咨询与建议

限定检索结果

文献类型

  • 6,837 篇 会议
  • 6,156 篇 期刊文献
  • 70 册 图书

馆藏范围

  • 13,063 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,655 篇 工学
    • 4,723 篇 计算机科学与技术...
    • 3,889 篇 软件工程
    • 1,758 篇 信息与通信工程
    • 1,204 篇 控制科学与工程
    • 991 篇 电气工程
    • 990 篇 电子科学与技术(可...
    • 891 篇 生物工程
    • 800 篇 光学工程
    • 740 篇 生物医学工程(可授...
    • 588 篇 机械工程
    • 579 篇 化学工程与技术
    • 539 篇 仪器科学与技术
    • 448 篇 网络空间安全
    • 376 篇 材料科学与工程(可...
    • 365 篇 动力工程及工程热...
    • 302 篇 安全科学与工程
    • 301 篇 核科学与技术
  • 5,399 篇 理学
    • 2,679 篇 物理学
    • 1,872 篇 数学
    • 1,034 篇 生物学
    • 695 篇 化学
    • 596 篇 统计学(可授理学、...
    • 339 篇 系统科学
  • 1,917 篇 管理学
    • 1,208 篇 管理科学与工程(可...
    • 786 篇 图书情报与档案管...
    • 407 篇 工商管理
  • 828 篇 医学
    • 621 篇 临床医学
    • 556 篇 基础医学(可授医学...
    • 365 篇 药学(可授医学、理...
    • 344 篇 公共卫生与预防医...
  • 308 篇 法学
  • 221 篇 农学
  • 152 篇 经济学
  • 82 篇 教育学
  • 75 篇 文学
  • 50 篇 军事学
  • 21 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 377 篇 deep learning
  • 357 篇 accuracy
  • 308 篇 feature extracti...
  • 261 篇 computational mo...
  • 237 篇 machine learning
  • 213 篇 real-time system...
  • 200 篇 hadron colliders
  • 184 篇 predictive model...
  • 180 篇 training
  • 179 篇 support vector m...
  • 179 篇 semantics
  • 170 篇 optimization
  • 156 篇 internet of thin...
  • 142 篇 image segmentati...
  • 130 篇 data mining
  • 109 篇 computer science
  • 108 篇 neural networks
  • 99 篇 reliability
  • 99 篇 computer archite...
  • 98 篇 hadrons

机构

  • 1,100 篇 cavendish labora...
  • 1,030 篇 department of ph...
  • 1,004 篇 university of ch...
  • 988 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 649 篇 infn laboratori ...
  • 622 篇 infn sezione di ...
  • 615 篇 fakultät physik ...
  • 605 篇 infn sezione di ...
  • 599 篇 infn sezione di ...
  • 570 篇 school of physic...
  • 561 篇 horia hulubei na...
  • 546 篇 iccub universita...
  • 538 篇 school of physic...
  • 538 篇 department of ph...
  • 534 篇 h.h. wills physi...
  • 521 篇 imperial college...
  • 513 篇 stfc rutherford ...
  • 509 篇 nikhef national ...
  • 505 篇 school of physic...

作者

  • 280 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 250 篇 blake t.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 245 篇 bellee v.
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 239 篇 c. amelung
  • 238 篇 d. calvet
  • 238 篇 brundu d.
  • 236 篇 bowcock t.j.v.
  • 235 篇 betancourt c.
  • 233 篇 g. spigo
  • 233 篇 borsato m.
  • 232 篇 amato s.
  • 231 篇 f. siegert
  • 228 篇 s. chen
  • 225 篇 boettcher t.

