咨询与建议

限定检索结果

文献类型

  • 34,403 篇 会议
  • 5,316 篇 期刊文献
  • 272 册 图书

馆藏范围

  • 39,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,669 篇 工学
    • 17,660 篇 计算机科学与技术...
    • 14,804 篇 软件工程
    • 6,542 篇 信息与通信工程
    • 3,979 篇 控制科学与工程
    • 3,048 篇 电子科学与技术(可...
    • 2,866 篇 电气工程
    • 2,641 篇 生物工程
    • 2,131 篇 生物医学工程(可授...
    • 1,694 篇 光学工程
    • 1,620 篇 机械工程
    • 1,487 篇 仪器科学与技术
    • 1,369 篇 动力工程及工程热...
    • 1,110 篇 化学工程与技术
    • 984 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 750 篇 网络空间安全
  • 12,355 篇 理学
    • 6,617 篇 数学
    • 3,357 篇 物理学
    • 2,898 篇 生物学
    • 2,198 篇 统计学(可授理学、...
    • 1,536 篇 系统科学
    • 1,190 篇 化学
  • 6,430 篇 管理学
    • 3,831 篇 管理科学与工程(可...
    • 2,915 篇 图书情报与档案管...
    • 2,006 篇 工商管理
  • 1,863 篇 医学
    • 1,594 篇 临床医学
    • 1,481 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 801 篇 公共卫生与预防医...
  • 1,206 篇 法学
    • 979 篇 社会学
  • 735 篇 经济学
  • 569 篇 农学
  • 497 篇 教育学
  • 186 篇 文学
  • 97 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,290 篇 accuracy
  • 996 篇 feature extracti...
  • 968 篇 computational mo...
  • 871 篇 deep learning
  • 805 篇 training
  • 782 篇 computer science
  • 657 篇 real-time system...
  • 641 篇 machine learning
  • 616 篇 support vector m...
  • 550 篇 predictive model...
  • 497 篇 internet of thin...
  • 470 篇 convolutional ne...
  • 434 篇 data models
  • 382 篇 reliability
  • 356 篇 data mining
  • 340 篇 computer archite...
  • 340 篇 optimization
  • 316 篇 artificial intel...
  • 312 篇 wireless sensor ...
  • 311 篇 routing

