咨询与建议

限定检索结果

文献类型

  • 3,605 篇 会议
  • 1,688 篇 期刊文献
  • 32 册 图书

馆藏范围

  • 5,325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,137 篇 工学
    • 1,903 篇 计算机科学与技术...
    • 1,534 篇 软件工程
    • 932 篇 信息与通信工程
    • 650 篇 电子科学与技术(可...
    • 618 篇 电气工程
    • 534 篇 控制科学与工程
    • 402 篇 生物工程
    • 330 篇 生物医学工程(可授...
    • 310 篇 光学工程
    • 236 篇 仪器科学与技术
    • 231 篇 动力工程及工程热...
    • 223 篇 机械工程
    • 209 篇 化学工程与技术
    • 168 篇 材料科学与工程(可...
    • 149 篇 安全科学与工程
    • 136 篇 交通运输工程
    • 123 篇 网络空间安全
  • 1,820 篇 理学
    • 798 篇 数学
    • 723 篇 物理学
    • 447 篇 生物学
    • 263 篇 统计学(可授理学、...
    • 224 篇 化学
    • 174 篇 系统科学
  • 746 篇 管理学
    • 498 篇 管理科学与工程(可...
    • 274 篇 图书情报与档案管...
    • 204 篇 工商管理
  • 321 篇 医学
    • 280 篇 临床医学
    • 246 篇 基础医学(可授医学...
    • 146 篇 药学(可授医学、理...
    • 137 篇 公共卫生与预防医...
  • 127 篇 法学
  • 101 篇 经济学
  • 88 篇 农学
  • 31 篇 教育学
  • 31 篇 文学
  • 16 篇 军事学
  • 8 篇 艺术学

主题

  • 176 篇 accuracy
  • 150 篇 deep learning
  • 139 篇 real-time system...
  • 135 篇 internet of thin...
  • 125 篇 feature extracti...
  • 105 篇 machine learning
  • 100 篇 computational mo...
  • 95 篇 training
  • 86 篇 predictive model...
  • 82 篇 optimization
  • 81 篇 convolutional ne...
  • 75 篇 support vector m...
  • 73 篇 neural networks
  • 71 篇 data models
  • 67 篇 artificial intel...
  • 63 篇 monitoring
  • 60 篇 security
  • 58 篇 wireless sensor ...
  • 55 篇 wireless communi...
  • 54 篇 computer archite...

机构

  • 101 篇 university of sc...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 96 篇 university of ch...
  • 95 篇 tianfu cosmic ra...
  • 92 篇 yunnan observato...
  • 86 篇 department of ph...
  • 84 篇 key laboratory f...
  • 82 篇 school of physic...
  • 81 篇 center for astro...
  • 74 篇 college of physi...
  • 72 篇 institute of fro...
  • 66 篇 national astrono...
  • 63 篇 tsung-dao lee in...
  • 62 篇 institute for nu...
  • 61 篇 school of physic...
  • 59 篇 school of physic...
  • 58 篇 sun yat-sen univ...
  • 57 篇 school of physic...
  • 57 篇 school of electr...

作者

  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 jiang k.
  • 77 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 liu d.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 70 篇 chen m.j.
  • 70 篇 guo y.q.
  • 69 篇 bao y.w.
  • 68 篇 hu h.b.
  • 67 篇 liu b.
  • 66 篇 li xin
  • 64 篇 li cheng
  • 64 篇 min z.
  • 64 篇 danzengluobu
  • 62 篇 qin j.j.

