咨询与建议

限定检索结果

文献类型

  • 3,120 篇 会议
  • 1,098 篇 期刊文献
  • 57 册 图书

馆藏范围

  • 4,275 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,526 篇 工学
    • 1,729 篇 计算机科学与技术...
    • 1,362 篇 软件工程
    • 1,006 篇 信息与通信工程
    • 528 篇 电子科学与技术(可...
    • 506 篇 控制科学与工程
    • 464 篇 电气工程
    • 329 篇 生物工程
    • 279 篇 光学工程
    • 266 篇 生物医学工程(可授...
    • 240 篇 网络空间安全
    • 237 篇 仪器科学与技术
    • 200 篇 动力工程及工程热...
    • 187 篇 机械工程
    • 183 篇 安全科学与工程
    • 138 篇 交通运输工程
    • 123 篇 化学工程与技术
  • 1,342 篇 理学
    • 635 篇 数学
    • 425 篇 物理学
    • 366 篇 生物学
    • 240 篇 统计学(可授理学、...
    • 191 篇 化学
    • 138 篇 系统科学
  • 716 篇 管理学
    • 489 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 212 篇 工商管理
  • 352 篇 医学
    • 258 篇 临床医学
    • 248 篇 基础医学(可授医学...
    • 209 篇 公共卫生与预防医...
    • 138 篇 药学(可授医学、理...
  • 132 篇 法学
    • 116 篇 社会学
  • 80 篇 经济学
  • 61 篇 农学
  • 31 篇 文学
  • 18 篇 军事学
  • 17 篇 教育学
  • 4 篇 艺术学

主题

  • 194 篇 accuracy
  • 164 篇 deep learning
  • 146 篇 real-time system...
  • 140 篇 internet of thin...
  • 120 篇 feature extracti...
  • 111 篇 machine learning
  • 97 篇 predictive model...
  • 91 篇 computational mo...
  • 86 篇 convolutional ne...
  • 85 篇 artificial intel...
  • 83 篇 security
  • 80 篇 training
  • 78 篇 optimization
  • 77 篇 cloud computing
  • 72 篇 support vector m...
  • 65 篇 wireless communi...
  • 60 篇 neural networks
  • 60 篇 energy efficienc...
  • 57 篇 wireless sensor ...
  • 56 篇 medical services

机构

  • 189 篇 maharishi school...
  • 107 篇 maharishi school...
  • 98 篇 department of el...
  • 90 篇 presidency unive...
  • 76 篇 department of el...
  • 59 篇 centre of interd...
  • 56 篇 department of co...
  • 53 篇 department of co...
  • 48 篇 karnataka bangal...
  • 44 篇 department of co...
  • 43 篇 department of co...
  • 42 篇 centre of resear...
  • 42 篇 state key labora...
  • 39 篇 prince shri venk...
  • 38 篇 chitkara centre ...
  • 38 篇 college of elect...
  • 36 篇 maharishi univer...
  • 33 篇 lovely professio...
  • 33 篇 school of electr...
  • 32 篇 school of inform...

作者

  • 42 篇 guo hong
  • 34 篇 r. santhana kris...
  • 25 篇 imoize agbotinam...
  • 22 篇 zhang yichen
  • 22 篇 krishnan r. sant...
  • 21 篇 hanzo lajos
  • 19 篇 dharmesh dhabliy...
  • 19 篇 li deng
  • 19 篇 xiao ding
  • 18 篇 senthil g.a.
  • 17 篇 j. relin francis...
  • 17 篇 yu song
  • 17 篇 dhabliya dharmes...
  • 17 篇 girija shankar s...
  • 17 篇 prabha r.
  • 16 篇 gu wenzhe
  • 16 篇 yang shaoshi
  • 16 篇 awotunde joseph ...
  • 16 篇 feng botao
  • 16 篇 ding xiao

