咨询与建议

限定检索结果

文献类型

  • 5,839 篇 会议
  • 908 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 6,787 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,900 篇 工学
    • 3,030 篇 计算机科学与技术...
    • 2,565 篇 软件工程
    • 1,055 篇 信息与通信工程
    • 672 篇 控制科学与工程
    • 519 篇 生物工程
    • 468 篇 生物医学工程(可授...
    • 463 篇 电气工程
    • 411 篇 电子科学与技术(可...
    • 296 篇 光学工程
    • 288 篇 动力工程及工程热...
    • 247 篇 机械工程
    • 228 篇 仪器科学与技术
    • 216 篇 安全科学与工程
    • 193 篇 化学工程与技术
    • 170 篇 网络空间安全
    • 162 篇 交通运输工程
  • 2,055 篇 理学
    • 1,001 篇 数学
    • 592 篇 物理学
    • 574 篇 生物学
    • 336 篇 统计学(可授理学、...
    • 234 篇 系统科学
    • 195 篇 化学
  • 1,111 篇 管理学
    • 708 篇 管理科学与工程(可...
    • 491 篇 图书情报与档案管...
    • 372 篇 工商管理
  • 451 篇 医学
    • 395 篇 临床医学
    • 373 篇 基础医学(可授医学...
    • 229 篇 药学(可授医学、理...
    • 206 篇 公共卫生与预防医...
  • 247 篇 法学
    • 206 篇 社会学
  • 150 篇 经济学
  • 131 篇 农学
  • 98 篇 教育学
  • 27 篇 军事学
  • 26 篇 文学
  • 2 篇 艺术学

主题

  • 334 篇 accuracy
  • 243 篇 feature extracti...
  • 239 篇 deep learning
  • 207 篇 real-time system...
  • 198 篇 computational mo...
  • 185 篇 machine learning
  • 173 篇 training
  • 162 篇 predictive model...
  • 146 篇 internet of thin...
  • 143 篇 support vector m...
  • 139 篇 convolutional ne...
  • 116 篇 data models
  • 115 篇 cloud computing
  • 107 篇 security
  • 101 篇 machine learning...
  • 98 篇 optimization
  • 89 篇 artificial intel...
  • 87 篇 wireless sensor ...
  • 86 篇 medical services
  • 86 篇 data mining

机构

  • 32 篇 lovely professio...
  • 30 篇 the islamic univ...
  • 25 篇 school of automa...
  • 25 篇 department of co...
  • 23 篇 college of compu...
  • 20 篇 department of co...
  • 19 篇 dept. of compute...
  • 18 篇 dept. of compute...
  • 17 篇 dept. of compute...
  • 16 篇 chitkara univers...
  • 15 篇 school of comput...
  • 15 篇 the islamic univ...
  • 13 篇 dept. of compute...
  • 12 篇 faculty of scien...
  • 12 篇 ggits mp
  • 12 篇 dept. of compute...
  • 11 篇 computer science...
  • 11 篇 dept. of compute...
  • 11 篇 school of comput...
  • 11 篇 artificial intel...

作者

  • 15 篇 ankur gupta
  • 13 篇 haitao yuan
  • 13 篇 ren-hung hwang
  • 13 篇 sivanandam s.n.
  • 12 篇 reiner lisa
  • 11 篇 mengchu zhou
  • 11 篇 zhou mengchu
  • 11 篇 yuan haitao
  • 10 篇 jayendra gopal t...
  • 10 篇 shell dylan a.
  • 10 篇 saadaldeen rashi...
  • 10 篇 jia zhang
  • 10 篇 bi jing
  • 10 篇 ahmed saadaldeen...
  • 9 篇 bellos p.
  • 9 篇 bona m.
  • 9 篇 lu xiang
  • 9 篇 bachacou h.
  • 9 篇 bressler s.
  • 9 篇 qiu wangqi

