咨询与建议

限定检索结果

文献类型

  • 71,621 篇 会议
  • 40,937 篇 期刊文献
  • 813 册 图书

馆藏范围

  • 113,371 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 69,858 篇 工学
    • 46,848 篇 计算机科学与技术...
    • 38,207 篇 软件工程
    • 17,666 篇 信息与通信工程
    • 11,845 篇 控制科学与工程
    • 9,319 篇 电气工程
    • 8,618 篇 电子科学与技术(可...
    • 8,026 篇 生物工程
    • 5,804 篇 光学工程
    • 5,646 篇 生物医学工程(可授...
    • 5,628 篇 机械工程
    • 4,004 篇 化学工程与技术
    • 3,947 篇 仪器科学与技术
    • 3,700 篇 动力工程及工程热...
    • 3,123 篇 网络空间安全
    • 2,852 篇 交通运输工程
    • 2,763 篇 材料科学与工程(可...
    • 2,719 篇 安全科学与工程
  • 38,593 篇 理学
    • 19,362 篇 数学
    • 12,028 篇 物理学
    • 9,022 篇 生物学
    • 6,469 篇 统计学(可授理学、...
    • 4,364 篇 化学
    • 4,058 篇 系统科学
  • 18,846 篇 管理学
    • 12,016 篇 管理科学与工程(可...
    • 7,637 篇 图书情报与档案管...
    • 4,835 篇 工商管理
  • 5,618 篇 医学
    • 4,503 篇 临床医学
    • 4,011 篇 基础医学(可授医学...
    • 2,430 篇 药学(可授医学、理...
  • 3,049 篇 法学
    • 2,494 篇 社会学
  • 1,906 篇 经济学
  • 1,470 篇 农学
  • 1,057 篇 教育学
  • 510 篇 文学
  • 260 篇 军事学
  • 216 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,315 篇 accuracy
  • 3,119 篇 feature extracti...
  • 2,978 篇 deep learning
  • 2,667 篇 training
  • 2,514 篇 computational mo...
  • 2,161 篇 machine learning
  • 2,140 篇 computer science
  • 1,735 篇 optimization
  • 1,623 篇 predictive model...
  • 1,456 篇 real-time system...
  • 1,448 篇 convolutional ne...
  • 1,429 篇 internet of thin...
  • 1,409 篇 semantics
  • 1,353 篇 data models
  • 1,347 篇 support vector m...
  • 1,204 篇 neural networks
  • 1,195 篇 data mining
  • 1,091 篇 artificial intel...
  • 1,061 篇 image segmentati...
  • 995 篇 security

机构

  • 2,488 篇 school of comput...
  • 1,552 篇 school of comput...
  • 1,390 篇 school of comput...
  • 1,089 篇 cavendish labora...
  • 1,020 篇 department of ph...
  • 1,002 篇 school of comput...
  • 953 篇 physikalisches i...
  • 943 篇 oliver lodge lab...
  • 843 篇 university of ch...
  • 692 篇 school of comput...
  • 623 篇 chitkara univers...
  • 580 篇 school of comput...
  • 547 篇 fakultät physik ...
  • 531 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 527 篇 school of physic...
  • 526 篇 school of comput...
  • 520 篇 department of ph...
  • 513 篇 imperial college...
  • 511 篇 h.h. wills physi...

作者

  • 276 篇 niyato dusit
  • 268 篇 a. gomes
  • 267 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 244 篇 g. bella
  • 244 篇 j. strandberg
  • 242 篇 c. amelung
  • 241 篇 d. calvet
  • 237 篇 blake t.
  • 234 篇 beiter a.
  • 233 篇 s. chen
  • 230 篇 bellee v.
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 217 篇 g. spigo

