咨询与建议

限定检索结果

文献类型

  • 6,036 篇 会议
  • 2,551 篇 期刊文献
  • 63 册 图书

馆藏范围

  • 8,650 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,929 篇 工学
    • 3,778 篇 计算机科学与技术...
    • 3,079 篇 软件工程
    • 1,330 篇 信息与通信工程
    • 851 篇 控制科学与工程
    • 656 篇 电气工程
    • 571 篇 生物工程
    • 524 篇 生物医学工程(可授...
    • 504 篇 电子科学与技术(可...
    • 387 篇 光学工程
    • 380 篇 网络空间安全
    • 297 篇 动力工程及工程热...
    • 278 篇 机械工程
    • 278 篇 化学工程与技术
    • 274 篇 安全科学与工程
    • 265 篇 仪器科学与技术
  • 3,092 篇 理学
    • 1,627 篇 数学
    • 856 篇 物理学
    • 681 篇 生物学
    • 592 篇 统计学(可授理学、...
    • 311 篇 化学
    • 311 篇 系统科学
    • 275 篇 地球物理学
  • 1,532 篇 管理学
    • 845 篇 管理科学与工程(可...
    • 752 篇 图书情报与档案管...
    • 431 篇 工商管理
  • 600 篇 医学
    • 470 篇 临床医学
    • 442 篇 基础医学(可授医学...
    • 329 篇 公共卫生与预防医...
    • 254 篇 药学(可授医学、理...
  • 311 篇 法学
    • 257 篇 社会学
  • 174 篇 经济学
  • 166 篇 农学
  • 96 篇 教育学
  • 45 篇 文学
  • 18 篇 军事学
  • 8 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 422 篇 accuracy
  • 329 篇 deep learning
  • 279 篇 machine learning
  • 255 篇 feature extracti...
  • 244 篇 real-time system...
  • 234 篇 computational mo...
  • 207 篇 support vector m...
  • 206 篇 internet of thin...
  • 195 篇 predictive model...
  • 164 篇 computer science
  • 160 篇 convolutional ne...
  • 146 篇 optimization
  • 142 篇 data mining
  • 137 篇 training
  • 134 篇 application soft...
  • 124 篇 galaxies
  • 123 篇 security
  • 113 篇 image segmentati...
  • 113 篇 artificial intel...
  • 110 篇 neural networks

机构

  • 268 篇 department of ph...
  • 264 篇 fermi national a...
  • 262 篇 madrid
  • 225 篇 department of ph...
  • 200 篇 kavli institute ...
  • 185 篇 department of ph...
  • 185 篇 campus uab carre...
  • 174 篇 school of mathem...
  • 169 篇 george p. and cy...
  • 161 篇 school of physic...
  • 153 篇 department of ph...
  • 153 篇 department of ph...
  • 150 篇 departamento de ...
  • 147 篇 sorbonne univers...
  • 141 篇 slac national ac...
  • 140 篇 institució catal...
  • 138 篇 max planck insti...
  • 136 篇 computer science...
  • 136 篇 kavli institute ...
  • 122 篇 santa cruz insti...

作者

  • 260 篇 miquel r.
  • 252 篇 tarle g.
  • 244 篇 smith m.
  • 239 篇 sanchez e.
  • 238 篇 gruendl r.a.
  • 194 篇 carretero j.
  • 190 篇 gruen d.
  • 183 篇 garcía-bellido j...
  • 180 篇 flaugher b.
  • 171 篇 gschwend j.
  • 164 篇 doel p.
  • 160 篇 diehl h.t.
  • 158 篇 james d.j.
  • 157 篇 kuropatkin n.
  • 147 篇 brooks d.
  • 146 篇 suchyta e.
  • 141 篇 da costa l.n.
  • 138 篇 aguena m.
  • 138 篇 marshall j.l.
  • 137 篇 carnero rosell a...

