咨询与建议

限定检索结果

文献类型

  • 14,488 篇 会议
  • 9,466 篇 期刊文献
  • 437 册 图书

馆藏范围

  • 24,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,485 篇 工学
    • 9,695 篇 计算机科学与技术...
    • 7,884 篇 软件工程
    • 2,818 篇 信息与通信工程
    • 2,602 篇 控制科学与工程
    • 1,777 篇 电气工程
    • 1,539 篇 生物工程
    • 1,501 篇 电子科学与技术(可...
    • 1,116 篇 机械工程
    • 1,113 篇 生物医学工程(可授...
    • 1,021 篇 光学工程
    • 677 篇 仪器科学与技术
    • 662 篇 化学工程与技术
    • 601 篇 动力工程及工程热...
    • 540 篇 材料科学与工程(可...
    • 527 篇 安全科学与工程
    • 525 篇 交通运输工程
  • 7,881 篇 理学
    • 4,041 篇 数学
    • 2,027 篇 物理学
    • 1,843 篇 生物学
    • 1,285 篇 统计学(可授理学、...
    • 1,212 篇 系统科学
    • 759 篇 化学
  • 3,894 篇 管理学
    • 2,618 篇 管理科学与工程(可...
    • 1,449 篇 图书情报与档案管...
    • 1,268 篇 工商管理
  • 1,164 篇 医学
    • 981 篇 临床医学
    • 851 篇 基础医学(可授医学...
    • 508 篇 药学(可授医学、理...
  • 647 篇 法学
    • 548 篇 社会学
  • 468 篇 经济学
    • 464 篇 应用经济学
  • 320 篇 教育学
  • 256 篇 农学
  • 65 篇 文学
  • 46 篇 军事学
  • 40 篇 艺术学
  • 8 篇 哲学
  • 4 篇 历史学

主题

  • 906 篇 computer science
  • 502 篇 software enginee...
  • 456 篇 deep learning
  • 333 篇 machine learning
  • 330 篇 computational mo...
  • 280 篇 application soft...
  • 274 篇 feature extracti...
  • 272 篇 accuracy
  • 257 篇 computer archite...
  • 256 篇 training
  • 251 篇 artificial intel...
  • 238 篇 systems engineer...
  • 234 篇 internet of thin...
  • 198 篇 support vector m...
  • 198 篇 neural networks
  • 193 篇 optimization
  • 175 篇 data mining
  • 166 篇 image segmentati...
  • 162 篇 reinforcement le...
  • 157 篇 laboratories

机构

  • 259 篇 college of compu...
  • 113 篇 school of comput...
  • 92 篇 state key labora...
  • 84 篇 school of comput...
  • 75 篇 graduate school ...
  • 70 篇 software enginee...
  • 65 篇 school of comput...
  • 61 篇 university of ch...
  • 44 篇 department of la...
  • 41 篇 institute for sy...
  • 41 篇 school of softwa...
  • 38 篇 department of co...
  • 37 篇 school of comput...
  • 36 篇 department of el...
  • 36 篇 department of co...
  • 36 篇 inesc tec - inst...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 34 篇 graduate school ...
  • 32 篇 department of co...

作者

  • 45 篇 rajkumar buyya
  • 43 篇 niyato dusit
  • 41 篇 m. zahn
  • 32 篇 liu yang
  • 30 篇 baowen xu
  • 29 篇 johansson karl h...
  • 28 篇 zhou jie
  • 28 篇 mengchu zhou
  • 26 篇 chen zhong
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 jiang liu
  • 24 篇 bo du
  • 24 篇 tao yang
  • 24 篇 li li
  • 22 篇 j.h. lang
  • 22 篇 e. rogers
  • 21 篇 liu xin
  • 21 篇 bentahar jamal
  • 20 篇 zhang lei
  • 20 篇 li yang

