咨询与建议

限定检索结果

文献类型

  • 6,492 篇 会议
  • 6,034 篇 期刊文献
  • 71 册 图书

馆藏范围

  • 12,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,397 篇 工学
    • 4,517 篇 计算机科学与技术...
    • 3,753 篇 软件工程
    • 1,665 篇 信息与通信工程
    • 1,106 篇 控制科学与工程
    • 956 篇 电子科学与技术(可...
    • 932 篇 电气工程
    • 862 篇 生物工程
    • 791 篇 光学工程
    • 715 篇 生物医学工程(可授...
    • 552 篇 机械工程
    • 545 篇 化学工程与技术
    • 520 篇 仪器科学与技术
    • 395 篇 网络空间安全
    • 354 篇 材料科学与工程(可...
    • 326 篇 动力工程及工程热...
    • 299 篇 核科学与技术
    • 272 篇 安全科学与工程
  • 5,273 篇 理学
    • 2,634 篇 物理学
    • 1,826 篇 数学
    • 993 篇 生物学
    • 663 篇 化学
    • 582 篇 统计学(可授理学、...
    • 333 篇 系统科学
  • 1,818 篇 管理学
    • 1,144 篇 管理科学与工程(可...
    • 768 篇 图书情报与档案管...
    • 392 篇 工商管理
  • 772 篇 医学
    • 598 篇 临床医学
    • 534 篇 基础医学(可授医学...
    • 353 篇 药学(可授医学、理...
    • 300 篇 公共卫生与预防医...
  • 294 篇 法学
  • 204 篇 农学
  • 145 篇 经济学
  • 77 篇 教育学
  • 72 篇 文学
  • 50 篇 军事学
  • 20 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 351 篇 deep learning
  • 338 篇 accuracy
  • 287 篇 feature extracti...
  • 244 篇 computational mo...
  • 219 篇 machine learning
  • 210 篇 hadron colliders
  • 186 篇 real-time system...
  • 180 篇 semantics
  • 173 篇 training
  • 168 篇 predictive model...
  • 162 篇 support vector m...
  • 158 篇 optimization
  • 137 篇 image segmentati...
  • 135 篇 internet of thin...
  • 128 篇 data mining
  • 107 篇 computer science
  • 104 篇 neural networks
  • 101 篇 visualization
  • 98 篇 hadrons
  • 96 篇 computer archite...

机构

  • 1,099 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 1,000 篇 university of ch...
  • 979 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 643 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 607 篇 fakultät physik ...
  • 602 篇 infn sezione di ...
  • 595 篇 infn sezione di ...
  • 565 篇 school of physic...
  • 563 篇 horia hulubei na...
  • 545 篇 iccub universita...
  • 536 篇 school of physic...
  • 536 篇 department of ph...
  • 535 篇 h.h. wills physi...
  • 518 篇 imperial college...
  • 514 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 507 篇 school of physic...

作者

  • 269 篇 barter w.
  • 258 篇 a. gomes
  • 256 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 244 篇 blake t.
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 bellee v.
  • 239 篇 c. amelung
  • 238 篇 d. calvet
  • 236 篇 bowcock t.j.v.
  • 234 篇 g. spigo
  • 233 篇 brundu d.
  • 233 篇 betancourt c.
  • 232 篇 f. siegert
  • 231 篇 borsato m.
  • 228 篇 s. chen
  • 227 篇 amato s.
  • 221 篇 boettcher t.

