咨询与建议

限定检索结果

文献类型

  • 2,602 篇 期刊文献
  • 2,047 篇 会议
  • 53 册 图书

馆藏范围

  • 4,702 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,936 篇 工学
    • 1,833 篇 计算机科学与技术...
    • 1,466 篇 软件工程
    • 503 篇 信息与通信工程
    • 494 篇 生物工程
    • 439 篇 生物医学工程(可授...
    • 401 篇 控制科学与工程
    • 385 篇 电子科学与技术(可...
    • 376 篇 电气工程
    • 341 篇 光学工程
    • 235 篇 化学工程与技术
    • 173 篇 材料科学与工程(可...
    • 161 篇 机械工程
    • 145 篇 仪器科学与技术
    • 128 篇 力学(可授工学、理...
    • 121 篇 动力工程及工程热...
  • 2,457 篇 理学
    • 1,241 篇 数学
    • 866 篇 物理学
    • 623 篇 生物学
    • 446 篇 统计学(可授理学、...
    • 307 篇 化学
    • 261 篇 系统科学
    • 94 篇 地球物理学
  • 674 篇 管理学
    • 393 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 191 篇 工商管理
  • 391 篇 医学
    • 322 篇 临床医学
    • 286 篇 基础医学(可授医学...
    • 178 篇 药学(可授医学、理...
    • 140 篇 公共卫生与预防医...
  • 111 篇 法学
    • 96 篇 社会学
  • 111 篇 农学
  • 54 篇 经济学
  • 36 篇 教育学
  • 11 篇 军事学
  • 9 篇 文学
  • 3 篇 哲学
  • 3 篇 艺术学
  • 1 篇 历史学

主题

  • 113 篇 deep learning
  • 106 篇 machine learning
  • 93 篇 accuracy
  • 92 篇 computational mo...
  • 73 篇 feature extracti...
  • 70 篇 computer science
  • 66 篇 training
  • 64 篇 optimization
  • 61 篇 predictive model...
  • 60 篇 support vector m...
  • 54 篇 artificial intel...
  • 53 篇 neural networks
  • 45 篇 data mining
  • 41 篇 computer archite...
  • 40 篇 image segmentati...
  • 40 篇 real-time system...
  • 39 篇 convolutional ne...
  • 38 篇 data models
  • 36 篇 scalability
  • 35 篇 internet of thin...

机构

  • 27 篇 department of co...
  • 24 篇 institute for co...
  • 23 篇 department of co...
  • 23 篇 department of ma...
  • 22 篇 science institut...
  • 21 篇 computational sc...
  • 19 篇 srm institute of...
  • 17 篇 department of co...
  • 16 篇 computational sc...
  • 16 篇 department of co...
  • 14 篇 shenzhen key lab...
  • 14 篇 ieee
  • 14 篇 institute for co...
  • 13 篇 division of comp...
  • 13 篇 shenzhen key lab...
  • 12 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 computer computa...
  • 12 篇 division of comp...
  • 12 篇 department of ph...

作者

  • 33 篇 abdullah nzar ra...
  • 19 篇 gudmundsson vida...
  • 15 篇 yunyoung nam
  • 15 篇 jacek m. zurada
  • 15 篇 qian xiaoning
  • 15 篇 yoon byung-jun
  • 14 篇 ravishankar saip...
  • 14 篇 zhang chao
  • 14 篇 mani deepak chou...
  • 13 篇 choudhry mani de...
  • 13 篇 rashid hunar oma...
  • 13 篇 mohamed abouhaww...
  • 12 篇 lin huey-wen
  • 12 篇 yao xin
  • 12 篇 shoeibi afshin
  • 12 篇 mehedi masud
  • 12 篇 herrera-viedma e...
  • 12 篇 misako takayasu
  • 12 篇 hideki takayasu
  • 12 篇 qian yanmin

