咨询与建议

限定检索结果

文献类型

  • 1,204 篇 期刊文献
  • 458 篇 会议
  • 36 册 图书

馆藏范围

  • 1,697 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 561 篇 工学
    • 191 篇 计算机科学与技术...
    • 139 篇 软件工程
    • 94 篇 电气工程
    • 67 篇 信息与通信工程
    • 58 篇 材料科学与工程(可...
    • 50 篇 土木工程
    • 47 篇 控制科学与工程
    • 46 篇 电子科学与技术(可...
    • 34 篇 冶金工程
    • 34 篇 动力工程及工程热...
    • 31 篇 水利工程
    • 31 篇 船舶与海洋工程
    • 31 篇 生物工程
    • 29 篇 生物医学工程(可授...
    • 27 篇 化学工程与技术
    • 26 篇 机械工程
    • 23 篇 仪器科学与技术
    • 22 篇 环境科学与工程(可...
  • 456 篇 理学
    • 272 篇 物理学
    • 77 篇 数学
    • 47 篇 生物学
    • 47 篇 统计学(可授理学、...
    • 30 篇 海洋科学
    • 25 篇 化学
  • 122 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 31 篇 工商管理
  • 69 篇 医学
    • 45 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
  • 50 篇 经济学
    • 48 篇 应用经济学
  • 23 篇 农学
  • 20 篇 教育学
  • 16 篇 法学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 37 篇 machine learning
  • 29 篇 deep learning
  • 23 篇 artificial intel...
  • 22 篇 accuracy
  • 21 篇 feature extracti...
  • 20 篇 cloud computing
  • 18 篇 computer science
  • 18 篇 computational mo...
  • 17 篇 wireless sensor ...
  • 17 篇 training
  • 16 篇 real-time system...
  • 15 篇 security
  • 14 篇 routing
  • 14 篇 theory of comput...
  • 14 篇 data models
  • 13 篇 information syst...
  • 12 篇 scalability
  • 12 篇 computer archite...
  • 12 篇 data mining
  • 12 篇 testing

机构

  • 16 篇 associate profes...
  • 13 篇 school of comput...
  • 13 篇 department of ma...
  • 13 篇 department of ch...
  • 13 篇 william norris p...
  • 11 篇 department of co...
  • 11 篇 adjunct professo...
  • 9 篇 clayton school o...
  • 7 篇 department of co...
  • 6 篇 assistant profes...
  • 6 篇 assistant profes...
  • 6 篇 department of co...
  • 6 篇 member
  • 6 篇 optimanumerics l...
  • 6 篇 professor
  • 5 篇 centre of resear...
  • 5 篇 department of co...
  • 5 篇 warsaw universit...
  • 5 篇 department of co...
  • 5 篇 department of ph...

作者

  • 13 篇 youngsong mun
  • 13 篇 osvaldo gervasi
  • 13 篇 vipin kumar
  • 11 篇 marina l. gavril...
  • 10 篇 antonio laganá
  • 9 篇 c. j. kenneth ta...
  • 9 篇 david taniar
  • 7 篇 andreas pitsilli...
  • 6 篇 vikrant sharma
  • 6 篇 l m patnaik
  • 5 篇 grace khayat
  • 5 篇 vangipuram radha...
  • 5 篇 ankit kumar
  • 5 篇 c.v. guru rao
  • 5 篇 sharma s.c.
  • 5 篇 hyunseung choo
  • 5 篇 manjunatha k.
  • 5 篇 constandinos x m...
  • 5 篇 nagabhushana h.
  • 5 篇 ashish verma