语言

  • 90,813 篇 英文
  • 20,791 篇 其他
  • 1,930 篇 中文
  • 130 篇 日文
  • 23 篇 德文
  • 21 篇 法文
  • 14 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 4 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Amity School of Engineering and Technology"
113371 条 记 录,以下是381-390 订阅
排序:
Production prediction using machine learning  10
Production prediction using machine learning
收藏 引用
10th International Conference on Signal Processing and Integrated Networks, SPIN 2023
作者: Batra, Rakshit Abbi, Prateek Sharma, Rohan Agarwal, Hardik Bhulania, Paurush Amity University Amity School of Engineering and Technology Department of Computer Science and Engineering Uttar Pradesh Gautam Budh Nagar India
Our project is inspired from the problems faced by Micro and Small-scale industry owners who are into food production and have to manufacture their goods on daily basis of demand and sale. To plan the production these... 详细信息
来源: 评论
Mobile Healthcare Model for Disease Diagnosis  3
Mobile Healthcare Model for Disease Diagnosis
收藏 引用
3rd IEEE International Conference on Industrial Electronics: Developments and Applications, ICIDeA 2025
作者: Nigam, Tanishq Saha, Shreya Debdas, Subhra Das, Saptak Debdas, Sankhadeep Shishir Sekhar Pattanaik, Bijay Kishor School of Computer Science KIIT Deemed to be University Bhubaneswar India School of Computer Science Engineering Amity University India School of Computer Engineering Gita Autonomous College Bhubaneswar India
The research paper explores the transformative potential of mobile healthcare (mHealth) models in revolutionizing disease diagnosis, driven by advancements in AI and remote diagnostic tools. It emphasizes the critical... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
science China(Information sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
Comprehensive Framework for Analyzing Grammar Error Correction with GPT -3.5
Comprehensive Framework for Analyzing Grammar Error Correcti...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Munda, Rajni Kant Kumar, Abhishek Burman, Ravi Kumar Kumar, Biresh Alam, Md. Shoaib Sinha, Anurag Jharkhand University of Technology Computer Science and Engineering Ranchi India Amity University Computer Science and Engineering Jharkhand Ranchi India Ignou School of Computing and Information Science New Delhi India
This investigate assesses the viability and exactness of an error-correction approach utilizing GPT-3.5 compared to routine instruments. Letter set rectification plays a vital part in making strides the quality of and... 详细信息
来源: 评论
SAECNet: Self-Attention Encryption and Compression Network Based on Bidirectional Cyclic Multi-Scroll Memristor Neural Network
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24631-24643页
作者: Li, Peizhen Feng, Xiufang Lu, Herbert Ho-Ching Zhou, Shuang Zhang, Hao Taiyuan University of Technology School of Software China University of Western Australia School of Engineering Electrical Electronic and Computer Engineering Australia Chongqing Normal University School of Mathematics China Taiyuan University of Technology School of Computer Science and Technology China
This paper introduces a memristor-based neural network with bidirectional cyclic constructed from square wave pulse functions. Additionally, we design an image encryption and compression network framework incorporatin... 详细信息
来源: 评论
AsyCo: an asymmetric dual-task co-training model for partial-label learning
收藏 引用
science China(Information sciences) 2025年 第5期68卷 332-347页
作者: Beibei LI Yiyuan ZHENG Beihong JIN Tao XIANG Haobo WANG Lei FENG College of Computer Science Chongqing University State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences School of Software Technology Zhejiang University School of Computer Science and Engineering Nanyang Technological University
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance b... 详细信息
来源: 评论
Explainable Business Process Remaining Time Prediction Using Reachability Graph
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 625-639页
作者: CAO Rui ZENG Qingtian NI Weijian LU Faming LIU Cong DUAN Hua College of Computer Science and Engineering Shandong University of Science and Technology School of Computer Science and Technology Shandong University of Technology
With the recent advances in the field of deep learning, an increasing number of deep neural networks have been applied to business process prediction tasks, remaining time prediction, to obtain more accurate predictiv... 详细信息
来源: 评论
Sentimental Technique Implementation on Textual Data  6
Sentimental Technique Implementation on Textual Data
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Karthik, Baggam Sai Bharat, Dhavileswarapu N.S.S.V.V. Durga Alam, Md Afroz Sai, Bandari Tharun Rana, Mrinalini Sharma, Smita Yadav, Suman Avdhesh School of Computer Science and Engineering Lovely Professional University Punjab Kapurthala India Amity School of Engineering and Technology Department of Computer Science and Engineering Amity University Uttar Pradesh Greater Noida India
The increasing amount of real-time or near-real-time data in the big data age provides organizations with opportunities to make data-driven decisions. However, social media data, such as that generated by Twitter, is ... 详细信息
来源: 评论
Enhancing Information Security for Text-Based Data Hiding Using Midpoint Folding Approach: A Comparative Analysis  4th
Enhancing Information Security for Text-Based Data Hiding Us...
收藏 引用
4th International Conference on Mobile Radio Communications and 5G Networks, MRCN 2023
作者: Allwadhi, Sachin Joshi, Kamaldeep Yadav, Ashok Kumar Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Haryana Rohtak124001 India Amity School of Engineering and Technology Amity University Uttar Pradesh Noida201301 India
The activity of concealing information or data within a carrier entity in a way that is difficult for unauthorized users to notice is known as information hiding, sometimes known as data hiding. Different types of dig... 详细信息
来源: 评论