咨询与建议

限定检索结果

文献类型

  • 78,124 篇 会议
  • 48,590 篇 期刊文献
  • 1,351 册 图书

馆藏范围

  • 128,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77,965 篇 工学
    • 52,064 篇 计算机科学与技术...
    • 42,219 篇 软件工程
    • 18,772 篇 信息与通信工程
    • 12,569 篇 控制科学与工程
    • 10,676 篇 电气工程
    • 9,950 篇 电子科学与技术(可...
    • 9,561 篇 生物工程
    • 7,679 篇 生物医学工程(可授...
    • 6,683 篇 光学工程
    • 5,193 篇 机械工程
    • 4,514 篇 化学工程与技术
    • 4,246 篇 动力工程及工程热...
    • 4,055 篇 仪器科学与技术
    • 3,762 篇 材料科学与工程(可...
    • 3,236 篇 网络空间安全
    • 3,074 篇 安全科学与工程
  • 46,091 篇 理学
    • 22,759 篇 数学
    • 15,165 篇 物理学
    • 10,989 篇 生物学
    • 7,638 篇 统计学(可授理学、...
    • 5,128 篇 化学
    • 4,964 篇 系统科学
  • 20,296 篇 管理学
    • 12,750 篇 管理科学与工程(可...
    • 8,231 篇 图书情报与档案管...
    • 6,016 篇 工商管理
  • 7,889 篇 医学
    • 6,390 篇 临床医学
    • 5,645 篇 基础医学(可授医学...
    • 3,421 篇 药学(可授医学、理...
    • 3,350 篇 公共卫生与预防医...
  • 3,834 篇 法学
    • 3,255 篇 社会学
  • 2,318 篇 经济学
  • 1,719 篇 农学
  • 1,462 篇 教育学
  • 633 篇 文学
  • 254 篇 军事学
  • 178 篇 艺术学
  • 25 篇 哲学
  • 18 篇 历史学

主题

  • 3,631 篇 accuracy
  • 3,313 篇 computer science
  • 3,154 篇 deep learning
  • 2,753 篇 machine learning
  • 2,620 篇 computational mo...
  • 2,584 篇 feature extracti...
  • 2,387 篇 training
  • 1,722 篇 predictive model...
  • 1,687 篇 real-time system...
  • 1,667 篇 internet of thin...
  • 1,632 篇 artificial intel...
  • 1,610 篇 optimization
  • 1,559 篇 convolutional ne...
  • 1,518 篇 support vector m...
  • 1,359 篇 data models
  • 1,159 篇 data mining
  • 1,127 篇 neural networks
  • 1,125 篇 semantics
  • 1,062 篇 wireless sensor ...
  • 1,033 篇 security

机构

  • 1,089 篇 cavendish labora...
  • 1,021 篇 department of ph...
  • 969 篇 physikalisches i...
  • 957 篇 university of ch...
  • 949 篇 oliver lodge lab...
  • 571 篇 department of el...
  • 554 篇 fakultät physik ...
  • 538 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 531 篇 imperial college...
  • 528 篇 school of physic...
  • 528 篇 department of ph...
  • 506 篇 h.h. wills physi...
  • 506 篇 stfc rutherford ...
  • 502 篇 nikhef national ...
  • 497 篇 school of comput...
  • 481 篇 center for high ...
  • 480 篇 henryk niewodnic...
  • 479 篇 school of physic...
  • 473 篇 infn sezione di ...

作者

  • 269 篇 a. gomes
  • 259 篇 niyato dusit
  • 259 篇 barter w.
  • 249 篇 d. calvet
  • 248 篇 c. alexa
  • 244 篇 j. m. izen
  • 240 篇 g. bella
  • 239 篇 j. strandberg
  • 239 篇 c. amelung
  • 237 篇 s. chen
  • 236 篇 beiter a.
  • 234 篇 blake t.
  • 227 篇 bellee v.
  • 227 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 218 篇 boettcher t.
  • 217 篇 borsato m.
  • 212 篇 g. spigo

