咨询与建议

限定检索结果

文献类型

  • 6,036 篇 会议
  • 2,551 篇 期刊文献
  • 63 册 图书

馆藏范围

  • 8,650 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,929 篇 工学
    • 3,778 篇 计算机科学与技术...
    • 3,079 篇 软件工程
    • 1,330 篇 信息与通信工程
    • 851 篇 控制科学与工程
    • 656 篇 电气工程
    • 571 篇 生物工程
    • 524 篇 生物医学工程(可授...
    • 504 篇 电子科学与技术(可...
    • 387 篇 光学工程
    • 380 篇 网络空间安全
    • 297 篇 动力工程及工程热...
    • 278 篇 机械工程
    • 278 篇 化学工程与技术
    • 274 篇 安全科学与工程
    • 265 篇 仪器科学与技术
  • 3,092 篇 理学
    • 1,627 篇 数学
    • 856 篇 物理学
    • 681 篇 生物学
    • 592 篇 统计学(可授理学、...
    • 311 篇 化学
    • 311 篇 系统科学
    • 275 篇 地球物理学
  • 1,532 篇 管理学
    • 845 篇 管理科学与工程(可...
    • 752 篇 图书情报与档案管...
    • 431 篇 工商管理
  • 600 篇 医学
    • 470 篇 临床医学
    • 442 篇 基础医学(可授医学...
    • 329 篇 公共卫生与预防医...
    • 254 篇 药学(可授医学、理...
  • 311 篇 法学
    • 257 篇 社会学
  • 174 篇 经济学
  • 166 篇 农学
  • 96 篇 教育学
  • 45 篇 文学
  • 18 篇 军事学
  • 8 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 422 篇 accuracy
  • 329 篇 deep learning
  • 279 篇 machine learning
  • 255 篇 feature extracti...
  • 244 篇 real-time system...
  • 234 篇 computational mo...
  • 207 篇 support vector m...
  • 206 篇 internet of thin...
  • 195 篇 predictive model...
  • 164 篇 computer science
  • 160 篇 convolutional ne...
  • 146 篇 optimization
  • 142 篇 data mining
  • 137 篇 training
  • 134 篇 application soft...
  • 124 篇 galaxies
  • 123 篇 security
  • 113 篇 image segmentati...
  • 113 篇 artificial intel...
  • 110 篇 neural networks

机构

  • 268 篇 department of ph...
  • 264 篇 fermi national a...
  • 262 篇 madrid
  • 225 篇 department of ph...
  • 200 篇 kavli institute ...
  • 185 篇 department of ph...
  • 185 篇 campus uab carre...
  • 174 篇 school of mathem...
  • 169 篇 george p. and cy...
  • 161 篇 school of physic...
  • 153 篇 department of ph...
  • 153 篇 department of ph...
  • 150 篇 departamento de ...
  • 147 篇 sorbonne univers...
  • 141 篇 slac national ac...
  • 140 篇 institució catal...
  • 138 篇 max planck insti...
  • 136 篇 computer science...
  • 136 篇 kavli institute ...
  • 122 篇 santa cruz insti...

作者

  • 260 篇 miquel r.
  • 252 篇 tarle g.
  • 244 篇 smith m.
  • 239 篇 sanchez e.
  • 238 篇 gruendl r.a.
  • 194 篇 carretero j.
  • 190 篇 gruen d.
  • 183 篇 garcía-bellido j...
  • 180 篇 flaugher b.
  • 171 篇 gschwend j.
  • 164 篇 doel p.
  • 160 篇 diehl h.t.
  • 158 篇 james d.j.
  • 157 篇 kuropatkin n.
  • 147 篇 brooks d.
  • 146 篇 suchyta e.
  • 141 篇 da costa l.n.
  • 138 篇 aguena m.
  • 138 篇 marshall j.l.
  • 137 篇 carnero rosell a...

