咨询与建议

限定检索结果

文献类型

  • 77,941 篇 会议
  • 49,015 篇 期刊文献
  • 1,357 册 图书

馆藏范围

  • 128,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78,115 篇 工学
    • 52,438 篇 计算机科学与技术...
    • 42,383 篇 软件工程
    • 18,898 篇 信息与通信工程
    • 12,833 篇 控制科学与工程
    • 10,692 篇 电气工程
    • 9,893 篇 电子科学与技术(可...
    • 9,600 篇 生物工程
    • 7,717 篇 生物医学工程(可授...
    • 6,820 篇 光学工程
    • 5,207 篇 机械工程
    • 4,537 篇 化学工程与技术
    • 4,282 篇 动力工程及工程热...
    • 4,084 篇 仪器科学与技术
    • 3,622 篇 材料科学与工程(可...
    • 3,264 篇 网络空间安全
    • 3,090 篇 安全科学与工程
  • 46,335 篇 理学
    • 22,777 篇 数学
    • 15,243 篇 物理学
    • 11,026 篇 生物学
    • 7,578 篇 统计学(可授理学、...
    • 5,193 篇 化学
    • 4,974 篇 系统科学
  • 20,359 篇 管理学
    • 12,774 篇 管理科学与工程(可...
    • 8,253 篇 图书情报与档案管...
    • 6,034 篇 工商管理
  • 7,976 篇 医学
    • 6,453 篇 临床医学
    • 5,684 篇 基础医学(可授医学...
    • 3,417 篇 药学(可授医学、理...
    • 3,376 篇 公共卫生与预防医...
  • 3,837 篇 法学
    • 3,254 篇 社会学
  • 2,328 篇 经济学
  • 1,740 篇 农学
  • 1,456 篇 教育学
  • 637 篇 文学
  • 256 篇 军事学
  • 177 篇 艺术学
  • 27 篇 哲学
  • 19 篇 历史学

主题

  • 3,568 篇 accuracy
  • 3,319 篇 computer science
  • 3,153 篇 deep learning
  • 2,759 篇 machine learning
  • 2,595 篇 computational mo...
  • 2,566 篇 feature extracti...
  • 2,387 篇 training
  • 1,705 篇 predictive model...
  • 1,650 篇 internet of thin...
  • 1,636 篇 artificial intel...
  • 1,618 篇 real-time system...
  • 1,607 篇 optimization
  • 1,557 篇 convolutional ne...
  • 1,503 篇 support vector m...
  • 1,350 篇 data models
  • 1,153 篇 data mining
  • 1,143 篇 neural networks
  • 1,117 篇 semantics
  • 1,077 篇 wireless sensor ...
  • 1,019 篇 security

机构

  • 1,090 篇 cavendish labora...
  • 1,018 篇 department of ph...
  • 965 篇 physikalisches i...
  • 952 篇 university of ch...
  • 948 篇 oliver lodge lab...
  • 566 篇 fakultät physik ...
  • 552 篇 department of el...
  • 540 篇 school of physic...
  • 538 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 532 篇 imperial college...
  • 529 篇 school of physic...
  • 512 篇 h.h. wills physi...
  • 504 篇 stfc rutherford ...
  • 500 篇 nikhef national ...
  • 496 篇 school of comput...
  • 483 篇 henryk niewodnic...
  • 478 篇 center for high ...
  • 475 篇 van swinderen in...
  • 475 篇 school of physic...

作者

  • 268 篇 a. gomes
  • 262 篇 niyato dusit
  • 254 篇 barter w.
  • 251 篇 c. alexa
  • 250 篇 d. calvet
  • 248 篇 j. m. izen
  • 242 篇 s. chen
  • 240 篇 c. amelung
  • 239 篇 g. bella
  • 239 篇 j. strandberg
  • 232 篇 beiter a.
  • 229 篇 blake t.
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo
  • 215 篇 brundu d.
  • 215 篇 borsato m.

