咨询与建议

限定检索结果

文献类型

  • 70,901 篇 会议
  • 40,185 篇 期刊文献
  • 813 册 图书

馆藏范围

  • 111,899 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 68,954 篇 工学
    • 45,983 篇 计算机科学与技术...
    • 37,747 篇 软件工程
    • 17,120 篇 信息与通信工程
    • 11,286 篇 控制科学与工程
    • 8,866 篇 电气工程
    • 8,473 篇 电子科学与技术(可...
    • 7,994 篇 生物工程
    • 5,696 篇 光学工程
    • 5,589 篇 生物医学工程(可授...
    • 5,487 篇 机械工程
    • 3,943 篇 化学工程与技术
    • 3,841 篇 仪器科学与技术
    • 3,596 篇 动力工程及工程热...
    • 2,832 篇 网络空间安全
    • 2,786 篇 材料科学与工程(可...
    • 2,713 篇 交通运输工程
    • 2,590 篇 安全科学与工程
  • 38,059 篇 理学
    • 19,179 篇 数学
    • 11,818 篇 物理学
    • 8,962 篇 生物学
    • 6,450 篇 统计学(可授理学、...
    • 4,226 篇 化学
    • 4,048 篇 系统科学
  • 18,428 篇 管理学
    • 11,718 篇 管理科学与工程(可...
    • 7,470 篇 图书情报与档案管...
    • 4,789 篇 工商管理
  • 5,394 篇 医学
    • 4,400 篇 临床医学
    • 3,965 篇 基础医学(可授医学...
    • 2,422 篇 药学(可授医学、理...
  • 2,977 篇 法学
    • 2,430 篇 社会学
  • 1,874 篇 经济学
  • 1,448 篇 农学
  • 1,035 篇 教育学
  • 471 篇 文学
  • 258 篇 军事学
  • 216 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,253 篇 accuracy
  • 3,093 篇 feature extracti...
  • 2,865 篇 deep learning
  • 2,645 篇 training
  • 2,489 篇 computational mo...
  • 2,138 篇 computer science
  • 2,073 篇 machine learning
  • 1,700 篇 optimization
  • 1,600 篇 predictive model...
  • 1,423 篇 convolutional ne...
  • 1,419 篇 real-time system...
  • 1,401 篇 internet of thin...
  • 1,388 篇 semantics
  • 1,350 篇 data models
  • 1,336 篇 support vector m...
  • 1,207 篇 neural networks
  • 1,169 篇 data mining
  • 1,053 篇 image segmentati...
  • 1,047 篇 artificial intel...
  • 959 篇 security

机构

  • 2,471 篇 school of comput...
  • 1,548 篇 school of comput...
  • 1,367 篇 school of comput...
  • 1,087 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 989 篇 school of comput...
  • 943 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 835 篇 university of ch...
  • 687 篇 school of comput...
  • 579 篇 school of comput...
  • 569 篇 chitkara univers...
  • 540 篇 fakultät physik ...
  • 532 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 520 篇 department of ph...
  • 516 篇 imperial college...
  • 511 篇 school of comput...
  • 508 篇 h.h. wills physi...