语言

  • 6,553 篇 英文
  • 2,074 篇 其他
  • 52 篇 中文
  • 5 篇 法文
  • 3 篇 德文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Computer Applications"
8650 条 记 录,以下是821-830 订阅
排序:
Predicting Chronic Kidney Disease Progression Using Classification and Ensemble Learning  8th
Predicting Chronic Kidney Disease Progression Using Classifi...
收藏 引用
8th International Conference on Data Management, Analytics and Innovation, ICDMAI 2024
作者: Valli Mayil, V. Ratha Jeyalakshmi, T. Gupta, Rishu Kumar Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Guntur India Department of MCA Dayananda Sagar College of Engineering Karnataka Bangalore India Department of Computer Science and Applications Koneru Lakshmaiah Education Foundation Andhra Pradesh Guntur India
A serious medical problem that impacts millions of people globally is chronic kidney disease, or CKIDD. Accurate CKIDD progression prediction is essential for disease management and early intervention. Machine learnin... 详细信息
来源: 评论
Detection of Animal Hunters in Forest Using Regional Convolutional Neural Network Algorithm
Detection of Animal Hunters in Forest Using Regional Convolu...
收藏 引用
2023 International Conference on New Frontiers in Communication, Automation, Management and Security, ICCAMS 2023
作者: Sakthivanitha, M. Lakshmi, R.Bagavathi Chitra, A. Priscila, S.Silvia Department of Information Technology Chennai India Drbccc Hindu College Department of Computer Applications Chennai India Bharath Institute of Higher Education and Research Department of Computer Science Chennai India
Detection of objects moving in a video is regarded as a vital problem in image processing applications i.e. the detection during the movement of camera is considered significant in video processing. In this paper, the... 详细信息
来源: 评论
Anomaly Detection in Medical Images Using Deep Reinforcement Learning  2
Anomaly Detection in Medical Images Using Deep Reinforcement...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Rastogi, Divya Sharma, Aparna Yadav, R.K. Varshney, Neeraj Saraswat, Laxmi Computer Science and Application Sharda University UP Greater Noida India Electronics & Communication Engineering Raj Kumar Goel Institute of Technology UP Ghaziabad India Gla University Department of Computer Engineering and Applications UP Mathura India Abes Engineering College Department of Computer Science UP Ghaziabad India
Anomaly detection in clinical pix is vital to identify and diagnose diseases. Deep reinforcement gaining knowledge is a practical gadget-mastering approach implemented for more than a few medical obligations. This tec... 详细信息
来源: 评论
Securing the Cyber Supply Chain: A Risk-based Approach to Threat Assessment and Mitigation  4
Securing the Cyber Supply Chain: A Risk-based Approach to Th...
收藏 引用
4th International Conference on Electronics and Sustainable Communication Systems, ICESC 2023
作者: Phani Prathyusha, J.R.V.S.L.P. Esther Jyothi, V. Jhansi, Vadlamudi Sampreeth Chowdary, N. Madhuri, A. Sindhura, S. Velagapudi Ramakrishna Siddhartha Engineering College Department of Computer Applications Vijayawada India P.V.P. Siddhartha Institute of Technology Department of Computer Science and Engineering Vijayawada India Nri Institute of Technology Department of Computer Science and Engineering Agiripalli India
The system of Cyber Supply Chain (CSC) is characterized by its complexity, consisting of several subsystems, each responsible for a distinct set of responsibilities. Securing the supply chain presents a challenge due ... 详细信息
来源: 评论
Security Challenges in Multi-Cloud Environments: Solutions and Best Practices  7
Security Challenges in Multi-Cloud Environments: Solutions a...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Madanan, Mukesh Patel, Pratik Agrawal, Prateek Mudholkar, Pankaj Mudholkar, Megha Jaganraja, V. Dhofar University Department of Computer Science Oman National Forensic Sciences University India India Marwadi University Faculty of Computer Applications Gujarat Rajkot360003 India Marwadi University Department of Computer Engineering Gujarat Rajkot360003 India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Avadi Chennai600062 India
