咨询与建议

限定检索结果

文献类型

  • 1,381 篇 会议
  • 353 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 1,750 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 944 篇 工学
    • 742 篇 计算机科学与技术...
    • 633 篇 软件工程
    • 254 篇 信息与通信工程
    • 145 篇 生物工程
    • 125 篇 控制科学与工程
    • 98 篇 生物医学工程(可授...
    • 88 篇 电气工程
    • 82 篇 光学工程
    • 80 篇 电子科学与技术(可...
    • 49 篇 动力工程及工程热...
    • 47 篇 安全科学与工程
    • 47 篇 网络空间安全
    • 38 篇 机械工程
    • 38 篇 交通运输工程
    • 33 篇 化学工程与技术
  • 502 篇 理学
    • 256 篇 数学
    • 152 篇 生物学
    • 125 篇 物理学
    • 106 篇 统计学(可授理学、...
    • 43 篇 系统科学
    • 31 篇 地球物理学
  • 275 篇 管理学
    • 149 篇 图书情报与档案管...
    • 135 篇 管理科学与工程(可...
    • 88 篇 工商管理
  • 100 篇 医学
    • 79 篇 临床医学
    • 75 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 48 篇 药学(可授医学、理...
  • 65 篇 法学
    • 55 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 23 篇 农学
  • 13 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学

主题

  • 130 篇 accuracy
  • 72 篇 computational mo...
  • 67 篇 deep learning
  • 64 篇 real-time system...
  • 64 篇 machine learning
  • 57 篇 feature extracti...
  • 56 篇 predictive model...
  • 54 篇 convolutional ne...
  • 51 篇 training
  • 44 篇 data models
  • 42 篇 machine learning...
  • 39 篇 artificial intel...
  • 37 篇 support vector m...
  • 35 篇 analytical model...
  • 35 篇 technological in...
  • 32 篇 security
  • 31 篇 internet of thin...
  • 30 篇 visualization
  • 27 篇 reliability
  • 27 篇 data mining

机构

  • 15 篇 faculty of compu...
  • 15 篇 gik institute of...
  • 15 篇 university of eu...
  • 15 篇 department of ph...
  • 15 篇 dept. of technol...
  • 14 篇 lovely professio...
  • 13 篇 center for data ...
  • 13 篇 bcmaterials basq...
  • 13 篇 dept. of linguis...
  • 11 篇 fermi national a...
  • 11 篇 department of ph...
  • 11 篇 dept. of compute...
  • 11 篇 computer science...
  • 11 篇 kavli institute ...
  • 11 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 10 篇 madrid
  • 10 篇 department of ph...
  • 10 篇 smart data & kno...
  • 9 篇 department of ph...

作者

  • 21 篇 bowman samuel r.
  • 17 篇 ali raja hashim
  • 16 篇 zain ul abideen
  • 15 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 raja hashim ali
  • 13 篇 ashwini kodipall...
  • 13 篇 günnemann stepha...
  • 12 篇 dengel andreas
  • 12 篇 schröder markus
  • 11 篇 gruendl r.a.
  • 11 篇 ali zeeshan ijaz
  • 11 篇 sanchez e.
  • 11 篇 carretero j.
  • 11 篇 kodipalli ashwin...
  • 11 篇 jilek christian
  • 10 篇 miquel r.
  • 10 篇 ravindran balara...
  • 10 篇 gruen d.
  • 10 篇 doel p.

