咨询与建议

限定检索结果

文献类型

  • 2,402 篇 会议
  • 1,336 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,775 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,311 篇 工学
    • 1,658 篇 计算机科学与技术...
    • 1,351 篇 软件工程
    • 626 篇 信息与通信工程
    • 379 篇 控制科学与工程
    • 302 篇 生物工程
    • 291 篇 电气工程
    • 230 篇 生物医学工程(可授...
    • 217 篇 电子科学与技术(可...
    • 182 篇 光学工程
    • 160 篇 网络空间安全
    • 158 篇 机械工程
    • 139 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 113 篇 动力工程及工程热...
    • 107 篇 交通运输工程
    • 104 篇 仪器科学与技术
    • 94 篇 核科学与技术
  • 1,360 篇 理学
    • 609 篇 数学
    • 479 篇 物理学
    • 329 篇 生物学
    • 217 篇 统计学(可授理学、...
    • 158 篇 化学
    • 113 篇 系统科学
  • 696 篇 管理学
    • 436 篇 管理科学与工程(可...
    • 293 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 220 篇 医学
    • 162 篇 基础医学(可授医学...
    • 160 篇 临床医学
    • 111 篇 公共卫生与预防医...
  • 127 篇 法学
    • 106 篇 社会学
  • 66 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 171 篇 accuracy
  • 140 篇 deep learning
  • 102 篇 feature extracti...
  • 100 篇 hadron colliders
  • 99 篇 machine learning
  • 89 篇 computational mo...
  • 89 篇 training
  • 85 篇 convolutional ne...
  • 70 篇 real-time system...
  • 66 篇 support vector m...
  • 64 篇 predictive model...
  • 62 篇 artificial intel...
  • 54 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 45 篇 security
  • 45 篇 cloud computing
  • 45 篇 data models
  • 44 篇 semantics

