咨询与建议

限定检索结果

文献类型

  • 30,938 篇 会议
  • 21,086 篇 期刊文献
  • 433 册 图书

馆藏范围

  • 52,457 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31,643 篇 工学
    • 22,350 篇 计算机科学与技术...
    • 17,810 篇 软件工程
    • 6,722 篇 信息与通信工程
    • 4,705 篇 控制科学与工程
    • 3,770 篇 电气工程
    • 3,466 篇 生物工程
    • 3,130 篇 电子科学与技术(可...
    • 2,506 篇 生物医学工程(可授...
    • 2,403 篇 光学工程
    • 2,065 篇 机械工程
    • 1,780 篇 化学工程与技术
    • 1,536 篇 动力工程及工程热...
    • 1,501 篇 仪器科学与技术
    • 1,384 篇 材料科学与工程(可...
    • 1,273 篇 网络空间安全
    • 1,148 篇 安全科学与工程
  • 19,259 篇 理学
    • 9,749 篇 数学
    • 6,617 篇 物理学
    • 3,920 篇 生物学
    • 3,054 篇 统计学(可授理学、...
    • 2,051 篇 化学
    • 1,845 篇 系统科学
  • 8,575 篇 管理学
    • 5,195 篇 管理科学与工程(可...
    • 3,739 篇 图书情报与档案管...
    • 2,318 篇 工商管理
  • 2,551 篇 医学
    • 2,146 篇 临床医学
    • 1,881 篇 基础医学(可授医学...
    • 1,123 篇 药学(可授医学、理...
    • 1,115 篇 公共卫生与预防医...
  • 1,439 篇 法学
    • 1,151 篇 社会学
  • 900 篇 经济学
  • 659 篇 农学
  • 629 篇 教育学
  • 176 篇 文学
  • 116 篇 军事学
  • 111 篇 艺术学
  • 33 篇 哲学
  • 13 篇 历史学

主题

  • 1,356 篇 accuracy
  • 1,342 篇 deep learning
  • 1,162 篇 feature extracti...
  • 1,103 篇 computational mo...
  • 1,057 篇 machine learning
  • 1,009 篇 training
  • 891 篇 computer science
  • 706 篇 predictive model...
  • 634 篇 semantics
  • 622 篇 real-time system...
  • 602 篇 internet of thin...
  • 599 篇 data models
  • 502 篇 artificial intel...
  • 477 篇 data mining
  • 470 篇 support vector m...
  • 467 篇 convolutional ne...
  • 460 篇 optimization
  • 445 篇 cloud computing
  • 410 篇 neural networks
  • 409 篇 educational inst...

机构

  • 905 篇 institute of com...
  • 877 篇 university of ch...
  • 356 篇 university of sc...
  • 269 篇 school of comput...
  • 210 篇 institute of hig...
  • 207 篇 college of intel...
  • 179 篇 department of co...
  • 169 篇 key laboratory o...
  • 159 篇 department of co...
  • 155 篇 department of co...
  • 148 篇 college of compu...
  • 140 篇 college of compu...
  • 139 篇 school of comput...
  • 138 篇 shandong provinc...
  • 129 篇 key laboratory o...
  • 113 篇 faculty of compu...
  • 113 篇 school of comput...
  • 109 篇 department of ph...
  • 103 篇 department of co...
  • 98 篇 college of compu...

作者

  • 307 篇 hai jin
  • 203 篇 jin hai
  • 202 篇 niyato dusit
  • 155 篇 cheng xueqi
  • 115 篇 bastieri d.
  • 89 篇 ferrara g.
  • 89 篇 ardid m.
  • 88 篇 calvo d.
  • 87 篇 chen a.
  • 86 篇 li xin
  • 85 篇 zhang lei
  • 81 篇 li cheng
  • 75 篇 fang j.
  • 75 篇 feng c.f.
  • 69 篇 jiang k.
  • 68 篇 kuleshov d.
  • 64 篇 gal t.
  • 61 篇 bozza c.
  • 55 篇 wang lei
  • 54 篇 lei wang