语言

  • 10,329 篇 英文
  • 2,561 篇 其他
  • 201 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Vidya Academy of Science and Technology"
13063 条 记 录,以下是291-300 订阅
排序:
Personality Prediction Using Machine Learning  1
Personality Prediction Using Machine Learning
收藏 引用
1st International Conference on Computational Intelligence for Information, Security and Communication Applications, CIISCA 2023
作者: Pooja, K. Rakshitha, G.H. Spoorthi, S. Kamal, Shoaib Rao, Trupthi Ashwini, K. Global Academy of Technology Department of Computer Science and Engineering Bangalore India Global Academy of Technology Department of Artificial Intelligence and Data Science Bangalore India
With the growth of social networks, a wide range of methodologies have been developed to describe users' personalities only based on their language and social media use habits. Persona prediction is very popular t... 详细信息
来源: 评论
Early Forest-Fire Detection by Linear Regression, Ridge Regression and Lasso Regression  1
Early Forest-Fire Detection by Linear Regression, Ridge Regr...
收藏 引用
1st International Conference on Computational Intelligence for Information, Security and Communication Applications, CIISCA 2023
作者: Mandre, Ananya. Hebbar, Deeksha.R. Rao, J. Shreya Keshav, Ananya Kamal, Shoaib Rao, Trupthi Global Academy of Technology Department of Computer Science Engineering Bangalore India Global Academy of Technology Department of Electronics and Communication Engineering Bangalore India Global Academy of Technology Department of Information Science Engineering Bangalore India Global Academy of Technology Department of Artificial Intelligence and Science Bangalore India
Forest fires are the wildfires that grow uncontrollably, burning plants, animals, grassland and bushlands. For reducing the losses caused by the disaster an effective fire detection device is required. The main agenda... 详细信息
来源: 评论
Dumpy: A Waste Management App
Dumpy: A Waste Management App
收藏 引用
2023 International Conference on IoT, Communication and Automation technology, ICICAT 2023
作者: Chetan, S.R. Karanth, Adithya B Dheeraj, D. Singh R, Rohan Arun, Jaideep Global Academy of Technology Information Science and Engineering Bengaluru India Dayananda Sagar College of Engineering Computer Science and Engineering Bengaluru India
A developing kind of trash management called smart waste management uses technology to streamline the operations of waste collection, transportation, and disposal. These kind of systems can increase operational effect... 详细信息
来源: 评论
Cyber Security Threat Detection in Internet of Things Using Optimized Deep Learning Technique  3
Cyber Security Threat Detection in Internet of Things Using ...
收藏 引用
3rd IEEE Asian Conference on Innovation in technology, ASIANCON 2023
作者: Mariappan, Umasree Balakrishnan, D. Rajendran, S. Alagusundar, Nanditha Sheriff, A. Ashiq Aadith, K. Sri Vidya College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Virudhunagar626001 India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamil Nadu Krishnankoil626126 India Kalasalingam Academy of Research and Education Department of Electrical and Electronics Engineering Tami lNadu Krishnankoil626126 India
Cybersecurity threat detection in the Internet of Things (IoT) refers to the process of identifying and addressing potential security risks and attacks within IoT systems and devices. It involves monitoring IoT networ... 详细信息
来源: 评论
Pager Explosion:Cybersecurity Insights and Afterthoughts
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2359-2362页
作者: Chuan Sheng Wanlun Ma Qing-Long Han Wei Zhou Xiaogang Zhu Sheng Wen Yang Xiang Fei-Yue Wang Swinburne University of Technology Hawthorn VIC 3122Australia IEEE the School of Computer and Mathematical Sciences the University of AdelaideAdelaideSouth Australia 5005Australia the State Key Laboratory for Management and Control of Complex Systems Chinese Academy of SciencesBeijing 100190 the Department of Engineering Science Faculty of Innovation EngineeringMacao University of Science and TechnologyMacao 999078China
PAGER EXPLOSION:THE *** 2024 Lebanon pager explosions represent one of the most unexpected and devastating technological incidents in recent *** September 17 and 18,2024,thousands of pagers and walkie-talkies exploded... 详细信息
来源: 评论
Ensemble of Handcrafted and Deep Learning Model for Histopathological Image Classification
