咨询与建议

限定检索结果

文献类型

  • 57,782 篇 会议
  • 9,087 篇 期刊文献
  • 458 册 图书
  • 1 篇 科技报告

馆藏范围

  • 67,328 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 42,199 篇 工学
    • 26,277 篇 计算机科学与技术...
    • 22,000 篇 软件工程
    • 11,203 篇 信息与通信工程
    • 7,849 篇 电气工程
    • 7,752 篇 电子科学与技术(可...
    • 7,017 篇 控制科学与工程
    • 3,714 篇 生物工程
    • 3,192 篇 生物医学工程(可授...
    • 3,156 篇 光学工程
    • 2,806 篇 动力工程及工程热...
    • 2,774 篇 机械工程
    • 2,511 篇 仪器科学与技术
    • 2,161 篇 化学工程与技术
    • 1,598 篇 材料科学与工程(可...
    • 1,391 篇 安全科学与工程
    • 1,289 篇 交通运输工程
  • 22,067 篇 理学
    • 11,690 篇 数学
    • 7,307 篇 物理学
    • 4,047 篇 生物学
    • 3,727 篇 统计学(可授理学、...
    • 2,672 篇 系统科学
    • 2,265 篇 化学
  • 9,180 篇 管理学
    • 5,622 篇 管理科学与工程(可...
    • 3,962 篇 图书情报与档案管...
    • 3,097 篇 工商管理
  • 2,492 篇 医学
    • 2,162 篇 临床医学
    • 2,015 篇 基础医学(可授医学...
    • 1,353 篇 药学(可授医学、理...
  • 1,594 篇 法学
    • 1,314 篇 社会学
  • 1,155 篇 经济学
    • 1,153 篇 应用经济学
  • 845 篇 教育学
  • 736 篇 农学
  • 274 篇 文学
  • 180 篇 军事学
  • 60 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 1,524 篇 accuracy
  • 1,401 篇 computational mo...
  • 1,220 篇 feature extracti...
  • 1,075 篇 training
  • 900 篇 computer science
  • 837 篇 deep learning
  • 768 篇 real-time system...
  • 766 篇 machine learning
  • 741 篇 predictive model...
  • 694 篇 optimization
  • 586 篇 support vector m...
  • 575 篇 computer archite...
  • 566 篇 data models
  • 543 篇 internet of thin...
  • 536 篇 neural networks
  • 482 篇 data mining
  • 475 篇 wireless sensor ...
  • 472 篇 convolutional ne...
  • 468 篇 mathematical mod...
  • 466 篇 bandwidth

机构

  • 165 篇 dept. of electri...
  • 89 篇 institute of inf...
  • 82 篇 north-west unive...
  • 80 篇 institut univers...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 73 篇 national centre ...
  • 66 篇 università di ca...
  • 62 篇 dept. of electr....
  • 58 篇 school of automa...
  • 58 篇 dept. of electri...
  • 56 篇 dept. of compute...
  • 56 篇 dept. of informa...
  • 52 篇 dept. of electri...
  • 49 篇 leiden universit...
  • 44 篇 dept. of compute...
  • 42 篇 infn lnf via enr...
  • 42 篇 in2p3 lpc campus...
  • 39 篇 dept. of compute...
  • 38 篇 dept. of compute...

作者

  • 87 篇 chen a.
  • 86 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 82 篇 gal t.
  • 82 篇 bozza c.
  • 61 篇 kalekin o.
  • 52 篇 kulikovskiy v.
  • 47 篇 huang f.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.
  • 40 篇 díaz a.f.
  • 37 篇 androulakis g.
  • 34 篇 de palma m.
  • 33 篇 khatun a.
  • 31 篇 eirini eleni tsi...
  • 28 篇 berti a.
  • 28 篇 ambrosi g.

