咨询与建议

限定检索结果

文献类型

  • 2,407 篇 会议
  • 1,329 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,773 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,299 篇 工学
    • 1,633 篇 计算机科学与技术...
    • 1,341 篇 软件工程
    • 622 篇 信息与通信工程
    • 365 篇 控制科学与工程
    • 300 篇 生物工程
    • 288 篇 电气工程
    • 229 篇 生物医学工程(可授...
    • 220 篇 电子科学与技术(可...
    • 180 篇 光学工程
    • 160 篇 机械工程
    • 160 篇 网络空间安全
    • 136 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 115 篇 动力工程及工程热...
    • 107 篇 交通运输工程
    • 104 篇 核科学与技术
    • 102 篇 仪器科学与技术
  • 1,346 篇 理学
    • 602 篇 数学
    • 473 篇 物理学
    • 327 篇 生物学
    • 214 篇 统计学(可授理学、...
    • 154 篇 化学
    • 113 篇 系统科学
  • 691 篇 管理学
    • 432 篇 管理科学与工程(可...
    • 293 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 218 篇 医学
    • 161 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
  • 129 篇 法学
    • 107 篇 社会学
  • 67 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 172 篇 accuracy
  • 141 篇 deep learning
  • 105 篇 feature extracti...
  • 100 篇 hadron colliders
  • 98 篇 machine learning
  • 89 篇 computational mo...
  • 88 篇 training
  • 84 篇 convolutional ne...
  • 73 篇 real-time system...
  • 66 篇 support vector m...
  • 63 篇 predictive model...
  • 61 篇 artificial intel...
  • 56 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 46 篇 cloud computing
  • 46 篇 data models
  • 44 篇 semantics
  • 44 篇 security