语言

  • 42,220 篇 英文
  • 9,779 篇 其他
  • 579 篇 中文
  • 21 篇 日文
  • 11 篇 德文
  • 6 篇 斯洛文尼亚文
  • 5 篇 法文
  • 5 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 西班牙文
  • 1 篇 捷克文
检索条件"机构=Computing Science and Technology"
52457 条 记 录,以下是241-250 订阅
排序:
Face Recognition Approach Using the Deep Learning Techniques  1
Face Recognition Approach Using the Deep Learning Techniques
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Al-Dilami, Redwan Zahary, Ammer T. Al-Sharafi, Abobakr Al-Anashi, Osamah Maresh, Suliman Faculty of Computing and TT University of Science and Technology Sana’a Yemen
Facial recognition technology has emerged as a pivotal tool in both security and technical domains. Its adoption has accelerated in several developed nations, where it finds applications across various sectors. For in... 详细信息
来源: 评论
Application of CNN Based Deep Learning Algorithm for Herbal Plant Leaf Detection
Application of CNN Based Deep Learning Algorithm for Herbal ...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Pongiannan, R.K. Das, Sagardeep Purbia, Rudra Prakash Brindha, R. Jame, S. Lourde Shiju Kumar, P.S. Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur India
The medicinal plant market faces challenges due to inefficiencies and a lack of transparency. In this paper, a total of 10GB dataset with 10,000 entries, including 15 attributes such as plant name, region, price, and ... 详细信息
来源: 评论
Detection and Classification of Monkeypox Disease with Chatbot  3
Detection and Classification of Monkeypox Disease with Chatb...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Chandu, P. Siddardha, P. Priyadharshini, K. Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur India
Monkeypox detection is essential for effective public health management and controlling its spread. Timely detection enables early intervention in outbreaks, reducing transmission risk. This project presents an innova... 详细信息
来源: 评论
Comprehensive Methods for Secure Medical Image Transfer: Encryption and Standardization Techniques
Comprehensive Methods for Secure Medical Image Transfer: Enc...
收藏 引用
2024 International Conference on science, technology, Engineering and Management, ICSTEM 2024
作者: Priyadharshini, K. Nandi, Hitesh Parmar, Harsh Dept. of Computing Technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India
The primary goal of the process is to securely transfer medical images. This involves utilizing MRI datasets for processing and applying resizing and filtering techniques such as Conv2D and Gaussian blur to standardiz... 详细信息
来源: 评论
Explainable AI in Large Language Models: A Review  2
Explainable AI in Large Language Models: A Review
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Sauhandikaa, S. Bhagavath Narenthranath, R. Sathya Bama Krishna, R. Sathyabama Institute of Science and Technology School of Computing Chennai India
Explainable AI in Large Language Models (LLMs) represents an exciting frontier in Artificial Intelligence. In recent times, LLMs provides various AI applications ranging from chatbots to content generation. While thes... 详细信息
来源: 评论
Multi-dataset learning with channel modulation loss for blind image quality assessment
收藏 引用
Multimedia Tools and Applications 2024年 第40期83卷 88159-88178页
作者: Li, Hui Yan, Zhaoyi Fan, Xiaopeng Department of Computing Science Harbin Institute of Technology Harbin China Department of Network Intelligence Pengcheng Laboratory Shenzhen China
In Blind Image Quality Assessment (BIQA), due to the problem of laborious labeling, it is perceived as the intractability of collecting a new large-scale dataset that has plentiful images with a large diversity in dis... 详细信息
来源: 评论
Big Data analytics for privacy through ND-homomorphic encryption
收藏 引用
Journal of Control and Decision 2023年 第1期10卷 64-71页
作者: S.Saravanan N.Poornima Department of CSE SRM Institute of Science and TechnologyChennaiIndia Department of Data Science and Business Systems School of ComputingSRM Institute of Science and TechnologyKattankulathurIndia
Rapidly rising the quantity of Big Data is an opportunity to flout the privacy of people. Whenhigh processing capacity and massive storage are required for Big Data, distributed networkshave been used. There are sever... 详细信息
来源: 评论
Empowering Inquisitive Learners: ICT and Holistic Development in University 5.0  13
Empowering Inquisitive Learners: ICT and Holistic Developmen...
收藏 引用
13th IEEE International Conference on Teaching, Assessment and Learning for Engineering, TALE 2024
作者: Rajagopal, Balaji Ganesh Kannan Raju, Jagadeesh Jacob, Mincy Rachel Srm Institute of Science and Technology School of Computing Tiruchirappalli India
University 5.0 thrives on the transformative power of ICT. Digital learning platforms, virtual labs, and collaborative software elevate the educational experience by fostering creativity and inclusivity. These tools r... 详细信息
来源: 评论
Deep Guard Authenticator  15
Deep Guard Authenticator
收藏 引用
15th International Conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2024
作者: Das, Deepshikha Sarkar, Shreyan Rizvi, Hamid Shobana, M. SRM Institute of Science and Technology School of Computing Chennai India
A novel method for detecting deepfakes by presenting an AI architecture that is dynamic and adaptable and is designed and exclusively for picture authentication. Conventional deepfake detection models frequently find ... 详细信息
来源: 评论
A review on network function virtualisation security challenges and design considerations
收藏 引用
International Journal of Networking and Virtual Organisations 2024年 第4期31卷 368-393页
作者: Ahmad, Naveed Rathore, Muhammad Siraj Ngadi, Md Asri bin Faculty of Engineering University Teknologi Malaysia 81110 Malaysia Faculty of Computing Department of Computer Science Capital University of Science and Technology Islamabad46000 Pakistan
Network function virtualisation (NFV) offers several benefits to both network operators and end users. It is a more programmable and low-cost solution as compared to a traditional network. Since the network functions ... 详细信息
来源: 评论