245 篇 predictive model...
  • 226 篇 computer archite...
  • 215 篇 convolutional ne...
  • 213 篇 optimization
  • 200 篇 reliability
  • 198 篇 data mining
  • 188 篇 neural networks
  • 184 篇 image segmentati...
  • 180 篇 routing
  • 174 篇 wireless communi...

机构

  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 université de st...
  • 81 篇 infn sezione di ...
  • 81 篇 national centre ...
  • 80 篇 tno technical sc...
  • 78 篇 institute of inf...
  • 77 篇 nikhef national ...
  • 76 篇 infn sezione di ...
  • 68 篇 university würzb...
  • 66 篇 università di ca...
  • 59 篇 university of jo...
  • 55 篇 university moham...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 49 篇 university moham...
  • 44 篇 ncsr demokritos ...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...

作者

  • 94 篇 ardid m.
  • 93 篇 ferrara g.
  • 92 篇 kalekin o.
  • 91 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 89 篇 coleiro a.
  • 87 篇 calvo d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 80 篇 chen a.
  • 77 篇 gozzini s.r.
  • 76 篇 huang f.
  • 76 篇 dallier r.
  • 72 篇 anguita m.
  • 71 篇 enzenhöfer a.
  • 67 篇 celli s.
  • 66 篇 boettcher m.
  • 63 篇 dornic d.
  • 60 篇 kulikovskiy v.
  • 59 篇 aly z.