语言

  • 3,862 篇 英文
  • 379 篇 其他
  • 25 篇 中文
  • 2 篇 朝鲜文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Electronics and Communication Engineering Computer and Information"
4275 条 记 录,以下是121-130 订阅
排序:
Machine Learning Techniques for Detecting DDOS Attacks  3
Machine Learning Techniques for Detecting DDOS Attacks
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Saeed, Mamoon M. Rashad Mohammed, Husam Nedhal Hazaea Gazem, Othman Abdulkafi Saeed, Rashid A. Ahmed Morei, Hossam Mohammed Thabet Eidah, Aimen Ebdulkreem Gaid, AbdulGuddoos S.A. Ameen Saif Al-Uosfi, Ameen Sami Qasem Al-Madhagi, Mohamed Galal Faculty of Engineering Department of Communications and Electronics Engineering Yemen College of Computers and Information Technology Taif University Department of Computer Engineering Taif21944 Saudi Arabia Taiz University Faculty of Engineering & Information Technology Dept. of Communication & Computer Engineering Taiz Yemen
The development witnessed by the world of science and technology and the emergence of the Internet, where cybersecurity has become one of the most important areas that are growing rapidly every day, and one of its goa... 详细信息
来源: 评论
Unravelling stress levels in continuous speech through optimal feature selection and deep learning  2
Unravelling stress levels in continuous speech through optim...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Duvvuri, Kavya Kanisettypalli, Harshitha Masabattula, Teja Nikhil Vekkot, Susmitha Gupta, Deepa Zakariah, Mohammed Department of Computer Science & Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Electronics & Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru India Department of Computer Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
Stress is a psychological or emotional strain that occurs due to adverse experiences in human life. This paper showcases the application of deep learning in detecting stress levels in continuous audio signals in the D... 详细信息
来源: 评论
Multilayer Neural Network Based Speech Emotion Recognition for Smart Assistance
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1523-1540页
作者: Sandeep Kumar MohdAnul Haq Arpit Jain C.Andy Jason Nageswara Rao Moparthi Nitin Mittal Zamil S.Alzamil Department of Computer Science and Engineering Koneru Lakshmaiah Education FoundationVaddeswaramAP522502India Department of Computer Science College of Computer and Information SciencesMajmaah University11952Al-MajmaahSaudi Arabia Department of Computer Science and Engineering Teerthanker Mahaveer UniversityMoradabadUttar Pradesh244001India Department of Electronics and Communication Engineering Sreyas Institute of Engineering and TechnologyHyderabad500068India University Centre for Research and Development Chandigarh UniversityMohali140413PunjabIndia
Day by day,biometric-based systems play a vital role in our daily *** paper proposed an intelligent assistant intended to identify emotions via voice message.A biometric system has been developed to detect human emoti... 详细信息
来源: 评论
Classification of Bipolar Disorder Using Deep Learning Models on fMRI Data  1
收藏 引用
3rd International Conference on Innovations in Computational Intelligence and computer Vision, ICICV 2022
作者: Chauhan, Harsh Gadhiya, Poojan Sharma, Abhishek Department of Computer Science and Engineering The LNM Institute of Information Technology Rajasthan Jaipur302031 India Department of Electronics and Communication Engineering The LNM Institute of Information Technology Rajasthan Jaipur302031 India
The use of functional magnetic resonance imaging (fMRI) has been widely used to detect brain abnormalities linked to Bipolar Disorder. These borderline diseases are either inherited or the result of parental exposure ... 详细信息
来源: 评论
Improving Tomato Disease Diagnosis Through ResNet50: An Innovative Approach  4
Improving Tomato Disease Diagnosis Through ResNet50: An Inno...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Dhamotharan, R. Raj, J. Relin Francis Krishnan, R. Santhana Kavitha, S. Soundiraraj, N. Kumar, V. Vinoth Kalasalingam Academy of Research and Education Department of Computer Science and Information Technology Krishnankoil India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Electronics and Communication Engineering Chennai India Scad College of Engineering and Technology Department of Electronics and Communication Engineering Cheranmahadevi India Velammal College of Engineering and Technology Department of Computer Science and Engineering Madurai India Psna College of Engineering and Technology Department of Electrical and Electronics Engineering Dindigul India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India