语言

  • 23,191 篇 英文
  • 876 篇 其他
  • 306 篇 中文
  • 31 篇 日文
  • 11 篇 德文
  • 3 篇 朝鲜文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Science Software Systems Engineering"
24391 条 记 录,以下是481-490 订阅
排序:
SecureChainAI: Integrating Blockchain and Artificial Intelligence for Enhanced Security in IoT Environments  5
SecureChainAI: Integrating Blockchain and Artificial Intelli...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Thamaraiselvi, K. Pushpalatha, A. Chidambarathanu, K. Wankhede, Jaishri P. Alagumuthukrishnan, S. Sarveshwaran, Velliangiri New Horizon College of Engineering Department of Information Science and Engineering Bangalore India Karpagam College of Engineering Department of Computer Science and Design Coimbatore India R.M.K. Engineering College Department of Computer Science and Business Systems Kavaraipettai India Cmr Institute of Technology Department of Computer Science and Engineering Hyderabad India Srm Institute of Science and Technology Department of Computational Intelligence Kattankulathur India
Internet of Things (IoT) systems develop with paramount importance for security in view of the increased deployment of IoT devices over critical sectors like healthcare, industry automation, and smart cities. The risk... 详细信息
来源: 评论
Enhanced Text-to-Image Synthesis Using Generative Adversarial Networks and Skip-Thought Vectors for Improved Visual and Semantic Accuracy
Enhanced Text-to-Image Synthesis Using Generative Adversaria...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence systems, IACIS 2024
作者: Monisha, D. Keerthana, D.R. Manoj Kumar, M.V. Prashanth, B.S. Sneha, H.R. Puneeth, B.H. Nitte Meenakshi Institute of Technology Department of Information Science & Engineering Karnataka Bangalore560064 India Bapuji Institute of Engineering and Technology Department of Computer Science and Business Systems Karnataka Davanagere577004 India
Creating realistic images from textual descriptions is a major challenge in computer vision and natural language processing. Traditional methods often fail to accurately translate text into visual representations, res... 详细信息
来源: 评论
Trustworthy Artificial Intelligence and Automatic Morse Code Based Communication Recognition with Eye Tracking
收藏 引用
Journal of Mobile Multimedia 2023年 第6期19卷 1439-1461页
作者: Medichalam, Krishnakanth Vijayarajan, V. Kumar, V. Vinoth Iyer, I. Manimozhi Vanukuri, Yaswanth Kumar Prasath, V.B. Surya Swapna, B. School of Computer Science and Engineering Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore 632014 India Department of Computer Science and Engineering East Point College of Engineering and Technology India Department of Electrical Engineering and Computer Science University of Cincinnati 45221 OH United States Department of ECE Dr MGR Educational and Research Institute Chennai 95 India
Morse code is one of the oldest communication techniques and used in telecommunication systems. Morse code can be transmitted as a visual signal by using reflections or with the help of flashlights, but it can also be... 详细信息
来源: 评论
Blockchain-based Patient Recommendation System for Smart Healthcare
Blockchain-based Patient Recommendation System for Smart Hea...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Mehta, Raj Mehta, Mahek Kakkar, Riya Oza, Parita Agrawal, Smita Tanwar, Sudeep Dutta, Ashit Kumar Rodrigues, Joel J.P.C. Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat 382481 India Department of Computer Science and Information Systems College of Applied Sciences AlMaarefa University Saudi Arabia
In recent times data breaches in various sectors of industry have become a common threat. It has become very crucial to secure patient data in the health industry. The upcoming Healthcare 4.0 techniques can play an im... 详细信息
来源: 评论
Innovative Data Encryption Techniques using AI for Wireless Sensor Actuator Network Security  2
Innovative Data Encryption Techniques using AI for Wireless ...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Dharmateja, M. Rama, Prabha K.P. Asha, N. Nithya, P. Lalitha, S. Manojkumar, P. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Arunai Engineering College Department of Computer Science and Engineering Tamil Nadu Tiruvannamalai India Bannari Amman Institute of Technology Department of Electrical and Electronics Engineering Tamil Nadu Sathyamangalam India
