咨询与建议

限定检索结果

文献类型

  • 796 篇 会议
  • 388 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 1,201 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 758 篇 工学
    • 567 篇 计算机科学与技术...
    • 439 篇 软件工程
    • 228 篇 信息与通信工程
    • 152 篇 控制科学与工程
    • 95 篇 电气工程
    • 84 篇 生物工程
    • 79 篇 电子科学与技术(可...
    • 74 篇 网络空间安全
    • 71 篇 生物医学工程(可授...
    • 64 篇 安全科学与工程
    • 61 篇 光学工程
    • 58 篇 交通运输工程
    • 53 篇 机械工程
    • 41 篇 石油与天然气工程
    • 40 篇 动力工程及工程热...
    • 38 篇 仪器科学与技术
    • 34 篇 化学工程与技术
  • 386 篇 理学
    • 217 篇 数学
    • 110 篇 物理学
    • 98 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 46 篇 系统科学
    • 41 篇 化学
  • 269 篇 管理学
    • 161 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 51 篇 工商管理
  • 77 篇 医学
    • 63 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 37 篇 公共卫生与预防医...
    • 37 篇 药学(可授医学、理...
  • 49 篇 法学
  • 27 篇 农学
  • 21 篇 经济学
  • 9 篇 教育学
  • 7 篇 军事学
  • 6 篇 文学
  • 2 篇 艺术学

主题

  • 37 篇 accuracy
  • 36 篇 deep learning
  • 30 篇 machine learning
  • 26 篇 internet of thin...
  • 23 篇 computational mo...
  • 21 篇 artificial intel...
  • 21 篇 convolutional ne...
  • 20 篇 optimization
  • 19 篇 feature extracti...
  • 18 篇 medical services
  • 17 篇 training
  • 15 篇 support vector m...
  • 15 篇 real-time system...
  • 14 篇 big data
  • 14 篇 data mining
  • 14 篇 wireless sensor ...
  • 13 篇 authentication
  • 13 篇 predictive model...
  • 13 篇 blockchain
  • 12 篇 reliability

机构

  • 66 篇 department of co...
  • 59 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 39 篇 department of co...
  • 36 篇 department of co...
  • 27 篇 infn e laborator...
  • 27 篇 faculty of scien...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 west university ...
  • 27 篇 research center ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 graduate school ...
  • 27 篇 department physi...
  • 27 篇 institute of phy...
  • 27 篇 deutsches elektr...
  • 27 篇 institute of phy...
  • 27 篇 department of ph...
  • 27 篇 instituto de fís...
  • 26 篇 department of mo...

作者

  • 23 篇 c. alexa
  • 23 篇 j. m. izen
  • 23 篇 j. gao
  • 23 篇 g. bella
  • 23 篇 j. strandberg
  • 23 篇 d. calvet
  • 23 篇 c. amelung
  • 23 篇 b. konya
  • 23 篇 f. pastore
  • 23 篇 a. grummer
  • 23 篇 k. j. r. cormier
  • 23 篇 n. orlando
  • 23 篇 f. a. förster
  • 23 篇 y. tayalati
  • 23 篇 t. pham
  • 23 篇 g. spigo
  • 23 篇 v. chiarella
  • 23 篇 m. lu
  • 23 篇 f. siegert
  • 23 篇 a. e. c. coimbra

