咨询与建议

限定检索结果

文献类型

  • 30,598 篇 会议
  • 4,956 篇 期刊文献
  • 248 册 图书

馆藏范围

  • 35,802 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,248 篇 工学
    • 15,837 篇 计算机科学与技术...
    • 13,328 篇 软件工程
    • 5,847 篇 信息与通信工程
    • 3,722 篇 控制科学与工程
    • 2,761 篇 电子科学与技术(可...
    • 2,759 篇 电气工程
    • 2,344 篇 生物工程
    • 1,887 篇 生物医学工程(可授...
    • 1,540 篇 光学工程
    • 1,447 篇 机械工程
    • 1,270 篇 动力工程及工程热...
    • 1,250 篇 仪器科学与技术
    • 1,049 篇 化学工程与技术
    • 859 篇 安全科学与工程
    • 748 篇 交通运输工程
  • 11,423 篇 理学
    • 6,205 篇 数学
    • 3,136 篇 物理学
    • 2,565 篇 生物学
    • 2,047 篇 统计学(可授理学、...
    • 1,408 篇 系统科学
    • 1,110 篇 化学
  • 5,668 篇 管理学
    • 3,349 篇 管理科学与工程(可...
    • 2,596 篇 图书情报与档案管...
    • 1,822 篇 工商管理
  • 1,586 篇 医学
    • 1,374 篇 临床医学
    • 1,281 篇 基础医学(可授医学...
    • 850 篇 药学(可授医学、理...
    • 656 篇 公共卫生与预防医...
  • 1,025 篇 法学
    • 826 篇 社会学
  • 646 篇 经济学
    • 646 篇 应用经济学
  • 497 篇 农学
  • 433 篇 教育学
  • 155 篇 文学
  • 81 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,034 篇 accuracy
  • 840 篇 feature extracti...
  • 811 篇 computational mo...
  • 684 篇 deep learning
  • 681 篇 computer science
  • 671 篇 training
  • 510 篇 support vector m...
  • 499 篇 real-time system...
  • 499 篇 machine learning
  • 440 篇 predictive model...
  • 402 篇 internet of thin...
  • 348 篇 computer archite...
  • 343 篇 data models
  • 330 篇 convolutional ne...
  • 321 篇 reliability
  • 310 篇 optimization
  • 290 篇 data mining
  • 278 篇 routing
  • 260 篇 wireless sensor ...
  • 248 篇 image segmentati...

