咨询与建议

限定检索结果

文献类型

  • 77,287 篇 会议
  • 48,647 篇 期刊文献
  • 1,355 册 图书

馆藏范围

  • 127,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77,143 篇 工学
    • 51,781 篇 计算机科学与技术...
    • 42,050 篇 软件工程
    • 18,696 篇 信息与通信工程
    • 12,439 篇 控制科学与工程
    • 10,590 篇 电气工程
    • 9,790 篇 电子科学与技术(可...
    • 9,543 篇 生物工程
    • 7,625 篇 生物医学工程(可授...
    • 6,749 篇 光学工程
    • 5,179 篇 机械工程
    • 4,499 篇 化学工程与技术
    • 4,254 篇 动力工程及工程热...
    • 4,048 篇 仪器科学与技术
    • 3,546 篇 材料科学与工程(可...
    • 3,215 篇 网络空间安全
    • 3,059 篇 安全科学与工程
  • 45,980 篇 理学
    • 22,652 篇 数学
    • 15,102 篇 物理学
    • 10,983 篇 生物学
    • 7,532 篇 统计学(可授理学、...
    • 5,104 篇 化学
    • 4,963 篇 系统科学
  • 20,239 篇 管理学
    • 12,702 篇 管理科学与工程(可...
    • 8,206 篇 图书情报与档案管...
    • 5,990 篇 工商管理
  • 7,868 篇 医学
    • 6,348 篇 临床医学
    • 5,624 篇 基础医学(可授医学...
    • 3,418 篇 药学(可授医学、理...
    • 3,322 篇 公共卫生与预防医...
  • 3,819 篇 法学
    • 3,240 篇 社会学
  • 2,318 篇 经济学
  • 1,722 篇 农学
  • 1,440 篇 教育学
  • 636 篇 文学
  • 255 篇 军事学
  • 175 篇 艺术学
  • 25 篇 哲学
  • 18 篇 历史学

主题

  • 3,539 篇 accuracy
  • 3,317 篇 computer science
  • 3,093 篇 deep learning
  • 2,735 篇 machine learning
  • 2,575 篇 computational mo...
  • 2,551 篇 feature extracti...
  • 2,383 篇 training
  • 1,695 篇 predictive model...
  • 1,644 篇 internet of thin...
  • 1,613 篇 artificial intel...
  • 1,597 篇 real-time system...
  • 1,596 篇 optimization
  • 1,517 篇 convolutional ne...
  • 1,495 篇 support vector m...
  • 1,338 篇 data models
  • 1,141 篇 neural networks
  • 1,140 篇 data mining
  • 1,111 篇 semantics
  • 1,075 篇 wireless sensor ...
  • 1,005 篇 security

机构

  • 1,088 篇 cavendish labora...
  • 1,016 篇 department of ph...
  • 965 篇 physikalisches i...
  • 946 篇 oliver lodge lab...
  • 938 篇 university of ch...
  • 562 篇 fakultät physik ...
  • 546 篇 department of el...
  • 540 篇 school of physic...
  • 539 篇 department of ph...
  • 538 篇 horia hulubei na...
  • 534 篇 imperial college...
  • 533 篇 school of physic...
  • 512 篇 h.h. wills physi...
  • 506 篇 stfc rutherford ...
  • 506 篇 nikhef national ...
  • 492 篇 school of comput...
  • 483 篇 henryk niewodnic...
  • 480 篇 center for high ...
  • 479 篇 school of physic...
  • 475 篇 van swinderen in...

作者

  • 270 篇 a. gomes
  • 255 篇 barter w.
  • 252 篇 c. alexa
  • 252 篇 niyato dusit
  • 251 篇 d. calvet
  • 249 篇 j. m. izen
  • 242 篇 s. chen
  • 241 篇 g. bella
  • 241 篇 j. strandberg
  • 241 篇 c. amelung
  • 233 篇 beiter a.
  • 229 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo
  • 215 篇 brundu d.
  • 215 篇 borsato m.

