咨询与建议

限定检索结果

文献类型

  • 140,299 篇 会议
  • 69,346 篇 期刊文献
  • 1,412 册 图书

馆藏范围

  • 211,056 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 127,877 篇 工学
    • 84,941 篇 计算机科学与技术...
    • 69,640 篇 软件工程
    • 30,731 篇 信息与通信工程
    • 20,115 篇 控制科学与工程
    • 16,023 篇 电气工程
    • 15,932 篇 电子科学与技术(可...
    • 14,758 篇 生物工程
    • 10,351 篇 生物医学工程(可授...
    • 10,132 篇 光学工程
    • 9,603 篇 机械工程
    • 7,029 篇 化学工程与技术
    • 6,870 篇 仪器科学与技术
    • 6,355 篇 动力工程及工程热...
    • 5,097 篇 材料科学与工程(可...
    • 4,555 篇 交通运输工程
    • 4,482 篇 安全科学与工程
    • 4,318 篇 网络空间安全
  • 70,006 篇 理学
    • 35,619 篇 数学
    • 21,348 篇 物理学
    • 16,517 篇 生物学
    • 11,801 篇 统计学(可授理学、...
    • 7,729 篇 系统科学
    • 7,502 篇 化学
  • 33,001 篇 管理学
    • 20,525 篇 管理科学与工程(可...
    • 13,720 篇 图书情报与档案管...
    • 9,011 篇 工商管理
  • 9,757 篇 医学
    • 8,007 篇 临床医学
    • 7,173 篇 基础医学(可授医学...
    • 4,439 篇 药学(可授医学、理...
  • 5,614 篇 法学
    • 4,677 篇 社会学
  • 3,448 篇 经济学
  • 2,489 篇 农学
  • 2,177 篇 教育学
  • 948 篇 文学
  • 458 篇 军事学
  • 354 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,145 篇 computer science
  • 5,326 篇 accuracy
  • 5,174 篇 feature extracti...
  • 4,677 篇 computational mo...
  • 4,630 篇 deep learning
  • 4,626 篇 training
  • 3,738 篇 machine learning
  • 2,969 篇 optimization
  • 2,915 篇 predictive model...
  • 2,820 篇 semantics
  • 2,595 篇 data models
  • 2,456 篇 real-time system...
  • 2,331 篇 support vector m...
  • 2,315 篇 neural networks
  • 2,313 篇 data mining
  • 2,266 篇 convolutional ne...
  • 2,069 篇 internet of thin...
  • 1,955 篇 artificial intel...
  • 1,874 篇 image segmentati...
  • 1,871 篇 educational inst...

机构

  • 2,471 篇 school of comput...
  • 2,215 篇 school of comput...
  • 2,088 篇 school of comput...
  • 1,823 篇 school of comput...
  • 1,522 篇 school of comput...
  • 1,484 篇 school of comput...
  • 1,361 篇 school of electr...
  • 1,338 篇 school of comput...
  • 1,261 篇 school of comput...
  • 1,075 篇 cavendish labora...
  • 1,033 篇 school of comput...
  • 974 篇 school of comput...
  • 972 篇 department of ph...
  • 917 篇 school of comput...
  • 885 篇 physikalisches i...
  • 873 篇 university of ch...
  • 871 篇 oliver lodge lab...
  • 546 篇 school of comput...
  • 544 篇 school of comput...
  • 517 篇 chitkara univers...

作者

  • 393 篇 niyato dusit
  • 269 篇 a. gomes
  • 261 篇 barter w.
  • 245 篇 c. alexa
  • 237 篇 j. m. izen
  • 234 篇 s. chen
  • 232 篇 blake t.
  • 229 篇 bowcock t.j.v.
  • 224 篇 bellee v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 217 篇 brundu d.
  • 216 篇 beiter a.
  • 213 篇 g. bella
  • 212 篇 bencivenni g.
  • 210 篇 bay a.
  • 209 篇 j. strandberg
  • 208 篇 d. calvet

