咨询与建议

限定检索结果

文献类型

  • 3,790 篇 会议
  • 1,663 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 5,494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,342 篇 工学
    • 2,308 篇 计算机科学与技术...
    • 1,909 篇 软件工程
    • 853 篇 信息与通信工程
    • 532 篇 控制科学与工程
    • 403 篇 电气工程
    • 393 篇 生物工程
    • 344 篇 电子科学与技术(可...
    • 298 篇 生物医学工程(可授...
    • 264 篇 光学工程
    • 256 篇 机械工程
    • 210 篇 化学工程与技术
    • 201 篇 网络空间安全
    • 178 篇 安全科学与工程
    • 169 篇 仪器科学与技术
    • 169 篇 动力工程及工程热...
    • 150 篇 材料科学与工程(可...
    • 148 篇 交通运输工程
  • 1,907 篇 理学
    • 894 篇 数学
    • 667 篇 物理学
    • 429 篇 生物学
    • 311 篇 统计学(可授理学、...
    • 223 篇 化学
    • 177 篇 系统科学
  • 969 篇 管理学
    • 617 篇 管理科学与工程(可...
    • 407 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 271 篇 医学
    • 209 篇 临床医学
    • 205 篇 基础医学(可授医学...
    • 139 篇 公共卫生与预防医...
  • 168 篇 法学
    • 137 篇 社会学
  • 100 篇 农学
  • 85 篇 经济学
  • 46 篇 教育学
  • 37 篇 文学
  • 27 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 205 篇 accuracy
  • 176 篇 deep learning
  • 141 篇 feature extracti...
  • 132 篇 computational mo...
  • 126 篇 machine learning
  • 125 篇 training
  • 102 篇 convolutional ne...
  • 100 篇 predictive model...
  • 100 篇 hadron colliders
  • 91 篇 support vector m...
  • 91 篇 real-time system...
  • 89 篇 data models
  • 78 篇 artificial intel...
  • 77 篇 security
  • 71 篇 optimization
  • 70 篇 internet of thin...
  • 69 篇 cloud computing
  • 68 篇 data mining
  • 63 篇 reliability
  • 61 篇 semantics

