咨询与建议

限定检索结果

文献类型

  • 71,621 篇 会议
  • 40,937 篇 期刊文献
  • 813 册 图书

馆藏范围

  • 113,371 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 69,858 篇 工学
    • 46,848 篇 计算机科学与技术...
    • 38,207 篇 软件工程
    • 17,666 篇 信息与通信工程
    • 11,845 篇 控制科学与工程
    • 9,319 篇 电气工程
    • 8,618 篇 电子科学与技术(可...
    • 8,026 篇 生物工程
    • 5,804 篇 光学工程
    • 5,646 篇 生物医学工程(可授...
    • 5,628 篇 机械工程
    • 4,004 篇 化学工程与技术
    • 3,947 篇 仪器科学与技术
    • 3,700 篇 动力工程及工程热...
    • 3,123 篇 网络空间安全
    • 2,852 篇 交通运输工程
    • 2,763 篇 材料科学与工程(可...
    • 2,719 篇 安全科学与工程
  • 38,593 篇 理学
    • 19,362 篇 数学
    • 12,028 篇 物理学
    • 9,022 篇 生物学
    • 6,469 篇 统计学(可授理学、...
    • 4,364 篇 化学
    • 4,058 篇 系统科学
  • 18,846 篇 管理学
    • 12,016 篇 管理科学与工程(可...
    • 7,637 篇 图书情报与档案管...
    • 4,835 篇 工商管理
  • 5,618 篇 医学
    • 4,503 篇 临床医学
    • 4,011 篇 基础医学(可授医学...
    • 2,430 篇 药学(可授医学、理...
  • 3,049 篇 法学
    • 2,494 篇 社会学
  • 1,906 篇 经济学
  • 1,470 篇 农学
  • 1,057 篇 教育学
  • 510 篇 文学
  • 260 篇 军事学
  • 216 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,315 篇 accuracy
  • 3,119 篇 feature extracti...
  • 2,978 篇 deep learning
  • 2,667 篇 training
  • 2,514 篇 computational mo...
  • 2,161 篇 machine learning
  • 2,140 篇 computer science
  • 1,735 篇 optimization
  • 1,623 篇 predictive model...
  • 1,456 篇 real-time system...
  • 1,448 篇 convolutional ne...
  • 1,429 篇 internet of thin...
  • 1,409 篇 semantics
  • 1,353 篇 data models
  • 1,347 篇 support vector m...
  • 1,204 篇 neural networks
  • 1,195 篇 data mining
  • 1,091 篇 artificial intel...
  • 1,061 篇 image segmentati...
  • 995 篇 security

机构

  • 2,488 篇 school of comput...
  • 1,552 篇 school of comput...
  • 1,390 篇 school of comput...
  • 1,089 篇 cavendish labora...
  • 1,020 篇 department of ph...
  • 1,002 篇 school of comput...
  • 953 篇 physikalisches i...
  • 943 篇 oliver lodge lab...
  • 843 篇 university of ch...
  • 692 篇 school of comput...
  • 623 篇 chitkara univers...
  • 580 篇 school of comput...
  • 547 篇 fakultät physik ...
  • 531 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 527 篇 school of physic...
  • 526 篇 school of comput...
  • 520 篇 department of ph...
  • 513 篇 imperial college...
  • 511 篇 h.h. wills physi...

作者

  • 276 篇 niyato dusit
  • 268 篇 a. gomes
  • 267 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 244 篇 g. bella
  • 244 篇 j. strandberg
  • 242 篇 c. amelung
  • 241 篇 d. calvet
  • 237 篇 blake t.
  • 234 篇 beiter a.
  • 233 篇 s. chen
  • 230 篇 bellee v.
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 217 篇 g. spigo