语言

  • 182,952 篇 英文
  • 25,051 篇 其他
  • 3,159 篇 中文
  • 181 篇 日文
  • 38 篇 朝鲜文
  • 29 篇 德文
  • 24 篇 法文
  • 12 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Computer Engineering"
211057 条 记 录,以下是4701-4710 订阅
排序:
Challenges of Integrating Blockchain Technology into Educational Institutions
Challenges of Integrating Blockchain Technology into Educati...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Ali, Abbas Hussein Yavanoǧlu, Uraz Graduate School of Informatics Gazi University Dept. Of Computer Science Ankara Turkey Gazi University Faculty of Engineering Dept. of Computer Engineering Ankara Turkey
The latest advancements in blockchain technology have significantly influenced several sectors, such as banking, healthcare, and supply chain networks. Because of its distinct attributes, like decentralization, trustw... 详细信息
来源: 评论
Internet of Things (IoT) applications security trends and challenges
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-22页
作者: Laghari, Asif Ali Li, Hang Khan, Abdullah Ayub Shoulin, Yin Karim, Shahid Khani, Muhammad Adnan Kaim Software College Shenyang Normal University Shenyang China Department of Computer Science Bahria University Karachi Campus Karachi75000 Pakistan School of Information Engineering Xi’an Eurasia University Shaanxi Xian710065 China Department of Computer Science Ilma University Karachi Pakistan
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilitie... 详细信息
来源: 评论
Using Machine Learning and the K-Nearest Neighbour Classification Method to Assess Autism Risk  4
Using Machine Learning and the K-Nearest Neighbour Classific...
收藏 引用
4th International Conference on Innovative Practices in Technology and Management, ICIPTM 2024
作者: Singla, Muskan Gill, Kanwarpartap Singh Aggarwal, Priyanshi Rawat, Ramesh Singh Chanti, Yerrolla Chitkara University Institute of Engineering and Technology Punjab India Graphic Era Hill University Computer Science & Engineering Uttarakhand Dehradun India Graphic Era Deemed to Be University Computer Science & Engineering Uttarakhand Dehradun India Sr University School of Computer Science & Artificial Intelligence Warangal India
The K-Nearest Neighbour (KNN) classification approach, one of the machine learning algorithms examined in this work, is used to determine a person's likelihood of developing autism spectrum disorder (ASD). The stu... 详细信息
来源: 评论
Effective and Efficient Community Search with Graph Embeddings  26
Effective and Efficient Community Search with Graph Embeddin...
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Gou, Xiaoxuan Xu, Xiaoliang Wu, Xiangying Chen, Runhuai Wang, Yuxiang Wu, Tianxing Ke, Xiangyu Hangzhou Dianzi University School of Computer Science China Southeast University School of Computer Science and Engineering China Zhejiang University School of Software Technology China
Given a graph G and a query node q, community search (CS) seeks a cohesive subgraph from G that contains q. CS has gained much research interests recently. In the database research community, researchers aim to find t... 详细信息
来源: 评论
Review of permission-based malware detection in Android
Review of permission-based malware detection in Android
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Rawat, Nishant Amrita Singh, Avjeet Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India Center for Cyber Security and Cryptology Computer Science and Engineering Sharda School of Engineering and Technology Sharda University Uttar Pradesh Greater Noida India
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9... 详细信息
来源: 评论
Intelligent Techniques for Nutrition Level Prediction in Guava Plants
Intelligent Techniques for Nutrition Level Prediction in Gua...
收藏 引用
2024 Asia Pacific Conference on Innovation in Technology, APCIT 2024
作者: Nadiger, Rakshith S Suresh, Gautham Shobha Rani, N. Prabhu, Akshatha Sangamesh, M.A. Amrita Vishwa Vidyapeetham School of Computing Department of Computer Science Mysuru India Gitam University Gitam School of Technology Department of Computer Science & Engineering Bengaluru India National Institute of Engineering Department of Chemistry Mysuru India
Guava, a valuable tropical fruit crop, faces significant defect challenges due to diseases. Manual disease checks are time- consuming and error prone, leading to delayed action. Our research focuses on image processin... 详细信息
来源: 评论
Intelligent Wearable Device for Visually Impaired Person to act as a Third Eye  4
Intelligent Wearable Device for Visually Impaired Person to ...
收藏 引用
4th International Conference on Electronics and Sustainable Communication Systems, ICESC 2023
作者: Saranya, G. Tharun, S.V. Tamilvizhi, T. Surendran, R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India Panimalar Engineering College Department of Computer Science and Engineering Chennai India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India
People with limited vision, impaired sight, or visual impairment cannot see or recognize people, objects, words, or letters. Offer visually challenged people a camera-based detection system so they can read names of t... 详细信息
来源: 评论
U-Net Based Speech Denoising Model for Kiosk Environments  15th
U-Net Based Speech Denoising Model for Kiosk Environments
收藏 引用
15th International Conference on computer science and its Applications, CSA 2023 and 17th KIPS International Conference on Ubiquitous Information Technologies and Applications, CUTE 2023
作者: Hyun, Kyeong-Seok Chung, Jaehwa School of Computer Engineering Korea University Seoul Korea Republic of Department of Computer Science Korea National Open University Seoul Korea Republic of
In the context of kiosk systems, denoising is a critical preprocessing step that enhances speech recognition reliability. It is especially relevant for applications like chatbots, as it effectively removes ambient noi... 详细信息
来源: 评论
Towards optimized tensor code generation for deep learning on sunway many-core processor
收藏 引用
Frontiers of computer science 2024年 第2期18卷 1-15页
作者: Mingzhen LI Changxi LIU Jianjin LIAO Xuegui ZHENG Hailong YANG Rujun SUN Jun XU Lin GAN Guangwen YANG Zhongzhi LUAN Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China National University of Singapore Singapore 119077Singapore State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214000China Science and Technology on Special System Simulation Laboratory Beijing Simulation Center Beijing 100854China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application *** the existing dee... 详细信息
来源: 评论
Fault Diagnosis of Tenessee Eastman Process with Detection Quality Using IMVOA with Hybrid DL Technique in IIOT
收藏 引用
SN computer science 2023年 第5期4卷 1-10页
作者: Anitha, Cuddapah Rajesh Kumar, T. Balamanigandan, R. Mahaveerakannan, R. Computer Science and Engineering School of Computing Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College Andhra Pradesh Tirupati India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Tamil Nadu Chennai 602105 India
This work presents a deep learning (DL) based approach to defect identification in continuous systems. The Tennessee Eastman Procedure was chosen as a use case for this study because it involves a dispersed network of... 详细信息
来源: 评论