咨询与建议

限定检索结果

文献类型

  • 1,460 篇 会议
  • 740 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,474 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 873 篇 软件工程
    • 434 篇 信息与通信工程
    • 252 篇 控制科学与工程
    • 166 篇 生物工程
    • 162 篇 电气工程
    • 144 篇 电子科学与技术(可...
    • 126 篇 光学工程
    • 113 篇 机械工程
    • 113 篇 生物医学工程(可授...
    • 104 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 76 篇 仪器科学与技术
    • 76 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 60 篇 化学工程与技术
  • 752 篇 理学
    • 422 篇 数学
    • 192 篇 物理学
    • 184 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 85 篇 系统科学
    • 66 篇 化学
  • 466 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 77 篇 工商管理
  • 114 篇 医学
    • 92 篇 临床医学
    • 91 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 49 篇 公共卫生与预防医...
  • 81 篇 法学
    • 56 篇 社会学
  • 46 篇 农学
  • 30 篇 经济学
  • 18 篇 教育学
  • 16 篇 军事学
  • 11 篇 文学
  • 8 篇 艺术学

主题

  • 61 篇 deep learning
  • 51 篇 accuracy
  • 47 篇 machine learning
  • 44 篇 feature extracti...
  • 43 篇 computational mo...
  • 39 篇 training
  • 38 篇 internet of thin...
  • 37 篇 convolutional ne...
  • 31 篇 data mining
  • 29 篇 real-time system...
  • 27 篇 optimization
  • 27 篇 semantics
  • 27 篇 data models
  • 25 篇 predictive model...
  • 24 篇 cloud computing
  • 22 篇 support vector m...
  • 22 篇 authentication
  • 21 篇 object detection
  • 21 篇 convolution
  • 21 篇 artificial intel...

机构

  • 66 篇 department of co...
  • 59 篇 vivekananda glob...
  • 57 篇 faculty of infor...
  • 50 篇 college of compu...
  • 45 篇 maharishi school...
  • 41 篇 hunan provincial...
  • 39 篇 department of co...
  • 36 篇 department of co...
  • 27 篇 infn e laborator...
  • 27 篇 faculty of scien...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 west university ...
  • 27 篇 research center ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 graduate school ...
  • 27 篇 department physi...
  • 27 篇 institute of phy...
  • 27 篇 deutsches elektr...
  • 27 篇 institute of phy...

作者

  • 23 篇 c. alexa
  • 23 篇 j. m. izen
  • 23 篇 j. gao
  • 23 篇 g. bella
  • 23 篇 j. strandberg
  • 23 篇 d. calvet
  • 23 篇 c. amelung
  • 23 篇 b. konya
  • 23 篇 f. pastore
  • 23 篇 a. grummer
  • 23 篇 k. j. r. cormier
  • 23 篇 n. orlando
  • 23 篇 f. a. förster
  • 23 篇 y. tayalati
  • 23 篇 t. pham
  • 23 篇 g. spigo
  • 23 篇 v. chiarella
  • 23 篇 m. lu
  • 23 篇 f. siegert
  • 23 篇 a. e. c. coimbra

