咨询与建议

限定检索结果

文献类型

  • 2,160 篇 会议
  • 1,035 篇 期刊文献
  • 34 册 图书

馆藏范围

  • 3,229 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,914 篇 工学
    • 1,392 篇 计算机科学与技术...
    • 1,118 篇 软件工程
    • 528 篇 信息与通信工程
    • 335 篇 控制科学与工程
    • 223 篇 生物工程
    • 217 篇 电气工程
    • 197 篇 生物医学工程(可授...
    • 167 篇 电子科学与技术(可...
    • 160 篇 网络空间安全
    • 136 篇 光学工程
    • 122 篇 机械工程
    • 116 篇 动力工程及工程热...
    • 115 篇 安全科学与工程
    • 107 篇 化学工程与技术
    • 99 篇 交通运输工程
    • 94 篇 核科学与技术
  • 1,140 篇 理学
    • 516 篇 数学
    • 411 篇 物理学
    • 255 篇 生物学
    • 171 篇 统计学(可授理学、...
    • 116 篇 化学
    • 108 篇 系统科学
  • 603 篇 管理学
    • 356 篇 管理科学与工程(可...
    • 262 篇 图书情报与档案管...
    • 158 篇 工商管理
  • 211 篇 医学
    • 162 篇 临床医学
    • 159 篇 基础医学(可授医学...
    • 112 篇 公共卫生与预防医...
    • 88 篇 药学(可授医学、理...
  • 115 篇 法学
    • 93 篇 社会学
  • 66 篇 农学
  • 61 篇 经济学
  • 31 篇 教育学
  • 24 篇 文学
  • 12 篇 军事学
  • 2 篇 艺术学

主题

  • 148 篇 accuracy
  • 100 篇 hadron colliders
  • 99 篇 deep learning
  • 93 篇 machine learning
  • 73 篇 computational mo...
  • 68 篇 feature extracti...
  • 65 篇 support vector m...
  • 65 篇 convolutional ne...
  • 60 篇 training
  • 58 篇 internet of thin...
  • 57 篇 artificial intel...
  • 50 篇 wireless sensor ...
  • 50 篇 real-time system...
  • 49 篇 optimization
  • 48 篇 predictive model...
  • 47 篇 security
  • 43 篇 medical services
  • 41 篇 data models
  • 38 篇 reliability
  • 35 篇 neural networks