语言

  • 117,706 篇 英文
  • 9,358 篇 其他
  • 1,203 篇 中文
  • 122 篇 日文
  • 23 篇 德文
  • 13 篇 法文
  • 11 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 4 篇 西班牙文
  • 3 篇 荷兰文
  • 3 篇 俄文
检索条件"机构=Department of Computer Science and Engineering School of Computing"
128313 条 记 录,以下是501-510 订阅
排序:
A Next-Gen Approach to Streamlined Canteen Management Systems using Mesa Framework  8
A Next-Gen Approach to Streamlined Canteen Management System...
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Narendran, Advik Inuguri, Anantha Hothri Yashaswini, Manyam Sundaram, Srinidhi Khanna, Manju Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bangalore India
A next-generation canteen management system is proposed that employs intelligent software agents to streamline various tasks, such as order processing and customer service, within canteens. The system automates verifi... 详细信息
来源: 评论
Adapting Optimal Solutions to Travelling Salesman Problem  15
Adapting Optimal Solutions to Travelling Salesman Problem
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Madhusoodanan, Devika Vismaya, R. Hridyalakshmi Sahay, Apurvanand Amrita Vishwa Vidyapeetham Amrita School Of Computing Department of Computer Science and Engineering Bengaluru India
A comparative analysis of algorithms for the Traveling Salesman Problem (TSP) is proposed that evaluates four distinct approaches: Nearest neighbor (NN), 2-opt algorithm, Genetic Algorithm (GA), Simulated Annealing (S... 详细信息
来源: 评论
A Speech2Text based Recognizer and Probabilistic Parser Application for TeluguSentences  15
A Speech2Text based Recognizer and Probabilistic Parser Appl...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Varshini, Surisetty Hima Varma, Gottimukkala Sarayu Belwal, Meena Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bangalore India
Telugu, the largest Dravidian language, is one of the Indian languages that is predominantly spoken in Andhra Pradesh, Telangana and a few parts of southern India. The proposed work presents a speech-to-text based rec... 详细信息
来源: 评论
Comparative Analysis of Eminent Algorithms for Detecting Ham and Spam Contents in OSN  4
Comparative Analysis of Eminent Algorithms for Detecting Ham...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Ponnuchamy, Kardeepa Subbulakshmi, N. School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Virudhunagar India
Social or Communal media platforms is a lay of exchanging the thoughts or ideas of online users through various data formats like text content, image content or through audio, video, Graphics Interchange Format (GIF) ... 详细信息
来源: 评论
Deep Fake Image Detection using Xception Architecture  5
Deep Fake Image Detection using Xception Architecture
收藏 引用
5th IEEE International Conference on Recent Trends in computer science and Technology, ICRTCST 2024
作者: Joshi, Paritosh Nivethitha, V. Amrita School Of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India
Deep Fake technology has become increasingly sophisticated, posing a significant challenge to the integrity of digital content in today's information age. This research paper introduces a novel approach in detecti... 详细信息
来源: 评论
Exploring the Essence of Prompt Tone: A Comparative Study of Large Language Model Security  3
Exploring the Essence of Prompt Tone: A Comparative Study of...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Nair, Aiswarya Vithayathil, Jose Nambiar, Sandeep Prem Snehasree, S. Murali, Shalu Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Amritapuri India
Chatbots powered by Large Language Model(LLM) can be manipulated by malicious prompts, generating harmful content and biased responses which would raise security concerns. Growing dependence on chatbots demands robust... 详细信息
来源: 评论
MazeSolver: Exploring Algorithmic Solutions for Maze Navigation  15
MazeSolver: Exploring Algorithmic Solutions for Maze Navigat...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Narendran, Advik Hothri, Anantha Saga, Hemanth Sahay, Apurvanand Bangalore Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering India
The initiative examines the efficiency of various maze-solving algorithms, including breadth-first search (BFS), depth-first search (DFS), A∗ search, Markov decision processes with policy iteration (MDP PI), value ite... 详细信息
来源: 评论
Generating Event Descriptions from Legal Documents with Bidirectional and Auto-Regressive Transformers  4
Generating Event Descriptions from Legal Documents with Bidi...
收藏 引用
4th IEEE Asian Conference on Innovation in Technology, ASIANCON 2024
作者: Kumar, Aparna Ashok Pati, Peeta Basa Prabhakar, Priyanka Amrita School of Computing Department of Computer Science & Engineering Amrita Vishwa Vidyapeetham Benagluru India
Legal document analysis often requires understanding complex sequences of events, their relationships, and their implications within a legal context. This paper introduces a novel method for event generation by extrac... 详细信息
来源: 评论
Empowering IoT Security: Leveraging Deep Neural Networks Against Ransomware and DDoS Attacks  15
Empowering IoT Security: Leveraging Deep Neural Networks Aga...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Geetha, K. Chaudhary, Dharmindar Shrivarshini, K. Amrita Vishwa Vidhyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India
Using Internet of Things (IoT) devices has become more efficient and convenient, but it has also increased the potential of security breaches, particularly from ransomware and Distributed Denial of Service (DDoS) assa... 详细信息
来源: 评论
Comparative Analysis of Legal Outcome Prediction with Detailed and Summarized Text  9
Comparative Analysis of Legal Outcome Prediction with Detail...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Varshini, Surisetty Hima Varma, Gottimukkala Sarayu Prabhakar, Priyanka Pati, Peeta Basa Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science & Engineering Bengaluru India
Legal Outcome Prediction(LOP) is the process of predicting the possible outcome of a court case based on the contents in the case *** aim of this work is to perform a comparative analysis to assess the effectiveness o... 详细信息
来源: 评论