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 4393-4406页
作者: Vasumathi Devi Majety N.Sharmili Chinmaya Ranjan Pattanaik ELaxmi Lydia Subhi R.M.Zeebaree Sarmad Nozad Mahmood Ali S.Abosinnee Ahmed Alkhayyat Department of Computer Science Engineering Vignan’s Nirula Institute of Technology and Science for WomenGuntur522005India Department of Computer Science Engineering Gayatri Vidya Parishad College of Engineering for WomenVisakhapatnam530048India Department of Computer Science and Engineering Ajay Binay Institute of Technology CuttackOdisha750314India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Energy Department Technical College of EngineeringDuhok Polytechnic UniversityDuhokIraq Computer Technology Engineering College of Engineering TechnologyAl-Kitab UniversityIraq Computer Technical Engineering Department College of Technical EngineeringThe Islamic UniversityNajaf54001Iraq College of Technical Engineering The Islamic UniversityNajafIraq
Histopathology is the investigation of tissues to identify the symptom of *** histopathological procedure comprises gathering samples of cells/tissues,setting them on the microscopic slides,and staining *** investigat... 详细信息
来源: 评论
Malware Detection Employing Deep Neural Networks  10
Malware Detection Employing Deep Neural Networks
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Nayak, Sanjana Ganesh Kurup, Samir Andrew, J. Manipal Institue of Technology Manipal Academy of Higher Education Department of Computer Science and Engineering Karnataka Manipal India
Malware, malicious software designed to disrupt, damage, or gain unauthorized access to computer systems, poses a significant and evolving threat to cybersecurity. Malware detection is an essential component of modern... 详细信息
来源: 评论
A Robust Low-Rank Tensor Decomposition and Quantization based Compression Method  40
A Robust Low-Rank Tensor Decomposition and Quantization base...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Ouyang, Yudian Xie, Kun Wen, Jigang Xie, Gaogang Li, Kenli College of Computer Science and Electronics Engineering Hunan University Changsha China Hangzhou Institute of Advanced Technology Hangzhou China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Institute of Computer Network Information Center Chinese Academy of Sciences Beijing China
Tensor data is widely used in fields such as smart grids, cloud systems, and deep learning. As the scale of this data increases, storage and transmission costs rise significantly. Many tensor data exhibit low-rank str... 详细信息
来源: 评论
Classification of Social Anxiety Disorder Using Explainable Machine Learning and Pearson's Correlation Technique  8
Classification of Social Anxiety Disorder Using Explainable ...
收藏 引用
8th IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2024
作者: Bathula, Srivarsha Chadaga, Krishnaraj Prabhu, Srikanth Sampathila, Niranjana Manipal Institute of Technology Manipal Academy of Higher Education Manipal Department of Computer Science and Engineering Karnataka India
Social Anxiety Disorder (SAD) is a widespread mental health issue marked by significant fear or discomfort during social interactions. It can greatly affect a person's life and overall happiness, causing problems ... 详细信息
来源: 评论
Visual Computing Unified Application Using Deep Learning and computer Vision Techniques
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第1期18卷 59-74页
作者: Sowmya, B.J. Meeradevi Seema, S. Dayananda, P. Supreeth, S. Shruthi, G. Rohith, S. Department of Artificial Intelligence and Data Science Ramaiah Institute of Technology Karnataka Bengaluru India Department of Artificial Intelligence and Machine Learning Ramaiah Institute of Technology Karnataka Bengaluru India Department of Computer Science and Engineering M S Ramaiah Institute of Technology Karnataka Bengaluru India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Karnataka Manipal India School of Computer Science and Engineering REVA University Karnataka Bengaluru India Department of Electronics & Communication Engineering Nagarjuna College of Engineering & Technology Karnataka Bengaluru India
Vision Studio aims to utilize a diverse range of modern deep learning and computer vision principles and techniques to provide a broad array of functionalities in image and video processing. Deep learning is a distinc... 详细信息
来源: 评论