咨询与建议

限定检索结果

文献类型

  • 6,036 篇 会议
  • 2,551 篇 期刊文献
  • 63 册 图书

馆藏范围

  • 8,650 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,929 篇 工学
    • 3,778 篇 计算机科学与技术...
    • 3,079 篇 软件工程
    • 1,330 篇 信息与通信工程
    • 851 篇 控制科学与工程
    • 656 篇 电气工程
    • 571 篇 生物工程
    • 524 篇 生物医学工程(可授...
    • 504 篇 电子科学与技术(可...
    • 387 篇 光学工程
    • 380 篇 网络空间安全
    • 297 篇 动力工程及工程热...
    • 278 篇 机械工程
    • 278 篇 化学工程与技术
    • 274 篇 安全科学与工程
    • 265 篇 仪器科学与技术
  • 3,092 篇 理学
    • 1,627 篇 数学
    • 856 篇 物理学
    • 681 篇 生物学
    • 592 篇 统计学(可授理学、...
    • 311 篇 化学
    • 311 篇 系统科学
    • 275 篇 地球物理学
  • 1,532 篇 管理学
    • 845 篇 管理科学与工程(可...
    • 752 篇 图书情报与档案管...
    • 431 篇 工商管理
  • 600 篇 医学
    • 470 篇 临床医学
    • 442 篇 基础医学(可授医学...
    • 329 篇 公共卫生与预防医...
    • 254 篇 药学(可授医学、理...
  • 311 篇 法学
    • 257 篇 社会学
  • 174 篇 经济学
  • 166 篇 农学
  • 96 篇 教育学
  • 45 篇 文学
  • 18 篇 军事学
  • 8 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 422 篇 accuracy
  • 329 篇 deep learning
  • 279 篇 machine learning
  • 255 篇 feature extracti...
  • 244 篇 real-time system...
  • 234 篇 computational mo...
  • 207 篇 support vector m...
  • 206 篇 internet of thin...
  • 195 篇 predictive model...
  • 164 篇 computer science
  • 160 篇 convolutional ne...
  • 146 篇 optimization
  • 142 篇 data mining
  • 137 篇 training
  • 134 篇 application soft...
  • 124 篇 galaxies
  • 123 篇 security
  • 113 篇 image segmentati...
  • 113 篇 artificial intel...
  • 110 篇 neural networks

机构

  • 268 篇 department of ph...
  • 264 篇 fermi national a...
  • 262 篇 madrid
  • 225 篇 department of ph...
  • 200 篇 kavli institute ...
  • 185 篇 department of ph...
  • 185 篇 campus uab carre...
  • 174 篇 school of mathem...
  • 169 篇 george p. and cy...
  • 161 篇 school of physic...
  • 153 篇 department of ph...
  • 153 篇 department of ph...
  • 150 篇 departamento de ...
  • 147 篇 sorbonne univers...
  • 141 篇 slac national ac...
  • 140 篇 institució catal...
  • 138 篇 max planck insti...
  • 136 篇 computer science...
  • 136 篇 kavli institute ...
  • 122 篇 santa cruz insti...

作者

  • 260 篇 miquel r.
  • 252 篇 tarle g.
  • 244 篇 smith m.
  • 239 篇 sanchez e.
  • 238 篇 gruendl r.a.
  • 194 篇 carretero j.
  • 190 篇 gruen d.
  • 183 篇 garcía-bellido j...
  • 180 篇 flaugher b.
  • 171 篇 gschwend j.
  • 164 篇 doel p.
  • 160 篇 diehl h.t.
  • 158 篇 james d.j.
  • 157 篇 kuropatkin n.
  • 147 篇 brooks d.
  • 146 篇 suchyta e.
  • 141 篇 da costa l.n.
  • 138 篇 aguena m.
  • 138 篇 marshall j.l.
  • 137 篇 carnero rosell a...