The aim of this research paper is to investigate how machine learning can be incorporated to improve security around multi-clouds, with specific reference to the challenges. Based on the datasets obtained from Kaggle,... 详细信息
来源: 评论
A Neural Network Approach to Signature Verification with Mathematical Moments  22
A Neural Network Approach to Signature Verification with Mat...
收藏 引用
22nd OITS International Conference on Information Technology, OCIT 2024
作者: Suryadevara, Thireesha Rafi, Mudassir Sah, Dipak Kumar Kumar, Rahul Department of Computer Science & Engineering SRM University AP Amaravati 522240 India Department of Computer Engineering and Applications GLA University Mathura 2814006 India
The present work develops a method for identity authentication and verification of static signatures stored in the database employing artificial neural network. The present method uses mathematical moments for feature... 详细信息
来源: 评论
Contribution Unveiling Cutting-Edge Machine Learning Techniques for Image Segmentation
Contribution Unveiling Cutting-Edge Machine Learning Techniq...
收藏 引用
International Conference on Electrical and Electronics Engineering, ICEEE 2023
作者: Shaik, Nazeer Gupta, Ankur Bhati, Sunita Kumar, Jaideep Singh, Jagendra Budhiraja, Ishan Department of Computer Science and Engineering Srinivasa Ramanujan Institute of Technology Andhra Pradesh Anantapur India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Applications JECRC University Jaipur India Raj Kumar Goel Institute of Technology AKTU University Lucknow India
Segregation of images is a critical step in processing images, computer vision, and a variety of other disciplines. The technique involves decomposing an illustration into numerous components or components, every sing... 详细信息
来源: 评论
Future Database Technologies for Big Data Analytics
Future Database Technologies for Big Data Analytics
收藏 引用
2023 International Conference on Intelligent Systems for Communication, IoT and Security, ICISCoIS 2023
作者: Rani, Geeta Sharma, Taruna Sharma, Avinash Chitkara University Institute of Engineering and Technology Dept of Computer Applications Punjab India Maharishi Markandeshwar Engineering College Department of Computer Science and Engineering Mullana India
Data is valuable asset for organizations but it cannot be used directly for business decision making. It needs to be processed in a form that is easily understandable and can to be used by decision makers. The databas... 详细信息
来源: 评论
Pixel Similarity-Based Steganography in Bit Planes: An Optimization-Driven Approach  4
Pixel Similarity-Based Steganography in Bit Planes: An Optim...
收藏 引用
4th International Conference on Soft Computing for Security applications, ICSCSA 2024
作者: Roselinkiruba, R. Jude Moses Anto Devakanth, J. Sharmila, L. Vasumathy, M. Misba, M. Saranya Jothi, C. Department of Computer Science and Engineering Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology Chennai Avadi India Madanapalle Institute of Technology and Science Department of Computer Applications Andra Pradesh India Department of Information Technology Kingston Engineering College Vellore India
Steganography is the method that convert data into bits to make it suitable for hiding. While embedding data the factors such as stego image quality and distortion which cannot be observed by the human eyes. The aim o... 详细信息
来源: 评论
Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation
Secured Reversible Data Hiding Scheme with NMI Interpolatio...
收藏 引用
International Conference on Network Security and Blockchain Technology, ICNSBT 2023
作者: Jana, Manasi Jana, Biswapati Joardar, Shubhankar Jana, Sharmistha Lu, Tzu Chuen Department of Computer Applications Haldia Institute of Technology West Bengal Haldia India Department of Computer Science Vidyasagar University West Bengal West Midnapore India Department of Computer Science and Engineering Haldia Institute of Technology West Bengal Haldia India West Bengal Midnapore India Department of Information Management Chaoyang University of Technology Taichung Taiwan
A novel and efficient 2-level secure reversible data hiding (RDH) method has been proposed based on image interpolation and Arnold transformation. An input image is scaled-down to original image and then scaled up... 详细信息
来源: 评论