咨询与建议

限定检索结果

文献类型

  • 77,941 篇 会议
  • 49,015 篇 期刊文献
  • 1,357 册 图书

馆藏范围

  • 128,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78,115 篇 工学
    • 52,438 篇 计算机科学与技术...
    • 42,383 篇 软件工程
    • 18,898 篇 信息与通信工程
    • 12,833 篇 控制科学与工程
    • 10,692 篇 电气工程
    • 9,893 篇 电子科学与技术(可...
    • 9,600 篇 生物工程
    • 7,717 篇 生物医学工程(可授...
    • 6,820 篇 光学工程
    • 5,207 篇 机械工程
    • 4,537 篇 化学工程与技术
    • 4,282 篇 动力工程及工程热...
    • 4,084 篇 仪器科学与技术
    • 3,622 篇 材料科学与工程(可...
    • 3,264 篇 网络空间安全
    • 3,090 篇 安全科学与工程
  • 46,335 篇 理学
    • 22,777 篇 数学
    • 15,243 篇 物理学
    • 11,026 篇 生物学
    • 7,578 篇 统计学(可授理学、...
    • 5,193 篇 化学
    • 4,974 篇 系统科学
  • 20,359 篇 管理学
    • 12,774 篇 管理科学与工程(可...
    • 8,253 篇 图书情报与档案管...
    • 6,034 篇 工商管理
  • 7,976 篇 医学
    • 6,453 篇 临床医学
    • 5,684 篇 基础医学(可授医学...
    • 3,417 篇 药学(可授医学、理...
    • 3,376 篇 公共卫生与预防医...
  • 3,837 篇 法学
    • 3,254 篇 社会学
  • 2,328 篇 经济学
  • 1,740 篇 农学
  • 1,456 篇 教育学
  • 637 篇 文学
  • 256 篇 军事学
  • 177 篇 艺术学
  • 27 篇 哲学
  • 19 篇 历史学

主题

  • 3,568 篇 accuracy
  • 3,319 篇 computer science
  • 3,153 篇 deep learning
  • 2,759 篇 machine learning
  • 2,595 篇 computational mo...
  • 2,566 篇 feature extracti...
  • 2,387 篇 training
  • 1,705 篇 predictive model...
  • 1,650 篇 internet of thin...
  • 1,636 篇 artificial intel...
  • 1,618 篇 real-time system...
  • 1,607 篇 optimization
  • 1,557 篇 convolutional ne...
  • 1,503 篇 support vector m...
  • 1,350 篇 data models
  • 1,153 篇 data mining
  • 1,143 篇 neural networks
  • 1,117 篇 semantics
  • 1,077 篇 wireless sensor ...
  • 1,019 篇 security

机构

  • 1,090 篇 cavendish labora...
  • 1,018 篇 department of ph...
  • 965 篇 physikalisches i...
  • 952 篇 university of ch...
  • 948 篇 oliver lodge lab...
  • 566 篇 fakultät physik ...
  • 552 篇 department of el...
  • 540 篇 school of physic...
  • 538 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 532 篇 imperial college...
  • 529 篇 school of physic...
  • 512 篇 h.h. wills physi...
  • 504 篇 stfc rutherford ...
  • 500 篇 nikhef national ...
  • 496 篇 school of comput...
  • 483 篇 henryk niewodnic...
  • 478 篇 center for high ...
  • 475 篇 van swinderen in...
  • 475 篇 school of physic...

作者

  • 268 篇 a. gomes
  • 262 篇 niyato dusit
  • 254 篇 barter w.
  • 251 篇 c. alexa
  • 250 篇 d. calvet
  • 248 篇 j. m. izen
  • 242 篇 s. chen
  • 240 篇 c. amelung
  • 239 篇 g. bella
  • 239 篇 j. strandberg
  • 232 篇 beiter a.
  • 229 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo
  • 215 篇 brundu d.
  • 215 篇 borsato m.