语言

  • 1,655 篇 英文
  • 88 篇 其他
  • 6 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Dept. of Data Science and Computer Applications"
1750 条 记 录,以下是71-80 订阅
排序:
Automatic Identification of Teff (Eragrostis Tef) Flour Adulteration Using Machine Learning  10
Automatic Identification of Teff (Eragrostis Tef) Flour Adul...
收藏 引用
10th International Conference on Systems and Informatics, ICSAI 2024
作者: Bochera, Zekiyos Abayneh Gizaw, Solomon Clement, Onime Addis Ababa University Dept. of Computational Data Science Addis Ababa Ethiopia Addis Ababa University Dept. of Computer Science Addis Ababa Ethiopia Trieste Italy
Food adulteration, the act of mixing foodstuffs with lower-quality foodstuffs or other food and non-food items, has become a global issue, particularly in developing countries like Ethiopia. This is a significant prob... 详细信息
来源: 评论
Symptoms-based Classification of Disease Using Various ML Algorithms and Interpretation using LIME and SHAP KERNELS  4
Symptoms-based Classification of Disease Using Various ML Al...
收藏 引用
4th IEEE Asian Conference on Innovation in Technology, ASIANCON 2024
作者: Soujanya, K.J. Kodipalli, Ashwini Gosai, Sanjeev Sneha, B.J. Rao, Trupthi Global Academy of Technology Dept. of Artificial Intelligence & Data Science Karnataka Bangalore India Global Academy of Technology Dept. of Computer Science & Engineering Karnataka Bangalore India
Using a variety of machine learning techniques, this research study suggests a unique method for classifying diseases using symptom-based analysis. To improve model transparency and comprehension, the study makes use ... 详细信息
来源: 评论
Mitigating Imbalanced data in Online Social Networks using Stratified K-Means Sampling  8
Mitigating Imbalanced Data in Online Social Networks using S...
收藏 引用
8th International Conference on Business and Industrial Research, ICBIR 2023
作者: Kathiravan, P. Shanmugavadivu, P. Saranya, R. Central University of Tami Nadu Department of Computer Science Thiruvarur India The Gandhigram Rural Institute Dept. of Computer Science and Applications India
The K-means clustering technique is widely used in many fields, such as anomaly detection, customer segmentation, cyber-physical system, medical diagnoses, sentiment analysis, fraud detection, and other similar tasks.... 详细信息
来源: 评论
IoT-Enabled Covert Surveillance Camera Identification through IR Sensor  2
IoT-Enabled Covert Surveillance Camera Identification throug...
收藏 引用
2nd International Conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Ruksana, Shaik Imran, Shaik Farheen, Shaik Fatima Kireeti, Krovi Mohan Sailaja, K.L. VR Siddhartha Engineering College Dept. of Artificial Intelligence and Data Science Vijayawada India VR Siddhartha Engineering College Dept. of Computer Science and Engineering Vijayawada India
A rising number of spy cameras installed in sensitive locations globally poses an escalating threat to personal privacy. Detecting these small and well-concealed cameras with the naked eye is challenging. Despite the ... 详细信息
来源: 评论
Machine Learning Classifiers for Predicting the Risk of Cardiovascular Disease in Healthcare 4.0  3
Machine Learning Classifiers for Predicting the Risk of Card...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Kumari, Palak Kumar, Ashish Chatterjee, Kakali Master of Computer Applications Patna Women's College Patna India National Institute of Technology Patna Dept. of Computer Science and Engineering Patna India
Cardiovascular disease (CVD) generic phrase used to describe heart or blood vessel illness. Conditions that impact the body's, brain's, or heart's blood flow. Reduced blood flow can result from factors suc... 详细信息
来源: 评论
Facetpass- Intelligent Facial Recognition Authentication System Security and Usability  2
Facetpass- Intelligent Facial Recognition Authentication Sys...
收藏 引用
2nd International Conference on Artificial Intelligence and Machine Learning applications, AIMLA 2024
作者: Sathya, K. Esther, J. Kavitha, S. Kamalakumari, J. SRM Institute of Science and Technology Faculty of Science and Humanities Department of Computer Applications Chengalpattu Tamil Nadu Kattankulathur603203 India Tagore College of Arts and Science Department of Computer Science Chromepet Chennai India Agurchand Manmull Jain College Dept. Of. Computer Applications Meenambakkam Chennai India
The security of authentication system completely is connected with confidentiality and strength. Even if graphical authentication system eradicates the weakness of the text password, single-level password system is in... 详细信息
来源: 评论
Mathematical Morphology Adopted Automatic Detection of Ground Glass Opacities in Lung CT Images of COVID-19 Patients
Mathematical Morphology Adopted Automatic Detection of Groun...
收藏 引用
2023 International Conference on Intelligent Systems, Advanced Computing and Communication, ISACC 2023
作者: Chatterjee, Soma Chatterjee, Rohit Kamal Goswami, R.T. Techno International New Town Dept. of Computer Applications Kolkata India Birla Institute of Technology Dept. of Computer Science & Engineering Mesra Ranchi India Techno International New Town Dept. of Computer Science Kolkata India
The severity of the nCOVID infection relies on the presence of Ground Glass Opacities (GGO) present in the patient's chest CT scan images. Although, detecting and delineating the precise boundaries of GGO in the c... 详细信息
来源: 评论
Evaluating 10Gbps Wireless Optical Communication Using NRZ Modulation: Analyzing BER, Signal Quality, and System Performance  7
Evaluating 10Gbps Wireless Optical Communication Using NRZ M...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Khant, Shailesh Makwana, Mayur Patel, Atul Faculty of Computer Science and Applications Charusat Changa Anand India Dept. Electronics and Communication Engineering Charusat Changa Anand India
Free space optical (FSO) communication is a fast and wireless data transfer technique that serves as a viable alternative to traditional fiber-optic systems. This study illustrates how FSO can effectively address the ... 详细信息
来源: 评论
Integrating IoT in Transportation for Smart City Development for Secured data Processing  4
Integrating IoT in Transportation for Smart City Development...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Priya, R. Lakshmi, R. Anandha Sudha, C. Pal, Souvik Ali, Ghassan Ahmed Alajmani, Samah H. Vels Institute of Science Technology and Advanced Studies Dept. of Computer Applications Chennai India Anna Adarsh College for Women Dept. of Computer Applications Chennai India SSKV College of Arts and Science for Women Dept. of Computer Applications Kanchipuram India Saveetha College of Liberal Arts & Sciences Saveetha Institute of Medical & Technical Sciences Chennai India Universiti Islam Sultan Sharif Ali Faculty of Islamic Technology Brunei College of Computer & IT Taif University Department of Information Technology Saudi Arabia
In this study, we propose the architecture and implementation of an IoT and machine learning powered Integrated Transport Management (ITM-SCD)for Smart City Development to mitigate the issues described above. The desi... 详细信息
来源: 评论
Comparison of Faster RCNN and YOLO V3 for Video Anomaly Localization
Comparison of Faster RCNN and YOLO V3 for Video Anomaly Loca...
收藏 引用
2023 International Conference on Power, Instrumentation, Control and Computing, PICC 2023
作者: Anoopa, S. Salim, A. Nadera Beevi, S. College of Engineering Trivandrum Dept. of Computer Science and Engineering Kerala India Government Engineering College Thrissur Dept. of Computer Science and Engineering Kerala India Tkm College of Engineering and Technology Dept. of Computer Applications Kerala India
Video Anomaly Localization techniques are interesting and emerging tasks in computer vision that is used to locate the position of an anomalous object with bounding boxes. Convolutional neural network-based object loc... 详细信息
来源: 评论