机构

  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 charles universi...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 122 篇 irfu cea univers...
  • 121 篇 infn sezione di ...
  • 120 篇 university of de...
  • 120 篇 department of ph...
  • 118 篇 imperial college...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,148 篇 英文
  • 584 篇 其他
  • 45 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science of Engineering and Application"
3773 条 记 录,以下是441-450 订阅
排序:
application of Developmental Services based on IoT Efficiency  6
Application of Developmental Services based on IoT Efficienc...
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Rawat, Vandana Singh, Neelam Bijalwan, Rahul Verma, Poonam Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Application Graphic Era Deemed to be University Dehradun India Department of Computer Applications Graphic Era Hill University Dehradun India
Internet of things (IoT) is a fast and conforming technology, having a standard emergence primarily connected to the wireless communication between actuators, gadgets, and electrical services all in general referred t... 详细信息
来源: 评论
Bitcoin-Blockchain Technology: Security Perspective  3
Bitcoin-Blockchain Technology: Security Perspective
收藏 引用
3rd International Conference on Intelligent engineering and Management, ICIEM 2022
作者: Ansar, Syed Anas Arya, Swati Aggrawal, Shruti Yadav, Jaya Pathak, Prabhash Chandra Babu Banarasi Das University Department of Computer Application Lucknow India Thapar Institute of Engineering and Technology Department of Computer Science and Engineering Patiala India University of Lucknow Department of Computer Science Lucknow India
Nowadays, Blockchain technology has also drawn mammoth attention as it is currently triggering multiple projects. This technology is the prevalent technology that allows Bitcoin to operate. Bitcoin has already cemente... 详细信息
来源: 评论
Graph Regularized Sparse Non-Negative Matrix Factorization for Clustering
收藏 引用
IEEE Transactions on Computational Social Systems 2023年 第3期10卷 910-921页
作者: Deng, Ping Li, Tianrui Wang, Hongjun Wang, Dexian Horng, Shi-Jinn Liu, Rui Southwest Jiaotong University National Engineering Laboratory of Integrated Transportation Big Data Application Technology School of Computing and Artificial Intelligence Chengdu611756 China National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan North Sichuan Medical College School of Preclinical Medicine Department of Computer and Mathematics Nanchong637100 China
The graph regularized nonnegative matrix factorization (GNMF) algorithms have received a lot of attention in the field of machine learning and data mining, as well as the square loss method is commonly used to measure... 详细信息
来源: 评论
Extrapolative Preservation Management of Medical Equipment through IoT  1
Extrapolative Preservation Management of Medical Equipment t...
收藏 引用
1st International Conference on Artificial Intelligence for Innovations in Healthcare Industries, ICAIIHI 2023
作者: Tripathi, Rajeev Mishra, Vinay Kumar Maheshwari, Himani Tiwari, Raj Gaurang Agarwal, Ambuj Kumar Gupta, Ashulekha School of Management Sciences Department of Computer Application and Sciences Lucknow India School of Computer Application Babu Banarasi das University Lucknow India School of Computing Graphic Era Hill University Uttrakhand Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India School of Engineering and Technology Sharda University Department of Computer Science and Engineering Greater Noida India
The healthcare industry is primarily driven by technological innovations as they are a significant source of inspiration to provide the best patient care. To provide patients with prompt, high-quality care, medical de... 详细信息
来源: 评论
Source Camera Identification Algorithm Based on Multi-Scale Feature Fusion
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3047-3065页
作者: Jianfeng Lu Caijin Li Xiangye Huang Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Shangyu Institute of Science and Engineering Hangzhou Dianzi UniversityShaoxing312300China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
The widespread availability of digital multimedia data has led to a new challenge in digital *** source camera identification algorithms usually rely on various traces in the capturing ***,these traces have become inc... 详细信息
来源: 评论
Using Trust-Based Data Integrity Verification and Energy-Aware Hierarchical Data Aggregation for WSN  11
Using Trust-Based Data Integrity Verification and Energy-Awa...
收藏 引用
11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022
作者: Singh, Dushyant Gaganpreet Vivekananda Global University Department of Computer Science Engineering Jaipur India Chandigarh School of Business Department of Master of Computer Application India
Because of their numerous uses, wireless sensor networks are currently quite popular. These nodes are typically placed in severe environments and have limited power supplies, making it difficult to replace them. Becau... 详细信息
来源: 评论
Designing Blockchain Based Consensus Mechanism for Smart Healthcare IoT
Designing Blockchain Based Consensus Mechanism for Smart Hea...
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Kumari, Trishla Kumar, Rakesh Dwivedi, Rajendra Kumar Madan Mohan Malviya University of Technology Dept. of Computer Science and Engineering Gorakhpur India Madan Mohan Malviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
In today's world, healthcare system is improving day by day by using smart IoT based system. Blockchain based system is totally a decentralized system due to which attackers are unable to access the confidential r... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing  4
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zhou, Jincheng Li, Yue Shen, Yujie Tang, Dan Cai, Hongliang Gong, Jing Bai, Ningchao School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
A range and radial velocity measurement method based on up-chirp and down-chirp LFM signal in pulsed radar
A range and radial velocity measurement method based on up-c...
收藏 引用
IET International Radar Conference 2023, IRC 2023
作者: Chen, Hao Lei, Yi Key Lab of Aperture Array and Space Application East China Research Institute of Electronic Engineering Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Range accuracy and radial velocity accuracy are important indexes in pulsed radar. However, in pulsed radar using linear frequency modulation (LFM) pulse, the range-Doppler coupling of LFM signal will lead to large ra... 详细信息
来源: 评论
Exploring Drug Sentiment Analysis with Machine Learning Techniques  6
Exploring Drug Sentiment Analysis with Machine Learning Tech...
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Rathod, Dharmendrasinh Patel, Kashyap Goswami, Akashgiri Jashvantgiri Degadwala, Sheshang Vyas, Dhairya Computer Science and Engineering Chandubhai S Patel Institute of Technology Charusat University India Department of Computer Engineering DEPSTAR Charotar University of Science and Technology India Silver Oak College of Computer Application Silver Oak Univercity Gota Gujarat Ahmedabad India Computer Engineering Department Sigma Institute of Engineering Gujarat Vadodara India The Maharaja Sayajirao University of Baroda Gujarat Vadodara India
This research investigates the use of machine learning techniques for sentiment analysis of drug re views, which is a crucial task for extracting valuable information from the vast amount of unstructured data availabl... 详细信息
来源: 评论