语言

  • 108,954 篇 英文
  • 17,921 篇 其他
  • 1,205 篇 中文
  • 121 篇 日文
  • 32 篇 德文
  • 21 篇 法文
  • 10 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 4 篇 西班牙文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 阿拉伯文
检索条件"机构=Department of Computer Science and Engineering School of Computing"
128065 条 记 录,以下是1021-1030 订阅
排序:
Playing Maze using Voice Commands  14
Playing Maze using Voice Commands
收藏 引用
14th International Conference on computing Communication and Networking Technologies, ICCCNT 2023
作者: Sainadh, K. Vishnu Satwik, K. Ashrith, V. Vekkot, Susmitha Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Department of Electronics & Communication Amrita School of Computing Bengaluru India
In recent years, speech recognition has become increasingly well-known as a result of the numerous applications it has in virtually every industry. These applications include wake-word, sentiment, command, and interac... 详细信息
来源: 评论
Enhanced Security for IOMT Devices: Deep learning Techniques for Network Intrusion Detection  5
Enhanced Security for IOMT Devices: Deep learning Techniques...
收藏 引用
5th IEEE International Conference on Communication, computing and Industry 6.0, C2I6 2024
作者: Gopala Krishnan, D. Diviya, M. Jyoshika Shri, K. Subramanian, M. Amrita School of Computing Department of Computer Science and Engineering Chennai India St Joseph's College of Engineering Department of Mechanical Engineering Chennai India
The increasing popularity of Internet of Medical Things (IoMT) devices, like wearable sensors, has greatly improved patient care by allowing continuous monitoring and real-time data transfer to the cloud. However, thi... 详细信息
来源: 评论
Regularized Hybrid Deep Learning for DDoS Attack Prediction in Software Defined Internet of Things (SD-IoT)  3
Regularized Hybrid Deep Learning for DDoS Attack Prediction ...
收藏 引用
3rd International Conference on Power, Control and computing Technologies, ICPC2T 2024
作者: Deepthy, J. Radhika, N. Denny, Alosh Department of Electronics & Communication Engineering Amrita School of Engineering Coimbatore Amrita Vishwa Vidyapeetham India Department of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham India School of Engineering Ernakulam Cochin University of Science and Technology Division of Computer Science and Engineering India
The availability of online resource is seriously threatened by the fatal DDoS (Distributed Denial of Service) attacks, which can earnestly break up a targeted network or website by flooding it with traffic. DDoS attac... 详细信息
来源: 评论
Evolutionary Multi/Many-Objective Optimisation via Bilevel Decomposition
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第9期11卷 1973-1986页
作者: Shouyong Jiang Jinglei Guo Yong Wang Shengxiang Yang School of Automation Central South UniversityChangsha 410083China Department of Computing Science University of AberdeenAberdeen AB243FXUK School of Computer Science Central China Normal UniversityWuhan 430079China School of Computer Science and Informatics De Montfort UniversityLeicester LE19BHUK
Decomposition of a complex multi-objective optimisation problem(MOP)to multiple simple subMOPs,known as M2M for short,is an effective approach to multi-objective ***,M2M facilitates little communication/collaboration ... 详细信息
来源: 评论
Real Time Identification of Harmful Birds in Agriculture Field using computer Vision  7
Real Time Identification of Harmful Birds in Agriculture Fie...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Sudhesh, K.M. Akhila, T. Thangavel, Senthil Kumar Shanmugam, Selvanayaki Kolandapalayam Amrita Vishwa Vidhyapeetham Amrita School of Computing Department of Computer Science And Engineering Coimbatore India Ashland University Department of Mathematics And Computer Science OH United States
Agriculture is essential to the global economy and food security. Insect and bird attacks have now been found in recent research that could cause crop loss. Crops are prone to bird attacks throughout the early stages ... 详细信息
来源: 评论
Secure Student Record Management using Visual Cryptography in Educational Systems  9
Secure Student Record Management using Visual Cryptography i...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Kiranchandu, E. Gireesh, C. Kiran, G. Priya, D. Divya School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Krishnankoil Virudhunagar India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
Cloud computing is vital for data transmission and storage in the digital era, highlighting the urgent requirement for strong data security measures. Conventional encryption techniques such as RSA, while dependable, h... 详细信息
来源: 评论
Enhancing Healthcare Record Privacy Through the Integration of Visual Cryptography and Diverse Image Encryption Techniques  9
Enhancing Healthcare Record Privacy Through the Integration ...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Sandeep, Dayina Ganesh, Addala Siva Krishna, Angalakurthi Jaya Priya, D. Divya School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Krishnankoil Virudhunagar India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
The methodology of this research focuses on analyzing real-world breaches, such as the Star Health Insurance leak, and demonstrating how multi-layered encryption techniques could have mitigated the impact. By splittin... 详细信息
来源: 评论
Generating Markov Logic Networks Rulebase Based on Probabilistic Latent Semantics Analysis
收藏 引用
Tsinghua science and Technology 2023年 第5期28卷 952-964页
作者: Shan Cui Tao Zhu Xiao Zhang Liming Chen Lingfeng Mao Huansheng Ning School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Computer School University of South ChinaHengyang 421001China School of Computing Ulster UniversityBelfastBT151APUK
Human Activity Recognition(HAR)has become a subject of concern and plays an important role in daily *** uses sensor devices to collect user behavior data,obtain human activity information and identify *** Logic Networ... 详细信息
来源: 评论
Prediction of Neuro Cognitive Disorders using Supervised Comparative Machine Learning Model & Scanpath Representations  8
Prediction of Neuro Cognitive Disorders using Supervised Com...
收藏 引用
8th IEEE International Conference for Convergence in Technology, I2CT 2023
作者: Vinayak, Vineet Paliwal, Mohan Amudha, J. Jyotsna, C. Amrita School of Computing Bengaluru Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham India Amrita School of Computing Bengaluru Department of Computer Science Amrita Vishwa Vidyapeetham India
Dementia has become a pressing public health issue worldwide, with the number of affected individuals steadily increasing. As a syndrome, it is characterized by a decline in cognitive performance that extends beyond n... 详细信息
来源: 评论
A Dual-Layer Attention Based CAPTCHA Recognition Approach with Guided Visual Attention
收藏 引用
computer Modeling in engineering & sciences 2025年 第3期142卷 2841-2867页
作者: Zaid Derea Beiji Zou Xiaoyan Kui Alaa Thobhani Amr Abdussalam School of Computer Science and Engineering Central South UniversityChangsha410083China College of Computer Science and Information Technology Wasit UniversityWasit52001Iraq Electronic Engineering and Information Science Department University of Science and Technology of ChinaHefei230026China
Enhancing website security is crucial to combat malicious activities,and CAPTCHA(Completely Automated Public Turing tests to tell computers and Humans Apart)has become a key method to distinguish humans from *** text-... 详细信息
来源: 评论