语言

  • 2,096 篇 英文
  • 84 篇 其他
  • 41 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Application and Information Technology"
2219 条 记 录,以下是11-20 订阅
排序:
Enhanced Security in e-Tendering System Using Blockchain with Efficient Smart Contracts and Hybrid Cryptography  5th
Enhanced Security in e-Tendering System Using Blockchain wit...
收藏 引用
5th International Conference on Trends in Computational and Cognitive Engineering, TCCE 2023
作者: Gupta, Amritesh Kumar Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology Gorakhpur Gorakhpur India
Many organizations use tendering including government to obtain goods and services from the providers of the service and manufacturing companies. There has been an advanced evolution in the process from traditional ha... 详细信息
来源: 评论
Security Enabled Supply-Chain System Implementation Using Blockchain Integration with Hyperledger and IPFS Techniques  5
Security Enabled Supply-Chain System Implementation Using Bl...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Gupta, Amritesh Kumar Dwivedi, Rajendra Kumar Madan Mohan Malaviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
One of the important areas that needs attention is supply chain in this fast expansion of globalization. There are numerous tiny parts that are summed up to obtain an end and furnished product be it agricultural goods... 详细信息
来源: 评论
Designing A Secure Large Scale E -Voting System Leveraging Sharding Blockchain with Interoperability Protocol and Consensus Mechanism  2
Designing A Secure Large Scale E -Voting System Leveraging S...
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Maurya, Alka Dwivedi, Rajendra Kumar Madan Mohan Malaviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
The advent of electronic voting (e-voting) systems has promised greater accessibility, efficiency, and transparency in the process of electoral. However, by adopting e-voting systems, they bring forth significant chal... 详细信息
来源: 评论
Detecting Deceptive News in Social Media Using Supervised Machine Learning Techniques  6th
Detecting Deceptive News in Social Media Using Supervised Ma...
收藏 引用
6th International Conference on information and Communication technology for Intelligent Systems, ICTIS 2021
作者: Malviya, Anshita Dwivedi, Rajendra Kumar Department of Information Technology & Computer Application MMMUT Gorakhpur India
Our society has witnessed numerous incidents concerning fake *** media has always played a significant role in its *** with notorious mindsets often are the generators and spreaders of such *** mischievous people spre... 详细信息
来源: 评论
Air Quality Prediction Using Supervised Machine Learning Techniques  6th
Air Quality Prediction Using Supervised Machine Learning Tec...
收藏 引用
6th International Conference on information and Communication technology for Intelligent Systems, ICTIS 2021
作者: Shrivastava, Atul Lal Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application MMMUT Gorakhpur India
To maintain good air quality, the observation of pollution levels framework estimates a variety of air contaminants in various locations. In the current circumstances, it is the most desirable concern. The release of ... 详细信息
来源: 评论
A Novel Stacked Network Method for Enhancing the Performance of Side-Channel Attacks
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1001-1022页
作者: Zhicheng Yin Lang Li Yu Ou College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application HengyangNormal UniversityHengyang421002China
The adoption of deep learning-based side-channel analysis(DL-SCA)is crucial for leak detection in secure *** previous studies have applied this method to break targets protected with *** the increasing number of studi... 详细信息
来源: 评论
Using Machine Learning to Identify Autism Spectrum Disorder Across All Ages  2
Using Machine Learning to Identify Autism Spectrum Disorder ...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Kumar, Anil Jaiswal, Umesh Chandra Madan Mohan Malaviya University of Technology Information Technology & Computer Application U.P Gorakhpur India
Autism spectrum disorder (ASD) is a neurodevelopmental condition affecting children's societal and cognitive skills, leading to recurring behaviors, limited interests, communiqué challenges, and difficulties ... 详细信息
来源: 评论
Multi Terminal Adaptive Layout Based on HTML 5 and CSS3  1
收藏 引用
作者: Zheng, Wei Zhou, Qiang Ou, Wenjisi Department of Computer Technology Jiangxi Vocational and Technical College of Information Application Nanchang330043 China
Layout is a key link in web page design. In addition to PC, there are a large number of mobile terminals for accessing web pages. When the fixed layout is migrated to the mobile terminal, the user experience is likely... 详细信息
来源: 评论
Survey on Services and Support in Cloud Computing Environment
Survey on Services and Support in Cloud Computing Environmen...
收藏 引用
International Conference on VLSI and Microwave and Wireless Technologies, ICVMWT 2021
作者: Pandey, Abhishek Kumar Singh, Sarvpal Department of Information Technology and Computer Application MMMUT UP Gorakhpur India
Cloud computing serves a large portion of enterprises and intellectuals with the facility of computation as per their demand and proves to be successful. There are multiple services being provided by numerous cloud se... 详细信息
来源: 评论
Deep semantic network for hyperspectral image classification using enhanced bifurcation and light self-Gaussian attention mechanism
收藏 引用
Journal of Applied Remote Sensing 2025年 第1期19卷
作者: Wan, Xiaoqing Chen, Feng He, Yupeng Hengyang Normal University College of Computer Science and Technology Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang China
Convolutional neural networks (CNNs) are widely used in hyperspectral image (HSI) classification due to their strong feature extraction capabilities. Nevertheless, CNN-based classification methods face challenges in c... 详细信息
来源: 评论