咨询与建议

限定检索结果

文献类型

  • 18,606 篇 会议
  • 2,903 篇 期刊文献
  • 171 册 图书

馆藏范围

  • 21,680 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,198 篇 工学
    • 9,353 篇 计算机科学与技术...
    • 7,819 篇 软件工程
    • 3,730 篇 信息与通信工程
    • 2,086 篇 控制科学与工程
    • 1,705 篇 电子科学与技术(可...
    • 1,609 篇 电气工程
    • 1,370 篇 生物工程
    • 1,144 篇 生物医学工程(可授...
    • 978 篇 光学工程
    • 898 篇 机械工程
    • 794 篇 仪器科学与技术
    • 705 篇 动力工程及工程热...
    • 647 篇 化学工程与技术
    • 522 篇 安全科学与工程
    • 500 篇 交通运输工程
    • 379 篇 建筑学
  • 6,690 篇 理学
    • 3,520 篇 数学
    • 1,930 篇 物理学
    • 1,485 篇 生物学
    • 1,146 篇 统计学(可授理学、...
    • 775 篇 系统科学
    • 665 篇 化学
  • 3,419 篇 管理学
    • 2,070 篇 管理科学与工程(可...
    • 1,535 篇 图书情报与档案管...
    • 1,076 篇 工商管理
  • 981 篇 医学
    • 845 篇 临床医学
    • 780 篇 基础医学(可授医学...
    • 495 篇 药学(可授医学、理...
    • 422 篇 公共卫生与预防医...
  • 598 篇 法学
    • 471 篇 社会学
  • 376 篇 经济学
  • 328 篇 农学
  • 269 篇 教育学
  • 88 篇 文学
  • 44 篇 军事学
  • 20 篇 艺术学
  • 1 篇 哲学

主题

  • 689 篇 accuracy
  • 481 篇 feature extracti...
  • 468 篇 deep learning
  • 446 篇 computational mo...
  • 355 篇 training
  • 345 篇 support vector m...
  • 318 篇 real-time system...
  • 306 篇 internet of thin...
  • 292 篇 computer science
  • 249 篇 predictive model...
  • 246 篇 machine learning
  • 226 篇 computer archite...
  • 212 篇 reliability
  • 211 篇 optimization
  • 206 篇 wireless communi...
  • 199 篇 convolutional ne...
  • 198 篇 neural networks
  • 193 篇 data mining
  • 192 篇 routing
  • 184 篇 image segmentati...

机构

  • 84 篇 institute of inf...
  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 80 篇 tno technical sc...
  • 79 篇 infn sezione di ...
  • 77 篇 dept. of informa...
  • 76 篇 infn sezione di ...
  • 75 篇 nikhef national ...
  • 74 篇 university würzb...
  • 72 篇 université de st...
  • 66 篇 università di ca...
  • 64 篇 university of jo...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 54 篇 university moham...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 51 篇 dept. of compute...
  • 51 篇 university moham...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 82 篇 díaz a.f.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 80 篇 boumaaza j.
  • 80 篇 coleiro a.
  • 79 篇 gozzini s.r.
  • 78 篇 dallier r.
  • 75 篇 anguita m.
  • 74 篇 boettcher m.
  • 72 篇 enzenhöfer a.
  • 69 篇 huang f.
  • 69 篇 aly z.
  • 66 篇 celli s.
  • 59 篇 dornic d.
  • 54 篇 carretero v.

