咨询与建议

限定检索结果

文献类型

  • 1,215 篇 期刊文献
  • 458 篇 会议
  • 36 册 图书

馆藏范围

  • 1,708 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 568 篇 工学
    • 194 篇 计算机科学与技术...
    • 141 篇 软件工程
    • 94 篇 电气工程
    • 69 篇 信息与通信工程
    • 59 篇 材料科学与工程(可...
    • 50 篇 土木工程
    • 48 篇 控制科学与工程
    • 46 篇 电子科学与技术(可...
    • 35 篇 动力工程及工程热...
    • 34 篇 冶金工程
    • 32 篇 生物工程
    • 31 篇 水利工程
    • 31 篇 船舶与海洋工程
    • 30 篇 生物医学工程(可授...
    • 27 篇 化学工程与技术
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 23 篇 环境科学与工程(可...
  • 458 篇 理学
    • 272 篇 物理学
    • 78 篇 数学
    • 48 篇 统计学(可授理学、...
    • 47 篇 生物学
    • 30 篇 海洋科学
    • 27 篇 化学
  • 124 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 71 篇 医学
    • 46 篇 临床医学
    • 27 篇 基础医学(可授医学...
    • 23 篇 公共卫生与预防医...
  • 50 篇 经济学
    • 48 篇 应用经济学
  • 24 篇 农学
  • 20 篇 教育学
  • 16 篇 法学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 39 篇 machine learning
  • 29 篇 deep learning
  • 23 篇 artificial intel...
  • 23 篇 accuracy
  • 21 篇 feature extracti...
  • 20 篇 cloud computing
  • 18 篇 computer science
  • 18 篇 computational mo...
  • 17 篇 wireless sensor ...
  • 17 篇 training
  • 16 篇 real-time system...
  • 15 篇 security
  • 14 篇 routing
  • 14 篇 theory of comput...
  • 14 篇 data models
  • 13 篇 information syst...
  • 12 篇 scalability
  • 12 篇 computer archite...
  • 12 篇 data mining
  • 12 篇 testing

机构

  • 16 篇 associate profes...
  • 13 篇 school of comput...
  • 13 篇 department of ma...
  • 13 篇 department of ch...
  • 13 篇 william norris p...
  • 11 篇 department of co...
  • 11 篇 adjunct professo...
  • 9 篇 clayton school o...
  • 7 篇 department of co...
  • 6 篇 assistant profes...
  • 6 篇 assistant profes...
  • 6 篇 department of co...
  • 6 篇 member
  • 6 篇 optimanumerics l...
  • 6 篇 professor
  • 5 篇 centre of resear...
  • 5 篇 department of co...
  • 5 篇 school of comput...
  • 5 篇 warsaw universit...
  • 5 篇 department of co...

作者

  • 13 篇 youngsong mun
  • 13 篇 osvaldo gervasi
  • 13 篇 vipin kumar
  • 11 篇 marina l. gavril...
  • 10 篇 antonio laganá
  • 9 篇 c. j. kenneth ta...
  • 9 篇 david taniar
  • 7 篇 andreas pitsilli...
  • 6 篇 vikrant sharma
  • 6 篇 l m patnaik
  • 5 篇 grace khayat
  • 5 篇 vangipuram radha...
  • 5 篇 ankit kumar
  • 5 篇 c.v. guru rao
  • 5 篇 sharma s.c.
  • 5 篇 hyunseung choo
  • 5 篇 manjunatha k.
  • 5 篇 constandinos x m...
  • 5 篇 nagabhushana h.
  • 5 篇 ashish verma

