咨询与建议

限定检索结果

文献类型

  • 5,826 篇 会议
  • 2,528 篇 期刊文献
  • 61 册 图书

馆藏范围

  • 8,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,783 篇 工学
    • 3,660 篇 计算机科学与技术...
    • 2,995 篇 软件工程
    • 1,255 篇 信息与通信工程
    • 774 篇 控制科学与工程
    • 641 篇 电气工程
    • 568 篇 生物工程
    • 512 篇 生物医学工程(可授...
    • 495 篇 电子科学与技术(可...
    • 376 篇 光学工程
    • 357 篇 网络空间安全
    • 290 篇 动力工程及工程热...
    • 269 篇 机械工程
    • 268 篇 化学工程与技术
    • 260 篇 仪器科学与技术
    • 255 篇 安全科学与工程
  • 3,035 篇 理学
    • 1,591 篇 数学
    • 845 篇 物理学
    • 675 篇 生物学
    • 562 篇 统计学(可授理学、...
    • 310 篇 系统科学
    • 304 篇 化学
    • 271 篇 地球物理学
  • 1,487 篇 管理学
    • 809 篇 管理科学与工程(可...
    • 726 篇 图书情报与档案管...
    • 419 篇 工商管理
  • 584 篇 医学
    • 456 篇 临床医学
    • 431 篇 基础医学(可授医学...
    • 315 篇 公共卫生与预防医...
    • 253 篇 药学(可授医学、理...
  • 301 篇 法学
    • 249 篇 社会学
  • 168 篇 经济学
  • 164 篇 农学
  • 92 篇 教育学
  • 45 篇 文学
  • 17 篇 军事学
  • 8 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 390 篇 accuracy
  • 301 篇 deep learning
  • 265 篇 machine learning
  • 236 篇 feature extracti...
  • 223 篇 real-time system...
  • 219 篇 computational mo...
  • 195 篇 support vector m...
  • 194 篇 internet of thin...
  • 181 篇 predictive model...
  • 164 篇 computer science
  • 157 篇 convolutional ne...
  • 141 篇 data mining
  • 138 篇 training
  • 134 篇 application soft...
  • 134 篇 optimization
  • 124 篇 galaxies
  • 119 篇 security
  • 113 篇 artificial intel...
  • 109 篇 image segmentati...
  • 109 篇 neural networks

机构

  • 267 篇 department of ph...
  • 262 篇 fermi national a...
  • 260 篇 madrid
  • 229 篇 department of ph...
  • 203 篇 kavli institute ...
  • 184 篇 department of ph...
  • 184 篇 campus uab carre...
  • 171 篇 school of mathem...
  • 167 篇 george p. and cy...
  • 159 篇 school of physic...
  • 152 篇 department of ph...
  • 152 篇 department of ph...
  • 149 篇 departamento de ...
  • 147 篇 sorbonne univers...
  • 141 篇 institució catal...
  • 140 篇 max planck insti...
  • 139 篇 slac national ac...
  • 134 篇 computer science...
  • 134 篇 kavli institute ...
  • 121 篇 instituto de fis...

作者

  • 259 篇 miquel r.
  • 249 篇 tarle g.
  • 243 篇 smith m.
  • 238 篇 sanchez e.
  • 237 篇 gruendl r.a.
  • 196 篇 carretero j.
  • 190 篇 gruen d.
  • 183 篇 garcía-bellido j...
  • 179 篇 flaugher b.
  • 171 篇 gschwend j.
  • 167 篇 doel p.
  • 160 篇 james d.j.
  • 158 篇 kuropatkin n.
  • 158 篇 diehl h.t.
  • 145 篇 brooks d.
  • 144 篇 suchyta e.
  • 141 篇 da costa l.n.
  • 140 篇 marshall j.l.
  • 138 篇 carnero rosell a...
  • 137 篇 annis j.

