咨询与建议

限定检索结果

文献类型

  • 534,736 篇 会议
  • 6,120 册 图书
  • 5,589 篇 期刊文献
  • 4 篇 学位论文

馆藏范围

  • 546,429 篇 电子文献
  • 44 种 纸本馆藏

日期分布

学科分类号

  • 323,963 篇 工学
    • 228,393 篇 计算机科学与技术...
    • 186,743 篇 软件工程
    • 73,588 篇 信息与通信工程
    • 47,518 篇 控制科学与工程
    • 35,633 篇 电气工程
    • 33,314 篇 生物工程
    • 30,099 篇 电子科学与技术(可...
    • 29,735 篇 机械工程
    • 27,903 篇 生物医学工程(可授...
    • 20,355 篇 光学工程
    • 18,358 篇 仪器科学与技术
    • 18,283 篇 化学工程与技术
    • 17,173 篇 动力工程及工程热...
    • 13,439 篇 安全科学与工程
    • 13,069 篇 材料科学与工程(可...
    • 11,903 篇 交通运输工程
    • 10,939 篇 土木工程
  • 148,076 篇 理学
    • 80,135 篇 数学
    • 37,190 篇 物理学
    • 35,943 篇 生物学
    • 24,593 篇 统计学(可授理学、...
    • 17,199 篇 化学
    • 17,133 篇 系统科学
  • 86,645 篇 管理学
    • 53,698 篇 管理科学与工程(可...
    • 36,996 篇 图书情报与档案管...
    • 25,992 篇 工商管理
  • 23,092 篇 医学
    • 19,611 篇 临床医学
    • 18,707 篇 基础医学(可授医学...
    • 12,262 篇 药学(可授医学、理...
  • 14,359 篇 法学
    • 11,721 篇 社会学
  • 10,832 篇 教育学
  • 10,745 篇 经济学
  • 8,253 篇 农学
  • 3,969 篇 文学
  • 1,503 篇 军事学
  • 1,243 篇 艺术学
  • 61 篇 哲学
  • 36 篇 历史学

主题

  • 23,920 篇 computer science
  • 15,344 篇 accuracy
  • 15,038 篇 computational mo...
  • 14,776 篇 feature extracti...
  • 12,334 篇 training
  • 10,649 篇 deep learning
  • 8,851 篇 data mining
  • 8,844 篇 machine learning
  • 8,837 篇 computer archite...
  • 8,533 篇 predictive model...
  • 8,326 篇 support vector m...
  • 7,494 篇 real-time system...
  • 7,461 篇 data models
  • 7,312 篇 neural networks
  • 7,218 篇 software enginee...
  • 6,934 篇 artificial intel...
  • 6,932 篇 convolutional ne...
  • 6,517 篇 educational inst...
  • 6,219 篇 optimization
  • 5,981 篇 visualization

机构

  • 1,904 篇 chitkara univers...
  • 1,347 篇 school of comput...
  • 1,091 篇 school of comput...
  • 1,047 篇 school of comput...
  • 869 篇 school of comput...
  • 672 篇 department of co...
  • 651 篇 school of comput...
  • 609 篇 lovely professio...
  • 569 篇 department of co...
  • 538 篇 department of co...
  • 535 篇 school of comput...
  • 530 篇 college of compu...
  • 528 篇 school of comput...
  • 521 篇 maharishi school...
  • 505 篇 college of compu...
  • 500 篇 school of comput...
  • 497 篇 department of co...
  • 486 篇 school of electr...
  • 454 篇 college of compu...
  • 433 篇 college of compu...

