咨询与建议

限定检索结果

文献类型

  • 6,529 篇 会议
  • 6,015 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 12,613 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,623 篇 工学
    • 4,513 篇 计算机科学与技术...
    • 3,742 篇 软件工程
    • 1,665 篇 信息与通信工程
    • 1,104 篇 控制科学与工程
    • 973 篇 电子科学与技术(可...
    • 940 篇 电气工程
    • 861 篇 生物工程
    • 774 篇 光学工程
    • 712 篇 生物医学工程(可授...
    • 554 篇 机械工程
    • 548 篇 化学工程与技术
    • 530 篇 核科学与技术
    • 520 篇 仪器科学与技术
    • 396 篇 网络空间安全
    • 376 篇 材料科学与工程(可...
    • 329 篇 动力工程及工程热...
    • 272 篇 安全科学与工程
  • 5,255 篇 理学
    • 2,625 篇 物理学
    • 1,825 篇 数学
    • 989 篇 生物学
    • 668 篇 化学
    • 581 篇 统计学(可授理学、...
    • 333 篇 系统科学
  • 1,813 篇 管理学
    • 1,144 篇 管理科学与工程(可...
    • 760 篇 图书情报与档案管...
    • 392 篇 工商管理
  • 767 篇 医学
    • 593 篇 临床医学
    • 532 篇 基础医学(可授医学...
    • 354 篇 药学(可授医学、理...
    • 302 篇 公共卫生与预防医...
  • 294 篇 法学
  • 203 篇 农学
  • 146 篇 经济学
  • 76 篇 教育学
  • 72 篇 文学
  • 49 篇 军事学
  • 21 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 352 篇 accuracy
  • 349 篇 deep learning
  • 298 篇 feature extracti...
  • 254 篇 computational mo...
  • 228 篇 machine learning
  • 205 篇 hadron colliders
  • 189 篇 real-time system...
  • 188 篇 semantics
  • 171 篇 predictive model...
  • 171 篇 training
  • 164 篇 optimization
  • 163 篇 support vector m...
  • 140 篇 internet of thin...
  • 137 篇 image segmentati...
  • 127 篇 data mining
  • 106 篇 computer science
  • 105 篇 neural networks
  • 105 篇 visualization
  • 98 篇 security
  • 97 篇 computer archite...

机构

  • 1,097 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 990 篇 university of ch...
  • 978 篇 physikalisches i...
  • 969 篇 oliver lodge lab...
  • 640 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 601 篇 infn sezione di ...
  • 594 篇 infn sezione di ...
  • 567 篇 school of physic...
  • 560 篇 horia hulubei na...
  • 540 篇 iccub universita...
  • 536 篇 department of ph...
  • 535 篇 school of physic...
  • 533 篇 h.h. wills physi...
  • 518 篇 imperial college...
  • 512 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 507 篇 school of physic...

作者

  • 273 篇 barter w.
  • 259 篇 a. gomes
  • 255 篇 beiter a.
  • 248 篇 blake t.
  • 247 篇 c. alexa
  • 245 篇 bellee v.
  • 244 篇 j. m. izen
  • 241 篇 g. bella
  • 241 篇 j. strandberg
  • 239 篇 c. amelung
  • 238 篇 bowcock t.j.v.
  • 237 篇 d. calvet
  • 236 篇 brundu d.
  • 233 篇 g. spigo
  • 232 篇 betancourt c.
  • 231 篇 f. siegert
  • 230 篇 borsato m.
  • 228 篇 s. chen
  • 226 篇 amato s.
  • 221 篇 boettcher t.

