咨询与建议

限定检索结果

文献类型

  • 7,794 篇 会议
  • 2,985 篇 期刊文献
  • 145 册 图书
  • 2 篇 科技报告

馆藏范围

  • 10,926 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,011 篇 工学
    • 4,528 篇 计算机科学与技术...
    • 3,611 篇 软件工程
    • 1,509 篇 信息与通信工程
    • 1,123 篇 控制科学与工程
    • 736 篇 电气工程
    • 703 篇 生物工程
    • 640 篇 生物医学工程(可授...
    • 548 篇 电子科学与技术(可...
    • 462 篇 网络空间安全
    • 433 篇 机械工程
    • 378 篇 动力工程及工程热...
    • 378 篇 安全科学与工程
    • 368 篇 光学工程
    • 334 篇 化学工程与技术
    • 301 篇 交通运输工程
  • 3,386 篇 理学
    • 1,657 篇 数学
    • 939 篇 物理学
    • 831 篇 生物学
    • 513 篇 统计学(可授理学、...
    • 387 篇 系统科学
    • 372 篇 化学
  • 2,073 篇 管理学
    • 1,391 篇 管理科学与工程(可...
    • 805 篇 工商管理
    • 744 篇 图书情报与档案管...
  • 790 篇 医学
    • 623 篇 临床医学
    • 571 篇 基础医学(可授医学...
    • 431 篇 公共卫生与预防医...
    • 306 篇 药学(可授医学、理...
  • 447 篇 法学
    • 383 篇 社会学
  • 357 篇 经济学
    • 352 篇 应用经济学
  • 258 篇 农学
  • 146 篇 教育学
  • 57 篇 文学
  • 22 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 468 篇 accuracy
  • 370 篇 deep learning
  • 349 篇 machine learning
  • 287 篇 internet of thin...
  • 272 篇 real-time system...
  • 270 篇 computational mo...
  • 255 篇 feature extracti...
  • 249 篇 predictive model...
  • 236 篇 computer science
  • 222 篇 support vector m...
  • 210 篇 artificial intel...
  • 176 篇 data mining
  • 164 篇 optimization
  • 156 篇 training
  • 154 篇 convolutional ne...
  • 147 篇 medical services
  • 146 篇 security
  • 142 篇 reliability
  • 130 篇 scalability
  • 128 篇 neural networks

机构

  • 139 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 127 篇 universidad iber...
  • 127 篇 istanbul technic...
  • 123 篇 brunel universit...
  • 123 篇 university of sp...
  • 122 篇 infn sezione di ...
  • 120 篇 università di to...
  • 118 篇 academy of scien...
  • 118 篇 indian institute...
  • 113 篇 infn sezione di ...
  • 108 篇 charles universi...
  • 106 篇 department of ph...
  • 105 篇 zhejiang univers...
  • 101 篇 imperial college...
  • 100 篇 centre of resear...
  • 90 篇 state university...
  • 90 篇 rwth aachen univ...
  • 87 篇 irfu cea univers...

作者

  • 125 篇 m. lu
  • 96 篇 c. hensel
  • 94 篇 g. tonelli
  • 94 篇 d. barney
  • 94 篇 l. valencia palo...
  • 94 篇 t. liu
  • 94 篇 a. garcia-bellid...
  • 94 篇 a. steen
  • 94 篇 n. cartiglia
  • 94 篇 d. eliseev
  • 93 篇 a. babaev
  • 93 篇 v. karjavine
  • 92 篇 n. colino
  • 92 篇 f. moortgat
  • 91 篇 b. clerbaux
  • 90 篇 g. sultanov
  • 90 篇 a. mallampalli
  • 89 篇 m. a. ciocci
  • 88 篇 k. lamichhane
  • 88 篇 s. maselli