Tomato crops are vulnerable to numerous diseases that can severely affect both yield and quality. Early and precise identification of these diseases is indispensable for implementing active management and intervention... 详细信息
来源: 评论
Lung Cancer Detection Through Filtration and Segmentation via Neural-Network  3
Lung Cancer Detection Through Filtration and Segmentation vi...
收藏 引用
3rd International Conference on Advancement in electronics and communication engineering, AECE 2023
作者: Raj, Mrinal Sahare, Parul Pandey, Nachiketa Kalinga Institute of Industrial Technology Department of Computer Science and Engineering Bhubaneswar India Indian Institutes of Information Technology Department of Electronics and Communication Engineering Nagpur India
Cancer is a threat in which the cell starts to grow abnormally and it does not function like a normal cell. When the cancerous cell begin to develop in lungs it is called as lung cancer. Lung cancer is one of the most... 详细信息
来源: 评论
An authenticated spectrum acquirement and transmission of encrypted images over fusion centre
收藏 引用
Multimedia Tools and Applications 2024年 1-24页
作者: V, Thanikaiselvan Y, PiyaDessi S, Renuga devi Shanthini, S. Suba Mahalingam, Hemalatha S, Aashiq Banu R, Dhivya V.M, Padmapriya Amirtharajan, Rengarajan School of Electronics Engineering Vellore Institute of Technology Vellore Vellore India School of Information Technology Vellore Institute of Technology Vellore India Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah22254 Saudi Arabia System Engineering Department Military Technological College Muscat Oman Department of Electronics and Communication Engineering Mepco Schlenk Engineering College Tamilnadu Sivakasi626005 India Department of Computer Sciences Marquette University MilwaukeeWI53233 United States School of Electrical & amp Electronics Engineering SASTRA Deemed University 613 401 Thanjavur India
These days, spectrum insufficiency is the most common issue. If the number of smartphone users who access the radio spectrum grows, the radio spectrum becomes increasingly scarce. Certain types of technology equipment... 详细信息
来源: 评论
Predicting Schizophrenia from fMRI Using Deep Learning  1
收藏 引用
3rd International Conference on Innovations in Computational Intelligence and computer Vision, ICICV 2022
作者: Kardani, Shail Sharma, Raghav Sharma, Abhishek Deparment of Computer Science Engineering The LNM Institute of Information Technology Rajasthan Jaipur302031 India Deparment of Electronics and Communication Engineering The LNM Institute of Information Technology Rajasthan Jaipur302031 India
Schizophrenia is a complex and multifaceted disorder that is still not fully understood. However, many processes are known to drive its onset, relapse, symptomatology, and therapy. One possible explanation for Schizop... 详细信息
来源: 评论
QR Code Encryption for improving Bank information and Confidentiality  27
QR Code Encryption for improving Bank information and Confid...
收藏 引用
27th International Conference on information Technology, IT 2023
作者: Malallah, Fahad Layth Abduljabbar, Ali I. Shareef, Baraa T. Al-Janaby, Ali Othman Ninevah University College of Electronics Engineering Computer and Information Engineering Department Mosul41002 Iraq Ninevah University Computer Center Mosul41002 Iraq Ahlia University Department of Information Technology Collage of Information Technology Manama Bahrain Ninevah University College of Electronics Engineering Communication Department Mosul41002 Iraq
Nowadays, storing confidential documents using cloud services is getting popular due to advantages regarding security and fast processing operations. One of the major services of cloud computing is cloud storage, whic... 详细信息
来源: 评论
A Hybrid CNN-LSTM-PSO Framework for Enhanced Cybersecurity Threat Detection and Classification
A Hybrid CNN-LSTM-PSO Framework for Enhanced Cybersecurity T...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Akilandeswari, S. Soumya, T.R. Sumathi, S. Sushith, Mishmala Brinda, V. Rajan, S. E.G.S. Pillay Engineering College Department of Artificial Intelligence & Data Science Nagapattinam611002 India Prathyusha Engineering College Department of Computer Science Engineering Tiruvallur602025 India Velammal Engineering College Department of Electronics and Communication Engineering Chennai600066 India Adithya institute of Technology Department of Information Technology Kurumbapalayam India K.Ramakrishnan College Of Engineering Department of Electronics and Communication Engineering Samayapuram621112 India Velalar College of Engineering and Technology Department of Electronics and Communication Engineering Erode638012 India
With the advancement of digital era comes an increased value for cybersecurity, and these need to be dealt with using advanced techniques. Deep learning - metaheuristic optimization hybrid model for advanced threat de... 详细信息
来源: 评论