咨询与建议

限定检索结果

文献类型

  • 2,177 篇 会议
  • 1,029 篇 期刊文献
  • 35 册 图书

馆藏范围

  • 3,241 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,916 篇 工学
    • 1,392 篇 计算机科学与技术...
    • 1,118 篇 软件工程
    • 528 篇 信息与通信工程
    • 337 篇 控制科学与工程
    • 223 篇 生物工程
    • 213 篇 电气工程
    • 196 篇 生物医学工程(可授...
    • 166 篇 电子科学与技术(可...
    • 161 篇 网络空间安全
    • 134 篇 光学工程
    • 122 篇 机械工程
    • 121 篇 安全科学与工程
    • 117 篇 动力工程及工程热...
    • 107 篇 化学工程与技术
    • 100 篇 交通运输工程
    • 95 篇 核科学与技术
  • 1,147 篇 理学
    • 522 篇 数学
    • 410 篇 物理学
    • 256 篇 生物学
    • 173 篇 统计学(可授理学、...
    • 116 篇 化学
    • 108 篇 系统科学
  • 602 篇 管理学
    • 357 篇 管理科学与工程(可...
    • 262 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 210 篇 医学
    • 164 篇 临床医学
    • 160 篇 基础医学(可授医学...
    • 112 篇 公共卫生与预防医...
    • 88 篇 药学(可授医学、理...
  • 116 篇 法学
    • 95 篇 社会学
  • 67 篇 农学
  • 60 篇 经济学
  • 31 篇 教育学
  • 24 篇 文学
  • 12 篇 军事学
  • 2 篇 艺术学

主题

  • 147 篇 accuracy
  • 100 篇 deep learning
  • 100 篇 hadron colliders
  • 95 篇 machine learning
  • 73 篇 computational mo...
  • 68 篇 feature extracti...
  • 66 篇 support vector m...
  • 65 篇 convolutional ne...
  • 61 篇 training
  • 59 篇 artificial intel...
  • 58 篇 internet of thin...
  • 50 篇 wireless sensor ...
  • 49 篇 optimization
  • 49 篇 predictive model...
  • 49 篇 real-time system...
  • 47 篇 security
  • 42 篇 medical services
  • 41 篇 data models
  • 38 篇 reliability
  • 34 篇 neural networks

