咨询与建议

限定检索结果

文献类型

  • 30,634 篇 会议
  • 4,656 篇 期刊文献
  • 240 册 图书

馆藏范围

  • 35,530 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,002 篇 工学
    • 15,947 篇 计算机科学与技术...
    • 13,350 篇 软件工程
    • 5,910 篇 信息与通信工程
    • 3,559 篇 控制科学与工程
    • 2,713 篇 电子科学与技术(可...
    • 2,665 篇 电气工程
    • 2,357 篇 生物工程
    • 1,908 篇 生物医学工程(可授...
    • 1,552 篇 光学工程
    • 1,371 篇 机械工程
    • 1,245 篇 动力工程及工程热...
    • 1,226 篇 仪器科学与技术
    • 1,030 篇 化学工程与技术
    • 888 篇 安全科学与工程
    • 752 篇 交通运输工程
  • 11,253 篇 理学
    • 6,095 篇 数学
    • 3,076 篇 物理学
    • 2,574 篇 生物学
    • 2,027 篇 统计学(可授理学、...
    • 1,337 篇 系统科学
    • 1,110 篇 化学
  • 5,736 篇 管理学
    • 3,374 篇 管理科学与工程(可...
    • 2,665 篇 图书情报与档案管...
    • 1,837 篇 工商管理
  • 1,651 篇 医学
    • 1,399 篇 临床医学
    • 1,309 篇 基础医学(可授医学...
    • 851 篇 药学(可授医学、理...
    • 726 篇 公共卫生与预防医...
  • 1,063 篇 法学
    • 855 篇 社会学
  • 648 篇 经济学
    • 648 篇 应用经济学
  • 494 篇 农学
  • 437 篇 教育学
  • 183 篇 文学
  • 77 篇 军事学
  • 39 篇 艺术学
  • 1 篇 哲学

