咨询与建议

限定检索结果

文献类型

  • 1,460 篇 会议
  • 740 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,474 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 873 篇 软件工程
    • 434 篇 信息与通信工程
    • 252 篇 控制科学与工程
    • 166 篇 生物工程
    • 162 篇 电气工程
    • 144 篇 电子科学与技术(可...
    • 126 篇 光学工程
    • 113 篇 机械工程
    • 113 篇 生物医学工程(可授...
    • 104 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 76 篇 仪器科学与技术
    • 76 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 60 篇 化学工程与技术
  • 752 篇 理学
    • 422 篇 数学
    • 192 篇 物理学
    • 184 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 85 篇 系统科学
    • 66 篇 化学
  • 466 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 77 篇 工商管理
  • 114 篇 医学
    • 92 篇 临床医学
    • 91 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 49 篇 公共卫生与预防医...
  • 81 篇 法学
    • 56 篇 社会学
  • 46 篇 农学
  • 30 篇 经济学
  • 18 篇 教育学
  • 16 篇 军事学
  • 11 篇 文学
  • 8 篇 艺术学

主题

  • 61 篇 deep learning
  • 51 篇 accuracy
  • 47 篇 machine learning
  • 44 篇 feature extracti...
  • 43 篇 computational mo...
  • 39 篇 training
  • 38 篇 internet of thin...
  • 37 篇 convolutional ne...
  • 31 篇 data mining
  • 29 篇 real-time system...
  • 27 篇 optimization
  • 27 篇 semantics
  • 27 篇 data models
  • 25 篇 predictive model...
  • 24 篇 cloud computing
  • 22 篇 support vector m...
  • 22 篇 authentication
  • 21 篇 object detection
  • 21 篇 convolution
  • 21 篇 artificial intel...

机构

  • 66 篇 department of co...
  • 59 篇 vivekananda glob...
  • 57 篇 faculty of infor...
  • 50 篇 college of compu...
  • 45 篇 maharishi school...
  • 41 篇 hunan provincial...
  • 39 篇 department of co...
  • 36 篇 department of co...
  • 27 篇 infn e laborator...
  • 27 篇 faculty of scien...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 west university ...
  • 27 篇 research center ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 graduate school ...
  • 27 篇 department physi...
  • 27 篇 institute of phy...
  • 27 篇 deutsches elektr...
  • 27 篇 institute of phy...

作者

  • 23 篇 c. alexa
  • 23 篇 j. m. izen
  • 23 篇 j. gao
  • 23 篇 g. bella
  • 23 篇 j. strandberg
  • 23 篇 d. calvet
  • 23 篇 c. amelung
  • 23 篇 b. konya
  • 23 篇 f. pastore
  • 23 篇 a. grummer
  • 23 篇 k. j. r. cormier
  • 23 篇 n. orlando
  • 23 篇 f. a. förster
  • 23 篇 y. tayalati
  • 23 篇 t. pham
  • 23 篇 g. spigo
  • 23 篇 v. chiarella
  • 23 篇 m. lu
  • 23 篇 f. siegert
  • 23 篇 a. e. c. coimbra