语言

  • 19,906 篇 英文
  • 995 篇 其他
  • 198 篇 中文
  • 65 篇 日文
  • 19 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Science and Engineering and Computer Technology Institute"
21185 条 记 录,以下是4921-4930 订阅
排序:
UAV-based Firefighting by Multi-agent Reinforcement Learning
UAV-based Firefighting by Multi-agent Reinforcement Learning
收藏 引用
International eConference on computer and Knowledge engineering (ICCKE)
作者: Reza Shami Tanha Mohsen Hooshmand Mohsen Afsharchi Dept. Computer Science and IT Institute for Advanced Studies in Basic Sciences (IASBS) Zanjan Iran Dept. Electrical and Computer Engineering University of Zanjan Zanjan Iran
Wildfire in the forest leads to a huge amount of financial and human losses. That is it causes damage to the forest and the life of firefighters. To reduce the amount of such damage, unmanned aerial vehicles are among...
来源: 评论
Indian Food Segmentation and Calorie Estimation Using CatBoost and Masked Convolutional Neural Networks
Indian Food Segmentation and Calorie Estimation Using CatBoo...
收藏 引用
Network, Multimedia and Information technology (NMITCON) International Conference on
作者: Nabin Acharya Ayush Kumar Singh Anshuman Kumar Dwivedi Jayanthi M. G Prashant Kannadaguli Dept. of Information Science and Engineering Cambridge Institute of Technology Bengaluru India Dept. of Artificial Intelligence and Machine Learning Cambridge Institute of Technology Bengaluru India Dept. of Computer Science and Engineering Cambridge Institute of Technology Bengaluru India Dhaarini Academy of Technical Education Bengaluru India
Accurate food segmentation and calorie estimation play a pivotal role in effective dietary monitoring and health management. In this paper, after extensive experimentation on a diverse Indian food dataset of 20 classe...
来源: 评论
Human Activity Recognition using ShuffleNetV2 Model
Human Activity Recognition using ShuffleNetV2 Model
收藏 引用
Intelligent Computing and Control for engineering and Business Systems (ICCEBS)
作者: Shanufa Nazrin P S J.V. Bibal Benifa Anu K. P Aiswarya Vijayakumar dept. of Computer Science St.Joseph's college (university of calicut) Thrissur Kerala dept.of Computer Science and Engineering Indian Institute of Information Technology kottayam Kerala India
HAR is specified as the crucial task within the field of computer vision and artificial intelligence. Main aim of HAR is to observing and labelling different human activity images of distinct data sources by machines ...
来源: 评论
Implementation of a Word Prediction Model Using LSTM Neural Network with Optimization Strategies
Implementation of a Word Prediction Model Using LSTM Neural ...
收藏 引用
Multi-Agent Systems for Collaborative Intelligence (ICMSCI), International Conference on
作者: Jagadevi P Yeresime Suresh Dept. of Computer Science & Engg. Ballari Institute of Technology and Management Ballari Visvesvaraya Technological University Belagavi Karnataka India Dept. of CSE - Artificial Intelligence Ballari Institute of Technology and Management Ballari
The development of word predictive models has significantly advanced with the integration of deep learning techniques, particularly in the domain of natural language processing (NLP). Early models like n-grams and bas... 详细信息
来源: 评论
A Way of Safe Wireless Networks using IμUWB/Vision through Sensor Networks  4
A Way of Safe Wireless Networks using IμUWB/Vision through ...
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2024
作者: Sharmila, P. Maheswaran, M. Mohanraj, T. Verma, Rajan Malviya, Bhupendra Subbarao, S.P.V. Prince Shri Venkateshwara Padmavathy Engineering College S & H Dept TN India Nehru Institute of Engineering and Technology Department of Mechatronics Engineering Tamil Nadu T.M.Palayam India Karpagam Academy of Higher Education Department of Computer Science and Engineering TN India Chitkara University Chitkara Center for Research and Development Himachal Pradesh India M.P Bhopal India Sreenidhi Institute of Science and Technology Electronics and Communication Engineering Department Hyderabad India
In current military and private spheres, the demand for exact localization within the home of mobile agents, especially small unmanned aircraft (UAVs), has attracted significant attention. This paper shows a new metho... 详细信息
来源: 评论
EFFECTIVE NOISE-AWARE DATA SIMULATION FOR DOMAIN-ADAPTIVE SPEECH ENHANCEMENT LEVERAGING DYNAMIC STOCHASTIC PERTURBATION
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Chien-Chun Chen, Li-Wei Lee, Hung-Shin Chen, Berlin Wang, Hsin-Min Dept. Computer Science and Information Engineering National Taiwan Normal University Taiwan Institute of Computer Science Academia Sinica Taiwan United-Link Co. Ltd. Taiwan
Cross-domain speech enhancement (SE) is often faced with severe challenges due to the scarcity of noise and background information in an unseen target domain, leading to a mismatch between training and test conditions... 详细信息
来源: 评论
An Effective Framework for Detecting Epileptic Seizures using CNN and Encrypted EEG Signals
An Effective Framework for Detecting Epileptic Seizures usin...
收藏 引用
2023 International Conference on Sustainable Computing and Smart Systems, ICSCSS 2023
作者: Pradeep, G. Bala, Saroj Satheesh, N.P. Mahalakshmi, M. Balasamy, K. Suganyadevi, S. Sri Krishna College of Engineering and Technology Department of M.Tech. Computer Science and Engineering Coimbatore India Ajay Kumar Garg Engineering College Department of Mca Ghaziabad India Bannari Amman Institute of Technology Department of Ai & Ds Sathyamangalam India Saveetha Engineering College Dept of Artificial Intelligence & Data Science Chennai India Kpr Institute of Engineering and Technology Department of Ece Coimbatore India
Electroencephalogram (EEG) signals may be used to autonomously diagnose epilepsy, eliminating the requirement for a medical professional's involvement in the process. A good classification performance is really ne... 详细信息
来源: 评论
I-Card: A Generative AI-Supported Intelligent Design Method Card Deck  25
I-Card: A Generative AI-Supported Intelligent Design Method ...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Chen, Liuqing Cheang, Wengteng Jiang, Zhaojun Xu, Yuan Cai, Zebin Sun, Lingyun Childs, Peter Han, Ji Hansen, Preben Zuo, Haoyu College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou China School of Computer Science and Engineering Central South University Hunan Changsha China International Design Institute Zhejiang University Zhejiang Hangzhou China Dyson School of Design Engineering Imperial College London London United Kingdom Department of Innovation Technology and Entrepreneurship University of Exeter Exeter United Kingdom Dept of Computer and Systems Sciences Stockholm University Kista Sweden
A design method card deck helps designers understand and provoke thinking by presenting each method in a simple format and allow designers to switch between methods seamlessly by maintaining the same simple format acr... 详细信息
来源: 评论
Investigating the Impact of Heuristic Algorithms on Cyberthreat Detection
Investigating the Impact of Heuristic Algorithms on Cyberthr...
收藏 引用
Advances in Computation, Communication and Information technology (ICAICCIT), International Conference on
作者: Dinesh Kalla Abdul Sajid Mohammed Venkata Nagesh Boddapati Nasmin Jiwani T. Kiruthiga Dept. of Computer Science Colorado Technical University Charlotte NC USA Dept of School of Computer and Information Sciences University of the Cumberlands Kentucky USA Dept. of Computer Science Microsoft Charlotte NC USA Dept. of Information Technology University of The Cumberlands Williamsburg KY USA Department of ECE Vetri Vinayaha College of Engineering and Technology Trichy Tamil Nadu India
This paper investigates the effect of heuristic algorithms on cybersecurity hazard detection and mitigation. To be able to do so, the authors analyze the performance of two heuristics-based algorithms—the simple Heur... 详细信息
来源: 评论
Cyber Security Threats Detection Analysis and Remediation  1
Cyber Security Threats Detection Analysis and Remediation
收藏 引用
1st IEEE Mysore Sub Section International Conference, MysuruCon 2021
作者: Darshini, P. Mohana Kumar, S. Raghavendra, C.G. Krishna Prasad, S.J. Kavitha, H. Divakara, S.S. Ramaiah Institute of Technology Dept. of Computer Science Bangalore India Ramaiah Institute of Technology Bangalore Dept. of Computer Science Bangalore India Ramaiah Institute of Technology Dept. of Electronics and Communication Bangalore India Ramaiah Institute of Technology Dept. of Electronics and Telecommunication Bangalore India Siddaganga Institute of Technology Dept. Infomation and Science Tumkur India Coorg Institute of Technology Dept. of Electronics and Communication Ponnampet India
The devices of the organization such as laptops, desktops and mobiles are connected to the internet are vulnerable to cyber attacks, attacking on these components may lead to security breach, credential theft, malware... 详细信息
来源: 评论