作者

  • 273 篇 niyato dusit
  • 269 篇 a. gomes
  • 264 篇 barter w.
  • 248 篇 c. alexa
  • 246 篇 j. m. izen
  • 245 篇 c. amelung
  • 244 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 239 篇 beiter a.
  • 236 篇 blake t.
  • 233 篇 s. chen
  • 229 篇 bellee v.
  • 229 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 221 篇 brundu d.
  • 221 篇 borsato m.
  • 220 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 95,265 篇 英文
  • 14,833 篇 其他
  • 1,860 篇 中文
  • 129 篇 日文
  • 20 篇 德文
  • 19 篇 法文
  • 11 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=Computer Science and Engineering Amity School of Engineering and Technology"
111899 条 记 录,以下是171-180 订阅
排序:
Japanese Sign Language Recognition by Combining Joint Skeleton-Based Handcrafted and Pixel-Based Deep Learning Features with Machine Learning Classification
收藏 引用
computer Modeling in engineering & sciences 2024年 第6期139卷 2605-2625页
作者: Jungpil Shin Md.Al Mehedi Hasan Abu Saleh Musa Miah Kota Suzuki Koki Hirooka School of Computer Science and Engineering The University of AizuAizuwakamatsu965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing *** Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japanese Sign Lan... 详细信息
来源: 评论
Video Summarization using Speech Recognition and Text Summarization  4
Video Summarization using Speech Recognition and Text Summar...
收藏 引用
4th International Conference for Emerging technology, INCET 2023
作者: Tyagi, Tirath Dhari, Lakshaya Nigam, Yash Nagpal, Renuka Amity University Amity School of Engineering and Technology Department of Computer Science and Engineering Uttar Pradesh India
Videos on the internet have been increasingly becoming the chief source of knowledge and information in today's digital age. However, with increasing length of videos and diminishing time to spare in everyone'... 详细信息
来源: 评论
Lip Reading Into Text Using Deep Learning  14
Lip Reading Into Text Using Deep Learning
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Manglani, Krishna Bahuguna, Utkarsh Gupta, Subhash Chand Amity School of Engineering and Technology Dept. of Computer Science Uttar Pradesh India
An essential part of computer vision, lip reading, has grown significantly and is now used in autonomous driving, public safety, and hearing-impaired communication. This work provides an in-depth analysis of both conv... 详细信息
来源: 评论
CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm
收藏 引用
science China(Information sciences) 2024年 第5期67卷 325-326页
作者: Teng LI Weiguo LIN Ruichen MA Zhuo MA Yulong SHEN Jianfeng MA School of Cyber Engineering Xidian University School of Computer Science and Technology Xidian University
As mission scenarios grow more complex, the role of a single unmanned aerial vehicle(UAV) is limited. The UAV swarm,surpassing the single UAV, dynamically establishes temporary communication networks, ensuring high tr... 详细信息
来源: 评论
GAN-Based Federated Adversarial Learning for Enhancing Security Towards Consumer Digital Ecosystems
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1102-1114页
作者: Murmu, Anita Kumar, Piyush Namasudra, Suyel Reddy, M Rajasekhar National Institute of Technology Patna Department of Computer Science and Engineering Patna India Bennett University School of Computer Science Engineering and Technology India National Institute of Technology Department of Computer Science and Engineering Patna India National Institute of Technology Agartala Department of Computer Science and Engineering Tripura India Amrita Vishwa Vidyapeetham Amrita School of Computing Andhra Pradesh India
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before... 详细信息
来源: 评论
Comprehensive asset surveillance and prediction modeling using real time data analytics  2
Comprehensive asset surveillance and prediction modeling usi...
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Rawat, Aayushi Gupta, Sumita Raghuvanshi, Gauri Aggarwal, Tanya Majhi, Vinayak Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Uttar Pradesh Noida India Amity Innovation and Design Center Amity University Uttar Pradesh Noida India
The rapid evolution in the technology industry highlights the importance of developing a more advanced asset tracking system. The need for efficient and accurate asset management has become crucial and predominant acr... 详细信息
来源: 评论
Preamble slice orderly queue access scheme in cell-free dense communication systems
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 126-135页
作者: Jun Sun Mengzhu Guo Jian Liu School of Telecommunications and Information Engineering Nanjing University of Posts and TelecommunicationsNanjing 210003China School of Computer and Communication Engineering University of Science and TechnologyBeijing 100083China
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an inte... 详细信息
来源: 评论
A Review on Advancing Cybersecurity Frameworks by Integrating Machine Intelligence with Federated Learning  5
A Review on Advancing Cybersecurity Frameworks by Integratin...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Patil, Vijayta Moolchandani, Jhankar Dubey, Ashutosh Kumar Amity School of Engineering and Technology Department of Computer Science & Engineering Amity University Madhaya Pradesh Gwalior India Chitkara University School of Engineering and Technology Chitkara University Himachal Pradesh India
In today's world, the growth of connected networks has also created a significant risk due to increasing risks of cyber-attacks. In this paper, various hybrid cybersecurity frameworks have been reviewed and analyz... 详细信息
来源: 评论
Single Image Deraining Using Residual Channel Attention Networks
收藏 引用
Journal of computer science & technology 2023年 第2期38卷 439-454页
作者: 王迪 潘金山 唐金辉 School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China
Image deraining is a highly ill-posed *** significant progress has been made due to the use of deep convolutional neural networks,this problem still remains challenging,especially for the details restoration and gener... 详细信息
来源: 评论
Adaptive neural network control of a 2-DOF helicopter system considering input constraints and global prescribed performance
收藏 引用
science China(Information sciences) 2024年 第7期67卷 224-239页
作者: Zhijia ZHAO Jiale WU Zhijie LIU We HE C.L.Philip CHEN School of Mechanical and Electrical Engineering Guangzhou University School of Intelligence Science and Technology and Key Laboratory of Intelligent Bionic Unmanned Systems of Ministry of Education University of Science and Technology Beijing School of Computer Science and Engineering South China University of Technology Pazhou Lab
In this study, an adaptive neural network(NN) control is proposed for nonlinear two-degree-offreedom(2-DOF) helicopter systems considering the input constraints and global prescribed ***, radial basis function NN(RBFN... 详细信息
来源: 评论