咨询与建议

限定检索结果

文献类型

  • 31,083 篇 会议
  • 23,864 篇 期刊文献
  • 429 册 图书

馆藏范围

  • 55,376 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 33,510 篇 工学
    • 19,852 篇 计算机科学与技术...
    • 16,064 篇 软件工程
    • 6,561 篇 信息与通信工程
    • 5,320 篇 电气工程
    • 5,163 篇 电子科学与技术(可...
    • 4,337 篇 控制科学与工程
    • 3,242 篇 光学工程
    • 3,232 篇 生物工程
    • 2,449 篇 生物医学工程(可授...
    • 2,246 篇 机械工程
    • 2,225 篇 化学工程与技术
    • 2,185 篇 材料科学与工程(可...
    • 1,818 篇 仪器科学与技术
    • 1,528 篇 动力工程及工程热...
    • 932 篇 力学(可授工学、理...
    • 874 篇 交通运输工程
    • 866 篇 安全科学与工程
  • 20,738 篇 理学
    • 8,809 篇 物理学
    • 8,783 篇 数学
    • 3,807 篇 生物学
    • 2,758 篇 统计学(可授理学、...
    • 2,473 篇 化学
    • 1,967 篇 系统科学
  • 7,470 篇 管理学
    • 4,674 篇 管理科学与工程(可...
    • 3,032 篇 图书情报与档案管...
    • 2,077 篇 工商管理
  • 2,248 篇 医学
    • 1,895 篇 临床医学
    • 1,552 篇 基础医学(可授医学...
    • 986 篇 药学(可授医学、理...
  • 1,093 篇 法学
    • 885 篇 社会学
  • 726 篇 经济学
  • 554 篇 教育学
  • 532 篇 农学
  • 189 篇 文学
  • 130 篇 军事学
  • 94 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,176 篇 computer science
  • 1,544 篇 laboratories
  • 1,138 篇 software enginee...
  • 931 篇 computational mo...
  • 663 篇 feature extracti...
  • 648 篇 machine learning
  • 614 篇 application soft...
  • 612 篇 deep learning
  • 594 篇 training
  • 532 篇 computer archite...
  • 529 篇 testing
  • 509 篇 semantics
  • 508 篇 accuracy
  • 488 篇 data mining
  • 469 篇 costs
  • 459 篇 artificial intel...
  • 426 篇 bandwidth
  • 400 篇 optimization
  • 374 篇 predictive model...
  • 373 篇 software

机构

  • 1,104 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 979 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 795 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 597 篇 fakultät physik ...
  • 587 篇 infn sezione di ...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 525 篇 iccub universita...
  • 522 篇 department of ph...
  • 517 篇 h.h. wills physi...
  • 514 篇 imperial college...
  • 512 篇 nikhef national ...
  • 508 篇 stfc rutherford ...
  • 504 篇 physik-institut ...

作者

  • 267 篇 barter w.
  • 258 篇 a. gomes
  • 253 篇 beiter a.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 237 篇 bellee v.
  • 236 篇 c. amelung
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 232 篇 g. spigo
  • 231 篇 blake t.
  • 229 篇 s. chen
  • 227 篇 brundu d.
  • 226 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 f. siegert
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.