语言

  • 10,351 篇 英文
  • 523 篇 其他
  • 67 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Department of Computer Application Institute of Engineering and Management"
10926 条 记 录,以下是1-10 订阅
排序:
An Analytical Survey on Credit Scoring Mechanism in India  2nd
An Analytical Survey on Credit Scoring Mechanism in India
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Bhowmik, Ankan Basu, Arkajyoti Basu, Arittra Paul, Anish Roy, Atrri Department of Computer Application and Science Institute of Engineering and Management Kolkata India
Credit score is an important indicator to lenders of your capability to repay loans. A consumer's creditworthiness is indicated by a number between 300 and 850 called a credit score. The advanced the score, the be... 详细信息
来源: 评论
Skin Lesion Segmentation Using Deep Learning  2nd
Skin Lesion Segmentation Using Deep Learning
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Sarkar, Kaustav Haralalka, Varun Shaw, Vishal Singh, Rishav Raj Jaiswal, Rayirth Pramanick, Tridip Department of Computer Application and Science Institute of Engineering and Management Kolkata India
Dermoscopic image analysis has gained significant importance for dermatological applications due to its potential in eliminating observer bias. Segmenting lesion areas automatically in these images is crucial for expe... 详细信息
来源: 评论
A Random Walk-Based Approach for Clustering of Food Items  2nd
A Random Walk-Based Approach for Clustering of Food Items
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Das, Priyanka Bhattacharya, Rupam Department of Computer Application Institute of Engineering and Management West Bengal Kolkata India
Most of the recipe sites have a distinct page structure comprising a title, list of ingredients, preparation instructions, comments, and thus it is very challenging to cluster similar recipes. The work presented here ... 详细信息
来源: 评论
A Crime Knowledge Discovery Scheme Based on Entity Recognition, Relation Extraction, and Development of Criminal Profiling Using Modus Operandi  11th
A Crime Knowledge Discovery Scheme Based on Entity Recognit...
收藏 引用
11th International Conference on Intelligent Computing and applications, ICRTC 2023
作者: Das, Priyanka Dhar, Sayan Banerjee, Shreedatri Basak, Shirsha Nandi, Sneha Saha, Sneha Department of Computer Application Institute of Engineering and Management West Bengal Kolkata India
In this paper, a criminal knowledge discovery scheme is proposed for analysing the crime situation in India. The approach pulls information regarding crime against women in Indian states and union territories from a s... 详细信息
来源: 评论
Crime Analysis Using Graph-Based Feature Selection  11th
Crime Analysis Using Graph-Based Feature Selection
收藏 引用
11th International Conference on Intelligent Computing and applications, ICRTC 2023
作者: Das, Priyanka Dutta, Arindam Das, Bikash Kar, Madhuja Chakraborty, Sudipta Department of Computer Application and Science Institute of Engineering and Management West Bengal Kolkata India
The current study extracts all potential crime attributes from reported offenses and selects just those that are needed for crime pattern assessment. To accomplish this, before using a crime report, it is processed, a... 详细信息
来源: 评论
Utilization of Two Cross Two Switch for Bitonic Sorting Circuit
收藏 引用
Micro and Nanosystems 2025年 第1期17卷 45-57页
作者: Bhattacharjee, Subhasree Sarkar, Soumyadip Das, Kunal Sadhu, Arindam Sarkar, Bikramjit Department of Computer Application Narula Institute of Technology Kolkata India Department of Computer Science Acharya Prafulla Chandra College Kolkata India Department of Electronics & Communication Engineering Greater Kolkata College of Engineering and Management West Bengal India Department of Computer Science & Engineering JIS College of Engineering West Bengal India
Background: The synthesis of reversible logic has gained prominence as a crucial research area, particularly in the context of post-CMOS computing devices, notably quantum computing. Objective: To implement the bitoni... 详细信息
来源: 评论
Rough Set Based Recipe Clustering Approach  10
Rough Set Based Recipe Clustering Approach
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Das, Priyanka Mukherjee, Chandrani Gupta, Samiksha Roy, Sayan Shah, Khushi Singh, Shreya Institute of Engineering & Management Dept. of Computer Application and Science Kolkata India
Online cooking instructions including ingredient lists and cooking methods are now widely available due to the proliferation of recipe sharing websites. Finding novel and complex patterns in such vast, ambiguous categ... 详细信息
来源: 评论
Classification of Foods based on Bijective Soft Set  15
Classification of Foods based on Bijective Soft Set
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Das, Priyanka Bhattacharya, Rupam Dept. of Computer Application and Science Institute of Engineering & Management Kolkata India
Cuisine data is typically classified using images of the cuisine, cooking methods, cooking utensils, and, most importantly, ingredients. The vast amount of recipe data available on the internet necessitates the creati... 详细信息
来源: 评论
A Graph Based Approach For Detecting Sybil Node In Online Social Networks  15
A Graph Based Approach For Detecting Sybil Node In Online So...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Chandra, Sucheta Das, Priyanka Institute of Engineering & Management Dept. of Computer Application and Science Kolkata India
Sybil attacks pose a significant threat to the security and integrity of online social networks by allowing malicious actors to create multiple fake identities to manipulate network behavior. The abstract outlines a m... 详细信息
来源: 评论
Fall Detection and Alerts in Hearing Aids for Deaf using Generative AI  2
Fall Detection and Alerts in Hearing Aids for Deaf using Gen...
收藏 引用
2nd International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Tripathi, Bharat Lal Saini, Madan Jain, Manish Saxena, Apoorva Pal, Narendra Department of Computer Application Allenhouse Institute of Technology Kanpur India Department of Computer Science and Engineering Apex Institute of Technology Chandigarh University Punjab India Department of Computer Application Allenhouse Business School Kanpur India Department of Computer Science & Engineering Axis Institute of Technology & Management Kanpur India Department of Computer Science & Engineering Invertis University Bareilly India
Individuals with sensorineural hearing loss often experience difficulty comprehending speech when background noise is present. This paper investigates the extent of this problem in various listening scenarios and with... 详细信息
来源: 评论