语言

  • 19,231 篇 英文
  • 2,126 篇 其他
  • 206 篇 中文
  • 83 篇 日文
  • 35 篇 朝鲜文
  • 3 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Dept. of Computer Science and engineering and Information Technology"
21680 条 记 录,以下是71-80 订阅
排序:
Autoencoded Image Compression for Secure and Fast Transmission
Autoencoded Image Compression for Secure and Fast Transmissi...
收藏 引用
2024 IEEE International Conference on computer Vision and Machine Intelligence, CVMI 2024
作者: Naveen, Aryan Kashyap Thunga, Sunil Murki, Anuhya Kalale, Mahati Anil, Shriya National Institute of Technology Karnataka Dept. of Information Technology Surathkal India National Institute of Technology Karnataka Dept. of Computer Science and Engineering Surathkal India
With exponential growth in the use of digital image data, the need for efficient transmission methods has become imperative. Traditional image compression techniques often sacrifice image fidelity for reduced file siz... 详细信息
来源: 评论
Malware Detection across Clusters
Malware Detection across Clusters
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Manjushree, C.V. Nandakumar, A.N. Vemana Institute of Technology Dept. of Information Science & Engineering India City Engineering College Dept. of Computer Science & Engineering India
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba... 详细信息
来源: 评论
Secured Entry Control: An IoT and Deep Learning based Mask Detection System for COVID-19 Suspected Patient Screening and Access Regulation  3
Secured Entry Control: An IoT and Deep Learning based Mask D...
收藏 引用
3rd International Conference on Advancement in Electrical and Electronic engineering, ICAEEE 2024
作者: Sultana, Abida Peyal, Hasibul Islam Islam, Md. Injamul Abdal, Md. Nazmul Miraz, Shafiun Kontho, Md. Mahin Rahaman Leion, Zannatul Mawa Mamun, Abdul Al Rajshahi University of Engineering & Technology Dept. of Electrical & Computer Engineering Rajshahi Bangladesh Uttara University Dept. of Computer Science & Engineering Dhaka Bangladesh University of Liberal Arts Bangladesh Dept. of Computer Science and Engineering Dhaka Bangladesh Rajshahi University of Engineering & Technology Dept. of Computer Science & Engineering Rajshahi Bangladesh Tejgaon College Dept. of Computer Science and Engineering Dhaka Bangladesh
The new coronavirus SARS-CoV-2, which triggered the COVID-19 pandemic, has had an unparalleled effect on economies, cultures, and world health. In response to the critical need for strict COVID-19 screening systems in... 详细信息
来源: 评论
LeXNet++: Layer-wise eXplainable ResUNet++ framework for segmentation of colorectal polyp cancer images
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 213-229页
作者: Das, Surajit Khan, Soumya Suvra Sengupta, Diganta Debashis, De Dept. of Information Technology Meghnad Saha Institute of Technology Behind Urbana Complex Near Ruby General Hospital Anandapur Rd Uchhepota Kolkata700150 India Dept. of Computer Science & Engineering Meghnad Saha Institute of Technology Behind Urbana Complex Near Ruby General Hospital Anandapur Rd Uchhepota Kolkata700150 India Dept. of Computer Science & Engineering Heritage Institute of Technology Chowbaga Road West Bengal Anandapur Kolkata700107 India Dept. of Computer Science & Engineering Maulana Abul Kalam Azad University of Technology West Bengal NH-12 Simhat Haringhata West Bengal Nadia741249 India
Colorectal polyps are benign lesions that develop in the colon and can progress to cancer if left untreated. Clinical observations from medical images are often preferred over computational results due to the lac... 详细信息
来源: 评论
Spatial Dynamics for Identification of Individuals through Gait and Other Locomotion Activities
Spatial Dynamics for Identification of Individuals through G...
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Anusha, R. Sanshi, Shridhar Bapuji Institute of Engineering and Technology Dept. of Computer Science and Engineering Davanagere India National Institute of Technology Dept. of Computer Science and Engineering Karnataka Surathkal India
Gait, the pattern of walking, has been extensively studied and various methods have been developed to use it as a biometric for individual recognition. Despite this, the potential to identify individuals through runni... 详细信息
来源: 评论
WellBe: An Intelligent Elderly Care and Well-Being Monitoring System Using Deep Learning  4
WellBe: An Intelligent Elderly Care and Well-Being Monitorin...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Raotole, Atharv Shirodkar, Sailee Sanjay Shukla, Rahul Sisodia, Jignesh Devadkar, Kailas Patel Institute of Technology Dept. of Information Technology Sardar Mumbai India Patel Institute of Technology Dept. of Computer Science and Engineering Sardar Mumbai India
Deep Learning refers to a subset of Machine Learning that utilizes deep neural networks to simulate the complex decision-making process of the human brain. In recent years, DL has made remarkable progress in addressin... 详细信息
来源: 评论
DFT-based Channel Estimation with Multiple Windows for ATSC 3.0 Receiver  13
DFT-based Channel Estimation with Multiple Windows for ATSC ...
收藏 引用
13th IEEE Global Conference on Consumer Electronic, GCCE 2024
作者: Liu, Yu-Sun Li, Yin-Shan You, Shingchern D. National Taipei University of Technology Dept. of Electronic Engineering Taipei Taiwan National Taipei University of Technology Dept. of Computer Science and Information Engineering Taipei Taiwan
This study introduces a novel method for Discrete Fourie Transform (DFT)-based interpolation for channel estimation through the application of multiple windows in the channel impulse response. Utilizing a genetic algo... 详细信息
来源: 评论
Trust Based Cooperative Secure Routing Protocols for Internet of Things (IoT)  2
Trust Based Cooperative Secure Routing Protocols for Interne...
收藏 引用
2nd International Conference on Recent Trends in Microelectronics, Automation, Computing, and Communications Systems, ICMACC 2024
作者: Mekala, Sagar Ramji, Bhukya CVR College of Engineering Dept. of Computer Science and Engineering Hyderabad India Kakatiya Institute of Technology and Science Dept. of Computer Science and Engineering Hanmakonda India
The Internet of Things has rapidly emerged and continues to create services, software, sensors-embedded devices, and protocols. IoT allows physical objects to communicate, exchange information, and make decisions whil... 详细信息
来源: 评论
Exploring Explainable AI in Large Language Models: Enhancing Transparency and Trust  11
Exploring Explainable AI in Large Language Models: Enhancing...
收藏 引用
11th IEEE International Conference on Advances in Computing and Communications, ICACC 2024
作者: Ijas, H.A. Jo, Ashly Ann Raj, Ebin Deni FACTS-H Lab Indian Institute of Information Technology Dept. of Computer Science & Engineering Kottayam India
Large Language Models (LLMs) are at the forefront of technological evolution, significantly enhancing digital interactions and automating complex processes across various sectors. While these models facilitate advance... 详细信息
来源: 评论
Identity Authentication Techniques for Unmanned Ships Communication Based on MITRE ATT&CK Framework
Identity Authentication Techniques for Unmanned Ships Commun...
收藏 引用
2023 IET International Conference on engineering Technologies and Applications, ICETA 2023
作者: Chang, Shih-Hao He, Junxian Dept. of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Dept. of Computer Science and Information Engineering Tamkang University New Taipei Taiwan
With the development of the smart ship industry, unmanned ship technology is rapidly evolving. In this paper, our objective is to analyze potential risks associated with identity authentication technology in unmanned ... 详细信息
来源: 评论