咨询与建议

限定检索结果

文献类型

  • 6,529 篇 会议
  • 6,040 篇 期刊文献
  • 70 册 图书

馆藏范围

  • 12,639 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,577 篇 工学
    • 4,515 篇 计算机科学与技术...
    • 3,744 篇 软件工程
    • 1,665 篇 信息与通信工程
    • 1,107 篇 控制科学与工程
    • 969 篇 电子科学与技术(可...
    • 935 篇 电气工程
    • 861 篇 生物工程
    • 774 篇 光学工程
    • 712 篇 生物医学工程(可授...
    • 555 篇 机械工程
    • 548 篇 化学工程与技术
    • 520 篇 仪器科学与技术
    • 486 篇 核科学与技术
    • 396 篇 网络空间安全
    • 372 篇 材料科学与工程(可...
    • 329 篇 动力工程及工程热...
    • 272 篇 安全科学与工程
  • 5,257 篇 理学
    • 2,626 篇 物理学
    • 1,824 篇 数学
    • 990 篇 生物学
    • 668 篇 化学
    • 580 篇 统计学(可授理学、...
    • 333 篇 系统科学
  • 1,816 篇 管理学
    • 1,147 篇 管理科学与工程(可...
    • 760 篇 图书情报与档案管...
    • 392 篇 工商管理
  • 768 篇 医学
    • 593 篇 临床医学
    • 533 篇 基础医学(可授医学...
    • 354 篇 药学(可授医学、理...
    • 302 篇 公共卫生与预防医...
  • 293 篇 法学
  • 203 篇 农学
  • 146 篇 经济学
  • 76 篇 教育学
  • 72 篇 文学
  • 49 篇 军事学
  • 21 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 357 篇 accuracy
  • 350 篇 deep learning
  • 302 篇 feature extracti...
  • 253 篇 computational mo...
  • 224 篇 machine learning
  • 204 篇 hadron colliders
  • 192 篇 real-time system...
  • 186 篇 semantics
  • 176 篇 training
  • 171 篇 predictive model...
  • 165 篇 optimization
  • 163 篇 support vector m...
  • 140 篇 internet of thin...
  • 137 篇 image segmentati...
  • 127 篇 data mining
  • 106 篇 computer science
  • 104 篇 neural networks
  • 100 篇 visualization
  • 98 篇 hadrons
  • 97 篇 computer archite...

机构

  • 1,100 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 997 篇 university of ch...
  • 987 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 649 篇 infn laboratori ...
  • 622 篇 infn sezione di ...
  • 615 篇 fakultät physik ...
  • 605 篇 infn sezione di ...
  • 601 篇 infn sezione di ...
  • 570 篇 school of physic...
  • 563 篇 horia hulubei na...
  • 546 篇 iccub universita...
  • 538 篇 school of physic...
  • 538 篇 department of ph...
  • 534 篇 h.h. wills physi...
  • 521 篇 imperial college...
  • 513 篇 stfc rutherford ...
  • 509 篇 nikhef national ...
  • 505 篇 school of physic...

作者

  • 280 篇 barter w.
  • 258 篇 a. gomes
  • 255 篇 beiter a.
  • 250 篇 blake t.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 245 篇 bellee v.
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 239 篇 c. amelung
  • 239 篇 brundu d.
  • 238 篇 d. calvet
  • 236 篇 bowcock t.j.v.
  • 236 篇 betancourt c.
  • 234 篇 borsato m.
  • 233 篇 g. spigo
  • 232 篇 amato s.
  • 231 篇 f. siegert
  • 228 篇 s. chen
  • 225 篇 boettcher t.

