咨询与建议

限定检索结果

文献类型

  • 34,403 篇 会议
  • 5,316 篇 期刊文献
  • 272 册 图书

馆藏范围

  • 39,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,669 篇 工学
    • 17,660 篇 计算机科学与技术...
    • 14,804 篇 软件工程
    • 6,542 篇 信息与通信工程
    • 3,979 篇 控制科学与工程
    • 3,048 篇 电子科学与技术(可...
    • 2,866 篇 电气工程
    • 2,641 篇 生物工程
    • 2,131 篇 生物医学工程(可授...
    • 1,694 篇 光学工程
    • 1,620 篇 机械工程
    • 1,487 篇 仪器科学与技术
    • 1,369 篇 动力工程及工程热...
    • 1,110 篇 化学工程与技术
    • 984 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 750 篇 网络空间安全
  • 12,355 篇 理学
    • 6,617 篇 数学
    • 3,357 篇 物理学
    • 2,898 篇 生物学
    • 2,198 篇 统计学(可授理学、...
    • 1,536 篇 系统科学
    • 1,190 篇 化学
  • 6,430 篇 管理学
    • 3,831 篇 管理科学与工程(可...
    • 2,915 篇 图书情报与档案管...
    • 2,006 篇 工商管理
  • 1,863 篇 医学
    • 1,594 篇 临床医学
    • 1,481 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 801 篇 公共卫生与预防医...
  • 1,206 篇 法学
    • 979 篇 社会学
  • 735 篇 经济学
  • 569 篇 农学
  • 497 篇 教育学
  • 186 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,290 篇 accuracy
  • 996 篇 feature extracti...
  • 968 篇 computational mo...
  • 871 篇 deep learning
  • 805 篇 training
  • 782 篇 computer science
  • 657 篇 real-time system...
  • 641 篇 machine learning
  • 616 篇 support vector m...
  • 550 篇 predictive model...
  • 497 篇 internet of thin...
  • 470 篇 convolutional ne...
  • 434 篇 data models
  • 382 篇 reliability
  • 356 篇 data mining
  • 340 篇 computer archite...
  • 340 篇 optimization
  • 316 篇 artificial intel...
  • 312 篇 wireless sensor ...
  • 311 篇 routing