语言

  • 1,590 篇 英文
  • 103 篇 其他
  • 15 篇 中文
  • 1 篇 德文
检索条件"机构=Associate Professor Department of Computer Science and Engineering"
1709 条 记 录,以下是81-90 订阅
排序:
A Machine Learning-based Approach to Detect Polluting Vehicles in Smart Cities  6
A Machine Learning-based Approach to Detect Polluting Vehicl...
收藏 引用
6th International Conference on Smart Cities, Internet of Things and Applications, SCIoT 2022
作者: Afshar, Bahar Fathy, Mahmood Asgari, Maryam Shahverdy, Mohammad Shahverdi, Pooya Islamic Azad University Professor Hessabi Branch Department of Computer Engineering Tafresh Iran Iran University of Science and Technology Department of Computer Engineering Tehran Iran
After the increase of pollution caused by vehicle congestion, new approaches to reduce pollution have emerged. Although regular visits to technical inspection centers and car repair center can be helpful, a new approa... 详细信息
来源: 评论
Mitigating Credit Card Fraud: A Machine Learning Perspective
Mitigating Credit Card Fraud: A Machine Learning Perspective
收藏 引用
Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC), International Conference on
作者: Shivam Bhushan Indrajeet Gupta Angayarkanni S A Balakiruthiga B Pandimurugan V Rajaram V Department of Networking and Communications School of Computing SRM Institute of Science and Technology Kattankulathur India Associate Professor Computer Science and engineering Acharya Institute of Technology Bangalore India
In this day and age of online and digital transactions, credit cards have come up as a popular option of payment. This has led to the increase in the fraudulent credit card transactions and as a result the banks and t... 详细信息
来源: 评论
An Efficient Deep Learning Framework using CapsNet and SOM for Multidrug-Resistant Tuberculosis Detection and Analysis in CXR Images
收藏 引用
Procedia computer science 2025年 258卷 3251-3263页
作者: Ceronmani Sharmila V Remya K Sam Praveen P Associate Professor Department of ECE SRM Institute of Science and Technology Kattankulathur Chennai Tamil Nadu Assistant Professor Department of Information Technology Hindustan Institute of Technology and Science Padur Chennai Tamil Nadu PG Student Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Rajasthan
Early detection of Multidrug-resistant Tuberculosis (MDR-TB) is crucial for illness prevention, lowering mortality risk, and preventing the spread of infection to people. The chest X-ray images(CXRI), which is afforda... 详细信息
来源: 评论
Blockchain effect on E-commerce: A framework for key research areas
Blockchain effect on E-commerce: A framework for key researc...
收藏 引用
2023 International Conference on Artificial Intelligence and Smart Communication, AISC 2023
作者: Nethravathi, K. Panduro-Ramirez, Jeidy Gehlot, Anita Barve, Amit Sanjay, C.P. Ponnusamy, R. Jain University Department of Bms Bangalore India Universidad Tecnológica Del Perú Peru Uttaranchal University Uttaranchal Institute of Technology India Parul University Department of Associate Professor & Hod India Department of It& Business Analytics India Chennai Institute of Technology Department of Computer Science & Engineering India
Several business applications and procedures are expected to be significantly disrupted by Blockchain-based technologies, which has significant consequences for ecommerce. In light of the potential blockchain based te... 详细信息
来源: 评论
Deep Learning Cerebral Splitting: Adaptation for Spine Elimination
Deep Learning Cerebral Splitting: Adaptation for Spine Elimi...
收藏 引用
Communication, Computing and Energy Efficient Technologies (I3CEET), International Conference on
作者: M. Balasubramani B. J. Job Karuna Sagar K. C. Rajheshwari E. Saranya B. Aishwarya P. Murugeswari Assistant Professor Department of Computer Science and Engineering V.S.B. Engineering College Professor Department of Computer Science and Engineering Joginpally B.R Engineering College Hyderabad India Department of Computer Science and Engineering Sona College of Technology Assistant Professor Department of Computer Science and Engineering Sri Eshwar College of Engineering Coimbatore Assistant Professor Department of Computer Science and Engineering(Cyber Security) Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Department of Electronics and Communication Engineering Theni Kammavar Sangam College of Technology
The posterior fossa volume and the total intracranial volume are important factors to consider when doing a brain volumetric analysis using structural electromagnetic resonance imaging. The thorough segmentation of th... 详细信息
来源: 评论
Deep Learning Techniques Advancements in Apple Leaf Disease Detection
收藏 引用
Procedia computer science 2024年 235卷 713-722页
作者: E Kannan Carmel Mary Belinda M J Alex David S Ruth Naveena N Almas Begum Hemalatha D Professor Assistant Professor Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamilnadu India 600062 Professor Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical And Technical Sciences Chennai Tamilnadu India 602105 Assistant Professor (SG) Hindustan Institute of Technology and Science Chennai Tamilnadu India 603103 Assistant Professor Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamilnadu India 600062
An exhaustive and comprehensive investigation was undertaken to address the critical issue of disease detection on apple leaves using cutting-edge deep learning techniques. The research delved into an array of diverse... 详细信息
来源: 评论
Lamport Blum Shub Signcryptive Extreme Learning Machine for Secure Transmission of Digital Images
收藏 引用
Procedia computer science 2025年 252卷 728-737页
作者: V. Prabavathi M. Sakthi Research Scholar Department of Computer Science Nallamuthu Gounder Mahalingam College Affiliated to Bharathiar University Pollachi Tamil Nadu India Associate Professor Department of Computer Science Nallamuthu Gounder Mahalingam College Affiliated to Bharathiar University Pollachi TamilNadu India
Image transmission refers to sending or transferring digital images from one location to another, typically over a network or communication channel across various domains, including telecommunications, multimedia mess... 详细信息
来源: 评论
Confidential machine learning on untrusted platforms:a survey
收藏 引用
Cybersecurity 2021年 第1期4卷 461-479页
作者: Sharma Sagar Chen Keke Northwestern Mutual Data Science Associate Professor Director of Trustworthy and Intelligent Computing Lab Department of Computer Science Marquette University Milwaukee WisconsinUSA HP Inc. USA
With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)fo... 详细信息
来源: 评论
A Novel Effective Lightweight Homomorphic Cryptographic Algorithm for data security in cloud computing
收藏 引用
International Journal of Intelligent Networks 2022年 3卷 16-30页
作者: Thabit, Fursan Can, Ozgu Alhomdy, Sharaf Al-Gaphari, Ghaleb H. Jagtap, Sudhir Postdoctoral Researcher Department of Computer Engineering Faculty of Engineering Ege University Turkey Assoc. Prof Dr. Department of Computer Engineering Faculty of Engineering Ege University Turkey Sana'a University Yemen Professor and Principal Research Centre of Computer Science S.V.M Campus - S.R.T.M. University India
Cloud computing is a technology in which the resources are delivered as services. Users can access them anywhere, anytime via the Internet without any need to know the infrastructure knowledge, experience, or even aut... 详细信息
来源: 评论
A Review on Vulnerabilities to Modern Processors and its Mitigation for Various Variants
收藏 引用
Procedia computer science 2022年 215卷 91-97页
作者: E Praveen Kumar S Priyanka T Sudhakar Associate Professor School of Computer Science and Engineering VIT-AP University Amaravathi India
Recently, security researchers have found two hardware security vulnerabilities namely Spectre and Meltdown, related to computer memory. They are not singular, many variants of these two vulnerabilities are being a he... 详细信息
来源: 评论