语言

  • 4,356 篇 英文
  • 324 篇 其他
  • 28 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 日文
检索条件"机构=Department of Computer Science and Computational Engineering"
4702 条 记 录,以下是111-120 订阅
排序:
Detecting Android Malware with Convolutional Neural Networks and Hilbert Space-Filling Curves
收藏 引用
SN computer science 2024年 第7期5卷 810页
作者: Mbungang, Benedict Ngaibe Ali Wacka, Joan Beri Tchakounte, Franklin Polatidis, Nikolaos Nlong II, Jean Michel Tieudjo, Daniel Department of Mathematics and Computer Science University of Ngaoundere Ngaoundere Cameroon Cybersecurity with Computational and Artificial Intelligence Research Group University of Ngaoundere Ngaoundere Cameroon Department of Computer Science University of Buea Buea Cameroon School of Architecture Technology and Engineering University of Brighton Brighton United Kingdom
computer vision techniques have advanced greatly in recent years through deep learning, achieving unprecedented performance. This has motivated applying deep learning to malware detection through image-based approache... 详细信息
来源: 评论
Symmetric Matrix Completion with ReLU Sampling  41
Symmetric Matrix Completion with ReLU Sampling
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Liu, Huikang Wang, Peng Huang, Longxiu Qu, Qing Balzano, Laura Antai College of Economics and Management Shanghai Jiao Tong University China Department of Electrical Engineering and Computer Science University of Michigan United States Department of Computational Mathematics Science and Engineering Department of Mathematics Michigan State University United States
We study the problem of symmetric positive semidefinite low-rank matrix completion (MC) with deterministic entry-dependent sampling. In particular, we consider rectified linear unit (ReLU) sampling, where only positiv... 详细信息
来源: 评论
Methodical Tamil Character Recognition Using Fabricated CNN Model
Methodical Tamil Character Recognition Using Fabricated CNN ...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Bhavani, M. Ravikumar, S. Prithi, S. Arockia Raj, Y. Rajendiran, Babu Rajalakshmi Engineering College Department of Computer Science and Engineering Tamilnadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Computing Department of Computational Intelligence SRM Institute of Science and Technology Chennai India PSNA College of Engineering and Technology Department of Computer Science and Engineering Dindigul India
Recognizing text is one of the most challenging problems in computer vision. To put it simply, handwritten character recognition is the process of recognising text in photographs, papers, and other media and convertin... 详细信息
来源: 评论
Optimized Load Balancing Technique for Software Defined Network
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1409-1426页
作者: Aashish Kumar Darpan Anand Sudan Jha Gyanendra Prasad Joshi Woong Cho Department of Computer Science and Engineering Chandigarh UniversityMohaliPunjab140413India School of Computational Sciences CHRIST(Deemed to be University)Ghaziabad201003India Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Automotive ICT Convergence Engineering Daegu Catholic UniversityGyeongsan38430Korea
Software-defined networking is one of the progressive and prominent innovations in Information and Communications *** mitigates the issues that our conventional network was ***,traffic data generated by various applic... 详细信息
来源: 评论
Butterfly Optimized Feature Selection with Fuzzy C-Means Classifier for Thyroid Prediction
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 2909-2924页
作者: S.J.K.Jagadeesh Kumar P.Parthasarathi Mehedi Masud Jehad F.Al-Amri Mohamed Abouhawwash Department of Computer Science and Engineering Kathir College of EngineeringCoimbatore641062India Department of Computer science and Engineering Bannari Amman Institute of TechnologySathyamangalam638401TamilnaduIndia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.BOX 11099Taif21944Saudi Arabia Department of Mathematics Faculty of ScienceMansoura UniversityMansoura 35516Egypt Department of Computational Mathematics Scienceand Engineering(CMSE)Michigan State UniversityEast LansingMI48824USA
The main task of thyroid hormones is controlling the metabolism rate of humans,the development of neurons,and the significant growth of reproductive *** medical science,thyroid disorder will lead to creating thyroiditi... 详细信息
来源: 评论
Dynamic Bidirectional Translation for Sign Language by Using Machine Learning-Infused Approach with Integrated computer Vision  2