作者

  • 278 篇 wang wei
  • 246 篇 yang yang
  • 240 篇 li wei
  • 236 篇 liu yang
  • 234 篇 china
  • 231 篇 kukreja vinay
  • 231 篇 yang liu
  • 230 篇 vinay kukreja
  • 208 篇 wei wang
  • 162 篇 zhang wei
  • 161 篇 wei li
  • 154 篇 wei zhang
  • 149 篇 li li
  • 148 篇 zhang yu
  • 146 篇 wang lei
  • 137 篇 li yang
  • 132 篇 zhang lei
  • 127 篇 liu wei
  • 119 篇 li bo
  • 114 篇 li hui

语言

  • 493,124 篇 英文
  • 49,344 篇 其他
  • 6,248 篇 中文
  • 29 篇 西班牙文
  • 28 篇 法文
  • 28 篇 土耳其文
  • 11 篇 葡萄牙文
  • 8 篇 德文
  • 6 篇 俄文
  • 2 篇 乌克兰文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"任意字段=International Conference on Advances in Computer Science and Engineering"
546454 条 记 录,以下是681-690 订阅
排序:
Investigating the Applications of Deep Learning in Drug Discovery and Pharmaceutical Research
Investigating the Applications of Deep Learning in Drug Disc...
收藏 引用
2024 international conference on advances in Computing Research on science engineering and Technology, ACROSET 2024
作者: Desai, Karishma Goyal, Manish Kumar Nachappa, M.N. Atlas SkillTech University Department of UGDX Maharashtra Mumbai India Vivekananda Global University Department of Computer Science & Application Jaipur India Department of Computer Science and Information Technology Bangalore India
The widespread use of deep learning has ushered in a revolutionary age in the fields of drug development and pharmaceutical research. The many uses and consequences of deep learning in this area are briefly discussed ... 详细信息
来源: 评论
Improving Trusted Cloud Storage Services Using Identity Based Signature Over Hash Based Protocol  2
Improving Trusted Cloud Storage Services Using Identity Base...
收藏 引用
2nd IEEE international conference on advances in Information Technology, ICAIT 2024
作者: Jaswanth, Thavva Venkata Thangaraj, S. John Justin Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu Chennai India
By utilizing identity-based signatures rather than hash-based protocols, the goal is to enhance the reliability of cloud storage services. The innovative identity-based signature and the hash-based protocol are two co... 详细信息
来源: 评论
computer-Generated Image Detection Based on Multi-Scale Feature Fusion Attention Module  2
Computer-Generated Image Detection Based on Multi-Scale Feat...
收藏 引用
2nd IEEE international conference on Control, Electronics and computer Technology, ICCECT 2024
作者: Xue, Yijie Ji, Lixin Li, Shaomei Cyber Science and Engineering Zhengzhou University Zhengzhou China Institute of Information Technology Information Engineering University Zhengzhou China
As processing technology advances rapidly and image editors become widely used, computer-generated (CG) images are becoming increasingly lifelike, making it harder and harder to distinguish them from photographic (PG)... 详细信息
来源: 评论
Creating a Surround View Algorithm with Implementation on a Real Embedded ADAS Platform  32
Creating a Surround View Algorithm with Implementation on a ...
收藏 引用
32nd international conference on Software, Telecommunications and computer Networks, SoftCOM 2024
作者: Marinic, Ivan Vranjes, Mario Grbic, Ratko Herceg, Marijan TTTech Auto d.o.o. Cara Hadrijana 10b Osijek Croatia Faculty of Electrical Engineering Computer Science and Information Technology Osijek Kneza Trpimira 2B Osijek Croatia
computer Vision (CV) has seen significant advances, and autonomous driving technologies have been transforming the automotive industry in recent years. Autonomous vehicles require robust CV algorithms, while Advanced ... 详细信息
来源: 评论
Double Encryption Technique for Sharing and Storing the Images in the Cloud Environment  4
Double Encryption Technique for Sharing and Storing the Imag...
收藏 引用
4th international conference on advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Anusha, P. Maruthi, R. Kumar, D. Maghesh Begum, H. Parveen Periyar Maniammai Institute of Science and Technology Department of Software Engineering Tamil Nadu Thanjavur India Hindustan Institute of Technology and Science Department of Computer Applications Tamil Nadu Chennai India