机构

  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 128 篇 irfu cea univers...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 department of ph...
  • 125 篇 infn sezione di ...
  • 122 篇 infn sezione di ...
  • 121 篇 zhejiang univers...
  • 121 篇 university of de...
  • 121 篇 department of ph...
  • 120 篇 imperial college...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 2,985 篇 英文
  • 225 篇 其他
  • 32 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Application and Technology"
3241 条 记 录,以下是81-90 订阅
排序:
Research on identity authentication and labeling technology based on MR neural network
Research on identity authentication and labeling technology ...
收藏 引用
2022 International Conference on Artificial Intelligence, Virtual Reality, and Visualization, AIVRV 2022
作者: Yang, Hao Tang, Chuanqian Department of Computer Technology and Application Qinghai University Qinghai Xining810016 China
Aiming at the problems of poor convenience, poor scalability, and low authentication rate in traditional authentication technology using physical contact authentication methods such as magnetic cards and passwords, th... 详细信息
来源: 评论
Selection of Digital Watermarking Techniques for Medical Image Security by Using the Fuzzy Analytical Hierarchy Process
收藏 引用
Recent Advances in computer Science and Communications 2023年 第7期16卷 74-80页
作者: Ahmad, Masood Nadeem, Mohd Islam, Mohd Ali, Saquib Agrawal, Alka Khan, Raees Ahmad Department of Information Technology Babasaheb Bhimrao Ambedkar University Uttar Pradesh Lucknow226025 India Department of Computer Science & Application Era University Lucknow India
Background: The watermarking technique is a security algorithm for medical images and the patient's information. Watermarking is used for maintaining the robustness, integrity, confidentiality, authentication, and... 详细信息
来源: 评论
Multimodal emotion recognition model via hybrid model with improved feature level fusion on facial and EEG feature set
收藏 引用
Multimedia Tools and applications 2025年 第1期84卷 1-36页
作者: Singh, Pratima Tripathi, Mukesh Kumar Patil, Mithun B. Shivendra Neelakantappa, Madugundu Department of Computer Science and Engineering Galgotias University Gautam Buddh Nagar Uttar Pradesh India Department of Computer Science and Engineering Vardhaman College of Engineering Telangana Hyderabad India Department of Computer Science and Engineering N K Orchid College of Engineering & Technology Maharastra Solapur India Department of Computer Application D. K. College Dumraon Bihar Buxar India Department of Information Technology Vasavi College of Engineering Telangana Hyderabad India
In recent years, academics have placed a high value on multi-modal emotion identification, as well as extensive research has been conducted in the areas of video, text, voice, and physical signal emotion detection. Th... 详细信息
来源: 评论
Overcoming Spatial Constraints in VR:A Survey of Redirected Walking Techniques
收藏 引用
Journal of computer Science & technology 2024年 第4期39卷 841-870页
作者: Jia-Hong Liu Yang-Fu Ren Qi Wen Gan Kui Huang Fiona Xiao Yu Chen Er-Xia Luo Khang Yeu Tang Yue-Yao Fu Cheng-Wei Fan Sen-Zhe Xu Song-Hai Zhang Academy of Arts and Design Tsinghua UniversityBeijing 100084China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China College of Computer Technology and Application Qinghai UniversityXining 810016China Zhili College Tsinghua UniversityBeijing 100084China School of Computer Beijing Information Science and Technology UniversityBeijing 100192China Department of Physics Tsinghua UniversityBeijing 100084China School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China
As the virtual reality(VR)technology strives to provide immersive and natural user experiences,the challenge of aligning vast virtual environments with limited physical spaces remains *** survey comprehensively explor... 详细信息
来源: 评论
Privacy Preservation in Federated Learning, its Attacks and Defenses using SMC-GAN  3
Privacy Preservation in Federated Learning, its Attacks and ...
收藏 引用
3rd International Conference on Secure Cyber Computing and Communications, ICSCCC 2023
作者: Maurya, Jyoti Prakash, Shiva Madan Mohan Malaviya University of Technology Department of Information Technology and Computer Application Gorakhpur273010 India
When using collaborative machine learning, maintaining privacy is a major concern because different parties want to train a model on their own data without sharing it with others. In collaborative machine learning, th... 详细信息
来源: 评论
Addressing the role and opportunities of machine learning utilization in brain tumor detection  9th
Addressing the role and opportunities of machine learning ut...
收藏 引用
9th International Conference on computer Science and Computational Intelligence, ICCSCI 2024
作者: Lesmana, Vallerie Delia Agustine, Holly Wairooy, Irma Kartika Makalew, Brilly Andro Computer Science Department School of Computer Science Binus University Jakarta11480 Indonesia Mobile Application & Technology Program Computer Science Department Binus University Jakarta11480 Indonesia
This research aims to develop a brain tumor detection model by utilizing the machine learning techniques and Convolutional Neural Network (CNN). A significant matter to address is revolving around early detection and ... 详细信息
来源: 评论
Deep Learning Techniques for Identification of Pneumonia: A CNN Approach  2
Deep Learning Techniques for Identification of Pneumonia: A ...
收藏 引用
2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Das, Ruchika Nayak, Debasish Swapnesh Kumar Rout, Chinmayee Priyadarshini Jena, Lambodar Swarnkar, Tripti Siksha 'o' Anusandhan University Department of Computer Science and Engineering Bhubaneswar India Nalanda Institute of Technology Department of Computer Application Bhubaneswar India Siksha 'O Anusandhan University Department of Data Science Bhubaneswar India Siksha 'o' Anusandhan University Department of Computer Application Bhubaneswar India
Pneumonia is an inflammatory lung disease that mostly affects the tiny air sacs known as alveoli in human bodies. Pneumonia may be caused by bacteria, viruses, or fungi. Mild to severe symptoms may include a mucus-pro... 详细信息
来源: 评论
An empirical analysis of evolutionary computing approaches for IoT security assessment
收藏 引用
Journal of Intelligent and Fuzzy Systems 2025年 第6期48卷 779-791页
作者: Kumar Sahu, Vinay Pandey, Dhirendra Singh, Priyanka Haque Ansari, Md Shamsul Khan, Asif Varish, Naushad Khan, Mohd Waris Department of Information Technology Babasaheb Bhim Rao Ambedkar University Uttar Pradesh Lucknow India CSE Department SRM University AP India Department of Computer Application Integral University Uttar Pradesh Lucknow India Telangana Hyderabad India Department of Computer Science Jamia Millia Islamia New Delhi India
The Internet of Things (IoT) strategy enables physical objects to easily produce, receive, and exchange data. IoT devices are getting more common in our daily lives, with diverse applications ranging from consumer sec... 详细信息
来源: 评论
Patients Medical Record Monitoring Using IoT Based Biometrics Blockchain Security System
Patients Medical Record Monitoring Using IoT Based Biometric...
收藏 引用
2023 International Conference on IoT, Communication and Automation technology, ICICAT 2023
作者: Gautam, Kamlesh Kumar Prakash, Shiva Dwivedi, R.K. Madam Mohan Malaviya University of Technology Department of Information Technology & Computer Application UP Gorakhpur India
The Patient medical record monitoring using IoT based Biometrics and blockchain security system suggests an innovative strategy for patient monitoring of their health and disease that combines the Internet of Things (... 详细信息
来源: 评论
Privacy Preservation in Federated Learning: its Attacks and Defenses  3
Privacy Preservation in Federated Learning: its Attacks and ...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Maurya, Jyoti Prakash, Shiva Madan Mohan Malaviya University of Technology Department of Information Technology and Computer Application Gorakhpur273010 India
In the context of artificial intelligence, the traditional centralized server-based machine learning model training approaches have significant security and privacy issues. The federated learning (FL) approach was cre... 详细信息
来源: 评论