语言

  • 63,866 篇 英文
  • 2,288 篇 其他
  • 754 篇 中文
  • 320 篇 朝鲜文
  • 109 篇 日文
  • 7 篇 德文
  • 3 篇 西班牙文
  • 3 篇 土耳其文
  • 2 篇 法文
  • 2 篇 葡萄牙文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
检索条件"机构=Dept. of Electrical and Computer Engineering Dept. of Computer Science"
67328 条 记 录,以下是701-710 订阅
排序:
Deciphering Deception: Unmasking Fake News in Multilingual Contexts  5
Deciphering Deception: Unmasking Fake News in Multilingual C...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Agarwal, Ashutosh Singh, Yash Pratap Rai, Vipin Galgotias University Dept. of Computer Science & Engineering Greater Noida India
A major global worry in the ever-expanding digital ecosystem is the spread of incorrect information. The ability to recognize false news in non-English languages is still lacking, despite great advancements in the ide... 详细信息
来源: 评论
Analysis of Ensemble Machine Learning Models for Fraud Detection
Analysis of Ensemble Machine Learning Models for Fraud Detec...
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Chaurasia, Siddharth Kesharwani, Satyam Sharma, Shanu Sharma, Swati Chugh, Bharti Kiet Group of Institutions Dept. of Computer Science and Engineering Ghaziabad India
Recent developments in electronic payment and e-commerce have led to a rise in digital fraud cases, including credit card fraud. Within the financial services industry, identifying credit card fraud is still a difficu... 详细信息
来源: 评论
Decentralized e-KYC System for Secure Identity Verification in Bangladesh  3
Decentralized e-KYC System for Secure Identity Verification ...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Karmoker, Sagar Khan, Md. Adib Anik, Nur Adnan Chowdhury Hossain, Md. Sabbir Rahman, Habibur Rumpa, Ummay Khadiza Hasan, Mahamudul East West University Dept. of Computer Science and Engineering Dhaka Bangladesh
In this modern age where everything is developing and moving forward to achieve new heights, Fraud and scam-related cases are also increasing. That's why we need to be more careful than ever before. nowadays wheth... 详细信息
来源: 评论
TraceChainBD: Securing Supply Chains from Counterfeiting in Bangladesh with Blockchain and IoT Integration
TraceChainBD: Securing Supply Chains from Counterfeiting in ...
收藏 引用
2024 International Conference on Innovations in science, engineering and Technology, ICISET 2024
作者: Karmoker, Sagar Khan, Md. Adib Lamia, Sanjida Alam Tanjid, Mobinul Ahasan Dihan, Shahriar Sadman Anik, Nur Adnan Chowdhury East West University Dept. of Computer Science and Engineering Dhaka Bangladesh
The scheme uses blockchain technology in Bangladesh's supply chain to eliminate counterfeit products, improve tax compliance, and build consumer trust. By ensuring product authenticity, it safeguards brand reputat... 详细信息
来源: 评论
Utilizing Genetic-Neural System Fusion for Advanced Prediction and Classification of Damage Intensity in Road Traffic Accidents  2
Utilizing Genetic-Neural System Fusion for Advanced Predicti...
收藏 引用
2nd International Conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Rahi, Parvez Kang, Sandeep Singh Singh, Ajay Pal Singh, Inderjeet Chandigarh University Dept. of Computer Science & Engineering Punjab Mohali India
This study proposes an analysis and prediction framework for road traffic accidents (RTAs) in the hilly terrain of Himachal Pradesh and several states in, India, integrating machine learning techniques such as neural ... 详细信息
来源: 评论
Leukaemia: A Comparative Analysis of Deep Learning Models Using ALL Dataset  6
Leukaemia: A Comparative Analysis of Deep Learning Models Us...
收藏 引用
6th IEEE International Conference on Recent Advances in Intelligent Computational Systems, RAICS 2024
作者: Sudheer, Rhea Vivek, Rapaka Ramesh, Richa Sarvade, Apoorva Kakarla, Sada Preethi, P. Pes University Dept. of Computer Science and Engineering Karnataka Bangalore India
White blood cells, also known as leukocytes, or WBCs, spread abnormally in the bone marrow and blood, resulting in leukaemia (blood cancer). Leukaemia can be identified by pathologists by examining a patient's blo... 详细信息
来源: 评论
Comprehensive Testing Strategies for Water Purity by Assessing and Eliminating Viruses and Bacteria using Machine Learning algorithms
Comprehensive Testing Strategies for Water Purity by Assessi...
收藏 引用
2024 International Conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Thaluka, Mohan Raj Maheswari, K. Srujan Raju, K. Nuthanakanti, Bhaskar Pavan Kumar, G. Santhuja, P. Cmr Technical Campus Dept. Of Computer Science And Engineering Hyderabad India
Water, essential for life, is often contaminated with bacteria and viruses, depriving many accesses towards purified drinking and irrigation water. The presence of pathogens in unpurified water puts human health at ri... 详细信息
来源: 评论
Deploying NLP techniques in Twitch application to comprehend online user behaviour  1
Deploying NLP techniques in Twitch application to comprehend...
收藏 引用
1st IEEE International Conference on Contemporary Computing and Communications, InC4 2023
作者: Sethurajan, Monikka Reshmi Natarajan, K. Dept. of Computer Science and Engineering Bangalore India
Sentiment analysis of emotion entails identifying and analyzing subjective information from language, such as views and attitudes, and helps to improve data visualization by employing a variety of strategies, tactics,... 详细信息
来源: 评论
Enhanced Security Measures for Image Privacy: Encryption Perspectives  2
Enhanced Security Measures for Image Privacy: Encryption Per...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Omshith, R. Balaji, Vemisetti Pavan Rahul, Rayapudi Venkata Kumaran, U. Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
A key technology in information security, picture encryption is intended to safeguard the integrity and confidentiality of digital photographs. Using a variety of cryptographic techniques and algorithms, the original ... 详细信息
来源: 评论
Intelligent Video Surveillance System  4
Intelligent Video Surveillance System
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Aryan, Ansh Singh, Dharya Pratap Kumar, Nitish Amity University Dept. of Computer Science and Engineering Uttar Pradesh India
This research study provides the utilization of an intelligent video surveillance system, a sophisticated technology that integrates video cameras, sensors, and cutting-edge software to monitor and analyze activities ... 详细信息
来源: 评论