语言

  • 90,813 篇 英文
  • 20,791 篇 其他
  • 1,930 篇 中文
  • 130 篇 日文
  • 23 篇 德文
  • 21 篇 法文
  • 14 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 4 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Amity School of Engineering and Technology"
113371 条 记 录,以下是4731-4740 订阅
排序:
Study on the Compression Property of Formation Space for Theoretical Support
Study on the Compression Property of Formation Space for The...
收藏 引用
2023 Intelligent Computing and Control for engineering and Business Systems, ICCEBS 2023
作者: Rajesh Kanna, R. Sharmila, L. Senthil, K. Umadevi, G. Raja, R. Vinston Srm Institute of Science and Technology Department of Computer Science and Engineering Ramapuram India Agni College of Technology Department of Computer Science and Engineering Tamil Nadu India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering India Panimalar Engineering College Department of Information Technology Chennai India
At present, the open stopping with subsequent filling mining of the 'two step' mode has received significant attention. The recovery method entails dividing the ore block into the first step ore room and the s... 详细信息
来源: 评论
Optimized Biometric Key Management System for Enhanced Security  11th
Optimized Biometric Key Management System for Enhanced Secu...
收藏 引用
11th International Conference on Intelligent Computing and Applications, ICRTC 2023
作者: Kaur, Prabhjot Kumar, Nitin School of Computing DIT University Uttarakhand India Department of Computer Science and Engineering National Institute of Technology Uttarakhand India Department of Computer Science and Engineering PEC Deemed to be University Chandigarh India
Biometric cryptosystems are security tools that use an individual’s distinctive physical or behavioral characteristics to secure sensitive data. Any biometric cryptosystem’s effectiveness is dependent on how well th... 详细信息
来源: 评论
Variance Based Key-Frame Extraction Technique to Summarize Educational Videos
Variance Based Key-Frame Extraction Technique to Summarize E...
收藏 引用
2024 International Conference on computer, Electronics, Electrical engineering and their Applications, IC2E3 2024
作者: Salam, Rakesh Berwal, Krishan Sharma, Vijay Kumari, Sangita Rana, Bibhas Kumar John, A. School of Computer Science Engineering and Technology Bennett University Greater Noida India MCTE Mhow India
As multimedia technologies advance, the education system is increasingly adopting e-Learning methods, such as e-classes, virtual classrooms, and online video lectures. This shift requires significant memory for storag... 详细信息
来源: 评论
Enhanced Content-Based Medical Image Retrieval in Healthcare Decision Support System Using AutoML and Vector Space Model  6
Enhanced Content-Based Medical Image Retrieval in Healthcare...
收藏 引用
6th IEEE International Conference on Recent Advances in Intelligent Computational Systems, RAICS 2024
作者: Sudhish, Dhanya K. Nair, Latha R. Shailesh, S. School of Engineering Cochin University of Science and Technology Kerala Kalamassery India Cochin University of Science and Technology Department of Computer Science Kerala Kalamassery India
Machine learning techniques can potentially revolutionise healthcare;training such models demands significant expertise. We aim to assess the effectiveness of automated machine learning modules in empowering healthcar... 详细信息
来源: 评论
Security Strengthen and Detection of Deepfake Videos and Images Using Deep Learning Techniques
Security Strengthen and Detection of Deepfake Videos and Ima...
收藏 引用
IEEE International Conference on Communications Workshops, ICC
作者: Sumran Talreja Abhay Bindle Vimal Kumar Ishan Budhiraja Pronaya Bhattacharya School of Computer Science Engineering and Technology Bennett University Greater Noida India Electronics and Communication Engineering Maharishi Markandeswar University Mullana-Ambala Haryana Computer Science and Engineering Amity School of Engineering and Technology Amity University Kolkata India
The identification of fraudulent movies or images created using deep learning algorithms is the subject of this research and attempts an in-depth investigation of Deepfake Detection. Deepfakes are created by manipulat... 详细信息
来源: 评论
Opposition based sunflower optimization algorithm using cloud computing environments
收藏 引用
Materials Today: Proceedings 2022年 62卷 4896-4902页
作者: Chandrashekar, Chirag Krishnadoss, Pradeep School of Computer Science and Engineering Vellore Institute of Technology Chennai 600 127 India
computer!! The one everyone uses almost every day in this busy world, a device capable of handling tasks from simple addition to complex tasks like launching rockets, but to sustain these tasks, and be a part of the h... 详细信息
来源: 评论
Refining Pseudo Labels With a Teacher-Student Paradigm for Accurate Brain Lesion Segmentation
收藏 引用
IEEE Access 2025年 13卷 84474-84487页
作者: Chatterjee, Pubali Das Sharma, Kaushik Chakrabarti, Amlan Department of Computer Science and Engineering Bhubaneswar751030 India University of Calcutta Electrical Engineering Section Department of Applied Physics Kolkata700073 India University of Calcutta A. K. Choudhury School of Information Technology Kolkata700073 India
In medical image segmentation, obtaining large volume of high quality labeled data is a persistent challenge, especially for intricate tasks like brain lesion segmentation, where annotations are time-consuming, costly... 详细信息
来源: 评论
Breast Cancer Detection using Domain-Adversarial Training (DANN) with Invariant Risk Minimization (IRM) Hybrid Approach  3
Breast Cancer Detection using Domain-Adversarial Training (D...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Akash, K.V. Daniel, Esther Seetha, S. Durga, S. Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Coimbatore India Cmr Institute of Technology Department of Information Science & Engineering India Amrita Vishwa Vidyapeetham Tifac Core in Cyber Security Amrita School of Engineering India
The breast cancer detection performs a key function in the health care network. The precise and early detection of cancer in the breast could aid to save life of the sufferer. The traditional machine learning methods ... 详细信息
来源: 评论
Editorial for ambient intelligence and applications for smart environment and smart city
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第3期15卷 1799-1800页
作者: Hung, Jason C. Yen, Neil Y. Massetto, Francisco Isidro National Taichung University of Science and Technology Taichung City Taiwan School of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan Universidade Federal do ABC Santo André Brazil
来源: 评论
A Hybrid WSVM-Levy Approach for Energy-Efficient Manufacturing Using Big Data and IoT
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4895-4914页
作者: Surbhi Bhatia Khan Mohammad Alojail Mahesh Thyluru Ramakrishna Hemant Sharma School of Science Engineering and EnvironmentUniversity of SalfordManchesterM68HDUK University Centre for Research and Development Chandigarh UniversityMohali140307India Management Information System Department College of Business AdministrationKing Saud UniversityRiyadh11495Saudi Arabia Department of Computer Science and Engineering JAIN(Deemed-to-be University)Bangalore560030India Department of Computer Science and Engineering IES College of TechnologyBhopal462044India
In Intelligent Manufacturing,Big Data and industrial information enable enterprises to closely monitor and respond to precise changes in both internal processes and external environmental factors,ensuring more informe... 详细信息
来源: 评论