咨询与建议

限定检索结果

文献类型

  • 34,404 篇 会议
  • 5,310 篇 期刊文献
  • 272 册 图书

馆藏范围

  • 39,986 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,661 篇 工学
    • 17,653 篇 计算机科学与技术...
    • 14,807 篇 软件工程
    • 6,532 篇 信息与通信工程
    • 3,971 篇 控制科学与工程
    • 3,044 篇 电子科学与技术(可...
    • 2,862 篇 电气工程
    • 2,641 篇 生物工程
    • 2,130 篇 生物医学工程(可授...
    • 1,695 篇 光学工程
    • 1,622 篇 机械工程
    • 1,487 篇 仪器科学与技术
    • 1,369 篇 动力工程及工程热...
    • 1,109 篇 化学工程与技术
    • 984 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 745 篇 网络空间安全
  • 12,352 篇 理学
    • 6,616 篇 数学
    • 3,354 篇 物理学
    • 2,900 篇 生物学
    • 2,198 篇 统计学(可授理学、...
    • 1,537 篇 系统科学
    • 1,184 篇 化学
  • 6,431 篇 管理学
    • 3,833 篇 管理科学与工程(可...
    • 2,914 篇 图书情报与档案管...
    • 2,008 篇 工商管理
  • 1,863 篇 医学
    • 1,594 篇 临床医学
    • 1,484 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 804 篇 公共卫生与预防医...
  • 1,208 篇 法学
    • 981 篇 社会学
  • 735 篇 经济学
  • 569 篇 农学
  • 496 篇 教育学
  • 186 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,288 篇 accuracy
  • 996 篇 feature extracti...
  • 968 篇 computational mo...
  • 867 篇 deep learning
  • 805 篇 training
  • 782 篇 computer science
  • 657 篇 real-time system...
  • 634 篇 machine learning
  • 617 篇 support vector m...
  • 550 篇 predictive model...
  • 496 篇 internet of thin...
  • 472 篇 convolutional ne...
  • 434 篇 data models
  • 381 篇 reliability
  • 356 篇 data mining
  • 340 篇 computer archite...
  • 340 篇 optimization
  • 315 篇 artificial intel...
  • 312 篇 wireless sensor ...
  • 311 篇 routing

