咨询与建议

限定检索结果

文献类型

  • 34,472 篇 会议
  • 5,302 篇 期刊文献
  • 271 册 图书

馆藏范围

  • 40,045 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,642 篇 工学
    • 17,640 篇 计算机科学与技术...
    • 14,781 篇 软件工程
    • 6,533 篇 信息与通信工程
    • 3,970 篇 控制科学与工程
    • 3,047 篇 电子科学与技术(可...
    • 2,862 篇 电气工程
    • 2,639 篇 生物工程
    • 2,128 篇 生物医学工程(可授...
    • 1,695 篇 光学工程
    • 1,620 篇 机械工程
    • 1,486 篇 仪器科学与技术
    • 1,366 篇 动力工程及工程热...
    • 1,107 篇 化学工程与技术
    • 981 篇 安全科学与工程
    • 812 篇 交通运输工程
    • 742 篇 网络空间安全
  • 12,340 篇 理学
    • 6,606 篇 数学
    • 3,354 篇 物理学
    • 2,897 篇 生物学
    • 2,193 篇 统计学(可授理学、...
    • 1,535 篇 系统科学
    • 1,182 篇 化学
  • 6,432 篇 管理学
    • 3,826 篇 管理科学与工程(可...
    • 2,921 篇 图书情报与档案管...
    • 2,006 篇 工商管理
  • 1,862 篇 医学
    • 1,595 篇 临床医学
    • 1,482 篇 基础医学(可授医学...
    • 954 篇 药学(可授医学、理...
    • 803 篇 公共卫生与预防医...
  • 1,206 篇 法学
    • 979 篇 社会学
  • 734 篇 经济学
  • 569 篇 农学
  • 496 篇 教育学
  • 186 篇 文学
  • 96 篇 军事学
  • 61 篇 艺术学
  • 1 篇 哲学

主题

  • 1,315 篇 accuracy
  • 1,003 篇 feature extracti...
  • 985 篇 computational mo...
  • 876 篇 deep learning
  • 818 篇 training
  • 783 篇 computer science
  • 678 篇 real-time system...
  • 637 篇 machine learning
  • 624 篇 support vector m...
  • 563 篇 predictive model...
  • 501 篇 internet of thin...
  • 488 篇 convolutional ne...
  • 448 篇 data models
  • 394 篇 reliability
  • 353 篇 data mining
  • 347 篇 optimization
  • 338 篇 computer archite...
  • 325 篇 artificial intel...
  • 312 篇 routing
  • 307 篇 wireless sensor ...

机构

  • 82 篇 north-west unive...
  • 82 篇 institut univers...
  • 79 篇 infn sezione di ...
  • 79 篇 national centre ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 66 篇 tno technical sc...
  • 59 篇 dept. of informa...
  • 58 篇 université de st...
  • 56 篇 dept. of compute...
  • 53 篇 dept. of informa...
  • 52 篇 school of automa...
  • 49 篇 leiden universit...
  • 48 篇 dept. of compute...
  • 45 篇 dept. of compute...
  • 44 篇 dept. of compute...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 42 篇 nikhef national ...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 81 篇 chen a.
  • 80 篇 kalekin o.
  • 76 篇 díaz a.f.
  • 73 篇 boumaaza j.
  • 70 篇 coleiro a.
  • 69 篇 huang f.
  • 67 篇 gozzini s.r.
  • 54 篇 dallier r.
  • 53 篇 kulikovskiy v.
  • 51 篇 anguita m.
  • 42 篇 benoit d.m.
  • 42 篇 eddymaoui a.
  • 42 篇 labalme m.
  • 41 篇 gagliardini s.
  • 40 篇 del burgo r.