语言

  • 52,069 篇 英文
  • 2,614 篇 其他
  • 696 篇 中文
  • 13 篇 德文
  • 7 篇 日文
  • 6 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering Laboratory Department of Computer Science and Engineering"
55376 条 记 录,以下是641-650 订阅
排序:
On Bounding the Behavior of a Neuron  36th
On Bounding the Behavior of a Neuron
收藏 引用
36th International Florida Artificial Intelligence Research Society Conference, FLAIRS-36 2023
作者: Borowski, Richard Choi, Arthur Computer Science Department College of Computing and Software Engineering Kennesaw State University United States
A neuron with binary inputs and a binary output represents a Boolean function. Our goal is to extract this Boolean function into a tractable representation that will facilitate the explanation and formal verification ... 详细信息
来源: 评论
A Cloud-Based 3D Digital Twin for Arabic Sign Language Alphabet Using Machine Learning Object Detection Model  15
A Cloud-Based 3D Digital Twin for Arabic Sign Language Alpha...
收藏 引用
15th International Conference on Innovations in Information Technology, IIT 2023
作者: Abduljabbar, Mohammed Gochoo, Munkhjargal Sultan, Mohamad T. Batnasan, Ganzorig Otgonbold, Munkh-Erdene Berengueres, Jose Alnajjar, Fady Rasheed, Ashika Abdul Alshamsi, Ahmed Alsaedi, Naser United Arab Emirates University Department of Computer Science and Software Engineering United Arab Emirates
People with hearing loss or hard hearing struggle with daily life activities as sign language is not widely known by the public. There are many attempts to use technology to help assist hearing loss individuals. Howev... 详细信息
来源: 评论
Sri Potha: A Voice-Based Sinhala Document Maker
Sri Potha: A Voice-Based Sinhala Document Maker
收藏 引用
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2023
作者: De Silva, D.I. Piyadali, D.S.P. Dilrukshi, M.G.S. Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Sri Lanka
This study discusses the development of a web application aimed at facilitating Sinhala document creation, with a specific emphasis on Sinhala voice-to-text conversion and the handling of Sinhala commands through voca... 详细信息
来源: 评论
Enhancing Deep Convolutional Neural Networks to Detect Pedestrians Effectively in Various Urban Environments  6
Enhancing Deep Convolutional Neural Networks to Detect Pedes...
收藏 引用
6th International Conference on Electrical engineering and Information and Communication Technology, ICEEICT 2024
作者: Hasan, Md. Mehedi Aman, Nakib Jahan, Md. Wadud Software Engineer i Developer EXperience Hub Rajshahi Bangladesh Pabna University of Science and Technology Department of Computer Science and Engineering Pabna Bangladesh
In computer vision, accurately identifying pedestrians is a crucial difficulty, especially in applications where safety is of the highest priority, such autonomous driving and urban planning. Deep learning has made pr... 详细信息
来源: 评论
Tomato Leaf Diseases Prediction Using Deep Learning Algorithms
Tomato Leaf Diseases Prediction Using Deep Learning Algorith...
收藏 引用
2024 International Conference on Advances in Data engineering and Intelligent Computing Systems, ADICS 2024
作者: Ananthi, P. Devi, K. Nirmala Gopinath, D. Shanmugapriya, P. Gowtham, S. Kongu Engineering College Department Of Computer Technology Tamilnadu Perundurai India Bangaluru India Kristu Jayanti College Department Of Computer Science Bangaluru India Software Systems Kongu Engineering College Erode India
In the realm of agriculture, infections on tomato leaves pose a worldwide danger to established tomato production, impacting a large number of farmers worldwide. To ensure healthy tomato plant growth and food security... 详细信息
来源: 评论
Spatiotemporal crowds features extraction of infrared images using neural network
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第4期15卷 2543-2556页
作者: Al-Oraiqat, Anas M. Drieiev, Oleksandr Drieieva, Hanna Meleshko, Yelyzaveta AlRawashdeh, Hazim Al-Oraiqat, Karim A. Hasan, Yassin M. Y. Maricar, Noor Khan, Sheroz Department of Computer Science College of Engineering and Information Technology Onaizah Colleges Qassim Saudi Arabia Department of Cybersecurity and Software Central Ukrainian National Technical University Kropyvnytskyi Ukraine Department of Artificial Intelligence Faculty of Information Technology Zarqa University Zarqa Jordan Department of Electrical Engineering College of Engineering and Information Technology Onaizah Colleges Qassim Saudi Arabia
Crowds can lead up to severe disasterous consequences resulting in fatalities. Videos obtained through public cameras or captured by drones flying overhead can be processed with artificial intelligence-based crowd ana... 详细信息
来源: 评论
A Hypergraph Transformer With Adaptive EdgeConv for Skeleton-based Action Recognition  7
A Hypergraph Transformer With Adaptive EdgeConv for Skeleton...
收藏 引用
7th International Conference on Pattern Recognition and Artificial Intelligence, PRAI 2024
作者: Zhou, Fengyu Liu, Jun Zhang, Dazhi Huang, Zengxi School of Computer Science and Software Engineering Xihua University Chengdu China Sichuan Police College Criminal Science and Technolog Department Luzhou China
Skeleton-based action recognition is a crucial task in computer vision, aiming to perform pattern recognition on a skeleton sequence to identify the actions represented by the skeleton's semantics. However, curren... 详细信息
来源: 评论
Cryptcoder: An Automatic Code Generator for Cryptographic Tasks in Ethereum Smart Contracts  31
Cryptcoder: An Automatic Code Generator for Cryptographic Ta...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Xia, Libin Zhang, Jiashuo Wang, Che Tan, Zezhong Gao, Jianbo Guan, Zhi Chen, Zhong Peking University MoE Key Laboratory of High Confidence Software Technologies Beijing China School of Computer Science Peking University Beijing China Peking University National Engineering Research Center for Software Engineering Beijing China
Cryptographic APIs provided by Ethereum are widely adopted in decentralized applications (DApps) for cryptographic operations. However, developers who lack expertise in cryptography frequently encounter difficulties w... 详细信息
来源: 评论
Gaussian Differential Privacy Integrated Machine Learning Model for Industrial Internet of Things
收藏 引用
SN computer science 2023年 第5期4卷 454页
作者: Lazar, Arokia Jesu Prabhu Soundararaj, Sivaprakash Sonthi, Vijaya Krishna Palanisamy, Vishnu Raja Subramaniyan, Vanithamani Sengan, Sudhakar Department of Computer Science and Engineering AI & ML CMR Institute of Technology Telangana Hyderabad 501401 India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore 632014 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram 522502 India Department of Computer Science and Engineering Kongu Engineering College Tamil Nadu Perundurai 638060 India Master of Computer Applications M. Kumarasamy College of Engineering Tamil Nadu Karur 638060 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Agriculture, energy, mining, healthcare, and transportation are a few of the top industries transformed by the industrial internet of things (IIoT). Industry 4.0 mainly relies on machine learning (ML) to use the vast ... 详细信息
来源: 评论
A Review of Colonial Pipeline Ransomware Attack  23
A Review of Colonial Pipeline Ransomware Attack
收藏 引用
23rd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing Workshops, CCGridW 2023
作者: Beerman, Jack Berent, David Falter, Zach Bhunia, Suman Miami University Department of Computer Science and Software Engineering OxfordOH45056 United States
In April, 2021 a ransomware attack occurred on Colonial Pipeline. The details of this attack point to the hacking group DarkSide taking advantage of the design flaws in the Colonial Pipeline network. After extensive r... 详细信息
来源: 评论