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 76 篇 institute of inf...
  • 75 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 65 篇 dept. of informa...
  • 61 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 54 篇 school of automa...
  • 52 篇 leiden universit...
  • 49 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 44 篇 university würzb...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 79 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 69 篇 dallier r.
  • 68 篇 huang f.
  • 62 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 34,525 篇 英文
  • 819 篇 其他
  • 348 篇 中文
  • 57 篇 日文
  • 51 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Control Engineering and Computer Science"
35802 条 记 录,以下是211-220 订阅
排序:
Call Translator with Voice Cloning Using Transformers  9
Call Translator with Voice Cloning Using Transformers
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Khan, Nawaz Fateen Hemanth, Nandan Goyal, Navyae Pranav, K.R. Agarwal, Pooja Pes University Computer Science Engineering Dept. Bangalore India
Voice Cloning employs technology and algorithms to create an artificial or synthetic reproduction of a person's voice. To understand and mimic the distinct vocal qualities of the target speaker, including tone, pi... 详细信息
来源: 评论
A Simplified Method for Convex Hull Pricing  4
A Simplified Method for Convex Hull Pricing
收藏 引用
4th International Conference on Intelligent Power and Systems, ICIPS 2024
作者: Wu, Tongqi Zou, Bin Shanghai University Dept. Department of Control Science and Engineering Shanghai China
In recent years, the development of new energy sources has led to a reduction in the proportion of thermal power generation, which in turn has highlighted the issue of non-convexities in electricity markets. Convex hu... 详细信息
来源: 评论
Preprocessing and Feature Extraction based Deepfake Detection on Combined dataset  2
Preprocessing and Feature Extraction based Deepfake Detectio...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Thejas, N.U. Nayak, Hithesh D. Siddique, Abbu Bucker Anas Danish, Mohammed Mamatha, H.R. Pes University Computer Science & Engineering Dept. Bengaluru India
There are many deepfake detection models available, each with their own limitations. This research concentrates on one such limitation and addresses it. That research gap would be the inefficient behavior of the deepf... 详细信息
来源: 评论
RPC Relay protocol for NaaS platforms  2
RPC Relay protocol for NaaS platforms
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Anirudh, R.H. Darshan, V. Dey, Kohav Phaneesh, S. Jadon, Shruti Pes University Computer Science & Engineering Dept. Bengaluru India
The decentralized internet, often termed as Web3, is envisioned as the future of the online world. It holds the promise of addressing the centralization and censorship issues prevalent in today's web landscape. Ye... 详细信息
来源: 评论
Machine Learning Techniques in Epileptic Seizure Detection: A Comprehensive Review  15
Machine Learning Techniques in Epileptic Seizure Detection: ...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Thakare, Vishal Ranawat, Rekha Sage University Dept. of computer Science and Engineering Indore India
The neurological disorder known as epilepsy is defined by its recurrent, spontaneous episodes of seizures impacting millions of people globally. The timely and accurate detection of epileptic seizures is necessary for... 详细信息
来源: 评论
Sentient Sound waves: Elevating Emotional Communication with AI-Generated Speech Technology  5
Sentient Sound waves: Elevating Emotional Communication with...
收藏 引用
5th IEEE International Conference for Emerging Technology, INCET 2024
作者: Roshan, Rahul G. Roshan, Rohit Sohan, M.H. Raj, S.M. Sutharsan Prasad, V.R. Badri Dept. of Computer Science and Engineering PES University Bangalore India
This research-based project is about a new way to put feelings into computer-generated speech. It has two stages: text emotion detection and emotional speech synthesis. In the former part, labeled text data is used to... 详细信息
来源: 评论
A Secure method of transferring confidential documents by leveraging Zero Trust Principles and Blockchain Technology  4
A Secure method of transferring confidential documents by le...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Alex, Hannah Thankam Alex, Sarah Swathi, C.G. Chavan, Chandrashekhar Pomu Pes University Dept. of Computer Science and Engineering Bengaluru India
Ensuring regulatory compliance and maintaining client trust in the legal industry depend on the safe transfer and preservation of sensitive data. Maintaining the safety and security of confidential information is esse... 详细信息
来源: 评论
Performance Evaluation of Openairinterface's Scheduling Algorithms for 5G Networks  4
Performance Evaluation of Openairinterface's Scheduling Algo...
收藏 引用
4th International Conference for Emerging Technology, INCET 2023
作者: Bhavana, D. Chaudhari, Shilpa Dept. of Computer Science and Engineering Bengaluru India Dept. Computer Networks and Engineering Bengaluru India
The introduction of the fifth generation (5G) of mobile networks (5G) has showed how crucial enhanced scheduling approaches are managing the scarce frequency spectrum whereas meeting 5G transmission needs. Openairinte... 详细信息
来源: 评论
Enhanced Level Brain Tumor Identification Using CNN, VGG16 and ResNet Models  2
Enhanced Level Brain Tumor Identification Using CNN, VGG16 a...
收藏 引用
2nd IEEE International Conference on Contemporary Computing and Communications, InC4 2024
作者: Sambandam, Rakoth Kandan Jyoshna, Mallela Christ University Dept. of Computer Science and Engineering Bengaluru India
The comprehension of brain growths is significantly improved through the identification and categorization of these disorders. Still, their discovery is relatively grueling due to their variability in terms of positio... 详细信息
来源: 评论
DURATION-BASED INVESTIGATION OF USER CONTENT CHOICES IN THE EXIT OF FILTER BUBBLES  6
DURATION-BASED INVESTIGATION OF USER CONTENT CHOICES IN THE ...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Bunza, Rabiatu DEPT. OF COMPUTER SCIENCE FACULTY OF SCIENCE AND ENGINEERING SWANSEA UNIVERSITY United Kingdom
Content personalization on social platforms has been linked to the creation of filter bubbles. The algorithms provide content recommendations based on the user’s browsing history and interests, which limits content d... 详细信息
来源: 评论