语言

  • 8,003 篇 英文
  • 389 篇 其他
  • 40 篇 中文
  • 2 篇 法文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Computer Applications"
8415 条 记 录,以下是41-50 订阅
排序:
A hybrid encryption for secure data deduplication the cloud
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 295-307页
作者: Ebinazer, Silambarasan Elkana Savarimuthu, Nickolas Bhanu, S. Mary Saira Department of Computer Science and Engineering Cyber Security IIIT Kottayam India Department of Computer Applications National Institute of Technology Tiruchirappalli India Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda... 详细信息
来源: 评论
StealthFace:Transfer Learning-Based Ensemble Model for Disguised Face Recognition using Skin-Segmented Images
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第4期52卷 1244-1260页
作者: Padmashree, G. Kotegar, Karunakar A Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India
Disguised face identification is challenging since people cover their identities by wearing masks, hats, sunglasses, or other disguises. These disguises dramatically modify face features, making identifying individual... 详细信息
来源: 评论
Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks
收藏 引用
Cluster Computing 2024年 第4期27卷 4673-4685页
作者: Swain, Smruti Rekha Parashar, Anshu Singh, Ashutosh Kumar Lee, Chung Nan Department of Computer Applications National Institute of Technology Haryana Kurukshetra136119 India Department of Computer Science and Engineering National Sun Yat-sen University Kaohsiung Kaohsiung804201 Taiwan
In the modern era, large-scale computing systems distribute tasks into smaller units, allowing them to be executed simultaneously, accelerating job completion, and reducing energy usage. However, cloud computing syste... 详细信息
来源: 评论
Character Classification and Actor Recognition in Yakshagana Images Using Machine Learning Techniques and Facial Makeup Pattern Analysis  8
Character Classification and Actor Recognition in Yakshagana...
收藏 引用
8th IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2024
作者: Murthy, Anantha Prathwini Kulkarni, Sanjeev Savitha, G. Nitte Karkala Institute of Computer Science and Information Science Srinivas University Department of Master of Computer Applications India Department of Master of Computer Applications Karkala India Srinivas University Institute of Engineering and Technology Department of Computer Science and Engineering Mangalore India Manipal Institute of Technology Manipal Academy of higher Education Manipal Department of Data Science and Computer Applications India
Yakshagana, a traditional theater form from Karnataka, India, features a unique combination of vibrant costumes, dynamic dance movements, and elaborate facial makeup, making character and actor identification a challe... 详细信息
来源: 评论
An Effective Hybrid Model of ELM and Enhanced GWO for Estimating Compressive Strength of Metakaolin-Contained Cemented Materials
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1521-1555页
作者: Abidhan Bardhan Raushan Kumar Singh Mohammed Alatiyyah Sulaiman Abdullah Alateyah Department of Civil Engineering National Institute of Technology PatnaPatnaIndia Department of Computer Engineering and Applications GLA UniversityMathuraIndia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam Bin Abdulaziz UniversityAl-KharjSaudi Arabia Department of Computer Science College of Science and ArtsQassim UniversityUnaizahSaudi Arabia
This research proposes a highly effective soft computing paradigm for estimating the compressive strength(CS)of metakaolin-contained cemented *** proposed approach is a combination of an enhanced grey wolf optimizer(E... 详细信息
来源: 评论
Parkinson’s disease Severity Detection Based on Fused features with tuned Residual Deep Convolutional Neural Network
收藏 引用
Multimedia Tools and applications 2025年 第14期84卷 13111-13131页
作者: Vishwakarma, Gagan Nandanwar, Amit Kumar Thakur, Ghanshyam Singh Computer Science & Engineering Indian Institute of Information Technology MP Bhopal India Computer Science & Engineering Maulana Azad National Institute of Technology MP Bhopal India Department of Computer Applications Maulana Azad National Institute of Technology MP Bhopal India
Parkinson's disease (PD) diagnosis involves the assessment of a variety of motor and non-motor symptoms. To accurately diagnose PD, it is necessary to differentiate its symptoms from those of other conditions. Dur... 详细信息
来源: 评论
Security Challenges and Privacy Issues in IoT Environment: A Systematic Review and Research Directions  23th
Security Challenges and Privacy Issues in IoT Environment: A...
收藏 引用
23rd International Conference on Intelligent Systems Design and applications, ISDA 2023
作者: Preeti Nath, Rajender Department of Computer Science and Applications Kurukshetra University Kurukshetra India
IoT is a powerful piece of technology that can connect to anything and everyone at anytime, anywhere, and with any service available on a platform or network. The IoT needs to overcome several security and privacy con... 详细信息
来源: 评论
Image Integrity Checking Using Watermarking in Cloud Computing: A Review  3rd
Image Integrity Checking Using Watermarking in Cloud Computi...
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Rani, Jyoti Nath, Rajender Department of Computer Science and Applications Kurukshetra University Kurukshetra Thanesar India
In today’s era of cloud computing, modification and tampering of digital images on cloud storage have turn out to be easier due to proliferation of digital image processing tools. Consequently, tamper detection and i... 详细信息
来源: 评论
A Narrative Review of Developments in Knowledge Tracing in Last Decade  3
A Narrative Review of Developments in Knowledge Tracing in L...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Jain, Ankush Mago, Neeru Panjab Univeristy Department of Computer Science and Applications Chandigarh India Panjab University Ssg Regional Centre Department of Computer Science and Applications Punjab Hoshiarpur India
Modern Teaching Methods suggest that the classroom interactions should be more student-centered rather than being teacher-centered. Intelligent Tutoring Systems (ITS) can play a vital role in making education more stu... 详细信息
来源: 评论
Dynamic Analysis of Window’s Based Malware Using Reverse Engineering: A Case Study of Exmatter  23th
Dynamic Analysis of Window’s Based Malware Using Reverse En...
收藏 引用
23rd International Conference on Intelligent Systems Design and applications, ISDA 2023
作者: Surange, Geetanjali Khatri, Pallavi Hazra, Shubhankar Department of Computer Science and Applications ITM University Gwalior India
Malware analysis, is a crucial and cumbersome task, because of the continuously evolving characteristics of malware. Most of the malware damages the system resources or held them hostages for some unreasonable demands... 详细信息
来源: 评论