语言

  • 1,578 篇 英文
  • 104 篇 其他
  • 15 篇 中文
  • 1 篇 德文
检索条件"机构=Associate Professor in Department of Computer Science Engineering"
1698 条 记 录,以下是71-80 订阅
排序:
Enhancing Educational Video Discovery Using Advanced Latent Semantic Analysis
收藏 引用
Procedia computer science 2025年 252卷 784-795页
作者: B. Sindhu A. Bhaskar G. Yugesh S. Reshma B. Rohit Assistant Professor Department of Computer Science and Engineering Godavari Global University Rajamahendravaram -533296 Andhra Pradesh India
The rapid growth of online educational videos has created abundant learning resources, but also has challenges in discovering high-quality, relevant content. This project mainly focuses on video-based content analysis... 详细信息
来源: 评论
Framework for 2D MRI Brain Tumour Segmentation Employing Znet-Based Deep Learning  4th
Framework for 2D MRI Brain Tumour Segmentation Employing Zne...
收藏 引用
4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, ICMISC 2023
作者: Tejashwini, P.S. Thriveni, J. Venugopal, K.R. Bangalore Institute of Technology Bengaluru560004 India Professor Department of Computer Science and Engineering University of Visveshwaraya College of Engineering Bengaluru560001 India Former Vice Chancellor Bangalore University Karnataka Bengaluru India
The spotting and segmentation of brain tumours using MR images presents substantial problems to the medical community. For potentially life-saving actions and the ability for doctors to select efficient treatment moda... 详细信息
来源: 评论
A Novel Approach to Prevent Hijacking of Accounts in the Cloud
A Novel Approach to Prevent Hijacking of Accounts in the Clo...
收藏 引用
computer science and Emerging Technologies (CSET), International Conference on
作者: Ananthoju Vijay Kumar Yeshitla Woinshet Mihret Nesru Kemal Nephtalem Woldeyohanes Ahmad Shah Dagemawi Ameha Computer Science and Engineering Associate Professor Jain University Bangalore India Computer science and engineering student Jain University Bangalore India
According to studies, majority of enterprises globally are now adopting cloud services, and the number of migrants to cloud environments in the industrialized nations is expanding ever since. Moving business data from...
来源: 评论
Blockchain-based Secure UAV-assisted Battlefield Operation underlying 5G  14
Blockchain-based Secure UAV-assisted Battlefield Operation u...
收藏 引用
14th International Conference on Information and Knowledge Technology, IKT 2023
作者: Pancholi, Dhruvi Jadav, Nilesh Kumar Tanwar, Sudeep Garg, Deepak Zanjani, S. Mohammadali Institute of Technology Nirma University Department of Computer Science and Engineering Ahmedabad 382481 India SR University Distinguished Professor School of Computer Science and Artificial Intelligence Warangal 506371 India Islamic Azad University Najafabad Branch Department of Electrical Engineering Najafabad Iran
The use of unmanned aerial vehicles (UAVs) has significantly increased during the past few years. UAVs have a wide range of applications, but their employment in the defense sector has grown significantly in recent ye... 详细信息
来源: 评论
Review of Segmentation Techniques for Weed Detection in Agricultural Crops
收藏 引用
Procedia computer science 2025年 259卷 1793-1802页
作者: Akanksha Bodhale Seema Verma Research Scholar Department of Computer Science & Engineering Banasthali Vidyapith Professor Department of Electronics School of Physical Sciences Banasthali Vidyapith
This study explores the role of deep learning in identifying and managing weeds in agriculture, a critical challenge for enhancing crop productivity. As the global population grows, increasing food production is essen... 详细信息
来源: 评论
Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case
收藏 引用
SN computer science 2023年 第4期4卷 329页
作者: Bang, Ankur Rao, Udai Pratap Knowledge Associate Centre for Development of Advanced Computing (C-DAC) Maharashtra Mumbai 400049 India Computer Science and Engineering Department National Institute of Technology Bihar Patna 800005 India
The rank value of a node in Routing Protocol for Low Power and Lossy Networks (RPL) plays a significant role in preventing loops and route optimization. Advertising a fake rank value creates a false topology and can d... 详细信息
来源: 评论
Investigation of Security Attacks in IoMT Devices and Federated Learning as a Mitigation Strategy
收藏 引用
Procedia computer science 2025年 258卷 3426-3435页
作者: Kiruthika M T Poongodi Assistant Professor Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Kattankulathur Tamilnadu 603203 India Professor Department of Computer Science and Engineering School of Engineering Dayananda Sagar University Bangalore Karnataka India
Internet of Medical Things (IoMT) is transforming the healthcare business with an increasing number of wearables, gadgets, and sensing devices. As a result, several patients are under daily monitoring for their cardio... 详细信息
来源: 评论
A novel stable feature selection algorithm for machine learning based intrusion detection system
收藏 引用
Procedia computer science 2025年 252卷 738-747页
作者: Sowmya T Mary Anita E A Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal 576104 Karnataka India Research Scholar Department of Computer Science and Engineering School of Engineering and Technology Christ(Deemed to be University) Bangalore Professor Department of Computer Science and Engineering CHRIST (Deemed to be University) Bengaluru Karnataka 560074 India
The advent of new technologies like artificial intelligence, and big data has influenced many cyber attackers to launch their attacks on the network. Hence researchers have already proposed Intrusion Detection Systems... 详细信息
来源: 评论
A Novel Technique for Detecting Various Thyroid Diseases Using Deep Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 199-214页
作者: Soma Prathibha Deepak Dahiya C.R.Rene Robin Cherukuru Venkata Nishkala S.Swedha Department of Information Technology Sri Sai Ram Engineering CollegeChennai600044India College of Computer and Information Sciences(CCIS) Majmaah UniversityMajmaah11952Kingdom of Saudi Arabia Department of Computer Science and Engineering Sri Sai Ram Engineering CollegeChennai602109India Associate Solutions Engineer PegasystemsChennai600044India Systems Engineer Infosys Ltd.Chennai600119India
Thyroid disease is a medical condition caused due to the excess release of thyroid *** is released by the thyroid gland which is in front of the neck just below the *** pictures such as X-rays and CT scans can,however... 详细信息
来源: 评论
Convolutional Neural Networks for MRI-Based Brain Tumor Classification  3
Convolutional Neural Networks for MRI-Based Brain Tumor Clas...
收藏 引用
3rd International Conference on Computation, Automation and Knowledge Management, ICCAKM 2022
作者: Soewu, Taiwo Singh, Dalwinder Rakhra, Manik Chakraborty, Gouri Shankar Singh, Arun Lovely Professional University Department of Computer Science and Engineering Phagwara India Lovely Professional University Department Computer Science and Engineering Phagwara India Lovely Professional University Assistant Professor Department of Computer Science and Engineering Phagwara India Lovely Professional University Phagwara Student IEEE Member Department of Computer Science and Engineering Punjab India
Recently, the rate at which people die from cancer disease is very alarming. The major reason is because the cancer cells were not detected at the early stages. It may be difficult for medical professionals to evaluat... 详细信息
来源: 评论