咨询与建议

限定检索结果

文献类型

  • 30,380 篇 会议
  • 4,648 篇 期刊文献
  • 239 册 图书

馆藏范围

  • 35,267 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,799 篇 工学
    • 15,762 篇 计算机科学与技术...
    • 13,251 篇 软件工程
    • 5,816 篇 信息与通信工程
    • 3,436 篇 控制科学与工程
    • 2,683 篇 电子科学与技术(可...
    • 2,620 篇 电气工程
    • 2,351 篇 生物工程
    • 1,891 篇 生物医学工程(可授...
    • 1,538 篇 光学工程
    • 1,346 篇 机械工程
    • 1,217 篇 动力工程及工程热...
    • 1,204 篇 仪器科学与技术
    • 1,016 篇 化学工程与技术
    • 855 篇 安全科学与工程
    • 721 篇 交通运输工程
  • 11,171 篇 理学
    • 6,041 篇 数学
    • 3,059 篇 物理学
    • 2,570 篇 生物学
    • 1,996 篇 统计学(可授理学、...
    • 1,336 篇 系统科学
    • 1,088 篇 化学
  • 5,627 篇 管理学
    • 3,282 篇 管理科学与工程(可...
    • 2,624 篇 图书情报与档案管...
    • 1,825 篇 工商管理
  • 1,600 篇 医学
    • 1,389 篇 临床医学
    • 1,299 篇 基础医学(可授医学...
    • 851 篇 药学(可授医学、理...
    • 677 篇 公共卫生与预防医...
  • 1,028 篇 法学
    • 822 篇 社会学
  • 644 篇 经济学
    • 644 篇 应用经济学
  • 490 篇 农学
  • 430 篇 教育学
  • 156 篇 文学
  • 77 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,120 篇 accuracy
  • 871 篇 feature extracti...
  • 856 篇 computational mo...
  • 741 篇 deep learning
  • 683 篇 training
  • 679 篇 computer science
  • 537 篇 real-time system...
  • 523 篇 support vector m...
  • 499 篇 machine learning
  • 461 篇 predictive model...
  • 426 篇 internet of thin...
  • 373 篇 convolutional ne...
  • 364 篇 data models
  • 354 篇 computer archite...
  • 334 篇 reliability
  • 309 篇 optimization
  • 291 篇 data mining
  • 281 篇 routing
  • 263 篇 wireless sensor ...
  • 255 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 76 篇 tno technical sc...
  • 67 篇 université de st...
  • 67 篇 dept. of informa...
  • 66 篇 università di ca...
  • 64 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 57 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 52 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 47 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 70 篇 huang f.
  • 70 篇 dallier r.
  • 60 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 31,526 篇 英文
  • 3,344 篇 其他
  • 301 篇 中文
  • 54 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Applications in Science and Engineering dept."
35267 条 记 录,以下是1111-1120 订阅
排序:
Comparative Analysis of Decorrelation and Contrast Stretching for Multispectral Color Image Enhancement  10
Comparative Analysis of Decorrelation and Contrast Stretchin...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Ganesan, P. Leo Joseph, L.M.I. Sajiv, G. Chandrasekaran, B. Manigandan, E. Janakiraman, V. Vidya Jyothi Institute of Technology Dept. of Electronics and Communication Engineering Hyderabad India Sr University Dept. of ECE Telangana Warangal India Simats Saveetha School of Engineering Tamilnadu Chennai India Hindustan Institute of Technology and Science Department of Computer Applications Chennai India
The proposed work explains the comparative detailed study of multispectral image enhancement by means of contrast and decorrelation stretching. It is challenging to extract all necessary information from multispectral... 详细信息
来源: 评论
Empowering Android Malware Detection: A Deep Learning Ensemble with Optimal Features  26
Empowering Android Malware Detection: A Deep Learning Ensemb...
收藏 引用
26th International Conference on computer and Information Technology, ICCIT 2023
作者: Shakil, Mehedi Hasan Hasan, Md. Mynul Chittagong University of Engineering & Technology Dept. of Computer Science and Engineering Chattagram Bangladesh
Because of the rapid expansion of mobile devices and the growing reliance on mobile applications, there has been an increase in Android malware threats, necessitating the development of sophisticated detection systems... 详细信息
来源: 评论
Secure Automated Inventory Management system using Abstracted System Design Microservice Architecture  14
Secure Automated Inventory Management system using Abstracte...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Darshan, M. Raswanth, S.R. Chaitanya, V.S.S.K. Kalavalapalli, Venkata Sridhar Sai Kumar, Priyanka Srivastava, Gautam Amrita School of Computing Dept. of Computer Science and Engineering Coimbatore India University of Texas Dept. of Computer Science San Antonio United States Brandon University Dept. of Mathematics and Computer Science Brandon Canada
Managing inventory has forever been a difficult problem for e-commerce sellers. Even today manual labor is used for the major part of the job. Without much automation in this industry growth has been stagnant because ... 详细信息