语言

  • 2,096 篇 英文
  • 84 篇 其他
  • 41 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Application and Information Technology"
2219 条 记 录,以下是61-70 订阅
排序:
Research on the Network Transmission technology of Integrating the Resource Demand of computer Cloud Computing  2
Research on the Network Transmission Technology of Integrati...
收藏 引用
2nd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Ou, Wenjisi Zheng, Wei Zhou, Qiang Jiangxi Vocational and Technical College of Information Application Department of Computer Technology Nanchang330043 China
The establishment of a network environment under the network environment under the network environment of the network environment. First of all, in view of the periodic characteristics of business requirements in the ... 详细信息
来源: 评论
Selection of Digital Watermarking Techniques for Medical Image Security by Using the Fuzzy Analytical Hierarchy Process
收藏 引用
Recent Advances in computer Science and Communications 2023年 第7期16卷 74-80页
作者: Ahmad, Masood Nadeem, Mohd Islam, Mohd Ali, Saquib Agrawal, Alka Khan, Raees Ahmad Department of Information Technology Babasaheb Bhimrao Ambedkar University Uttar Pradesh Lucknow226025 India Department of Computer Science & Application Era University Lucknow India
Background: The watermarking technique is a security algorithm for medical images and the patient's information. Watermarking is used for maintaining the robustness, integrity, confidentiality, authentication, and... 详细信息
来源: 评论
An Overview of Clustering Algorithms for Credit Card Fraud Detection
An Overview of Clustering Algorithms for Credit Card Fraud D...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Jebaraj, N.R. Solomon Shekhawat, Jyoti Gupta, Rupal Department of Computer Science and Information Technology Bangalore India Computer Science & Application Vivekananda Global University Jaipur India Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India
This paper offers a top-stage view of clustering algorithms that can be used for Clustering algorithms, which are robust and bendy techniques for uncovering patterns and anomalies in large datasets. Those algorithms c... 详细信息
来源: 评论
Internet of Everything: A Review on Smart Healthcare Taxonomy, Research Challenges and Methodologies  14
Internet of Everything: A Review on Smart Healthcare Taxonom...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Raj, Anu Prakash, Shiva Srivastava, Jyoti Madan Mohan Malaviya University of Technolgy Information Technology & Computer Application Department Gorakhpur India
The Internet of Everything (IoE) has the potential to revolutionize many aspects of our daily lives, including healthcare, business and industrial world etc. Smart healthcare systems that utilize IoE technologies coul... 详细信息
来源: 评论
Research on Cloud Computing Security technology under computer Big Data Network  3
Research on Cloud Computing Security Technology under Comput...
收藏 引用
3rd IEEE International Conference on Electronic technology, Communication and information, ICETCI 2023
作者: Zhou, Qiang Ou, Wenjisi Zheng, Wei Jiangxi Vocational and Technical College of Information Application Department of Computer Technology Nanchang330043 China
In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution charac... 详细信息
来源: 评论
Investigating the Use of Spatial Transformer Networks and Recurrent Neural Networks for Medical Image Segmentation
Investigating the Use of Spatial Transformer Networks and Re...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Saxena, Vineet Nachappa, M.N. Shree, Ritu Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India Computer Science & Application Vivekananda Global University Jaipur India
This paper investigates using popular deep learning models, Spatial Transformer Networks (STNs), and Recurrent Neural Networks (RNNs) for clinical picture segmentation. STNs are used to study a learnable pose-invarian... 详细信息
来源: 评论
Enhancing Network Security with Blockchain technology
Enhancing Network Security with Blockchain Technology
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Inzimam Bishnoi, Amit Kumar Menaka, C. Vivekananda Global University Department of Computer Science & Application Jaipur India Teerthanker Mahaveer University Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
The block chain era is hastily traction as a sturdy approach to community security. In its conventional shape, block chain integrated is a distributed, immutable, and cryptographically-secured ledger, composed of virt... 详细信息
来源: 评论
Bit level image encryption algorithm based on hyperchaotic system
收藏 引用
Optoelectronics Letters 2023年 第3期19卷 186-192页
作者: MAN Zhenlong ZHANG Yue ZHOU Ying LU Xiaoli WANG Zhaoquan School of Electronic and Information Engineering Liaoning Technical UniversityHuludao 125100China Advanced Interactive Technology and Application Laboratory Computer Network Information CenterChinese Academy of SciencesBeijing 100190China
Because chaotic systems are unpredictable,ergodic and sensitive to initial values and parameters,they are often used in the field of *** avoid the bad randomness of the random key generated by the low dimensional chao... 详细信息
来源: 评论
Exploring the Impact of LSTM Parameters on Network Performance for Automatic Text Summarization
Exploring the Impact of LSTM Parameters on Network Performan...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Naaz, Rohaila Kavitha, R. Yadav, Surendra Teerthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India Vivekananda Global University Department of Computer Science & Application Jaipur India
This technical abstract explores the impact of extended quick-term reminiscence (LSTM) parameters on net overall performance for automated textual content summarization within the Korean language. It observes and cons... 详细信息
来源: 评论
Combined CNN LSTM with attention for speech emotion recognition based on feature-level fusion
收藏 引用
Multimedia Tools and applications 2024年 第21期83卷 59839-59859页
作者: Liu, Yanlin Chen, Aibin Zhou, Guoxiong Yi, Jizheng Xiang, Jin Wang, Yaru Institute of Artificial Intelligence Application College of Computer and Information Engineering Central South University of Forestry and Technology Hunan Changsha410004 China Hunan Key Laboratory of Intelligent Logistics Technology Central South University of Forestry and Technology Hunan Changsha410004 China
According to the problem that emotional features cannot be well represented by a single feature and it is difficult to extract in the task of Speech Emotion Recognition (SER), we propose a Feature-Level (FL) fusion me... 详细信息
来源: 评论