语言

  • 6,553 篇 英文
  • 2,074 篇 其他
  • 52 篇 中文
  • 5 篇 法文
  • 3 篇 德文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Computer Applications"
8650 条 记 录,以下是891-900 订阅
排序:
A Comprehensive Review On Two-Stage Object Detection Algorithms
A Comprehensive Review On Two-Stage Object Detection Algorit...
收藏 引用
2023 IEEE International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security, iQ-CCHESS 2023
作者: Varghese, Rejin Sambath, M. Hindustan Institute of Technology and Science Department of Computer Applications Chennai India Hindustan Institute of Technology and Science School of Computing Science Chennai India
Two-stage object detection algorithms have gained significant attention in computer vision due to their robustness and accuracy in detecting objects in images. These algorithms consist of two main stages: region propo... 详细信息
来源: 评论
Adaptive energy-aware algorithms to minimize power consumption and SLA violation in cloud computing
收藏 引用
Recent Advances in computer science and Communications 2021年 第4期14卷 1008-1015页
作者: Singh, Monika Kumar, Pardeep Tyagi, Sanjay Department of Computer Science and Applications Kurukshetra University Haryana India
Objective: With the establishment of virtualized datacenters on a large scale, cuttingedge technology requires more energy to deliver the services 24*7 hours. With this expansion and accumulation of information on a m... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms for Securing IoT Enabled Environment  3
Comparative Analysis of Machine Learning Algorithms for Secu...
收藏 引用
3rd IEEE International Conference on Computing, Communication, and Intelligent Systems, ICCCIS 2022
作者: Sagu, Amit Gill, Nasib Singh Gulia, Preeti Rani, Deepti Chahal, Ayushi Maharshi Dayanand University Department of Computer Science and Applications Rohtak India
The IoT (Internet of Things) link system, various applications, data storage like cloud, and another service area that possibly will be a fresh entry for attackers as they uninterruptedly offer services in the organiz... 详细信息
来源: 评论
Modular irregular labelling in Network Analysis with Complete Bipartite Graph as Auto Proctoring  4
Modular irregular labelling in Network Analysis with Complet...
收藏 引用
4th International Conference on Emerging Systems and Intelligent Computing, ESIC 2024
作者: Sivakumar, S. Vidyanandini, S. Nayak, Soumya Ranjan Aluvala, Srinivas Srm Institute of Science and Technology Kattankulathur Faculty of Science and Humanities Department of Computer Applications Chennai603203 India Srm Institute of Science and Technology Kattankulathur College of Engineering and Technology Department of Mathematics Chennai603203 India Kiit Deemed to Be University School of Computer Engineering Odisha Bhubaneswar751024 India Sr University Department of Computer Science and Artificial Intelligence Telangana Warangal506371 India
Modular irregular labeling is an edge irregular labeling of a graph in which the edges and vertices are labelled with 1, 2, 3,.. k such that the weight of all vertices are different. The complete bipartite graph is wh... 详细信息
来源: 评论
Word Embedding for Bengali Language using Domain-related Corpus  6
Word Embedding for Bengali Language using Domain-related Cor...
收藏 引用
6th International Conference on Inventive Computation Technologies, ICICT 2023
作者: Bandyopadhyay, Ashutosh Nair, Jayashree Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri Kollam India Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri Kollam India
Many natural language processing (NLP) tasks, including machine translation, document classification, information retrieval, news category classification, document clustering, news category clustering, and question-an... 详细信息
来源: 评论
Secure Electronic Health Record Storage and Retreival Using Blockchain and Encryption for Healthcare Application
收藏 引用
SN computer science 2023年 第3期4卷 300页
作者: Saif, Sohail Mondal, Nabin Biswas, Suparna Department of Computer Applications Maulana Abul Kalam Azad University of Technology West Bengal Kolkata India Department of Computer Science & Engineering Maulana Abul Kalam Azad University of Technology West Bengal Kolkata India
With the rapid advancement of digital technologies, the electronic health record is not a concept but a reality. Electronic health records (EHR) are the patients’ health information that are stored for further refere... 详细信息
来源: 评论
MITM Attack Based Detection and Prevention for ARP Poisoning in Wireless Network Environment
MITM Attack Based Detection and Prevention for ARP Poisoning...
收藏 引用
International Conference on computer and Communications Technologies (ICCCT)
作者: J. Chandru C. Bagyalakshmi Department of Computer Applications Hindustan Institute of Technology and Science
In a wireless environment, a Man-in-the-Middle (MITM) attack takes place whilst a threat actor intercepts communication between two devices, generally a user's device and a Wi-Fi access point. At a point, an attac... 详细信息
来源: 评论
A Hybrid Watermarking Scheme Using DWT and Haar Transform for Image Authentication  3rd
A Hybrid Watermarking Scheme Using DWT and Haar Transform fo...
收藏 引用
3rd International Conference on Advanced Computing and applications, ICACA 2024
作者: Jana, Sachchidananda Pal, Pabitra Mahadani, Asim Kumar Giri, Debasis Department of Computer Science & Applications Prabhat Kumar College Contai West Bengal Purba Medinipur721404 India Department of Computer Applications Maulana Abul Kalam Azad University of Technology West Bengal Nadia741249 India Department of Computer Science and Engineering Bankura Unnayani Institute of Engineering West Bengal Bankura India Department of Information Technology Maulana Abul Kalam Azad University of Technology West Bengal Nadia741249 India
The safe transfer and preservation of medical images is crucial in the age of digital healthcare. Watermarking medical images is an essential method of adding patient data, hospital logos, and other pertinent informat... 详细信息
来源: 评论
Efficient Deepfake Detection Using Convolutional Neural Network
Efficient Deepfake Detection Using Convolutional Neural Netw...
收藏 引用
2025 International Conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Samal, Debasish Agrawal, Prateek Madaan, Vishu Goyal, Vishal School of Computer Applications Lovely Professional University Punjab India School of Computer Science & Engineering Lovely Professional University Punjab India Shree Guru Gobind Singh Tricentenary University Haryana Gurugram India Inti International University Nilai Malaysia University Punjabi University Department of Computer Science Punjab India
In recent times, generative AI has advanced quickly, and Generative Adversarial Network (GAN) has been used to create realistic-looking fake multimedia. It is still quite difficult to identify these Artificial Intelli... 详细信息
来源: 评论
Machine Learning-Based Mortality Prediction of COVID-19 Patients  1
收藏 引用
10th International Conference on Innovations in computer science and Engineering, ICICSE 2022
作者: Ani, R. Deepa, O.S. Arundhathi, M. Darsana, J. Department of Computer Science and Applications Amrita Vishwa Vidyapeetham Amritapuri India Department of Mathematics Amrita Vishwa Vidyapeetham Coimbatore India
Coronavirus Disease 2019 (COVID-19) has impacted our world. Risk classification during hospitalization is essential for medical planning and allocation of resources, and hence for lowering death rates, especially in u... 详细信息
来源: 评论