主题

  • 1,143 篇 accuracy
  • 886 篇 feature extracti...
  • 861 篇 computational mo...
  • 781 篇 deep learning
  • 690 篇 training
  • 679 篇 computer science
  • 553 篇 real-time system...
  • 543 篇 machine learning
  • 531 篇 support vector m...
  • 460 篇 predictive model...
  • 430 篇 internet of thin...
  • 389 篇 convolutional ne...
  • 367 篇 data models
  • 353 篇 computer archite...
  • 340 篇 reliability
  • 315 篇 optimization
  • 291 篇 data mining
  • 281 篇 routing
  • 263 篇 wireless sensor ...
  • 260 篇 artificial intel...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 75 篇 tno technical sc...
  • 66 篇 università di ca...
  • 66 篇 université de st...
  • 66 篇 dept. of informa...
  • 64 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 57 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 52 篇 dept. of compute...
  • 49 篇 dept. of compute...
  • 47 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 kalekin o.
  • 81 篇 chen a.
  • 80 篇 díaz a.f.
  • 80 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 70 篇 huang f.
  • 68 篇 dallier r.
  • 59 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 44 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 30,319 篇 英文
  • 4,815 篇 其他
  • 301 篇 中文
  • 54 篇 日文
  • 45 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science Engineering and Applications"
35530 条 记 录,以下是31-40 订阅
排序:
Image encryption using XOR-based continuous tone MSS and Cellular Automata  6
Image encryption using XOR-based continuous tone MSS and Cel...
收藏 引用
6th International Conference on Information Systems and computer Networks, ISCON 2023
作者: Akanksha Garg, Hitendra Shivani, Shivendra GLA University Dept. of Computer Engineering and Applications Mathura India Thapar Institute of Engineering and Technology Dept. of Computer Science Patiala India
Online communication has become quicker and simpler as a result of the growth of the internet and the advancement in technology. People are using multimedia data in almost all spheres of life. The amount of multimedia... 详细信息
来源: 评论
Comparison of Faster RCNN and YOLO V3 for Video Anomaly Localization
Comparison of Faster RCNN and YOLO V3 for Video Anomaly Loca...
收藏 引用
2023 International Conference on Power, Instrumentation, Control and Computing, PICC 2023
作者: Anoopa, S. Salim, A. Nadera Beevi, S. College of Engineering Trivandrum Dept. of Computer Science and Engineering Kerala India Government Engineering College Thrissur Dept. of Computer Science and Engineering Kerala India Tkm College of Engineering and Technology Dept. of Computer Applications Kerala India
Video Anomaly Localization techniques are interesting and emerging tasks in computer vision that is used to locate the position of an anomalous object with bounding boxes. Convolutional neural network-based object loc... 详细信息
来源: 评论
Revolutionizing Facial Feature Extraction with AI: An Innovative Approach  5
Revolutionizing Facial Feature Extraction with AI: An Innova...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Lakshmi, B. Alekhya, Jandhyam Lakshmi Parish Venkata Kumar, K. Kishore, B. Kamala Nyni, K. Likhita, K. V.R. Siddhartha Engineering Dept. of Computer Applications KanuruVijayawada 7 India V.R. Siddhartha Engineering College Dept of Computer Science and Engineering KanuruVijayawada 7 India Department of Computer Applications India
This paper provides a technique for detecting human faces & extracting their features based on segmentation of skin tone & facial structure. The system goes through several stages. The method first searches fo... 详细信息
来源: 评论
Revitalizing the single batch environment: a ‘Quest’ to achieve fairness and efficiency
收藏 引用
International Journal of computers and applications 2024年 第8期46卷 651-665页
作者: Manna, Supriya Mudigonda, Krishna Siva Prasad Dept. of Computer Science and Engineering SRM University AP Mangalagiri Andhra Pradesh India
In the realm of computer systems, efficient utilization of the CPU (Central Processing Unit) has always been a paramount concern. Researchers and engineers have long sought ways to optimize process execution on the CP... 详细信息
来源: 评论
An Overview on IoT in Electric Vehicles: Efficiency and Sustainability  2
An Overview on IoT in Electric Vehicles: Efficiency and Sust...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation Technology, ICICAT 2024
作者: Gupta, Shashank Sounkhla, Indu Dubey, Ranjeet Kumar Yadav, Mithilesh Kumar Singh Yadav, Sandeep NIT Dept. of Computer Science and Engineering Jalandhar India KIPM Dept. of Computer Science and Engineering Gorakhpur India Buddha Institute of Technology Dept. of Computer Science and Engineering Gorakhpur India
Internal combustion engine (ICE) vehicles are very polluting and release high nitrogen oxides, carcinogens, and soot into the environment. ICE vehicles are the best choice in this era, but replacing ICE vehicles with ... 详细信息
来源: 评论
PhishVQC: Optimizing Phishing URL Detection with Correlation Based Feature Selection and Variational Quantum Classifier  3
PhishVQC: Optimizing Phishing URL Detection with Correlation...
收藏 引用
3rd International Conference on Intelligent Systems, Advanced Computing, and Communication, ISACC 2025
作者: Shahriyar, Farhan Tanbhir, Gazi Raihan Chy, Abdullah Md Tanzin, Mohammed Abdul Al Arafat Mashrafi, Jisan World University of Bangladesh Dept. of Computer Science and Engineering Dhaka Bangladesh Southern University Bangladesh Dept. of Computer Science and Engineering Chittagong Bangladesh Brac University Dept. of Computer Science and Engineering Dhaka Bangladesh
Phishing URL detection is crucial in cybersecurity as malicious websites disguise themselves to steal sensitive information. Traditional machine learning techniques struggle to perform well in complex real-world scena... 详细信息
来源: 评论
Event Identification and Chronology Model of Ramayana  8
Event Identification and Chronology Model of Ramayana
收藏 引用
8th International Conference on Electronics, Materials engineering and Nano-Technology, IEMENTech 2025
作者: Paul, Apurba Mishra, Rishabh Padia, Nayan Das, Dipankar IEM Kolkata UEM Kolkata Dept. of Computer Science & Engineering Kolkata India IEM Kolkata Dept. of Computer Science & Engineering Kolkata India Jadavpur University Dept. of Computer Science & Engineering Kolkata India
The paper introduces an event chronology model for Hindu mythological texts, with a focus on the Ramayana's Bala-kanda. It captures and structures sentence-level events based on their chronological order to better... 详细信息
来源: 评论
Deep Learning-Based Approach for Detecting Copy-Move Forgery in Digital Images  27
Deep Learning-Based Approach for Detecting Copy-Move Forgery...
收藏 引用
27th International Symposium on Wireless Personal Multimedia Communications, WPMC 2024
作者: Dar, Navid Ahmad Atsya, Rani Kumar, Anuj Sharda University dept. of Computer Science and Engineering UP Greater Noida India Greater Noida Institute of Technology dept. of computer applications UP Greater Noida India
Copying and pasting a portion of the same image to hide another portion is the most common method of fraudulent image enhancement. Cloning a restricted portion of an image and pasting it once or more inside a comparab... 详细信息
来源: 评论
Integrated Framework for Equitable Healthcare AI: Bias Mitigation, Community Participation, and Regulatory Governance  14
Integrated Framework for Equitable Healthcare AI: Bias Mitig...
收藏 引用
14th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2025
作者: Chandra, Joydeep Kaur, Ramanjot Sahay, Rashi Dept. of Computer Science and Engineering Chandigarh University Punjab Mohali India Dept. of Computer Science and Engineering MRIIRS Faridabad India
Artificial intelligence (AI) has revolutionized healthcare by enhancing diagnostic precision, personalizing treatments, and optimizing clinical workflows. However, algorithmic biases arising from imbalanced training d... 详细信息
来源: 评论
Two-Phase Deep Q Learning Network for Secure Healthcare Model in the Internet of Things  2
Two-Phase Deep Q Learning Network for Secure Healthcare Mode...
收藏 引用
2nd International Conference on Advances in Computation, Communication and Information Technology, ICAICCIT 2024
作者: Selvam, Thamizh D. Vinothkumar, J. Madhubala, S. Dept. of Computer Science Rajiv Gandhi Arts and Science College Puducherry India Dept. of Computer Applications Rajiv Gandhi Arts and Science College Puducherry India
The Internet of Things (IoT) embodies a revolutionary networking technology that links both living beings and inanimate objects. Its utilization is rapidly growing across diverse sectors, particularly in healthcare, w... 详细信息
来源: 评论