语言

  • 6,553 篇 英文
  • 2,074 篇 其他
  • 52 篇 中文
  • 5 篇 法文
  • 3 篇 德文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Computer Applications"
8650 条 记 录,以下是871-880 订阅
排序:
Adult Obesity Prediction with Ensemble Classification Techniques - A Deep Learning Strategy  2
Adult Obesity Prediction with Ensemble Classification Techni...
收藏 引用
2nd IEEE International Conference on Integrated Intelligence and Communication Systems, ICIICS 2024
作者: Karthikeyan, S. Muthukumaravel, A. Department of Computer Applications Bharath Institute of Higher Education and Research Chennai India Department of Arts and Science Bharath Institute of Higher Education and Research Chennai India
The development of precise prediction models for early intervention is of the utmost importance due to the significant public health issue of the increasing prevalence of adult obesity. The study introduces an innovat... 详细信息
来源: 评论
Group security using ECC
收藏 引用
International Journal of Information Technology (Singapore) 2022年 第2期14卷 955-963页
作者: Sethi, Purna Chandra Sahu, Neelima Behera, Prafulla Kumar Department of Computer Science Rama Devi Women’s University Odisha Bhubaneswar India Department of Computer Science and Applications Utkal University Odisha Bhubaneswar India
Nowadays security is main issue during transmission of data. Among many cryptographic methods, ECC is the public key asymmetric cryptosystem which provides faster computation over smaller size in comparison to other a... 详细信息
来源: 评论
PODX: A Comprehensive Framework for Detecting Prohibited Items in Security X-Rays  9
PODX: A Comprehensive Framework for Detecting Prohibited Ite...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Shivane, Ashwini S. Bhoite, Sachin Indira College Of Commerce & Science Tathawade Pune India Dr. Vishwanath Karad Mit World Peace University Department Of Computer Science & Applications Pune India
The increasing need for accurate and reliable detection of prohibited items such as guns, knives, and pliers in X-ray security images underscores the importance of advanced frameworks to enhance security screening pro... 详细信息
来源: 评论
Evolution of Signcryption based cryptosystem in 5G communication technologies using Design Thinking  4
Evolution of Signcryption based cryptosystem in 5G communica...
收藏 引用
4th International Conference on Computation, Automation and Knowledge Management, ICCAKM 2023
作者: Gavaskar, A. Sumithra Vijayalakshmi, N. Gavaskar, S. Saranya, A. Kiruthika, R. SNS College of Technology Department of Computer Science and Engineeering Coimbatore India Bharathiyar University D Department of Computer Science and Engineeering Coimbatore India Rajeswari College of Arts and Science for Women Department of Computer Applications Puducherry India SNS College of Technology Department of Electronics and Communication Engineeering Coimbatore India
With the evolution of communication technologies, various substantial applications help the human community. Various real-time applications rely on the 5G era to fulfil the baseline service requirements. These 5G netw... 详细信息
来源: 评论
Dual Mode Host-Based and Cloud-Based Smartphone Intrusion Detection System  1
Dual Mode Host-Based and Cloud-Based Smartphone Intrusion De...
收藏 引用
1st International Conference on Futuristic Technologies, INCOFT 2022
作者: Gopala, B. Hanumanthappa, M. Kumar, Manish Bangalore University Department of Computer Science and Applications Bangalore India M S Ramaiah Institute of Technology Department of Master of Computer Applications Bangalore India
Smartphones are one of the most important devices in our daily life. It produces transfers and stores a significant amount of data about individuals such as banking transactions, authentication credentials, location d... 详细信息
来源: 评论
Double Encryption Technique for Sharing and Storing the Images in the Cloud Environment  4
Double Encryption Technique for Sharing and Storing the Imag...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Anusha, P. Maruthi, R. Kumar, D. Maghesh Begum, H. Parveen Periyar Maniammai Institute of Science and Technology Department of Software Engineering Tamil Nadu Thanjavur India Hindustan Institute of Technology and Science Department of Computer Applications Tamil Nadu Chennai India
Cryptography is used by all organizations to protect the data files and ensures confidentiality mainly at the time of sharing and storing in the cloud data storage. The cloud service providers use a wide range of tool... 详细信息
来源: 评论
Analysing of diverse Stress pattern in ECG using Machine Learning Techniques  2
Analysing of diverse Stress pattern in ECG using Machine Lea...
收藏 引用
2nd International Conference on computer Vision and Internet of Things, ICCVIoT 2024
作者: Anbarasi, S. Dhanalakshmi, B. Department of Computer Applications BS Abdur Rahman Crescent Institute of Science and Technology GST Road vandalur Tamil Nadu Chennai India Department of Computer Science and Engineering BS Abdur Rahman Crescent Institute of Science and Technology GST Road vandalur Tamil Nadu Chennai India
ECG signals are commonly used to diagnose various cardiac conditions, and the classification of these signals is an important task in Stress identification. With the advancement of ML techniques, several ML models hav... 详细信息
来源: 评论
A 2 GHz High-Performance Design of Braun Multiplier with Hybrid Full Adder for ALU  2
A 2 GHz High-Performance Design of Braun Multiplier with Hyb...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Sakthimohan, M. Sundravadivelu, K. Amuthaguka, D. Tamil Selvan, S. Elizabeth Rani, G. Rahul, Dudekula KalaignarKarunanidhi Institute of Technology Department of ECE Tamilnadu Coimbatore India Madurai Kamaraj University Department of Computer Science Tamilnadu Madurai India Kalasalingam Academy of Research and Education Department of Computer Applications Tamilnadu Krishnankoil India Tamilnadu Coimbatore India
For applications of signal processing that are both economical and computationally intensive, efficient arithmetic circuits are required. High-reliability and portable circuits are required for electronic appliances i... 详细信息
来源: 评论
Blockchain based Secure Erlang Server for Request based Group Communication over XMPP
Blockchain based Secure Erlang Server for Request based Grou...
收藏 引用
2023 International Conference on Advances in Intelligent Computing and applications, AICAPS 2023
作者: Johnpaul, C.I. Vivekanandan, Manojkumar Premkamal, Praveen Kumar Ramya, R. St. Thomas College Department of Computer Science and Applications Kerala Thrissur India Srm University-AP School of Engineering and Applied Sciences Department of Computer Science and Engineering Andhra Pradesh Amaravati India Kamaraj College of Engineering and Technology Department of Computer Science and Engineering Virudhunagar India
Many real world activities in computer science scenarios are linked with concurrency and security related issues and have to handle large number of processes to be executed in parallel with false safe security solutio... 详细信息
来源: 评论
Enhancing the Compressed Video Quality through a Neural Network Approach  4
Enhancing the Compressed Video Quality through a Neural Netw...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Panneerselvam, Karthick Rajalakshmi, K. Sornalatha, P. Kpr Institute of Engineering and Technology Department of Computer Science & Engineering Tamil Nadu Uthupalayam641407 India Cmr Institute of Technology Department of Mca Karnataka Bengaluru560037 India Alagappa University Department of Computer Applications Tamil Nadu Karaikudi630003 India
Video compression mainly focuses on reducing the file size of videos with little loss of quality, but most video compression algorithms on the market do not focus on clarity. Data compression is increasingly being con... 详细信息
来源: 评论