咨询与建议

限定检索结果

文献类型

  • 30,125 篇 会议
  • 4,639 篇 期刊文献
  • 236 册 图书

馆藏范围

  • 35,000 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,708 篇 工学
    • 15,708 篇 计算机科学与技术...
    • 13,221 篇 软件工程
    • 5,803 篇 信息与通信工程
    • 3,413 篇 控制科学与工程
    • 2,672 篇 电子科学与技术(可...
    • 2,616 篇 电气工程
    • 2,351 篇 生物工程
    • 1,887 篇 生物医学工程(可授...
    • 1,528 篇 光学工程
    • 1,339 篇 机械工程
    • 1,214 篇 动力工程及工程热...
    • 1,200 篇 仪器科学与技术
    • 1,017 篇 化学工程与技术
    • 850 篇 安全科学与工程
    • 718 篇 交通运输工程
  • 11,131 篇 理学
    • 6,029 篇 数学
    • 3,039 篇 物理学
    • 2,567 篇 生物学
    • 1,987 篇 统计学(可授理学、...
    • 1,337 篇 系统科学
    • 1,088 篇 化学
  • 5,602 篇 管理学
    • 3,272 篇 管理科学与工程(可...
    • 2,608 篇 图书情报与档案管...
    • 1,819 篇 工商管理
  • 1,590 篇 医学
    • 1,379 篇 临床医学
    • 1,292 篇 基础医学(可授医学...
    • 852 篇 药学(可授医学、理...
    • 671 篇 公共卫生与预防医...
  • 1,024 篇 法学
    • 820 篇 社会学
  • 643 篇 经济学
    • 643 篇 应用经济学
  • 487 篇 农学
  • 430 篇 教育学
  • 157 篇 文学
  • 77 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,046 篇 accuracy
  • 852 篇 feature extracti...
  • 815 篇 computational mo...
  • 699 篇 deep learning
  • 678 篇 computer science
  • 668 篇 training
  • 509 篇 support vector m...
  • 501 篇 real-time system...
  • 494 篇 machine learning
  • 433 篇 predictive model...
  • 419 篇 internet of thin...
  • 350 篇 computer archite...
  • 347 篇 convolutional ne...
  • 342 篇 data models
  • 320 篇 reliability
  • 303 篇 optimization
  • 287 篇 data mining
  • 281 篇 routing
  • 263 篇 wireless sensor ...
  • 253 篇 conferences