来源: 评论
Analysis of Time-Lapse Camera Using IoT
Analysis of Time-Lapse Camera Using IoT
收藏 引用
2023 International Conference on Circuit Power and Computing Technologies, ICCPCT 2023
作者: Manjunatha Swamy, C. Sundaram, S. Meenakshi Pranati, N. Karthik, R. Srivatsan, R. New Horizon College of Engineering Dept. of Computer Science and Engineering Bangalore India
Time-lapse photography is a widely used technique in various applications, such as film and video production, construction, and scientific research. However, traditional methods for creating time-lapse photography are... 详细信息
来源: 评论
Recent Advancements and Challenges in Bangla Textual Document Classification: A Review  26
Recent Advancements and Challenges in Bangla Textual Documen...
收藏 引用
26th International Conference on computer and Information Technology, ICCIT 2023
作者: Nahar, Khairun Al Mahfuz, Mohammed Abdullah Haque Sweety, Mahmuda Comilla University Faculty of Engineering Dept. of Computer Science and Engineering Cumilla Bangladesh
Bengali is the world's sixth-most frequently used dialect. Natural language processing (NLP), which enables data scientists to extract useful information from the constantly growing quantity of text data available... 详细信息
来源: 评论
Air Quality Evaluator using Arduino  6
Air Quality Evaluator using Arduino
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Pavan Ganesh Reedy, Y. Kadali Jagadees, H. Pravin, A. Dept. of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Air pollution has a negative impact on our ability to do daily tasks and on our standard of living. Ecosystems and human well-being are under danger. Recent years have seen a notable increase in heavy industry, leavin... 详细信息
来源: 评论
Vulnerability Scanning and Analysis Tool (VSAT)  9
Vulnerability Scanning and Analysis Tool (VSAT)
收藏 引用
9th International Conference on Smart Computing and Communications, ICSCC 2023
作者: Nair, Aarya Anil, Abhinav Pallivathuckal, Anna Rose Daiju, Dijo John, Jomina Rajagiri School of Engineering and Technology Dept. of Computer Science and Engineering Kochi India
Due to exponential technological advancement, the number of cyber attacks has been steadily increasing and leading to substantial loss of profits, productivity losses, reputational damage as well as judicial liability... 详细信息
来源: 评论
An Investigation of Deep Neural Network based Techniques for Object Detection and Recognition Task in computer Vision  2
An Investigation of Deep Neural Network based Techniques for...
收藏 引用
2nd International Conference on Edge Computing and applications, ICECAA 2023
作者: Sunil Kumar, Aithal S Mahesh, Kavitha St Joseph Engineering College Dept. of Computer Science and Engineering Mangalore India Nmam Institute of Technology Nitte Dept. of Computer Science and Engineering India Science and Engineering Nagarjuna College of Engineering & Technology Mudugurki Bengaluru India
Detection of objects and its recognition in visual sequences are the two critical tasks in the computer vision field. Various real-time applications such as autonomous vehicles, face recognition, health-care systems a... 详细信息
来源: 评论
A Technique to Avoid Blockchain Denial of Service (BDoS) and Selfish Mining Attack  5
A Technique to Avoid Blockchain Denial of Service (BDoS) and...
收藏 引用
5th International Conference on Blockchain Computing and applications, BCCA 2023
作者: Habib, Md. Ahsan Hossen Manik, Md. Motaleb Khulna University of Engineering & Technology Dept. of Computer Science and Engineering Khulna Bangladesh
Blockchain denial of service (BDoS) and selfish mining are the two most crucial attacks on blockchain technology. A classical DoS attack targets the computer network to limit, restrict, or stop accessing the system of... 详细信息
来源: 评论
An Improved Leukemia Detection Model using CNN
An Improved Leukemia Detection Model using CNN
收藏 引用
2023 IEEE International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2023
作者: Aditya, Y. Durga, M. Venkata Siva Naga Sai Teja, K. Hari Priya, J. Eswar Datta, K. Sr Gudlavalleru Engineering College Dept. of Computer Science and Engineering Gudlavalleru India
Leukemia is a kind of cancer in which a significant number of immature lymphocyte blood cells form, interfering with the formation of other blood cells. Normally, Leukemia can be identified by using Complete Blood Cou... 详细信息
来源: 评论