语言

  • 117,706 篇 英文
  • 9,358 篇 其他
  • 1,203 篇 中文
  • 122 篇 日文
  • 23 篇 德文
  • 13 篇 法文
  • 11 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 4 篇 西班牙文
  • 3 篇 荷兰文
  • 3 篇 俄文
检索条件"机构=Department of Computer Science and Engineering School of Computing"
128313 条 记 录,以下是371-380 订阅
排序:
Energy Conservation Using Piezo Electric Effect Through Modern Technology  9
Energy Conservation Using Piezo Electric Effect Through Mode...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Durga, Kanaparthi Dhathri, Kammarapalli Sri, Kanchukommula Sai Lavanya, Kandagaddala Naga Lakshmi School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India
This paper seeks to establish the energy conservation by using piezo-electric effect through some Modern Technology's and the project aims to investigate the application of modern technology in various fields to r... 详细信息
来源: 评论
An Investigation of Federated Learning Strategies for Disease Diagnosis  15
An Investigation of Federated Learning Strategies for Diseas...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Das, Abhay Krishnadas, Aishwarya Krishnan, Vaishakh S. Farida, Avani Sarath, Greeshma Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India
Traditional healthcare systems utilize centralized approaches for building machine-learning models for disease diagnosis. It requires sharing raw data to the centralized server, which is practically difficult due to p... 详细信息
来源: 评论
Post-Exploitation Insights: Dynamic Analysis of C2 Frameworks  4
Post-Exploitation Insights: Dynamic Analysis of C2 Framework...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Rao, Subhiksha Suresh Mishra, Sahil Seshadri, Samarth Kavitha, C.R. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science & Engineering Bengaluru India
Recognizing and reducing the risks presented by malevolent actors in the realm of cyber security requires an awareness of post exploitation techniques. However, deThe study investigates post operational challenges thr... 详细信息
来源: 评论
SecureComment: Safeguarding Online Discussions with Intelligent Toxic Comment Filtering  2
SecureComment: Safeguarding Online Discussions with Intellig...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation, IATMSI 2024
作者: Rayani, Reddy Kowshik Tekula, Samhitha Vattigunta, Subhash Kovid Kovi, Naveen Kumar Namitha, Kalakunnath Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Toxic comments, such as hate speech and abuse, are a widespread issue online, disrupting healthy conversation and user safety. Identifying and filtering these comments is crucial for ensuring respectful online communi... 详细信息
来源: 评论
FER-Net: Leveraging Attention Mechanisms in EfficintNetB5 model for Enhanced Emotion Recognition in Augmented Images  5
FER-Net: Leveraging Attention Mechanisms in EfficintNetB5 mo...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Sulochana, Balla Charishma Pragada, Bhavya Sri Reddy, Gaddam Anvith Singh, Rimjhim Padam Palaniswamy, Suja Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
Facial emotion recognition is a critical component in the development of advanced human-computer interaction systems, with applications spanning security, healthcare, and social robotics. This study explores the effic... 详细信息
来源: 评论
Design of an Automatic Washing Machine Control System using Deterministic Finite Automata  5
Design of an Automatic Washing Machine Control System using ...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Madhuja, C. Bhanot, Shreya Srinidhi, M. Radha, D. Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amrita School of Computing Bengaluru India
A Deterministic Finite Automaton (DFA) is a theoretical model of computation used to design and analyze the behavior of systems with a finite number of states, where each state transitions deterministically based on i... 详细信息
来源: 评论
Cloud-Based Remote Monitoring and Management for Diabetic Patient Healthcare  2
Cloud-Based Remote Monitoring and Management for Diabetic Pa...
收藏 引用
2nd International Conference on Distributed computing and Optimization Techniques, ICDCOT 2024
作者: Thangam, S. Niranjan, D.K. Chetan, Kulala Venkat Sujan, Gontla Shreyaa, Hothur Satya Sai Chakresh, Mamidisetti Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
The rising frequency of diabetes necessitates advanced technologies for timely monitoring, enabling visionary operation. The proposed methodology introduces a new approach by integrating sensor data collection, cloud-... 详细信息
来源: 评论
Detecting Malicious Threats On Mobile Applications Using Machine Learning Approaches  3
Detecting Malicious Threats On Mobile Applications Using Mac...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Padmavathi, A. Yasaswy, K. Rahul, K.Jayesh Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science Engineering Chennai India
In Today scenario , Android is one of the most frequently used mobile operatings systems, thus it is a priority for advanced threat actors and hackers. Malicious code is often found in Android applications to which se... 详细信息
来源: 评论
Identifying the Influences Behind the LinkedIn Posts using Topic Modeling and Sentiment Analysis  2
Identifying the Influences Behind the LinkedIn Posts using T...
收藏 引用
2nd IEEE International Conference on Trends in Quantum computing and Emerging Business Technologies, TQCEBT 2024
作者: Nagaraj, R. Rohith Adithya, C.R. Sri Chakra Teja, Sakalabathula Deepika, T. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
The proliferation of social networking in the modern world has made it a ubiquitous presence in people's lives. On a daily basis, individuals post and share their opinions, rating products, and engage in business-... 详细信息
来源: 评论
Enhanced Pomegranate Grading Using InceptionResNetV2 with Transformer Integration
Enhanced Pomegranate Grading Using InceptionResNetV2 with Tr...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Kiran, V. Gopi Babu, T. Hemanth Vidula, N.A. Singh, Rimjhim Padam Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Sorting pomegranates based on quality grades is a crucial stage in their export preparation and packing process. Traditionally reliant on manual sorting methods which are time-consuming, prone to inaccuracies and incu... 详细信息
来源: 评论