Wireless Sensor Actuator Networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat... 详细信息
来源: 评论
Novel Darknet traffic data synthesis using Generative Adversarial Networks enhanced with oscillatory Growing Cosine Unit activated convolution layers
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 58-65页
作者: Pradeep C, Antony Amali D, Geraldine Bessie Noel, Mathew Mithra Ghalib, Muhammad Rukunuddin Subramaniam, Prabhakar Rontala Venugopal, Chitra School of Computer Science and Engineering Vellore Institute of Technology Vellore India School of Electrical Engineering Vellore Institute of Technology Vellore India School of Computing De Montfort University Dubai United Arab Emirates Information Systems and Technology Westville South Africa Electrical Engineering & Renewable Energy Oregon Institute of Technology United States
The Darknet is an anonymous, encrypted collection of websites, with a passive listening nature - accepting incoming packets, while not supporting outgoing packets. Thus, it can potentially host criminal or malicious a... 详细信息
来源: 评论
Artificial Intelligence For Realtime Face Recognition Attendance Using College Classrooms and Buses
Artificial Intelligence For Realtime Face Recognition Attend...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Ahila, A. Hosanna Princye, P. Poonguzhali, A. Kavivendhan Deepa, M. Arthy, A. Saravanakumar, R. Sri Sairam College of Engineering Department of Electronics and Communication Engineering Anekal Bangalore India Francis Xavier Engineering College Department of Computer Science and Business Systems Tamil Nadu Tirunelveli India Iconix Software Solution Software Analyst Tamil Nadu Tirunelveli India
Teachers take attendance by having pupils sign in or check-in classes and transportation. Student absences often result from individual mistakes. This article examines a technology that records data from classroom pho... 详细信息
来源: 评论
YFLM: An Improved Levenberg-Marquardt Algorithm for Global Bundle Adjustment  41st
YFLM: An Improved Levenberg-Marquardt Algorithm for Global ...
收藏 引用
41st computer Graphics International Conference, CGI 2024
作者: Peng, Jiaxin Li, Tao Jiang, Qin Liu, Jie Wang, Ruibo Laboratory of Software Engineering for Complex Systems School of Computer Science National University of Defense Technology Hunan Changsha410073 China Parallel and Distributed Processing Laboratory School of Computer Science National University of Defense Technology Hunan Changsha410073 China
The conventional Levenberg-Marquardt (LM) algorithm is a state-of-the-art trust-region optimization method for solving bundle adjustment problems in the Structure-from-Motion community, which not only takes advantage ... 详细信息
来源: 评论
Photonics Applications and Web engineering – WILGA 2024
Photonics Applications and Web Engineering – WILGA 2024
收藏 引用
Photonics Applications in Astronomy, Communications, Industry, and High Energy Physics Experiments 2024
作者: Romaniuk, Ryszard S. Smolarz, Andrzej Wójcik, Waldemar Warsaw University of Technology Institute of Electronic Systems Poland Lublin University of Technology Faculty of Electrical Engineering and Computer Science Poland
Wilga 2024 Summer Symposium on Photonics Applications and Web engineering was the 52th edition of the research and technical meetings series. Traditionally, the annual series of technical conferences and topical sessi... 详细信息
来源: 评论
Fractal dimension analysis for improved decision-making in non-stationary multi-arm bandit problems: a machine learning approach
收藏 引用
The European Physical Journal Special Topics 2025年 1-16页
作者: Nandhini, S. Kala Pandian, J. Arun Department of Computer Applications School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
In this research, we propose a novel approach to addressing the exploration–exploitation dilemma in multi-armed bandit (MAB) algorithms using fractal dimensions. The fractal dimension is used in the algorithms to rep...
来源: 评论