机构

  • 136 篇 yerevan physics ...
  • 133 篇 national and kap...
  • 133 篇 centro brasileir...
  • 133 篇 istanbul technic...
  • 132 篇 irfu cea univers...
  • 131 篇 university of sp...
  • 131 篇 indian institute...
  • 130 篇 universidad iber...
  • 129 篇 brunel universit...
  • 129 篇 charles universi...
  • 128 篇 università di to...
  • 128 篇 academy of scien...
  • 128 篇 department of ph...
  • 128 篇 infn sezione di ...
  • 125 篇 infn sezione di ...
  • 124 篇 zhejiang univers...
  • 124 篇 university of de...
  • 124 篇 department of ph...
  • 123 篇 imperial college...
  • 122 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,063 篇 英文
  • 137 篇 其他
  • 31 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Technology and Application Department"
3229 条 记 录,以下是11-20 订阅
排序:
Deep learning for deepfake detection: Scientific landscape and future directions  4th
Deep learning for deepfake detection: Scientific landscape a...
收藏 引用
4th International Conference on Computational Methods in Science and technology, ICCMST 2024
作者: Dhiman, Pummy Kaur, Amandeep Sharma, Dilip Kumar Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Engineering and Application GLA University Mathura India
In today’s digital age, technology has advanced to the point where it is difficult to distinguish be-tween genuine and forged media content. It was intended to be used for entertainment, but it is now being used to d... 详细信息
来源: 评论
DYTC:Dynamic Graph Triangle Counting on GPU  24
DYTC:Dynamic Graph Triangle Counting on GPU
收藏 引用
8th International Conference on Algorithms, Computing and Systems, ICACS 2024
作者: Wang, Zhuo Li, Zhixiong Tu, Jinxing Huang, Jianqiang Department of Computer Technology and Applications Qinghai University Xining China Intelligent Computing and Application Laboratory of Qinghai Province Qinghai University Xining China
Triangle counting is a critical problem in graph theory and network analysis, with widespread applications in social network analysis, network science, and bioinformatics. Dynamic graphs are extensively utilized in va... 详细信息
来源: 评论
Forensic handwriting analysis: a hybrid classification framework for writer identification in Devanagari script
收藏 引用
Multimedia Tools and applications 2025年 1-12页
作者: Sethi, Monika Kumar, Munish Jindal, M.K. Department of Computer Science and Application Panjab University Chandigarh India P.G. Department of Information Technology Goswami Ganesh Dutta Sanatan Dharma College Chandigarh India Department of Computational Sciences Maharaja Ranjit Singh Punjab Technical University Punjab Bathinda India Department of Computer Science and Applications Panjab University Regional Centre Muktsar India
In a period marked by swift technological progress, the task of identifying writers through handwriting holds significant importance across various domains, including forensic investigation, plagiarism detection, and ... 详细信息
来源: 评论
Fuzzy Decision-Based Clustering for Efficient Data Aggregation in Mobile UWSNs
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 259-279页
作者: Aadil Mushtaq Pandith Manni Kumar Naveen Kumar Nitin Goyal Sachin Ahuja Yonis Gulzar Rashi Rastogi Rupesh Gupta Department of Computer Science and Engineering Lovely Professional UniversityJalandhar144402PunjabIndia Department of Computer Science and Engineering Chandigarh UniversityMohali140413PunjabIndia Salesforce Inc. DallasTX 75201USA Department of Computer Science and Engineering School of Engineering and TechnologyCentral University of HaryanaMahendragarh123031HaryanaIndia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Application Sir Chhotu Ram Institute of Engineering and TechnologyCh.Charan Singh UniversityMeerut250001Uttar PradeshIndia Chitkara University Institute of Engineering and Technology Chitkara UniversityRajpura140401PunjabIndia
Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the ***,many existing data aggregation techniq... 详细信息
来源: 评论
Comparative study of IoT- and AI-based computing disease detection approaches
收藏 引用
Data Science and Management 2025年 第1期8卷 94-106页
作者: Rhmann, Wasiur Khan, Jalaluddin Khan, Ghufran Ahmad Ashraf, Zubair Pandey, Babita Khan, Mohammad Ahmar Ali, Ashraf Ishrat, Amaan Alghamdi, Abdulrahman Abdullah Ahamad, Bilal Shaik, Mohammad Khaja Department of Computer Application Lovely Professional University Punjab Phagwara144411 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Guntur522502 India School of Computing Science and Engineering VIT Bhopal University Kothrikalan MP Sehore466114 India Babasaheb Bhimrao Ambedkar University Lucknow226025 India College of Commerce and Business Administration Dhofar University Salalah211 Oman Faculty of Computer Studies Arab Open University 18211 Bahrain Department of Computer Application Shri Ramswaroop Memorial University Lucknow225003 India College of Computing and Information Technology Shaqra University Shaqra11961 Saudi Arabia
The emergence of different computing methods such as cloud-, fog-, and edge-based Internet of Things (IoT) systems has provided the opportunity to develop intelligent systems for disease detection. Compared to other m... 详细信息
来源: 评论
Detecting Social Media Counterfeit Using Deep Learning Algorithm
Detecting Social Media Counterfeit Using Deep Learning Algor...
收藏 引用
International Conference on Inventive Computation Technologies (ICICT)
作者: Mervin A Shanthi H J Department of computer Application Hindustan institute of technology and Science Chennai Tamilnadu India Department of computer Application Hindustan institute of technology and Science Chennai India
The rapid dissemination of fake news via traditional and digital platforms has emerged as one of the most critical challenges of today's information-driven society. Fake news, which is also known as deliberately f... 详细信息
来源: 评论
Investigating the Impact of Public-Key Infrastructure in Information Security Models for Networked applications  5th
Investigating the Impact of Public-Key Infrastructure in Inf...
收藏 引用
5th International Conference on Data Science, Machine Learning and applications, ICDSMLA 2023
作者: Shree, Ritu Saxena, Kumud Mehta, Deepak Pandeya, Megha Department of Computer Science and Application Vivekananda Global University Jaipur India Department of Computer Science Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Public-key infrastructure (PKI) is poised to play a crucial function in the use of secure data technology systems. With the increasing complexity of these dais’s networks and packages, PKI gives a reliable way to ele... 详细信息
来源: 评论
ColorVein: Colorful Cancelable Vein Biometrics
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4943-4955页
作者: Wang, Yifan Gui, Jie Shi, Xinli Gui, Linqing Tang, Yuan Yan Kwok, James Tin-Yau Southeast University School of Cyber Science and Engineering Nanjing210000 China Ministry of Education Purple Mountain Laboratories Engineering Research Center of Blockchain Application Nanjing210000 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210003 China University of Macao Department of Computer and Information Science 999078 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong
Vein recognition technologies have become one of the primary solutions for high-security identification systems. However, the issue of biometric information leakage can still pose a serious threat to user privacy and ... 详细信息
来源: 评论
Balancing data imbalance in biomedical datasets using a stacked augmentation approach with STDA, DAGAN, and pufferfish optimization to reveal AI's transformative impact
收藏 引用
International Journal of Information technology (Singapore) 2025年 第1期17卷 455-480页
作者: Veedhi, Bhaskar Kumar Das, Kaberi Mishra, Debahuti Mishra, Sashikala Behera, Mandakini Priyadarshani Department of Computer Science and Engineering Siksha ‘O’ Anusandhan (Deemed to Be) University Odisha Bhubaneswar India Department of Computer Application Siksha ‘O’ Anusandhan (Deemed to Be) University Odisha Bhubaneswar India Department of Computer Science and Engineering Symbiosis Institute of Technology Symbiosis International (Deemed to Be) University Maharashtra Pune India School of Computer Engineering KIIT (Deemed to Be) University Odisha Bhubaneswar India
This study systematically assesses the effectiveness of data augmentation techniques, focusing particularly on the stacked approach, across a diverse range of biomedical datasets. Advanced data augmentation methods, i... 详细信息
来源: 评论
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论