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 69 篇 tno technical sc...
  • 66 篇 università di ca...
  • 62 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 nikhef national ...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 73 篇 coleiro a.
  • 68 篇 huang f.
  • 68 篇 gozzini s.r.
  • 58 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,786 篇 英文
  • 1,737 篇 其他
  • 367 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
39991 条 记 录,以下是4841-4850 订阅
排序:
An Overview of Virtual Reality  31st
An Overview of Virtual Reality
收藏 引用
31st International Conference on Software engineering and Data engineering, SEDE 2022
作者: Lewis, Christopher Harris, Frederick C. Dept. of Computer Science and Engineering University of Nevada Reno RenoNV89557 United States
Virtual Reality (VR) has existed for many years;however, it has only recently gained wide spread popularity and commercial use. This change comes from the innovations in head mounted displays (HMDs) and from the work ... 详细信息
来源: 评论
Design and analysis of key scheduling algorithm for symmetric cipher security
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第6期16卷 3991-3997页
作者: Tiwari, Vikas Kameswari, U. Surya Singh, Ajeet Saxena, Ashutosh Acharya Nagarjuna University Andhra Pradesh Guntur 522510 India C.R. Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad 500046 India Dept of Computer Science and Engineering Acharya Nagarjuna University Andhra Pradesh Guntur 522510 India School of Computing Science and Engineering Vellore Institute of Technology VIT Bhopal University Bhopal-Indore Highway Madhya Pradesh Bhopal 466114 India CMR Technical Campus Telangana Hyderabad 501401 India
The success and safety of block cipher systems heavily depend on how efficient and secure their Key Schedule Algorithms (KSAs) are, especially when fighting against cryptanalytic attacks. This paper proposes a novel K... 详细信息
来源: 评论
Visible Watermark Removal with Deep Learning Technology
Visible Watermark Removal with Deep Learning Technology
收藏 引用
International Symposium on computer, Consumer and Control (IS3C)
作者: Chia-Chen Lin Pei-Yu Wang Yan-Heng Lin Hsuan-Chao Huang Morteza Saberikamposhti Dept.of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Dept. of Information Science & Technology Universiti Kebangsaan Malaysia Selangor Malasiya
Watermarking is a technique used to assert ownership over an image, and can be categorized into visible and invisible forms based on the detectability of the watermark. Visible watermarking is more user-friendly and i...
来源: 评论
Vehicle Classification and Counting for Traffic Video Monitoring Using YOLO-v3  1
Vehicle Classification and Counting for Traffic Video Monito...
收藏 引用
1st International Conference on Connected Systems and Intelligence, CSI 2022
作者: Bose, Samprit Ramesh, Chavan Deep Kolekar, Maheshkumar H. Indian Institute of Technology Patna Electrical Engineering Dept Patna India PDPM-IIITDM Computer Science and Engineering Dept Jabalpur India
Traffic has been a major concern in most of the cities. Monitoring cameras are used to track, detect and count vehicles in real-time to ensure proper management of traffic. Counting of vehicles like cars, trucks and t... 详细信息
来源: 评论
Bridging the Modality Gap: Generative Adversarial Networks for T1-T2 MRI Image Translation
Bridging the Modality Gap: Generative Adversarial Networks f...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Mayank Pandey Naga Sai Shreya Kunda Pranave Kc Tripty Singh Rekha R Nair Dept. of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India Dept. of Computer Science and Engineering Alliance College of Engineering and Design Alliance University Bengaluru India
CycleGAN, a significant deep learning model, has transformed medical imaging by providing a remedy for translating MRI images between different modalities. Its ability to transform T1-weighted to T2-weighted images is... 详细信息
来源: 评论
Machine Learning and Deep Learning for Credit Card Fraud Detection: A Comparative Analysis
Machine Learning and Deep Learning for Credit Card Fraud Det...
收藏 引用
2024 International Conference on Artificial Intelligence and Emerging Technology, Global AI Summit 2024
作者: Jyoti Bhardwaj, Komal Garima Kumar, Mukesh Verma, Rajit Kumar, Divyansh Govt. Pg College for Women Computer Science dept. Haryana Rohtak India Mullana Haryana Ambala India Chitkara University Institute of Engineering and Technology Chitkara University India
Since last couple of the years, credit card frauds have been inclining abruptly. These frauds can be stated as the illicit usage of card, uncommon transaction activity, or swapping of an inert card. In other words, il... 详细信息
来源: 评论
TB Chest X-Ray Diagnostic Technique Using Deep Learning  3
TB Chest X-Ray Diagnostic Technique Using Deep Learning
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Goyal, Manish Kumar Yadav, Dhananjay Kumar Brar, Khushmeen Kaur Mittal, Manisha Ojha, Ananta Alzubaidi, Laith H. Pathani, Ashish Vivekananda Global University Dept. of Computer Science & Application Jaipur India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Chandigarh University Dept. of Electronics and Communication Engineering Mohali India Guru Tegh Bahadur Institute of Technology New Delhi India Dept. of Computer Science and Information Technology Bangalore India The Islamic University Najaf Iraq Uttaranchal Institute of Technology Uttaranchal University Department of Civil Engineering Dehradun India
The bacteria Mycobacterium tuberculosis is responsible for the infectious illness tuberculosis (TB). Although the lungs are the primary organs affected, the kidneys, bones, and brain may also be affected. Whenever an ... 详细信息
来源: 评论
GridWatch: A Smart Network for Smart Grid
GridWatch: A Smart Network for Smart Grid
收藏 引用
IEEE International Conference on Smart Grid Communications (SmartGridComm)
作者: Masoud Hemmatpour Changgang Zheng Noa Zilberman Phuong Hoai Ha Dept. Computer Science Arctic University of Norway Dept. Engineering Science University of Oxford
The adoption of decentralized energy market models facilitates the exchange of surplus power among local nodes in peer-to-peer settings. However, decentralized energy transactions within untrusted and non-transparent ... 详细信息
来源: 评论
Hybridization of Sparrow Search Algorithm and Sine Cosine Algorithm for Epileptic Seizure Detection  3
Hybridization of Sparrow Search Algorithm and Sine Cosine Al...
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Mohapatra, Sumant Kumar Swain, Kaliprasanna Mallik, Puspanjali Mali, Sabita Ali, Farida A. Trident Academy of Technology Odisha Bhubaneswar India Shailabala Women's Autonomous College Dept. of Computer Science Cuttack India Iter Soa University Faculty of Engineering Bhubaneswar India
An imbalance in electrical signal flow among neurons causes epilepsy, a complex brain disease that affects other parts of the body and results in seizures. Researchers and neurologists have put their efforts into devi... 详细信息
来源: 评论
Sparse Long Short-Term Memory Approach for Energy-Efficient Adaptive Cluster Fuzzy-based Controller in Wireless Sensor Network  5
Sparse Long Short-Term Memory Approach for Energy-Efficient ...
收藏 引用
5th International Conference on Smart Systems and Inventive Technology, ICSSIT 2023
作者: Ramanan, K. Ramesh, S.P. Kingsly, C. Sahaya Rajkumar, G. Vinoth Ponkumar, D. David Neels Vargheese, M. Npr College of Engineering and Technology Dept. of Ece Dindigul India Amet University Department of Computer Science and Engineering Tamil Nadu Chennai India Mangalam College of Engineering Department of Computer Science and Engineering Kottayam Ettumanoor India Jp College of Engineering Department of Ece Tamil Nadu Tenkasi India Vel Tech Rangarajan Dr. Sagunthala RandD Institute of Science and Technology Dept. of Ece Chennai India Psn College of Engineering and Technology Department of Cse Tamil Nadu Tirunelveli India
Wireless Sensor Network (WSN) gadgets began with limited-scope WSNs and have expanded to larger-scope and Internet of Things -based WSNs. Clustering increases WSN activity. Before picking Cluster Heads (CHs), Nodes ar... 详细信息
来源: 评论