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 69 篇 tno technical sc...
  • 66 篇 università di ca...
  • 63 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 52 篇 nikhef national ...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 75 篇 coleiro a.
  • 69 篇 gozzini s.r.
  • 68 篇 huang f.
  • 59 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,771 篇 英文
  • 1,746 篇 其他
  • 367 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
39986 条 记 录,以下是4531-4540 订阅
排序:
Breast Cancer Detection Based on Histopathological Images Using Vision Transformers
Breast Cancer Detection Based on Histopathological Images Us...
收藏 引用
International Conference on computer and Applications (ICCA)
作者: Rozah Hassan M. Alkhater Somaya Al-Maadeed Moutaz Saleh Younes Akbari dept. Computer Science and Engineering Qatar university Doha Qatar
Breast cancer is a prevalent and potentially fatal malignancy in women, requiring continual improvements in diagnostic techniques. In order to help medical personnel accurately detect dangerous tumors, automated medic... 详细信息
来源: 评论
A Secure method of transferring confidential documents by leveraging Zero Trust Principles and Blockchain Technology
A Secure method of transferring confidential documents by le...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: Hannah Thankam Alex Sarah Alex Swathi C G Chandrashekhar Pomu Chavan Dept. of Computer Science and Engineering PES University Bengaluru India
Ensuring regulatory compliance and maintaining client trust in the legal industry depend on the safe transfer and preservation of sensitive data. Maintaining the safety and security of confidential information is esse... 详细信息
来源: 评论
Spatial Data Discovery Using Small Language Model
Spatial Data Discovery Using Small Language Model
收藏 引用
Computing, Power and Communication Technologies (IC2PCT), IEEE International Conference on
作者: Sujit Kumar Thakur Neha Tyagi Dept. of Computer Science & Engineering Amity University Noida India
The ubiquitous use of data in a plethora of use cases and different organizational dependence on it for various insight has made data a valuable resource across business and scientific domains. Data has attained much ...
来源: 评论
Towards Robust Event-guided Low-Light Image Enhancement: A Large-Scale Real-World Event-Image Dataset and Novel Approach
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Guoqiang Chen, Kanghao Li, Hangyu Lu, Yunfan Wang, Lin China Dept. of Computer Science and Engineering HKUST Hong Kong
Event camera has recently received much attention for low-light image enhancement (LIE) thanks to their distinct advantages, such as high dynamic range. However, current research is prohibitively restricted by the lac... 详细信息
来源: 评论
Water Quality Prediction using Classification techniques on XGBoost, KNeighbors, SVC, Random Forest, AdaBoost, and GaussianNB Classifier
Water Quality Prediction using Classification techniques on ...
收藏 引用
2023 IEEE Global Conference on Information Technologies and Communications, GCITC 2023
作者: Gill, Kanwarpartap Singh Tuteja, Gaurav Anand, Vatsala Gupta, Rupesh Hsiung, Pao-Ann Chitkara University Institute of Engineering and Technology Chitkara University Punjab India National Chung Cheng University Dept. of Computer Science and Information Engineering Chiayi County Taiwan
A key environmental problem that is extensively researched for academic purposes is water contamination. To understand the origins, impacts, and potential solutions to water contamination, researchers look into a vari... 详细信息
来源: 评论
Hybrid Quantum-Classical Encryption (HQCE) Algorithm: A Post-Quantum Secure Solution for Data Encryption
Hybrid Quantum-Classical Encryption (HQCE) Algorithm: A Post...
收藏 引用
Information Technology (OCIT), OITS International Conference on
作者: Mahesh Babu Chittem Ashok Kumar Pradhan Dept of Computer Science and Engineering SRM University AP Amaravati India
While currently in practice, classical encryption methods such as RSA and AES-256 are opportunities in the age of quantum computing, algorithms such as Shor's are capable of bringing down their fundamental securit... 详细信息
来源: 评论
Malicious Traffic Classification in WSN using Deep Learning Approaches  2
Malicious Traffic Classification in WSN using Deep Learning ...
收藏 引用
2nd IEEE International Conference on Communication, Security and Artificial Intelligence, ICCSAI 2023
作者: Gupta, Chhote Lal Prasad Rajassekharan, Dinesh Sharma, Dilip Kumar Elangovan, Mohanraj Myilsamy, Varatharaj Upreti, Kamal Bansal Institute of Engineering and Technology Dept. of Computer Science and Engineering Lucknow India Peninsula College Faculty of Computer Science Peninsula Malaysia Jaypee University of Engineering and Technology Department of Mathematics Madhya Pradesh Guna473226 India K. S. Rangasamy College of Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruchengode637215 India V.S.B College of Engineering Technical Campus Department of Electrical and Electronics Engineering Tamil Nadu Coimbatore642109 India Department of Computer Science Delhi-NCR Ghaziabad India
Classifying malicious traffic in Wireless Sensor Networks (WSNs) is crucial for maintaining the network's security and dependability. Traditional security techniques are challenging to deploy in WSNs because they ... 详细信息
来源: 评论
Sentiment Analysis of Customer Reviews on Food Ordering Portals of Bangladesh using Natural Language Processing
Sentiment Analysis of Customer Reviews on Food Ordering Port...
收藏 引用
Cybernetics, Cognition and Machine Learning Applications (ICCCMLA), IEEE International Conference on
作者: Priom Deb Asibur Rahman Bhuiyan Farhan Ahmed Md. Rakib Hossain Habiba Mahrin Md Faisal Ahmed Dewan Ziaul Karim Dept. of Computer Science and Engineering BRAC University Dhaka Bangladesh
In recent years, the popularity of online food ordering services has surged, offering consumers a convenient way to order food from restaurants and have it delivered to their doorstep. During this period, HungryNaki a... 详细信息
来源: 评论
A Study on Deep Fake Face Detection Techniques
A Study on Deep Fake Face Detection Techniques
收藏 引用
Applied Artificial Intelligence and Computing (ICAAIC), International Conference on
作者: Mudit Arya Priyanshu Upwan Akash Umang Goyal Simran Chawla Dept. of Computer Science and Engineering Chandigarh University Punjab India
Advanced technology and the widespread use of deep fake technology has rendered the digital landscape vulnerable to deceptive manipulations, particularly through the creation of synthetic face images. This comprehensi... 详细信息
来源: 评论
Using an Adaptive Neuro Fuzzy Inference System to Improve the Calibration Accuracy of Modeless Robots
Using an Adaptive Neuro Fuzzy Inference System to Improve th...
收藏 引用
2022 International Symposium on Power Electronics, Electrical Drives, Automation and Motion, SPEEDAM 2022
作者: Bai, Ying Wang, Dali Johnson C. Smith University Dept of Computer Science and Engineering CharlotteNC United States Christopher Newport University Dept of Physics and Computer Science Newport NewsVA United States
This paper is our extended research described a technique used for position error compensations of the robot and manipulator calibration process based on an Adaptive Neuro Fuzzy Inference System (ANFIS) method. Tradit... 详细信息
来源: 评论