语言

  • 35,694 篇 英文
  • 3,898 篇 其他
  • 356 篇 中文
  • 54 篇 日文
  • 48 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept.of Computer Engineering and Computer Science"
40045 条 记 录,以下是961-970 订阅
排序:
Using Machine Learning Algorithms in Edge Intelligence for Ultra-Reliable and Low-Latency Communications in the Industrial Metaverse  29
Using Machine Learning Algorithms in Edge Intelligence for U...
收藏 引用
29th International computer Conference, computer Society of Iran, CSICC 2025
作者: Mohammadvand, Reza Mozayani, Naser Dept. Computer Engineering Iran University of Science and Technology Tehran Iran
Given the rapid advancements in technologies such as the metaverse and digital twins, the need for effective integration of communication, computation, and storage in complex systems and edge computing environments is... 详细信息
来源: 评论
Detecting adversarial examples using constraint-based learning
Detecting adversarial examples using constraint-based learni...
收藏 引用
2024 International Conference on Smart Devices, ICSD 2024
作者: Kumar, Vivek Kumar, Kamal Singh, Maheep National Institute of Technology Dept. of Computer Science -and Engineering Uttarakhand Pauri India IGDTUW Department of Information Technology New Delhi India Doon University Dept. of Computer Science and Engineering Dehradun India
Deep learning models have been applied in various fields and continue producing exceptional results. However, these models are vulnerable to adversarial attacks, which are modified data samples maliciously crafted to ... 详细信息
来源: 评论
Enhancing Programming Language Models for C++ Code Clone Detection  10
Enhancing Programming Language Models for C++ Code Clone Det...
收藏 引用
10th International Conference on Platform Technology and Service, PlatCon 2024
作者: Kang, Hyonjun Chun, Haeun Kim, Mucheol School of Computer Sceince and Engineering Chung-Ang University Seoul Korea Republic of Dept. of Computer Science and Engineering Chung-Ang University Seoul Korea Republic of
This paper examines the fine-tuning methods of two Code Language Models, namely Code-Reviewer and GraphCodeBERT, with the objective of enhancing code clone detection in C++ code. Two experiments are conducted: sentenc... 详细信息
来源: 评论
Breast Cancer Diagnosis Using a Machine Learning Model and Swarm Intelligence Approach  1
Breast Cancer Diagnosis Using a Machine Learning Model and S...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Gad, Ibrahim Elmezain, Mahmoud Alwateer, Majed M. Almaliki, Malik Elmarhomy, Ghada Atlam, Elsayed Tanta University Computer Science Division Faculty of Science Tanta31527 Egypt Taibah University College of Computer Science and Engineering Dept. of Computer Science Yanbu966144 Saudi Arabia
The features selection for machine learning models requires careful consideration. A good selection of features can enable machine learning models to better identify patterns in data and make more accurate predictions... 详细信息
来源: 评论
EBV: Electronic Bee-Veterinarian for Principled Mining and Forecasting of Honeybee Time Series
EBV: Electronic Bee-Veterinarian for Principled Mining and F...
收藏 引用
2024 SIAM International Conference on Data Mining, SDM 2024
作者: Hossain, Shamima Faloutsos, Christos Baer, Boris Kim, Hyoseung Tsotras, Vassilis J. Dept. of Computer Science and Engineering University of California Riverside United States School of Computer Science Carnegie Mellon University United States Dept. of Entomology University of California Riverside United States Dept. of Electrical and Computer Engineering University of California Riverside United States
Honeybees are vital for pollination and food production. Among many factors, extreme temperature (e.g., due to climate change) is particularly dangerous for bee health. Anticipating such extremities would allow beekee... 详细信息
来源: 评论
Deep Learning Algorithms for Pneumonia: A Comparative Approach to Classification and Segmentation  6
Deep Learning Algorithms for Pneumonia: A Comparative Approa...
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Mishra, Vishnu Kumar Mishra, Megha Tiwari, Rajesh Diwan, Tarun Dhar Soni, Rama Patra, Raj Kumar Malla Reddy Engineering college for Women Hyderabad Jntuh Dept. of Computer Science and Engineering Hyderabad India Shri Shankaracharya Technical Campus Csvtu Department of Computer Science and Engineering Bhilai India Atal Bihari Vajpayee University Dept. of Computer Science and CoE Chhattisgarh Bilaspur India Dr. C. V. Raman University Chhattisgarh Bilaspur India CMR Engineering College Department of Computer Science and Engineering Hyderabad India
The study compares the outcomes of numerous modern CNN architectures, such as ResNet-50, VGG-16, and DenseNet-121, with conventional machine learning classifiers in order to assess each architecture's performance.... 详细信息
来源: 评论
Towards Developing a Transformer-Based Bangla Typing Error Correction Model: A Deep Learning-Based Approach  2
Towards Developing a Transformer-Based Bangla Typing Error C...
收藏 引用
2nd International Conference on Information and Communication Technology for Sustainable Development, ICICT4SD 2023
作者: Salim, Shahidul Islam, Taqiul Zannat, Rowzatul Mia, Naeem Fuad, Mohtasim Murad, Hasan Khulna University of Engineering Technology Dept. of Computer Science and Engineering Khulna9203 Bangladesh Chattogram University of Engineering Technology Dept. of Computer Science and Engineering Chattogram4349 Bangladesh
Despite being the sixth most widely spoken language globally, the Bangla language faces a lack of effective and efficient automated methods to correct keyboard errors in written text. Such errors can result in communi... 详细信息
来源: 评论
Optimal Trajectory Planning of an Omni-directional Mobile Manipulator for Obstacle Avoidance
收藏 引用
Transactions of the Korean Institute of Electrical Engineers 2023年 第8期72卷 952-958页
作者: Kim, Minsu Sung, Young Whee School of Electrronic Engineering Kumoh National Institute of Technolgy Korea Republic of Dept. of Electrical Engineering and Computer Science DGIST Korea Republic of
The ultimate purpose of a mobile robot is to do some tasks in addition to moving to a desired point, so it is very natural for a mobile robot to be equipped with a manipulator. Among many types of mobile robots, omni-... 详细信息
来源: 评论
Classification of Depression, Anxiety and Stress from Handwriting and Drawing with Stacking Models  8
Classification of Depression, Anxiety and Stress from Handwr...
收藏 引用
8th International Symposium on Innovative Approaches in Smart Technologies, ISAS 2024
作者: Bayrak, Semra Golgiyaz, Sedat Aykut, Murat Karadeniz Technical University Graduate School of Natural and Applied Science Dept. of Computer Engineering Trabzon61080 Turkey Bingöl University Dept. of Computer Engineering Bingöl Turkey Karadeniz Technical University Dept. of Computer Engineering Trabzon Turkey
Recently, emotion analysis from online handwriting and drawings has become an important research topic. This study aims to determine the optimal model combination using dynamic and statistical features obtained from h... 详细信息
来源: 评论
Detection and Analysis of Single Blackhole Node with TCP Connection in MANETs using Machine Learning Algorithms  6
Detection and Analysis of Single Blackhole Node with TCP Con...
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Gotti, Rajeswari Polagani, Abhiram Posina, Gagana Sai Lakshmi Veerapaneni, Srihari Prasanth, Talluri Dept. of Computer Science and Engineering Seshadri Rao Gudlavalleru Engineering College Gudlavalleru India Dept. of Computer Science and Engineering Seshadri Rao Gudlavalleru Engineering College Machilipatnam India
A MANET facilitates the creation of a wireless connection between two devices without relying on any fixed infrastructure or centralized administration. Security is the main drawback in MANET's. As a result, intru... 详细信息
来源: 评论