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 69 篇 tno technical sc...
  • 66 篇 università di ca...
  • 62 篇 université de st...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 52 篇 school of automa...
  • 52 篇 leiden universit...
  • 51 篇 nikhef national ...
  • 50 篇 dept. of compute...
  • 49 篇 dept. of informa...
  • 46 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 dept. of electri...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 78 篇 díaz a.f.
  • 77 篇 boumaaza j.
  • 73 篇 coleiro a.
  • 68 篇 huang f.
  • 68 篇 gozzini s.r.
  • 58 篇 dallier r.
  • 51 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 37,786 篇 英文
  • 1,737 篇 其他
  • 367 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
39991 条 记 录,以下是4881-4890 订阅
排序:
OCSK-SMOTE: An improved minority oversampling technique for unbalanced dataset using One-Class SVM and K-means  2
OCSK-SMOTE: An improved minority oversampling technique for ...
收藏 引用
2nd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2022
作者: Pandey, Utkarsh Shukla, Sanyam Wadhvani, Rajesh Maulana Azad National Institute of Technology Dept. of Computer Science and Engineering Bhopal462003 India
Classification of dataset that have an imbalance in there classes still a challenge to the real world problem and a lot of research has been done and continuously being done to get a resolution to this problem, SMOTE ... 详细信息
来源: 评论
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm  22
OSHA: A General-purpose and Next Generation One-way Secure H...
收藏 引用
22nd IEEE/ACIS International Conference on computer and Information science, ICIS 2022
作者: Patgiri, Ripon National Institue of Technology Silchar Dept. of Computer Science & Engineering Assam Cachar788010 India
Secure hash functions are widely used in cryptographic algorithms to secure against diverse attacks. A one-way secure hash function is used in the various research fields to secure, for instance, blockchain. Notably, ... 详细信息
来源: 评论
Design and Development of Human Following Autonomous Airport Baggage Transportation System
Design and Development of Human Following Autonomous Airport...
收藏 引用
2022 IEEE International Conference on Advances in Computing, Communication and Applied Informatics, ACCAI 2022
作者: Shashank, M. Shvejan Saikrishna, P. Acharya, G. Prasad Reddy, Srikar Lavanya, P. Sreenidhi Institute of Science and Technology Dept. of Computer Science and Engineering Hyderabad India Sreenidhi Institute of Science and Technology Hyderabad India
This paper aims to the design and development of a miniaturized model of a baggage carrying robot that can autonomously navigate from its parking place to the passenger at the airport and follow the passenger by avoid... 详细信息
来源: 评论
Interpretable Pulmonary Disease Diagnosis with Graph Neural Network and Counterfactual Explanations  2
Interpretable Pulmonary Disease Diagnosis with Graph Neural ...
收藏 引用
2nd International Conference on Sensing, Measurement, Communication and Internet of Things Technologies, SMC-IoT 2023
作者: Li, Jiahong Chen, Yiyuan Wang, Yichi Ye, Yiqiang Sun, Min Ren, Hao Cheng, Weibin Zhang, Haodi College of Computer and Software Engineering Guangzhou China Cornell University Dept. Computer Science New York United States Shenzhen University College of Computer and Software Engineering Shenzhen China China Mobile Information Technology Co. Limited Shenzhen China Guangdong Second Provincial General Hospital Institute for Healthcare Artificial Intelligence Guangzhou China
With recent fast development of artificial intelligence and related techniques, computer-aided diagnosis is increasingly emerging. During the process of automated diagnosis, the importance of explainable decision maki... 详细信息
来源: 评论
Mitigating DDoS Attacks using SDN-based Network Security Measures  2
Mitigating DDoS Attacks using SDN-based Network Security Mea...
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Vadakkethil Somanathan Pillai, Sanjaikanth E Polimetla, Kiran University Of North Dakota Grand Forks School of Electrical Engineering and Computer Science North Dakota United States Adobe Inc Dept. of Information Technology AustinTX United States
Distributed denial-of-service attacks represent a significant threat to the delivery and integrity of network services. The attacks inundate a specific community or tool with excessive internet traffic, making it impo... 详细信息
来源: 评论
A Novel Approach for the Detection of Tea Leaf Disease Using Deep Neural Network
A Novel Approach for the Detection of Tea Leaf Disease Using...
收藏 引用
2022 International Conference on Machine Learning and Data engineering, ICMLDE 2022
作者: Datta, Saikat Gupta, Nitin Dept. of Computer Science and Engineering National Institute of Technology Hamirpur HP Hamirpur177005 India
India is among the biggest tea exporter in the world. However, tea leaf diseases caused by persistent pathogen exposure result in considerable crop yield losses around the world. Detection of the disease of tea leaves... 详细信息
来源: 评论
Transformed Deep Spatio Temporal-Features with Fused Distance for Efficient Video Retrieval  4
Transformed Deep Spatio Temporal-Features with Fused Distanc...
收藏 引用
4th International Conference on Artificial Intelligence and Speech Technology, AIST 2022
作者: Banerjee, Alina Kumar, Ela Ravinder, M. Indira Gandhi Delhi Technical University for Women Dept. of Computer Science and Engineering Delhi India
For the goal of video retrieval, this research proposes wavelet transformations on deep spatiotemporal characteristics. The component-wise similarities between the query video feature and prototype video feature are c... 详细信息
来源: 评论
Smart Vehicle Parking System on Fog Computing for Effective Resource Management  1
Smart Vehicle Parking System on Fog Computing for Effective ...
收藏 引用
1st IEEE International Conference on Applied Intelligence and Sustainable Computing, ICAISC 2023
作者: Kumara, Shubham Prasad, Nimmala Hari Monika, M. Tuli, Harshit Supreeth, S. Rohith, S. REVA University School of CSE Bengaluru India REVA University School of Computer Science and Engineering Bengaluru India Nagarjuna College of Engineering and Technology Dept. of ECE Bengaluru India
The rapid advance in the number of vehicles on the road led to a corresponding growth in demand for parking spaces. However, conventional car parking systems are inefficient and time-consuming. Smart Parking systems a... 详细信息
来源: 评论
Content Based Classification of Short Messages using Recurrent Neural Networks in NLP
Content Based Classification of Short Messages using Recurre...
收藏 引用
Artificial Intelligence, computer, Data sciences and Applications (ACDSA), International Conference on
作者: Deepthi Tabitha Bennet Preethi Samantha Bennet Priya Thiagarajan Sundarakantham. K Dept. of Applied Mathematics and Computational Science Thiagarajar College of Engineering Madurai India Dept. of Computer Science and Business Systems Thiagarajar College of Engineering Madurai India Dept. of Computer Science and Engineering Thiagarajar College of Engineering Madurai India
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
来源: 评论
Deep Learning-based Secure Machine-to-Machine Communication in Edge-Enabled Industrial IoT  3
Deep Learning-based Secure Machine-to-Machine Communication ...
收藏 引用
3rd IEEE International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2022
作者: Mankodiya, Harsh Jadav, Nilesh Kumar Tanwar, Sudeep Gupta, Rajesh Institute of Technology Nirma University Department of Computer Science and Engineering Ahmedabad382481 India U. V. Patel College of Engineering Ganpat University Dept. of Computer Engineering Mehsana India
A still in-progress technology of the Industrial Internet of things (IIoT) involves the use of machine-to-machine (M2M) for communication. It can serve the whole purpose of automation in industries by integrating it w... 详细信息
来源: 评论