语言

  • 1,097 篇 英文
  • 87 篇 其他
  • 17 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Information Technology and Computer Application"
1201 条 记 录,以下是41-50 订阅
排序:
An Overview of Clustering Algorithms for Credit Card Fraud Detection
An Overview of Clustering Algorithms for Credit Card Fraud D...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Jebaraj, N.R. Solomon Shekhawat, Jyoti Gupta, Rupal Department of Computer Science and Information Technology Bangalore India Computer Science & Application Vivekananda Global University Jaipur India Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India
This paper offers a top-stage view of clustering algorithms that can be used for Clustering algorithms, which are robust and bendy techniques for uncovering patterns and anomalies in large datasets. Those algorithms c... 详细信息
来源: 评论
Investigating the Use of Spatial Transformer Networks and Recurrent Neural Networks for Medical Image Segmentation
Investigating the Use of Spatial Transformer Networks and Re...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Saxena, Vineet Nachappa, M.N. Shree, Ritu Teetthanker Mahaveer University Department of Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India Computer Science & Application Vivekananda Global University Jaipur India
This paper investigates using popular deep learning models, Spatial Transformer Networks (STNs), and Recurrent Neural Networks (RNNs) for clinical picture segmentation. STNs are used to study a learnable pose-invarian... 详细信息
来源: 评论
Enhancing Network Security with Blockchain technology
Enhancing Network Security with Blockchain Technology
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Inzimam Bishnoi, Amit Kumar Menaka, C. Vivekananda Global University Department of Computer Science & Application Jaipur India Teerthanker Mahaveer University Computing Sciences and Information Technology Uttar Pradesh Moradabad India Department of Computer Science and Information Technology Bangalore India
The block chain era is hastily traction as a sturdy approach to community security. In its conventional shape, block chain integrated is a distributed, immutable, and cryptographically-secured ledger, composed of virt... 详细信息
来源: 评论
Research on the Network Transmission technology of Integrating the Resource Demand of computer Cloud Computing  2
Research on the Network Transmission Technology of Integrati...
收藏 引用
2nd IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics, ICDCECE 2023
作者: Ou, Wenjisi Zheng, Wei Zhou, Qiang Jiangxi Vocational and Technical College of Information Application Department of Computer Technology Nanchang330043 China
The establishment of a network environment under the network environment under the network environment of the network environment. First of all, in view of the periodic characteristics of business requirements in the ... 详细信息
来源: 评论
Internet of Everything: A Review on Smart Healthcare Taxonomy, Research Challenges and Methodologies  14
Internet of Everything: A Review on Smart Healthcare Taxonom...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Raj, Anu Prakash, Shiva Srivastava, Jyoti Madan Mohan Malaviya University of Technolgy Information Technology & Computer Application Department Gorakhpur India
The Internet of Everything (IoE) has the potential to revolutionize many aspects of our daily lives, including healthcare, business and industrial world etc. Smart healthcare systems that utilize IoE technologies coul... 详细信息
来源: 评论
Research on Cloud Computing Security technology under computer Big Data Network  3
Research on Cloud Computing Security Technology under Comput...
收藏 引用
3rd IEEE International Conference on Electronic technology, Communication and information, ICETCI 2023
作者: Zhou, Qiang Ou, Wenjisi Zheng, Wei Jiangxi Vocational and Technical College of Information Application Department of Computer Technology Nanchang330043 China
In this paper, a parameter estimation-based security access integration method for computer network smart data is designed. The scale of data clustering is determined according to the distribution and evolution charac... 详细信息
来源: 评论
Investigating the use of Neural Networks in Enhancing Music Composition and Sound Quality
Investigating the use of Neural Networks in Enhancing Music ...
收藏 引用
2024 International Conference on Advances in Computing Research on Science Engineering and technology, ACROSET 2024
作者: Gupta, Sachin Inzimam Manivasagam Sanskriti University Department of Management Mathura India Vivekananda Global University Department of Computer Science & Application Jaipur India Department of Computer Science and Information Technology Bangalore India
An exciting new area of study in the world of music technology is the use of neural networks to the improvement of sound quality and the automation of musical creation. The goal of this research is to evaluate the pot... 详细信息
来源: 评论
An empirical analysis of evolutionary computing approaches for IoT security assessment
收藏 引用
Journal of Intelligent and Fuzzy Systems 2025年 第6期48卷 779-791页
作者: Kumar Sahu, Vinay Pandey, Dhirendra Singh, Priyanka Haque Ansari, Md Shamsul Khan, Asif Varish, Naushad Khan, Mohd Waris Department of Information Technology Babasaheb Bhim Rao Ambedkar University Uttar Pradesh Lucknow India CSE Department SRM University AP India Department of Computer Application Integral University Uttar Pradesh Lucknow India Telangana Hyderabad India Department of Computer Science Jamia Millia Islamia New Delhi India
The Internet of Things (IoT) strategy enables physical objects to easily produce, receive, and exchange data. IoT devices are getting more common in our daily lives, with diverse applications ranging from consumer sec... 详细信息
来源: 评论
Performance Juxtapose of Plant Leaf Disease Detection using Adaptive Deep Convolutional Recurrent Neural Network (ADCRNN) in MATLAB Versus Python
Performance Juxtapose of Plant Leaf Disease Detection using ...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Jayashree, S. Sumalatha, V. Vels Institute of Science Technology & Advanced Studies Department of Information Technology Chennai India Vels Institute of Science Technology & Advanced Studies Department of Computer Application Chennai India
Leaf diseases can cause several detriments in crops' overall yield and fertility. While analyzing the various diseases that affect plants is imperative, identifying the diseases using algorithmic techniques that r... 详细信息
来源: 评论
Multi-agent QoS-aware autonomic resource provisioning framework for elastic BPM in containerized multi-cloud environment
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12895-12920页
作者: Saif, Mufeed Ahmed Naji Niranjan, S.K. Murshed, Belal Abdullah Hezam Al-ariki, Hasib Daowd Esmail Abdulwahab, Hudhaifa Mohammed Department of Computer Applications Sri Jayachamarajendra College of Engineering VTU Mysore India Department of Studies in Computer Science University of Mysore Karnataka Mysore India Department of Computer Science College of Eng. &IT University of Amran Amran Yemen Department of Information Technology Faculty of Engineering and Information Technology Al-ata’a University for Science and Technology Taiz Yemen Department of Computer Networks Engineering and Technologies Sana’a Community College Sana’a Yemen Department of Computer Application Ramaiah Institute of Technology VTU Bangalore India
Cloud computing enables businesses to improve their market competitiveness, enabling instant and easy access to a pool of virtualized and distributed resources such as virtual machines (VM) and containers for executin... 详细信息
来源: 评论