语言

  • 120,308 篇 英文
  • 5,761 篇 其他
  • 1,164 篇 中文
  • 122 篇 日文
  • 20 篇 德文
  • 15 篇 法文
  • 10 篇 朝鲜文
  • 6 篇 荷兰文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 2 篇 俄文
检索条件"机构=Department of Computer Science and Engineering School of Computing"
127289 条 记 录,以下是261-270 订阅
排序:
Cognitive Disorder Detection in Adolescents using Mental Health Data  2
Cognitive Disorder Detection in Adolescents using Mental Hea...
收藏 引用
2nd IEEE International Conference on Recent Advances in Information Technology for Sustainable Development, ICRAIS 2024
作者: Gowtham, R. Ramaraj, Vignesh Dayanand, V. Amrita Vishwa Vidyapeetham Amrita School of Computing Coimbatore Department of Computer Science and Engineering India
Cognitive disorders among adolescents pose significant challenges to their overall well-being and prospects. Timely detection and intervention are crucial to mitigating the potential long-term impacts of these disorde... 详细信息
来源: 评论
Hybrid Optimized A∗ Algorithm for Dynamic Rerouting in Autonomous Vehicles  15
Hybrid Optimized A∗ Algorithm for Dynamic Rerouting in Auto...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Yalamanchili, Tina Choudary Sreedhar, Nakshatra Sree Nouduri, Sreenivas Amritesh, P.J. Neethu, M.R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore India
This research presents a new approach to adaptive control in autonomous vehicles by optimizing the Hybrid A star algorithm. This algorithm is designed to ensure reliable and efficient operation in complex environments...
来源: 评论
Adaptive Real-Time Malware Detection for IoT Traffic Streams: A Comparative Study of Concept Drift Detection Techniques  5
Adaptive Real-Time Malware Detection for IoT Traffic Streams...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Bharani, D. Lakshmi Priya, V. Saravanan, S. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India
As IoT expands dynamically, cybersecurity threats are evolving with time;thus, classical malware detection systems are no more appropriate, due to the phenomenon of concept drift and the necessity of handling large am... 详细信息
来源: 评论
Hand-Written Bramhi Script Recognition using Deep Learning
Hand-Written Bramhi Script Recognition using Deep Learning
收藏 引用
2024 Asian Conference on Intelligent Technologies, ACOIT 2024
作者: Swaroop, Bandi Vishnu Prasad, Angala Hari Reddy, Busa Thanuj Sathwik Vardhan, Puvvadi Harsha Singh, Rimjhim Padam Palaniswamy, Suja Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
This work involves the classification of handwritten script using deep learning with a special interest in the comparison of different pre- trained models. As one of the oldest writing systems in the world, derived fr... 详细信息
来源: 评论
Inference of Missing Attributes in Multilevel Complex Network  5
Inference of Missing Attributes in Multilevel Complex Networ...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Nettem, Nikhil Chowdary Nukala, Aashish Gopal Kaushal, Siruguppa Vishnu Sai Deepthi, L.R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Social networks exhibit a hierarchical structure where users are grouped at multiple levels based on communities, interests, or behaviors. The attributes associated with users provide additional information for variou... 详细信息
来源: 评论
MediLocker: Centralized Electronic Health Records System  2
MediLocker: Centralized Electronic Health Records System
收藏 引用
2nd International Conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Harini, N. Karishma, R.S. Pranav, M. Duvvuri, Ananya Akhil, Marrivada Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore India
The transition from traditional paper-based patient records to advanced digital formats has not been without its challenges. While Electronic Health Records (EHRs) offer instantaneous access to detailed patient health... 详细信息
来源: 评论
Integrating Deep Learning with the Gemini API for Improved Pest Management  3
Integrating Deep Learning with the Gemini API for Improved P...
收藏 引用
3rd International Conference on Automation, computing and Renewable Systems, ICACRS 2024
作者: Manoj, Milan Ihsan, Faraz Devadath, G.K. Anjali, T. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
This study uses the Gemini API and deep learning algorithms to provide a novel approach to agricultural pest management. Pests pose serious difficulties to agriculture, thus prompt and precise pest management is cruci... 详细信息
来源: 评论
Improving Obfuscated Malware Classification: A Machine Learning Approach with Feature Selection and Data Balancing  11
Improving Obfuscated Malware Classification: A Machine Learn...
收藏 引用
11th IEEE International Conference on Advances in computing and Communications, ICACC 2024
作者: Bhavana, Gundu Pudota, Mokshagna Bhuvan Chowdary Saravanan, S. Deepak, K. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India
Obfuscated malware refers to malicious software that has been deliberately modified to hide its malicious purpose and avoid detection by conventional security mechanisms. Classifying obfuscated malware poses a signifi... 详细信息
来源: 评论
Efficient Text Formatting: A Comparative Analysis of Algorithmic Approaches  1
Efficient Text Formatting: A Comparative Analysis of Algorit...
收藏 引用
1st International Conference for Women in computing, InCoWoCo 2024
作者: Nandini, Bandaru Jaya Sahithi, Mamidi Leha Harshika, Siddareddy Gari Sahay, Apurvan Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bangalore India
Efficient text formatting, especially when printing with mono spaced fonts, is a very important factor. In an attempt to address the problem of printing clean paragraphs, this work has been presented in the form of im... 详细信息
来源: 评论
Efficient Airlift and Enhanced Care: Unmanned Aerial Vehicles and Droid Solutions for Battlefield Casualty Evacuation  5
Efficient Airlift and Enhanced Care: Unmanned Aerial Vehicle...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: George, Angelina Ashik, F. Jose, Alphonsa Niranjan, D.K. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science & Engineering Bengaluru India
In modern military operations, timely and effective medical evacuation is crucial for reducing soldier casualties and enhancing combat effectiveness. This research presents an investigation into the use of Unmanned Ae... 详细信息
来源: 评论