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 76 篇 tno technical sc...
  • 67 篇 université de st...
  • 66 篇 università di ca...
  • 66 篇 dept. of informa...
  • 64 篇 nikhef national ...
  • 59 篇 dept. of compute...
  • 58 篇 dept. of informa...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 51 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 45 篇 dept. of electri...
  • 45 篇 university würzb...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 70 篇 huang f.
  • 70 篇 dallier r.
  • 61 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 33,762 篇 英文
  • 827 篇 其他
  • 310 篇 中文
  • 54 篇 日文
  • 45 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Applications in Science and Engineering dept."
35000 条 记 录,以下是211-220 订阅
排序:
Harnessing Transformative Potential of UAV-Based AI-Powered Data Analysis for Emission Monitoring  6
Harnessing Transformative Potential of UAV-Based AI-Powered ...
收藏 引用
6th International Conference on Computational Intelligence and Networks, CINE 2024
作者: Namdev, Mayank Dholaria, Jay Rathi, Meet Manipal University Dept. of Computer Science Engineering Jaipur India
With the growing pressure to reduce environmental pollution, the combination of Unmanned Aerial Vehicles (UAVs) and Artificial Intelligence (AI) offers a viable path forward for modernizing emission monitoring. This r... 详细信息
来源: 评论
Machine Learning - Driven Approaches for Detection and Analysis of Phishing attacks: A Robust Framework for Cybersecurity  7
Machine Learning - Driven Approaches for Detection and Analy...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Sarvan, N.D.S.S. Sai Ram Reddy, Venkata Jain, Darshan Rakesh, Guntupalli Anguraj, Dinesh Kumar Kl University Dept. of Computer Science Engineering Guntur India
Phishing is the attempt to trick someone into disclosing confidential and private information by using internet communication, such as bank account details, passwords, credit/debit card details, and usernames. The acc... 详细信息
来源: 评论
A Review on Cosmetic Product Recommendation Using Deep Learning  4
A Review on Cosmetic Product Recommendation Using Deep Learn...
收藏 引用
4th International Conference on Soft Computing for Security applications, ICSCSA 2024
作者: Chouhan, Ruchika Barde, Snehlata Sage University Dept. of Computer Science Engineering Indore India
Cosmetic products play an important role in every one's life. Cosmetic products also called as makeup are substance that is applied on the body especially on face. The modern lifestyle can be demanding, leaving li... 详细信息
来源: 评论
A Rubric-Centric Approach for Automated Test Correction Utilizing RAG and Fine Tuning  4
A Rubric-Centric Approach for Automated Test Correction Util...
收藏 引用
4th International Conference on Technological Advancements in Computational sciences, ICTACS 2024
作者: Harshavardhan, G. Singh, Kulvinder Chandigarh University Dept. of Computer Science & Engineering Punjab India
Assessments are a popular method to quantify a person's knowledge, skill, or cognitive ability. However, to grade such assessments, particularly subjective questions requires a significant amount of time and effor... 详细信息
来源: 评论
Integrating Deep Learning Techniques for Enhanced Cyclone Prediction and its Impact on Air Quality Index Utilizing Satellite Imagery
Integrating Deep Learning Techniques for Enhanced Cyclone Pr...
收藏 引用
2024 IEEE Students Conference on engineering and Systems, SCES 2024
作者: Vijayakumar, Sushruth Jamadhiar, Sonakshi Raj, Srujan M Mr, Vishnudeep Saritha, K. PES University Dept. of Computer Science Engineering Bengaluru India
Tropical cyclones (TCs greatly impact ecosystems and weather patterns, often leading to catastrophic outcomes this research explores dynamic relationship between the Air Quality Index (AQI) and Tropical Cyclones (TCs)... 详细信息
来源: 评论
Enhancing Movie Recommendation Efficiency Using Ensemble Learning Techniques
Enhancing Movie Recommendation Efficiency Using Ensemble Lea...
收藏 引用
2024 International Conference on Emerging Innovations and Advanced Computing, INNOCOMP 2024
作者: Nitasha Pandey, Aniket Kumar Yadav, Ankit Mishra, Subrat Medhanshi Chandigarh University Dept. of Computer Science and Engineering Mohali India
This research paper explores the 'Movie Dataset' to create a better movie recommendation. The data includes many features such as genre, ratings, players, and user preferences. Our main goal is to find the bes... 详细信息
来源: 评论
Leveraging Name Entity Recognition and Text Classification for Talent Mapping  2
Leveraging Name Entity Recognition and Text Classification f...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Charan, Annepu Sai Moirangthem, Dennis Singh Iiit Manipur Dept. of Computer Science and Engineering Imphal India
The paper presents a dual-model approach that can be used for categorizing the work experience data from resumes or other textual copra. The application tracking system (ATS), which is the main tool used to screen res... 详细信息
来源: 评论
Performance Comparison of Machine Learning Algorithms for Parkinson's Disease Detection  14
Performance Comparison of Machine Learning Algorithms for Pa...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Gupta, Ipsha Vashisth, Dhwani Garg, Rakesh Amity University Dept. of Computer Science and Engineering UP India
Parkinson's Disease affects the neural system and can be detected using biomarkers, physiological and motor disruptions exhibited by patients. Several advancements and research on Machine Learning approaches have ... 详细信息
来源: 评论
Hybrid Image Encryption for IoT applications: Integrating Cellular Automata and Henon Map to Improve Security and Performance  4
Hybrid Image Encryption for IoT Applications: Integrating Ce...
收藏 引用
4th International Conference on Technological Advancements in Computational sciences, ICTACS 2024
作者: Yogi, Biswarup Khan, Ajoy Kumar Roy, Satyabrata Mizoram University Dept. of Computer Engineering Mizoram Aizawl India Manipal University Dept. of Computer Science and Engineering Rajasthan Jaipur India
Securing the vast volumes of data exchanged over networks is crucial in IoT (Internet of Things) applications. This study introduces an innovative image encryption algorithm that combines the interactive properties of... 详细信息
来源: 评论
Cyberbullying Detection and Severity Classification Using Bi-LSTM  9
Cyberbullying Detection and Severity Classification Using Bi...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Devi, K. Nirmala Rajasekar, Vani Jayanthi, P. Balasubramani, Kavin Kandasamy, Kaviya Gowrisankar, Keerthana Kongu Engineering College Dept. of Computer Science Erode India
Cyberbullying has grown to be a significant issue in the internet age, affecting individuals of all ages, particularly teens. It involves using internet channels to harass, threaten, or disparage people, often with li... 详细信息
来源: 评论