语言

  • 10,750 篇 英文
  • 1,687 篇 其他
  • 195 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Academy of Technology Adisaptagram"
12613 条 记 录,以下是611-620 订阅
排序:
A Secret and Traceable Approach for Cloud Data Sharing  10
A Secret and Traceable Approach for Cloud Data Sharing
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Xu, Chenying Yin, Yanfei Chen, Yingwen National University of Defense Technology College of Computer Changsha China China Aerospace Academy of Systems Science and Engineering China
With the development of cloud computing, data owners generally use cloud services to reduce storage and computing overhead. However, data stored in cloud servers is out of the direct control of the data owners, causin... 详细信息
来源: 评论
Parallel Implementation of DNA Cryptography Encryption Scheme using MPI and CUDA  1
Parallel Implementation of DNA Cryptography Encryption Schem...
收藏 引用
1st IEEE International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems, ICAECIS 2023
作者: Kamath, Navaneeth N Manjunath, K.N. Roopalakshmi, R. Rana, Akhil Nayak, Ashalatha Neelima, B. Manipal Institute of Technology Manipal Academy of Higher Education Department of Computer Science and Engineering Karnataka Manipal576104 India
There is a great requirement for cryptographic systems to secure shared or transmitted data over the internet. Periodic modification of the currently used cryptographic scheme to encrypt the data is also suggested to ... 详细信息
来源: 评论
Dynamic Changing Trustability Based Secured Protocol For Collaborative Data Transmission In Mobile Adhoc Network  3
Dynamic Changing Trustability Based Secured Protocol For Col...
收藏 引用
3rd IEEE Asian Conference on Innovation in technology, ASIANCON 2023
作者: Mariappan, Umasree Balakrishnan, D. Devi, G. Durga Alagusundar, Nanditha Aravindan, T.M. Nalatharaj, R.Jebi Sri Vidya College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Virudhunagar626001 India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu Krishnankoil626126 India
Secured data transmission in mobile adhoc network is an more difficult where there will not be any decentralized environment to monitor the packet transmission progress. There are various methods has been introduced e... 详细信息
来源: 评论
RSM-NLP at BLP-2023 Task 2: Bangla Sentiment Analysis using Weighted and Majority Voted Fine-Tuned Transformers  1
RSM-NLP at BLP-2023 Task 2: Bangla Sentiment Analysis using ...
收藏 引用
1st Workshop on Bangla Language Processing, BLP 2023
作者: Seth, Pratinav Goel, Rashi Mathur, Komal Vemulapalli, Swetha Dept. of Data Science & Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Manipal India Dept. of Computer Science & Engineering Dept. of Information and Communication Technology
This paper describes our approach to submissions made at Shared Task 2 at BLP Workshop - Sentiment Analysis of Bangla Social Media Posts(Hasan et al., 2023a;Islam et al., 2021;Hasan et al., 2023b). Sentiment Analysis ... 详细信息
来源: 评论
Multi-View Incongruity Learning for Multimodal Sarcasm Detection  31
Multi-View Incongruity Learning for Multimodal Sarcasm Detec...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Guo, Diandian Cao, Cong Yuan, Fangfang Liu, Yanbing Zeng, Guangjie Yu, Xiaoyan Peng, Hao Yu, Philip S. Institute of Information Engineering Chinese Academy of Sciences China School of Cyber Security University of Chinese Academy of Sciences China State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science University of Illinois Chicago United States
Multimodal sarcasm detection (MSD) is essential for various downstream tasks. Existing MSD methods tend to rely on spurious correlations. These methods often mistakenly prioritize non-essential features yet still make... 详细信息
来源: 评论
Incorporating Artificial Intelligence Powered Immersive Realities to Improve Learning using Virtual Reality (VR) and Augmented Reality (AR) technology  3
Incorporating Artificial Intelligence Powered Immersive Real...
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Balushi, Jasim Sharki Ghulam Al Jabri, Malak Ibrahim Ahmed Al Palarimath, Suresh Maran, Pyingkodi Thenmozhi, K. Balakumar, C. Univesity of Technology and Applied Sciences College of Computing and Information Sciences Information Technology Department Salalah Oman Kongu Engineering College Department of Computer Applications Erode India Department of Computer Science Bengaluru India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India
This study analyzes the transformative potential of combining artificial intelligence (AI) with immersive technologies, specifically virtual reality (VR) and augmented reality (AR), to elevate educational outcomes sig... 详细信息
来源: 评论
An Empirical Study of On-Policy and Off-Policy Actor-Critic Algorithms in the Context of Exploration-Exploitation Dilemma  3
An Empirical Study of On-Policy and Off-Policy Actor-Critic ...
收藏 引用
3rd International Conference on Emerging Techniques in Computational Intelligence, ICETCI 2023
作者: Seshagiri, Supriya Prema, K.V. Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Dept. of Computer Science and Engineering Manipal India
The Exploration-Exploitation dilemma in Reinforcement Learning (RL) algorithms is about deciding whether to select a sub-optimal path to the outcome and acquire a more varied learning of the environment or to select t... 详细信息
来源: 评论
GPU Side-Channel Attack Classification for Targeted Secure Shader Mitigation
收藏 引用
SN computer science 2024年 第8期5卷 1-23页
作者: Lungu, Nelson Patra, Sudhansu Shekhar Mishra, Manoj Ranjan Dash, Bibhuti Bhusan Sasmal, Gopal Charan Pattnayak, Parthasarathi Singh, Satyendr Gourisaria, Mahendra Kumar Department of Electrical and Electronics Engineering University of Zambia Lusaka Zambia School of Computer Applications Kalinga Institute of Industrial Technology (KIIT) Deemed to be University Bhubaneswar India MCA Department Trident Academy of Creative Technology Bhubaneswar India Computer Science and Engineering Department BML Munjal University Gurugram India School of Computer Engineering Kalinga Institute of Industrial Technology (KIIT) Deemed to be University Bhubaneswar India
Graphics processing units (GPUs) provide massively parallel processing capabilities, enabling accelerated computation across diverse applications. However, their parallel architecture and shared resources also introdu... 详细信息
来源: 评论
Enhanced Health Monitoring System for Internet of Medical Things using Machine Learning  15
Enhanced Health Monitoring System for Internet of Medical Th...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Swedheetha, C. Manikandan, P. Rajalakshmi, J. Muthuraja, T. Kavin Kumar, K. Chandrasekaran, Gokul Sriram Srivathsan, N. Velammal College of Engineering and Technology Department of Computer Science and Engineering India Kalasalingam Academy of Research and Education Krishnankoil Department of Electronics and Communication Engineering Virudhunagar India Sethu Institute of Technology Department of Electronics and Communication Engineering Virudhnagar India Kongu Engineering College Perundurai Department of Electronics and Communication Engineering Erode638060 India Karpagam Institute of Technology Department of Electronics and Communication Engineering Coimbatore India Velammal College of Engineering and Technology Department of Computer Science and Engineering Madurai India
This brief looks at mobile operation, speech recognition, and voice robotization. Patients with physical limitations, such as Parkinson's disease and cerebral palsy, as well as those with speech impairments, can e... 详细信息
来源: 评论
Exploring Social Media Trends - A Kannada Dataset Analysis
Exploring Social Media Trends - A Kannada Dataset Analysis
收藏 引用
2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023
作者: Dey, Amritangshu Aishwaryasri, J. Jai Surya, R. Jayanthi, M.G. Kannadaguli, Prashanth Cambridge Institute of Technology Department of Computer Science Engineering Bengaluru India Dhaarini Academy of Technical Education Bengaluru India
Platforms for social media are dynamic tools that help ideas spread and develop quickly. This study introduces a novel way of locating popular Kannada-language subjects on social networking sites. This study also invo... 详细信息
来源: 评论