咨询与建议

限定检索结果

文献类型

  • 7,505 篇 期刊文献
  • 7,366 篇 会议
  • 72 册 图书

馆藏范围

  • 14,943 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,594 篇 工学
    • 5,090 篇 计算机科学与技术...
    • 4,074 篇 软件工程
    • 2,008 篇 信息与通信工程
    • 1,325 篇 控制科学与工程
    • 1,315 篇 电气工程
    • 1,160 篇 电子科学与技术(可...
    • 1,016 篇 生物工程
    • 951 篇 生物医学工程(可授...
    • 890 篇 光学工程
    • 619 篇 化学工程与技术
    • 584 篇 机械工程
    • 575 篇 仪器科学与技术
    • 520 篇 材料科学与工程(可...
    • 495 篇 动力工程及工程热...
    • 412 篇 网络空间安全
    • 329 篇 安全科学与工程
  • 6,168 篇 理学
    • 2,920 篇 物理学
    • 2,166 篇 数学
    • 1,305 篇 生物学
    • 771 篇 化学
    • 747 篇 统计学(可授理学、...
    • 414 篇 系统科学
  • 2,165 篇 管理学
    • 1,401 篇 管理科学与工程(可...
    • 805 篇 图书情报与档案管...
    • 622 篇 工商管理
  • 1,198 篇 医学
    • 932 篇 临床医学
    • 780 篇 基础医学(可授医学...
    • 472 篇 公共卫生与预防医...
    • 460 篇 药学(可授医学、理...
  • 393 篇 法学
    • 331 篇 社会学
  • 293 篇 农学
  • 237 篇 经济学
  • 167 篇 教育学
  • 94 篇 文学
  • 35 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 447 篇 deep learning
  • 365 篇 accuracy
  • 284 篇 machine learning
  • 278 篇 feature extracti...
  • 261 篇 internet of thin...
  • 248 篇 real-time system...
  • 222 篇 optimization
  • 222 篇 computational mo...
  • 179 篇 hadron colliders
  • 179 篇 training
  • 178 篇 predictive model...
  • 173 篇 support vector m...
  • 150 篇 educational inst...
  • 135 篇 neural networks
  • 132 篇 image segmentati...
  • 130 篇 convolutional ne...
  • 129 篇 reliability
  • 113 篇 computer science
  • 113 篇 semantics
  • 109 篇 artificial intel...

机构

  • 884 篇 department of ph...
  • 860 篇 cavendish labora...
  • 823 篇 physikalisches i...
  • 812 篇 oliver lodge lab...
  • 576 篇 school of physic...
  • 476 篇 infn laboratori ...
  • 471 篇 infn sezione di ...
  • 457 篇 fakultät physik ...
  • 448 篇 infn sezione di ...
  • 440 篇 infn sezione di ...
  • 419 篇 university of ch...
  • 414 篇 horia hulubei na...
  • 413 篇 iccub universita...
  • 394 篇 school of physic...
  • 390 篇 department of ph...
  • 382 篇 nikhef national ...
  • 381 篇 imperial college...
  • 378 篇 center for high ...
  • 372 篇 school of physic...
  • 370 篇 h.h. wills physi...

作者

  • 278 篇 a. gomes
  • 262 篇 c. alexa
  • 262 篇 j. m. izen
  • 253 篇 g. bella
  • 251 篇 j. strandberg
  • 250 篇 d. calvet
  • 249 篇 c. amelung
  • 246 篇 s. chen
  • 240 篇 g. spigo
  • 238 篇 f. siegert
  • 221 篇 y. tayalati
  • 221 篇 r. ströhmer
  • 219 篇 j. wang
  • 216 篇 m. rijssenbeek
  • 214 篇 s. jin
  • 210 篇 g. gaudio
  • 208 篇 m. gandelman
  • 205 篇 t. gershon
  • 204 篇 s. mohapatra
  • 203 篇 d. golubkov