语言

  • 6,299 篇 英文
  • 428 篇 其他
  • 44 篇 中文
  • 13 篇 日文
  • 3 篇 朝鲜文
检索条件"机构=Dept of Computer Science and Engineering AMC Engineering College"
6787 条 记 录,以下是51-60 订阅
排序:
Enhancing Transaction Security through Iris Recognition  4
Enhancing Transaction Security through Iris Recognition
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Arepalli, Gopi Suresh Bhavana, Paluvai Krishna, Yakkanti Venkata Sai Surendrababu, Chittibomma Lakireddy Bali Reddy College of Engineering Dept. of computer Science and Engineering Mylavaram India Dept. of Computer Science and Engineering Mylavaram India
UPI frauds have led to increased use of biometrics for personal identification to ensure security and accuracy. Biometric UPI based on iris recognition technology improves customer service by providing a safe and pape... 详细信息
来源: 评论
Trust Based Cooperative Secure Routing Protocols for Internet of Things (IoT)  2
Trust Based Cooperative Secure Routing Protocols for Interne...
收藏 引用
2nd International Conference on Recent Trends in Microelectronics, Automation, Computing, and Communications Systems, ICMACC 2024
作者: Mekala, Sagar Ramji, Bhukya CVR College of Engineering Dept. of Computer Science and Engineering Hyderabad India Kakatiya Institute of Technology and Science Dept. of Computer Science and Engineering Hanmakonda India
The Internet of Things has rapidly emerged and continues to create services, software, sensors-embedded devices, and protocols. IoT allows physical objects to communicate, exchange information, and make decisions whil... 详细信息
来源: 评论
Cybersecurity Threat Detection Using Deep Learning and Anomaly Detection Techniques
Cybersecurity Threat Detection Using Deep Learning and Anoma...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Rajendran, T. Mohamed Imtiaz, N. Jagadeesh, K. Sampathkumar, Balaji Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai India Nagarjuna College of Engineering and Technology Dept. of Information Science and Engineering Bangalore India Sri Venkateswaraa College of Technology Dept. of Computer Science and Engineering Chennai India Akshaya College of Engineering and Technology Dept. of Computer Science and Engineering Coimbatore India
Through the use of combined deep learning and anomaly detection approaches, this research investigates the area of cybersecurity threat detection. The study proves the framework's extraordinary success in recogniz... 详细信息
来源: 评论
Recognition of Fingerprint Images using CNN for Cybercrime Detection System  2
Recognition of Fingerprint Images using CNN for Cybercrime D...
收藏 引用
2nd IEEE International Conference on Networks, Multimedia and Information Technology, NMITCON 2024
作者: Kavitha, T. Patil, Bhimaraya Saraswathi, S. Rajarajeswari, S. Patil, Anita New Horizon College of engineering Dept. of Computer Engineering Bangalore India Sri Sivasubramaniya Nadar College of Engineering Dept. of Computer Science Engineering Chennai India Vellore Institute of Technology School of computer science and engineering Vellore India City Engineering College Dept. of Information Science Bengaluru India
Fingerprint identification plays a crucial role in crime detection, but manual analysis is time-consuming and error-prone. This research aims to develop an automated system for accurate and efficient fingerprint match... 详细信息
来源: 评论
Stress Level Analysis Using EEG Signals: A Comparative Study of EEGNET and CNN Deep Learning Models  5
Stress Level Analysis Using EEG Signals: A Comparative Study...
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Khanaganni, Anulaxmi S. Monisha, H.M. Kumar, R. Ashok Bms College of Engineering Dept Information Science and Engineering Bangalore India Bms College of Engineering Dept Computer Science and Business Systems Bangalore India
Understanding the brain's response to stress is pivotal for advancing mental health monitoring technologies. In this research paper, we leverage deep learning techniques to predict stress levels using electroencep... 详细信息
来源: 评论
Identification of Therapeutic Plants Using Machine Learning  2
Identification of Therapeutic Plants Using Machine Learning
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Rohini, S. Keerthana Shree, M.U. Jayalakshmi, R. Malathi, M. Jabasheela, L. Panimalar Engineering College M.E Computer Science and Engineering Tamil Nadu Chennai India Panimalar Engineering College B.E Computer Science and Engineering Tamil Nadu Chennai India Panimalar Engineering College Dept of Computer Science and Engineering Tamil Nadu Chennai India Panimalar Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India
It takes a lot of work to develop a computerized method for classifying plants for medicinal purposes. There are countless kinds of plants found in India, and each one has its own unique set oftherapeutic advantages. ... 详细信息
来源: 评论
Content Based Classification of Short Messages using Recurrent Neural Networks in NLP
Content Based Classification of Short Messages using Recurre...
收藏 引用
2024 International Conference on Artificial Intelligence, computer, Data sciences, and Applications, ACDSA 2024
作者: Bennet, Deepthi Tabitha Bennet, Preethi Samantha Thiagarajan, Priya Sundarakantham, K. Thiagarajar College of Engineering Dept. of Applied Mathematics and Computational Science Madurai India Thiagarajar College of Engineering Dept. of Computer Science and Business Systems Madurai India Thiagarajar College of Engineering Dept. of Computer Science and Engineering Madurai India
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally... 详细信息
来源: 评论
Fire and Smoke Detection Using Deep Learning  2
Fire and Smoke Detection Using Deep Learning
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Divya, B. Kavitha, S. Muthu Pandeeswari, R. Sreenidhi, R. Ponvaishnavi, M.R. Loshine, S. Sri Sai Ram Institute of Technology Dept of Computer Science and Engineering India India Rajalakshmi Engineering College Dept of Computer Science and Engineering Thandalam India
Of late, wildfires and commercial fires like fires in a shopping complex, firework factories, and industries, continue to cause extensive destruction throughout the world, frequently causing human fatalities. The solu... 详细信息
来源: 评论
Remora optimization algorithm-based optimized node clustering technique for reliable data delivery in VANETs
收藏 引用
International Journal of Intelligent Networks 2022年 3卷 74-79页
作者: Konduru, Swathi Sathya, M. Department of Computer Science Pennsylvania State University PA16801 United States Department of Information Science and Engineering AMC Engineering College Bengaluru India
Vehicular ad hoc Network (VANET) is one of the recently growing trends which motivate the provision of several service providers in the urban areas. In VANETs, the vehicles represent the nodes in the network topology ... 详细信息
来源: 评论
Reinforcement Learning for Adaptive Traffic Signal Control Using Deep Q-Networks  1
Reinforcement Learning for Adaptive Traffic Signal Control U...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Bohra, Asha Rani Selvi, Thamarai Vishal, V. Sunkara, Pawan Sai Sunku, Balaji Jignesh, Bhavsar Nitya New Horizon College of Engineering Dept. of Computer Science and Engineering Karnataka Bengaluru India New Horizon College of Engineering Dept. of Information Science and Engineering Karnataka Bengaluru India
Traffic congestion is a critical issue in urban areas, contributing to increased travel time, fuel consumption, and environmental pollution. Traditional traffic signal control methods, such as fixed-time systems, cann... 详细信息
来源: 评论