Dynamic Bidirectional Translation for Sign Language by Using...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Jain, Somya Diwakar, Shikha Yadav, Neha G.L. Bajaj Institute of Technology and Management Engineering/ Computer Science Artificial Intelligence Department of Applied Computational Science India School of Information & Communication Technology Gautam Buddha University Engineering/Artificial Intelligence India G.L. Bajaj Institute of Technology and Management Department of Applied Computational Science India
This research aims to break communication barriers for the deaf and hard-of-hearing by pioneering a real-time, dynamic sign language translator. Unlike existing apps, it uses a CNN to translate simultaneously between ... 详细信息
来源: 评论
Optimizing Healthcare Accessibility and Effectiveness through the Implementation of AI Solutions for Remote Patient Monitoring  3
Optimizing Healthcare Accessibility and Effectiveness throug...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Singh, Jagendra Sahu, Dinesh Prasad Kumar, Ashwini Ahmad, Salman Khursheed Majumder, Jayeeta Gangopadhyay, Sourav Bennett University School of Computer Science Engineering & Technology Greater Noida India Camellia Institute of Technology & Management Department of Computer Science & Engineering Jaipur India Gl Bajaj Institute of Technology & Management Dept. of Applied Computational Science and Engineering Greater Noida India Brainware University Department of Hospital Management Kolkata India
This study investigates the optimization of healthcare accessibility and effectiveness by integrating artificial intelligence (AI) solutions within Internet of Things (IoT) systems for remote patient monitoring. Embra... 详细信息
来源: 评论
Leveraging Instruction-based Learning for Effective UAV Traffic Management in Dynamic Environment
Leveraging Instruction-based Learning for Effective UAV Traf...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Ramya, R.S. Daniel, Keren Lois Rajkumar, S. Madhavan, Sruthi S. Akshya, J. Choudhry, Mani Deepak Sri Ramakrishna Engineering College Department of Computer Science and Engineering Coimbatore India KGiSL Institute of Technology Department of Computer Science and Business Systems Coimbatore India Sona College of Technology Department of Information Technology Salem India Nehru Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Coimbatore India Srm Institute of Science and Technology Department of Computational Intelligence Chennai India Srm Institute of Science and Technology Department of Computing Technologies Chennai India
With the popularization of UAVs (Unmanned Aerial Vehicles) in surveillance, delivery services, environmental monitoring, and increasingly other operational aspects, besides the need to take off and land, efficient tra... 详细信息
来源: 评论
Detection analysis of malicious cyber attacks using machine learning algorithms
收藏 引用
Materials Today: Proceedings 2022年 68卷 26-34页
作者: Karthika, R.A. Maheswari, M. Department of Computer Science and Engineering Vels Institute of Science Technology and Advanced Studies Pallavaram Chennai India Department of Computational Intelligence SRM Institute of Science and Technology KTR Chennai 603203 India
Cybersecurity is the practice of safeguarding information and the systems that store or process information. Cybersecurity violations are the foremost persecution instigated by cyber attackers through one or more syst... 详细信息
来源: 评论
Removing Gaussian Image Noise Using Advanced Non-Local Means Filtering Techniques
Removing Gaussian Image Noise Using Advanced Non-Local Means...
收藏 引用
2023 International Conference on New Frontiers in Communication, Automation, Management and Security, ICCAMS 2023
作者: Suresh, A. Waris, Saiyed Faiayaz Mohankumar, B. Arumuga Arun, R. Saravanan, G. Vellore Institute of Technology School of Computer Science and Engineering Department of Computational Intelligence Vellore India Vignan's Foundation for Science Technology & Research Vadlamudi Department of Computer Science and Engineering Andhrapradesh Guntur India Vellore Institute of Technology School of Computer Science and Engineering Vellore India Veltech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering India
Our system is aimed at improving the application of image de-noising processes, even though the presence of noise has a negative impact on image quality. End-user applications suffer as a result of the focusing Gaussi... 详细信息
来源: 评论