机构

  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 charles universi...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 123 篇 irfu cea univers...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 121 篇 department of ph...
  • 119 篇 imperial college...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,438 篇 英文
  • 291 篇 其他
  • 47 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3775 条 记 录,以下是501-510 订阅
排序:
Lightweight object detection algorithm for road scenes based on YOLOV8  4
Lightweight object detection algorithm for road scenes based...
收藏 引用
4th International Conference on Machine Learning and computer application, ICMLCA 2023
作者: Huang, Chengqin Yang, Degang Zhang, Xin College of Computer and Information Science Chongqing Normal University Chongqing401331 China Chongqing Engineering Research Center of Educational Big Data Intelligent Perception and Application Chongqing Normal University Chongqing401331 China
Object detection in road scenes is a crucial component of autonomous driving. Due to the significant variations in target scales, it is prone to false positives, false negatives, and some underperforming devices canno... 详细信息
来源: 评论
Analyzing the Efficiency of Key Management Techniques Used in Information Security Models for Networked applications  5th
Analyzing the Efficiency of Key Management Techniques Used i...
收藏 引用
5th International Conference on Data science, Machine Learning and applications, ICDSMLA 2023
作者: Beemkumar, N. Singh, Vaishali Shree, Ritu Batra, Raman Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Mechanical Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India
This study aims to investigate the performance of numerous key manipulation strategies utilized in modern statistics protection models. Especially, this painting examines the use of public key infrastructures (PKI), s... 详细信息
来源: 评论
Fall Detection and Alerts in Hearing Aids for Deaf using Generative AI
Fall Detection and Alerts in Hearing Aids for Deaf using Gen...
收藏 引用
Computational Intelligence, Communication Technology and Networking (CICTN), International Conference on
作者: Bharat Tripathi Madan Lal Saini Manish Jain Apoorva Saxena Narendra Pal Department of Computer Application Allenhouse Institute of Technology Kanpur India Department of Computer Science and Engineering Apex Institute of Technology Chandigarh University Punjab India Department of Computer Application Allenhouse Business School Kanpur India Department of Computer Science & Engineering Axis Institute of Technology & Management Kanpur India Department of Computer Science & Engineering Invertis University Bareilly India
Individuals with sensorineural hearing loss often experience difficulty comprehending speech when background noise is present. This paper investigates the extent of this problem in various listening scenarios and with... 详细信息
来源: 评论
Network Security and Protection Strategies for Big Data: Challenges and Innovations  6
Network Security and Protection Strategies for Big Data: Cha...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Gupta, Manish Kumar Rai, Ashok Kumar Farooq, Mansoor Santhiya, P. Madan Mohan Malaviya University of Technology Department of Information Technology & Computer Application UP Gorakhpur India Madan Mohan Malaviya University of Technology Department of Computer Science & Engineering UP Gorakhpur India University of Kashmir Department of Management Studies Jammu & Kashmir India Sathyabama Institute of Science and Technology Department of Computer Science & Engineering Tamilnadu Chennai India
The emergence of Big Data (BD) has enabled organizations to process large and intricate datasets, uncover hidden patterns, gain valuable insights, and facilitate data sharing across networks. However, the transmission... 详细信息
来源: 评论
Domain Transfer Learning for Medical Image Segmentation Tasks  5th
Domain Transfer Learning for Medical Image Segmentation Task...
收藏 引用
5th International Conference on Data science, Machine Learning and applications, ICDSMLA 2023
作者: Kharbas, Vikas Kumar Srivastava, Pulkit Bargavi, Manju Pandeya, Megha Department of Computer Science and Application Vivekananda Global University Jaipur India Department of Mechanical Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Domain transfer learning is a powerful device for clinical image Segmentation duties. It involves transferring information from a source domain to a goal area so that related tasks on those domains can be advantageous... 详细信息
来源: 评论
Rice quality Prediction using Convolution Neural Network  2
Rice quality Prediction using Convolution Neural Network
收藏 引用
2nd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Rekha, V. Shiny, R.M. Ramya, J. Sakthivel, B. Pratheep, V.G. Kumar, Ashok AgurchandManmull Jain College Department of Bachelors's in Computer Application Chennai India Velammal Institute of Technology Department of Artificial Intelligence and Data Science Thiruvallur India St. Joseph's College of Engineering Department of Computer Science Engineering Chennai India Vivekanandha College of Engineering for Women Department of Electronics and Communication Engineering Namakkal India Kongu Engineering College Department of Mechatronics Engineering Perundurai India Banasthali Vidyapith Department of Computer Science Banasthali India
Rice is the most widely grown crop in Asia. In Asia, 60% of the population relies on rice, China, Indonesia especially India consumes the majority of it. Food is the single most direct way for an individual to become ... 详细信息
来源: 评论
GPS Based Automated Attendance System  5
GPS Based Automated Attendance System
收藏 引用
5th IEEE International Conference on Advances in Electronics, computers and Communications, ICAECC 2023
作者: Bhatt, Chandradeep Rawat, Adarsh Chauhan, Rahul Bhatt, Pashupati Singh, Teekam Sharma, Sanjay Graphic Era Hill University CSE Department Dehradun India Computer Science and Engineering Graphic Era Hill University Dehradun India Institute of Technology & Management Department of Information Technology Uttarakhand India Computer Science and Engineering Graphic Era Deemed to Be University Dehradun India SGRRITS Computer Application Department Dehradun India
Attendance management systems are important part of an organization, helps them to track real time employee data. From the past few decades, we have plenty of methods or models for the system, but they come with their... 详细信息
来源: 评论
ZKCross: An Efficient and Reliable Cross-Chain Authentication Scheme Based on Lightweight Attribute-Based Zero-Knowledge Proof  24th
ZKCross: An Efficient and Reliable Cross-Chain Authenticati...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Cai, Hailang Chen, Jialuo Xiang, Qiao Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China School of Informatics Xiamen University Xiamen China College of Computer Science Nankai University Tianjin China
The consortium blockchain finds wide application in finance and logistics. However, these independent networks create information silos. Cross-chain authentication aims to bridge these gaps. It verifies qualifications... 详细信息
来源: 评论
Health Fit system in Current Era using React JS  5
Health Fit system in Current Era using React JS
收藏 引用
5th IEEE International Conference on Advances in Electronics, computers and Communications, ICAECC 2023
作者: Bhatt, Chandradeep Negi, Ayush Singh Chauhan, Rahul Bhatt, Pashupati Singh, Teekam Sharma, Sanjay Graphic Era Hill University CSE Department Dehradun India Computer Science and Engineering Graphic Era Hill University Dehradun India Institute of Technology & Management Department of Information Technology Uttarakhand India Computer Science and Engineering Graphic Era Deemed to Be University Dehradun India SGRRITS Computer Application Department Dehradun India
The purpose of this system is to update the existing systems with the help of computer technology (i.e. to improve the API's which current systems lacked a lot) and the best computers to meet their needs, so that ... 详细信息
来源: 评论
Automated Anomaly Detection in Medical Imaging Using Support Vector Machines  5th
Automated Anomaly Detection in Medical Imaging Using Support...
收藏 引用
5th International Conference on Data science, Machine Learning and applications, ICDSMLA 2023
作者: Goyal, Manish Kumar Shahid, Mohammad Karthikeyan, M.P. Kumar, Ritesh Department of Computer Science & Application Vivekananda Global University Jaipur India Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Clinical imaging techniques such as X-ray, Magnetic Resonance Imaging (MRI), and laptop Tomography (CT) scanners are used to diagnose, compare, and deal with sufferers. Automatic Anomaly Detection is an automatic tech... 详细信息
来源: 评论