语言

  • 11,569 篇 英文
  • 846 篇 其他
  • 185 篇 中文
  • 2 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Academy of Technology Adisaptagram"
12597 条 记 录,以下是251-260 订阅
排序:
Analysis of Skin Lesions for Identifying of Skin Cancer Melanoma using Customized CNN Model with Transfer Learning  4
Analysis of Skin Lesions for Identifying of Skin Cancer Mela...
收藏 引用
4th IEEE Global Conference for Advancement in technology, GCAT 2023
作者: Sinchana, N.S. Jeevitha, K. Kumar Swamy, S. Kodipalli, Ashwini Rao, Trupthi Department of Computer Science and Engineering Global Academy of Technology Karnataka Bangalore India Department of Artificial Intelligence and Data Science and Engineering Global Academy of Technology Karnataka Bangalore India
Melanoma is a type of cancer known to be the most dangerous and is called the life threatening disease. Every year, there is rise in number of people being diagnosed with melanoma which is more frequent among the male... 详细信息
来源: 评论
Streamlined Data Pipeline for Real-Time Threat Detection and Model Inference  17
Streamlined Data Pipeline for Real-Time Threat Detection and...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Singh, Rajkanwar Aravindan, V. Mishra, Sanket Singh, Sunil Kumar VIT-AP University School of Computer Science & Engineering Andhra Pradesh Amaravati India Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Department of Computer Science and Engineering Karnataka Manipal India
Real-time threat detection in streaming data is crucial yet challenging due to varying data volumes and speeds. This paper presents an architecture designed to manage large-scale, high-speed data streams using deep le... 详细信息
来源: 评论
Personality Prediction Using Machine Learning  1
Personality Prediction Using Machine Learning
收藏 引用
1st International Conference on Computational Intelligence for Information, Security and Communication Applications, CIISCA 2023
作者: Pooja, K. Rakshitha, G.H. Spoorthi, S. Kamal, Shoaib Rao, Trupthi Ashwini, K. Global Academy of Technology Department of Computer Science and Engineering Bangalore India Global Academy of Technology Department of Artificial Intelligence and Data Science Bangalore India
With the growth of social networks, a wide range of methodologies have been developed to describe users' personalities only based on their language and social media use habits. Persona prediction is very popular t... 详细信息
来源: 评论
Performance Analysis of Machine Learning Algorithms to Predict Water Potability  1
Performance Analysis of Machine Learning Algorithms to Predi...
收藏 引用
1st International Conference on Computational Intelligence for Information, Security and Communication Applications, CIISCA 2023
作者: Parnika, J. Devamane, Shridhar B Ramya, C.N. Swarna Laxmi, M.G. Global Academy of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India
The survival of all living organisms, industry and agriculture is dependent on freshwater availability. A crucial step in the management of freshwater is the examination of the water's quality. According to the an... 详细信息
来源: 评论
Towards Mutation Testing of Embedded Software: A Framework and Case Study  35
Towards Mutation Testing of Embedded Software: A Framework a...
收藏 引用
35th IEEE International Symposium on Software Reliability engineering Workshops, ISSREW 2024
作者: Jiang, Wei Dong, Sijin Zhang, Jiaming Tang, Jin Zhang, Zichao Sun, Chang-Ai Zhang, Xiaoyi China Electronics Technology Group Corporation Information Science Academy Beijing China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China
Embedded software commonly executes safety-critical tasks and thus is expected to be highly reliable, which calls for stronger quality assurance techniques. As a fault-based testing technique, mutation testing is wide... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Interpretable Predictions for Crime Categories Using Log Loss Approach for Imbalanced Target Feature  2
Interpretable Predictions for Crime Categories Using Log Los...
收藏 引用
2nd IEEE International Conference on Contemporary Computing and Communications, InC4 2024
作者: Manasa, A. Sen, Snigdha Global Academy of Technology Department of Computer Science and Engineering Karnataka Bengaluru India Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Department of Information Technology Manipal India
Crime indicates activities that infringe laws and regulations constituted by a governing authority. These wrongdoings can range from minor aberrations such as petty theft to more serious crimes like assault, robbery, ... 详细信息
来源: 评论
GRU-Based Winner Subcarrier Detection in Frequency Domain Contention  24
GRU-Based Winner Subcarrier Detection in Frequency Domain Co...
收藏 引用
7th International Conference on Information science and Systems, ICISS 2024
作者: Yao, Shumin Zhao, Qinglin Xu, Zezhou Feng, Li Li, Guanghui Tian, Liwei Sun, Yi School of Computer Science and Engineering Macau University of Science and Technology China Department of Broadband Communication Pengcheng Laboratory China School of Artificial Intelligence and Computer Science Jiangnan University China Department of Computer Guangdong University of Science and Technology China Institute of Computing Technology Chinese Academy of Sciences China
Single-carrier frequency domain contention (S-FDC) is an efficient wireless contention mechanism based on orthogonal frequency-division multiplexing (OFDM). In each round of S-FDC, each node randomly selects and signa... 详细信息
来源: 评论
Analysis of Multi-Class Convolution Neural Network on Garbage Classification System
Analysis of Multi-Class Convolution Neural Network on Garbag...
收藏 引用
2023 IEEE International Conference on Network, Multimedia and Information technology, NMITCON 2023
作者: Vikas, K.R. Ullas, P. Sri Sai Teja, M.S. Kumar Swamy, S. Kodipalli, Ashwini Rao, Trupthi Global Academy of Technology Department of Computer Science and Engineering Karnataka Bangalore India Global Academy of Technology Department of Artificial Intelligence and Data Science and Engineering Karnataka Bangalore India
The buildup of solid waste in metropolitan areas is a major worry that, if not effectively handled, might lead to environmental contamination and be dangerous to human health. To manage a range of waste products, it&#... 详细信息
来源: 评论
Customized CNN Model for Alzheimer's Disease Stages Classification and Comparison with Transfer Learning  1
Customized CNN Model for Alzheimer's Disease Stages Classifi...
收藏 引用
1st International Conference on Recent Advances in Information technology for Sustainable Development, ICRAIS 2023
作者: Sindhu, B. Prasad, Rishitha Kodipalli, Ashwini Kumar Swamy, S. Rao, Trupthi Global Academy of Technology Department of Computer Science and Engineering Karnataka Bangalore India Global Academy of Technology Department of Artificial Intelligence and Data Science and Engineering Karnataka Bangalore India
Alzheimer's disease, the predominant form of dementia, progressively worsens over time, initially causing mild memory loss and eventually severely hampering daily tasks and communication abilities. This degenerati... 详细信息
来源: 评论