Cryptography is used by all organizations to protect the data files and ensures confidentiality mainly at the time of sharing and storing in the cloud data storage. The cloud service providers use a wide range of tool... 详细信息
来源: 评论
The Integration of HMS using IOMT and CE Through ANFIS  4
The Integration of HMS using IOMT and CE Through ANFIS
收藏 引用
4th IEEE international conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2024
作者: Sreelakshmy, R. Donald, Cecil Rajaram, Gnanajeyaraman Putta, Prakash Thajeel, Sadeq Khudhur Hameed, Hind Zaidan, Doaa Talib Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India Department of Computer Science Bengaluru India Saveetha Institute of Medical and Technical Sciences Simats Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Mohan Babu University Department of Mechanical Engineering Andhra Pradesh Tirupati India National University of Science and Technology College of Technical Engineering Dhi Qar64001 Iraq Al-Farahidi University Baghdad Iraq Kut University College Department of Laser and Optical Electronics Engineering Al Kut Iraq
advances in the IoMT-enabled cloud computing and interactive applications provide a basis for reconsidering the landscape for delivery of healthcare services. Even though the IoMT-cloud-based systems monitor patients ... 详细信息
来源: 评论
Proceedings - 2021 3rd international conference on advances in computer Technology, Information science and Communication, CTISC 2021
Proceedings - 2021 3rd International Conference on Advances ...
收藏 引用
3rd international conference on advances in computer Technology, Information science and Communication, CTISC 2021
The proceedings contain 74 papers. The topics discussed include: an algorithm based on attention mask for fine-grained object detection;an intelligent customer service system for securities industry based on compound ...
来源: 评论
A Multimodal Approach Utilizing the IOMT to Address both the Pandemic and its Aftermath
A Multimodal Approach Utilizing the IOMT to Address both the...
收藏 引用
2023 international conference on Recent advances in science and engineering Technology, ICRASET 2023
作者: Rao, Manjula Gururaj Divakarala, Usha Kumar Reddy, K Hemant Priyanka, H. Kumar, Ch Sree Nmam Institute of Technology Karkala Nitte India Vit Ap University Department of Computer Science and Engineering India Computer Science & Engineering Pesu Bangaluru India Nist Department of Computer Science Berhampur India
Many IOT in the healthcare industry offers improved medical facilities for patients, benefiting doctors' offices and hospitals as well. The Internet of Medical Things (IOMT) plays a crucial role in enhancing the a... 详细信息
来源: 评论
An Optimal Differential Evolution Based XGB Classifier for IoMT malware classification
An Optimal Differential Evolution Based XGB Classifier for I...
收藏 引用
2023 international conference on advances in Intelligent Computing and Applications, AICAPS 2023
作者: Dhanya, L. Chitra, R. Noorul Islam Centre for Higher Education Department of Computer Science and Engineering Thuckalay India Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India
In the world we live in today, massive amounts of data are transferred in a matter of seconds. Internet of Medical Things (IoMT) is a technology that enables the health parameters of patients to be collected by medica... 详细信息
来源: 评论
Automated Wearable Device to Detect Drowning Incidents in Water Bodies  2
Automated Wearable Device to Detect Drowning Incidents in Wa...
收藏 引用
2nd IEEE international conference on advances in Information Technology, ICAIT 2024
作者: Basthikodi, Mustafa Shetty, Shreya S. Yashmitha, B. Shetty, Shravya R. Prakruthi, P.D. Computer Science and Engineering Department Sahyadri College of Engineering and Management Mangalore India Information Science and Engineering Department Sahyadri College of Engineering and Management Mangalore India
Drowning is a leading cause of unintentional death worldwide, with a significant number of fatalities occurring in natural bodies of water, swimming pools, and other aquatic environments. Timely and accurate detection... 详细信息
来源: 评论