语言

  • 14,130 篇 英文
  • 658 篇 其他
  • 153 篇 中文
  • 6 篇 日文
  • 5 篇 德文
  • 5 篇 法文
  • 2 篇 荷兰文
检索条件"机构=Computer Science and Engineering Nutan College of Engineering and Research"
14943 条 记 录,以下是1-10 订阅
排序:
Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud
收藏 引用
Soft Computing 2024年 第23期28卷 13701-13713页
作者: Hombal, Uma Rangapura Basavaraju, Dayananda Shinde, Ashwini S. Department of Computer Science and Engineering KSIT Bengaluru India Department of Computer Science and Engineering MSRIT Bengaluru India Department of CSE-AI Nutan College of Engineering and Research Pune India
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud is one of the most efficient technology infrastructures with extens... 详细信息
来源: 评论
Bidirectional Sign Language Translation System  8
Bidirectional Sign Language Translation System
收藏 引用
8th IEEE International Conference on Computing, Communication, Control and Automation, ICCUBEA 2024
作者: Mahjan, Aditya Hendre, Pradnya Mankhair, Gauri Satpute, Shubhangi Chaudhari, Deepti A. Nutan College of Engineering and Research Department of Computer Science and Engineering Pune India
Sign language is an essential form of communication for the deaf and hard-of-hearing community. The creation of Bidirectional Sign Language Translation Systems (BSLTS) has drawn a lot of attention as technology has ad... 详细信息
来源: 评论
Sentimental Analysis on Zomato Restaurant Reviews using Bi-LSTM
Sentimental Analysis on Zomato Restaurant Reviews using Bi-L...
收藏 引用
2023 International Conference on Integrated Intelligence and Communication Systems, ICIICS 2023
作者: Chaudhari, Deepti Angadi, Sanjeevkumar Sable, Saili Patil, Uma Chaudhari, Dipamala Jadhav, Kavita Nutan College of Engineering and Research Computer Science and Engineering Pune India
Sentiment analysis is a vital aspect of understanding public opinion and sentiment towards products and services. This paper presents a sentiment analysis work focused on Zomato restaurant reviews in Bangalore, aiming... 详细信息
来源: 评论
Bridging the gap: combining expert guidance and self-learned knowledge for efficient and robust autonomous navigation in complex settings
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2025年 第2期16卷 425-441页
作者: Kumar, Dharmendra Computer Science and Engineering United College of Engineering and Research Naini Uttar Pradesh Prayagraj211010 India
Autonomous navigation in dynamic environments poses significant challenges due to complex agent–environment interactions, real-time decision-making, and adaptability requirements. We propose the Reinforcement-Imitati... 详细信息
来源: 评论
CNN-Based Detection of Tampered Digital Images  2
CNN-Based Detection of Tampered Digital Images
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Kumar, S. Prem Thirumalesh, M. Sai Kumar, T. Pramod Reddy, P. Subba Angadi, Sanjeevkumar Venu, Nookala Computer Science and Engineering G.Pullaiah College of Engineering and Technology Kurnool India Nutan College of Engineering and Research Computer Science and Engineering Talegaon Dabhade Pune India Madhya Pradesh Gwalior474 005 India
This project presents a novel approach for detecting tampered digital images using Convolutional Neural Networks (CNN). Our methodology leverages the power of deep learning to analyse image content and identify altera... 详细信息
来源: 评论
Reinforcement imitation learning for reliable and efficient autonomous navigation in complex environments
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 11945-11961页
作者: Kumar, Dharmendra Computer Science and Engineering United College of Engineering and Research Uttar Pradesh Naini Prayagraj211010 India
Reinforcement learning (RL) and imitation learning (IL) are quite two useful machine learning techniques that were shown to be potential in enhancing navigation performance. Basically, both of these methods try to fin... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 948-958页
作者: A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad Department of Information Systems College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... 详细信息
来源: 评论
CLIP-Flow:Decoding images encoded in CLIP space
收藏 引用
Computational Visual Media 2024年 第6期10卷 1157-1168页
作者: Hao Ma Ming Li Jingyuan Yang Or Patashnik Dani Lischinski Daniel Cohen-Or Hui Huang Visual Computing Research Center College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060China Department of Computer Science Tel Aviv UniversityTel Aviv 6997801Israel School of Computer Science and Engineering the Hebrew University of JerusalemJerusalem 91904Israel
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(Information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论