语言

  • 10,773 篇 英文
  • 1,688 篇 其他
  • 197 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Academy of Technology Adisaptagram"
12639 条 记 录,以下是601-610 订阅
排序:
Exploring Social Media Trends - A Kannada Dataset Analysis
Exploring Social Media Trends - A Kannada Dataset Analysis
收藏 引用
2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023
作者: Dey, Amritangshu Aishwaryasri, J. Jai Surya, R. Jayanthi, M.G. Kannadaguli, Prashanth Cambridge Institute of Technology Department of Computer Science Engineering Bengaluru India Dhaarini Academy of Technical Education Bengaluru India
Platforms for social media are dynamic tools that help ideas spread and develop quickly. This study introduces a novel way of locating popular Kannada-language subjects on social networking sites. This study also invo... 详细信息
来源: 评论
A Secure Authentication Model with Optimized Key Generation in IoT-Fog-Cloud Computing
A Secure Authentication Model with Optimized Key Generation ...
收藏 引用
2023 International Conference on Integrated Intelligence and Communication Systems, ICIICS 2023
作者: Babitha, M.N. Siddappa, M. Siddharetha Instiute of Technology Tumakuru Sri Siddhartha Academy of Higher Education Department of Computer Science and Engineering Tumakuru India
With a rise in cloud computing, numerous organizations and businesses units utilized the cloud servers to expand their operations, which leads to lower equipment cost and effective resources utilization. The fog syste... 详细信息
来源: 评论
Fuzzy Deep Neural Network Technique for Prediction of Morality Risk in Patients with Corona Virus Disease  2
Fuzzy Deep Neural Network Technique for Prediction of Morali...
收藏 引用
2nd IEEE International Conference on Futuristic Technologies, INCOFT 2023
作者: Balakrishnan, D. Mariappan, Umasree Reddy, S Manideep Kumar Aravindan, T.M. Yaswanth, Mupparaju Naidu, Pidikiti Narasimha Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu Krishnakoil626126 India Sri Vidya College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Virudhunagar626005 India
Predicting risks in patients with Corona Virus Disease 19 (COVID-19) involves assessing the likelihood and severity of various outcomes, such as hospitalization, ICU admission, disease progression, or mortality. Machi... 详细信息
来源: 评论
Methods for Human Identity Verification in Smart Unmanned Supermarkets Based on computer Vision  9
Methods for Human Identity Verification in Smart Unmanned Su...
收藏 引用
9th IEEE International Conference on Smart Cloud, SmartCloud 2024
作者: Liu, Lizheng Cai, Zhebiao Xu, Jianqiang Fudan University Academy for Engineering and Technology Shanghai China Fudan University School of Computer Science and Technology Shanghai China Shanghai Fine Electronic.LTD Shanghai China
Smart unmanned supermarkets have been emerging in the past years and significantly affected conventional shopping styles. Customer identification is an important step in picking up goods in smart unmanned supermarkets... 详细信息
来源: 评论
Automated Diabetic Retinopathy Prediction Using a Deep Learning Based Modified DenseNet  2
Automated Diabetic Retinopathy Prediction Using a Deep Learn...
收藏 引用
2nd IEEE International Conference on Futuristic Technologies, INCOFT 2023
作者: Balakrishnan, D. Mariappan, Umasree Reddy, Vajrala Pavan Sainath Chaitanya, Darimadugu Venkata Manohar, Nalluri Reddy, Lella Srinivasa Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu Krishnakoil626126 India Sri Vidya College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Virudhunagar626005 India
Diabetic Retinopathy (DR) is a form of diabetes caused by damage to the retinal blood vessels. Early identification and treatment of this condition are facilitated through retinal screening. DR progresses through five... 详细信息
来源: 评论
Dynamic Changing Trustability Based Secured Protocol For Collaborative Data Transmission In Mobile Adhoc Network  3
Dynamic Changing Trustability Based Secured Protocol For Col...
收藏 引用
3rd IEEE Asian Conference on Innovation in technology, ASIANCON 2023
作者: Mariappan, Umasree Balakrishnan, D. Devi, G. Durga Alagusundar, Nanditha Aravindan, T.M. Nalatharaj, R.Jebi Sri Vidya College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Virudhunagar626001 India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu Krishnankoil626126 India
Secured data transmission in mobile adhoc network is an more difficult where there will not be any decentralized environment to monitor the packet transmission progress. There are various methods has been introduced e... 详细信息
来源: 评论
Drowsiness Detection for Drivers using Hybrid T-Distributed Stochastic Neighbor Embedding with Convolutional Neural Network  2
Drowsiness Detection for Drivers using Hybrid T-Distributed ...
收藏 引用
2nd IEEE International Conference on Futuristic Technologies, INCOFT 2023
作者: Balakrishnan, D. Mariappan, Umasree Nikhitha, Balabhadra Akshitha, Bokkisam Visali, Bedamsetty Snehalatha, Bandikattu Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu Krishnankoil626126 India Sri Vidya College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Virudhunagar626005 India
Drowsiness Detection (DD) is the procedure of identifying signs of drowsiness in individuals, especially in critical situations like driving, heavy machinery operation, or aircraft piloting. Hybrid Bi-directional Long... 详细信息
来源: 评论
Identity – Attribute Inference in Online Social Network(s) Using Bio-Inspired Algorithms and Machine Learning Approaches
收藏 引用
Journal of Mobile Multimedia 2023年 第3期19卷 645-678页
作者: Shetty, Nisha P. Muniyal, Balachandra Teja, Daita Ravi Maben, Leander Melroy Vinil, Tummala Srinag Department of Information and Communication Technology Manipal Institute of Technology Manipal Academy of Higher Education Manipal 567104 India Department of Computer Science and Engineering Manipal Institute of Technology Manipal Academy of Higher Education Manipal 567104 India
Twitter is one of the most popular social networking sites today, and it has become a critical tool for gathering data from numerous individuals throughout the world. The platform hosts a variety of debates spanning f... 详细信息
来源: 评论
Data Deduplication using Machine Learning  15
Data Deduplication using Machine Learning
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Revanth, Narasimhula Varun, Ravuri Harshitha, Ebbili Angelina, J. Jane Rubel Subhashini, S.J. Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamil Nadu Virudhnagar India Department of IT SRM Madurai College for Engineering and Technology Tamil Nadu Madurai India
Reducing data in storage systems is becoming more crucial as a practical way to cut down on data Center management expenses. Current post-deduplication delta-compression techniques combine delta compression with lossl... 详细信息
来源: 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
science China(Information sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 评论