机构

  • 185 篇 institute of com...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 charles universi...
  • 124 篇 zhejiang univers...
  • 123 篇 department of ph...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 119 篇 imperial college...
  • 119 篇 rwth aachen univ...
  • 115 篇 department of ph...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,047 篇 英文
  • 360 篇 其他
  • 87 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Application"
5494 条 记 录,以下是661-670 订阅
排序:
Role of Neural Network, Fuzzy, and loT in Integrating Artificial Intelligence as a Cyber Security System  6
Role of Neural Network, Fuzzy, and loT in Integrating Artifi...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Kumar, Rakesh Pokhariya, Hemant Singh Rao, A Kakoli Mayuri, K. Kumar, Amit Kumar, Sajeev Rana, Ajay GLA University Department of Computer Engineering & Application Mathura India Graphic Era Deemed to Be University Department of Computer Science & Engineering Dehradun India Lloyd Institute of Engineering and Technology Greater Noida India Institute of Aeronautical Engineering Department of Computer Science and Engineering Hyderabad India Lloyd Law College Greater Noida India Amity University Uttar Pradesh Greater Noida India
The massive network of electronically connected devices that is referred to as the 'Internet of Things'is the primary component of this system. These interconnected devices collect vital information that might... 详细信息
来源: 评论
An Optimized Grid Computing based Feature Selection approaches from Brain Image dataset using Pretrained models  1
An Optimized Grid Computing based Feature Selection approach...
收藏 引用
1st IEEE International Conference on Advances in Signal Processing, Power, Communication, and Computing, ASPCC 2024
作者: Nayak, Sradhanjali Biswal, Pradyut Kumar Mishra, Pravakar Pradhan, Sateesh Kumar Niis Institute of Business Administration Dept. of Computer Science Bhubaneswar India Iiit Bhubaneswar Dept. of Etc Bhubaneswar India Niis Institute of Business Administration Dept. of Computer Science and Engineering Bhubaneswar India Utkal University Dept. of Computer Science and Application Bhubaneswar India
The outcome of simulated experiments expressed the efficiency of grid-based algorithm in the domain of image processing in the context of Brain MRI Images for Tumor Detection. It provides a faster approach in detectin... 详细信息
来源: 评论
Enhancing Security and Privacy in Health Care Using Cyber-physical Systems Through Machine Learning  8th
Enhancing Security and Privacy in Health Care Using Cyber-ph...
收藏 引用
8th International Conference on Information and Communication Technology for Intelligent Systems, ICTIS 2024
作者: Takale, Dattatray G. Gawali, Piyush P. Deshmukh, Gopal B. Mahalle, Parikshit N. Mehta, Pradnya S. Kashid, Shraddha S. Sule, Bipin Derle, Deepak R. Department of Computer Engineering Vishwakarma Institute of Information Technology SPPU Pune India Department of Artificial Intelligence and Data Science Vishwakarma Institute of Information Technology SPPU Pune India Department of Computer Engineering MIT ADT University Pune India and Humanities Vishwakarma Institute of Technology Pune India Department of Computer Science and Application KTHM College Nashik India
The importance of securing cyber-physical systems (CPS) is paramount to safeguarding the interconnected networks and devices, especially in sectors such as blockchain, health care, and the "Internet of Things&quo... 详细信息
来源: 评论
Bioinspired Clustering in UWSNs Using Monarch Butterfly Optimization Compared with Ant Colony Optimization Algorithm
Bioinspired Clustering in UWSNs Using Monarch Butterfly Opti...
收藏 引用
2024 IEEE International Conference on Communication, Computing and Signal Processing, IICCCS 2024
作者: Indira, G. Rani, Ruchika Chiranjevi, D. Husain, Saif O. Yogi, Rahul Nandhini, T.J. Prince Shri Venkateshwara Padmavathy Engineering College Chennai India Chandigarh Group of Colleges Department of Computer Application Chandigarh Engineering College Punjab Mohali India Aditya Engineering College Department of Computer Science & Engineering India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq The Islamic University of Al Diwaniyah College of Technical Engineering Department of Computers Techniques Engineering Al Diwaniyah Iraq Ies College of Technology Department of Computer Science & Engineering M.P. Bhopal India Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Science-SIMATS Department of Computer Science and Engineering Chennai India
The Monarch Butterfly Optimization (MBO) algorithm for clustering in Underwater Wireless Sensor Networks (UWSNs) is investigated and compared to the performance of the Ant Colony Optimization (ACO) algorithm in this p... 详细信息
来源: 评论
CryptoRecord: Advancing Electronic Medical Record (EMR) Security with Blockchain Technology
CryptoRecord: Advancing Electronic Medical Record (EMR) Secu...
收藏 引用
Intelligent Cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: Smitha G V Aishwarya Ghorpade K Asthik Nikita Yadav Masters of Computer Application Dayananda Sagar College of Engineering Bengalurru Karnataka India
This Health and medicine are definitely important to human life in modern times. With many hospitals employing different Record Management Software (RMS), healthcare stakeholders have various alternatives when it come... 详细信息
来源: 评论
Investigating the Potential of Applying Permission Blockchain for IoT Networks  15
Investigating the Potential of Applying Permission Blockchai...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Manjunath, H.R. Moharana, Alok Kumar Infimum School of Engineering and Technology Department of Physics Karnataka Bangalore India Arka Jain University Department of Pharmacy Jharkhand Jamshedpur India Vivekananda Global University Department of Computer Science & Application Jaipur India
This paper investigates the capability of applying permission block chain for IoT networks. Permission block chain is a dispensed ledger device that uses a consensus-based totally method to shop and manipulate records... 详细信息
来源: 评论
Geospatial Object Detection in Hyperspectral Imagery Using Spectral-Spatial Networks
Geospatial Object Detection in Hyperspectral Imagery Using S...
收藏 引用
2023 Intelligent Computing and Control for engineering and Business Systems, ICCEBS 2023
作者: Prabakar, D. Pranavan, S. Kumbhkar, Makhan Sah, Swati Patil, Harshal Firos, A. Computer Science and Engineering Karpagam College of Engineering Coimbatore India Dhanalakshmi Srinivasan College of Engineering Department of Civil Engineering Navakkarai Coimbatore India Indian Institute of Soybean Research Department of Computer Application Indore India School of Set Sharda University Greater Noida India Pune India Rono-Hills Department of Computer Science and Engineering Arunachal Pradesh Doimukh India
By recording a wide range of spectral bands across the electromagnetic spectrum, hyperspectral imagery (HSI) delivers extensive information. Due to the complicated interaction between spectral and spatial properties, ... 详细信息
来源: 评论
Traffic Prediction Analysis (TPA) Using Machine Learning Methodologies  6
Traffic Prediction Analysis (TPA) Using Machine Learning Met...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Solanki, Mohit Rawat, Vandana Pandey, Monika Singh, Neelam Aswal, Shobha Graphic Era Deemed to Be University Department of Computer Application Dehradun India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India School of Computing Graphic Era University Dehradun India
A traffic prediction system might help drivers in making better travel choices. Minimizing carbon emissions, reducing traffic congestion, and improving the effectiveness of traffic management to deliver such traffic f... 详细信息
来源: 评论
Activity Recognition System via Unification of CNN and SVM in Complex Domain
Activity Recognition System via Unification of CNN and SVM i...
收藏 引用
International Conference on Information Systems and computer Networks (ISCON)
作者: Parul Choudhary Pooja Pathak Abhishek Chaubey Department of Computer Application and Engineering GLA University Mathura
Human automatic activity recognition is an essential part of a little interactive application which involves human-being. The main disadvantage is the person’s diverse activities. These techniques provide high accura... 详细信息
来源: 评论
Research on Program Change Impact Analysis Methods Based on Software Networks
Research on Program Change Impact Analysis Methods Based on ...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
作者: Shiyong Li Fei Deng Xinglin Guo Zhenxiao Sun Zhuoliang Zou Institute of Computer Application China Academy of Engineering Physics Mianyang Sichuan China
Aiming at the problem that the current program change impact analysis methods have coarse calculation granularity and without considering the actual situation of program change, results in overstating the impact propa... 详细信息
来源: 评论