语言

  • 4,870 篇 英文
  • 389 篇 其他
  • 61 篇 中文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Electronics and Computing Engineering"
5325 条 记 录,以下是61-70 订阅
排序:
A novel context-sensitive attitude entropy-based multiclass segmentation method for brain MR images using enhanced flow directional algorithm
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 14759-14803页
作者: Naik, Manoj Kumar Jena, Bibekananda Panda, Rutuparna Wunnava, Aneesh Abraham, Ajith Faculty of Engineering and Technology Siksha O Anusandhan Odisha Bhubaneswar751030 India Department of Electronics and Communication Engineering Anil Neerukonda Institute of Technology & Sciences Andhra Pradesh Sangivalasa Visakhapatnam531162 India Department of Electronics and Telecommunication Engineering Veer Surendra Sai University of Technology Odisha Burla768018 India Faculty of Computing and Mathematical Sciences Bennett University Greater Noida201310 India
Computer vision techniques, aided by artificial intelligence, in medical image analysis, are currently encouraged for precise and speedy diagnosis of brain disorders. The brain MR image shows an intensity variation, w... 详细信息
来源: 评论
An Enhanced Framework for Churn Prediction using Stratifed Bagging and Stacked Multi-Output Random Forests  3
An Enhanced Framework for Churn Prediction using Stratifed B...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Bhardwaj, Anay Radha, D. Kirthika Devi, V.S. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidhyapeetham Bengaluru India Department of Electrical and Electronics Engineering Amrita School of Engineering Amrita Vishwa Vidhyapeetham Bengaluru India
Customer churn prediction is an important task in customer relationship management because it helps businesses know who is at risk of leaving and retain such at-risk *** and time-efficient churn prediction is essentia... 详细信息
来源: 评论
Optimizing Hiring Practices: A Machine Learning Approach for Candidate Selection  3
Optimizing Hiring Practices: A Machine Learning Approach for...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Dogiparthy, Naga Datta Radha, D. Kirthika Devi, V.S. Department of Computer Science and Engineering Amrita school of computing Amrita Vishwa Vidhyapeetham Bengaluru India Department of Electrical and Electronics Engineering Amrita School of Engineering Amrita Vishwa Vidhyapeetham Bengaluru India
Recruitment is one of the most crucial factors in shaping efficient and high-performing teams within organizations. However, the traditional recruitment processes are often plagued by biases and subjective judgments t... 详细信息
来源: 评论
Covert Cryptography in Pixel Realms: Unveiling Nonlinear-Encrypted Generative Adversarial Networks for Stealthy Image Steganography
Covert Cryptography in Pixel Realms: Unveiling Nonlinear-Enc...
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable Technology, ICRISST 2024
作者: Gahan, A.V. Devanagavi, Geetha D Reva University School of Electronics and Communication Engineering Bengaluru India Reva University School of Computing and Information Technology Bengaluru India
This article introduces an innovative grayscale image steganography approach competent of concealing confidential data within a carrier image of the corresponding dimensions. The method involves encrypting the confide... 详细信息
来源: 评论
Credit Card Fraud Detection(CFD) using GNN and Ensemble Techniques  3
Credit Card Fraud Detection(CFD) using GNN and Ensemble Tech...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Vinay, B.V.S.N.S. Radha, D. Kirthika Devi, V.S. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidhyapeetham Bengaluru India Department of Electrical and Electronics Engineering Amrita School of Engineering Amrita Vishwa Vidhyapeetham Bengaluru India
Credit card fraud is an essential problem in the economic industry;thus, its detection is solved with the help of the developed methods in order to minimize the overall loses and to improve the confidence of clients. ... 详细信息
来源: 评论
Predicting Customer Lifetime Value in E-commerce: A Data-Driven Approach to Enhance Customer Retention Strategies  3
Predicting Customer Lifetime Value in E-commerce: A Data-Dri...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Dey, Sonali Radha, D. Kirthika Devi, V.S. Department of Computer Science Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Electrical and Electronics Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Predicting Customer Lifetime Value (CLV) is one of the most critical tasks that businesses undertake in order to improve customer retention and optimize marketing strategies. The present paper proposes a predictive mo... 详细信息
来源: 评论
DDoS Detection in SDN Environments: Leveraging Machine Learning Algorithms with Local Interpretable Model-Agnostic Explanations (LIME) for Enhanced Security
DDoS Detection in SDN Environments: Leveraging Machine Lear...
收藏 引用
International Conference on Business Intelligence and Data Analytics, BIDA 2024
作者: Karna, Siwani Jahanve, Poluru Reddy Yadukul, S. Bhaskaran, Sreebha Vekkot, Susmitha Rajagopal, Shinu M. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bangalore India Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bangalore India
SDN, short for Software Defined Networking, represents a network architecture controlled by software applications. Distributed Denial-of-Service (DDoS) attacks create a challenge to these SDN environments and lead to ... 详细信息
来源: 评论
Voltage Mode Sinusoidal Oscillator with Non-Interacting Adjustment of Parameters Employing VCII
Voltage Mode Sinusoidal Oscillator with Non-Interacting Adju...
收藏 引用
2024 International Conference on Computer, electronics, Electrical engineering and their Applications, IC2E3 2024
作者: Arora, Tajinder Singh Tiwari, Sachin ZHCET Aligarh Muslim University Department of Electronics Engineering Aligarh India School of Computing MIT-ADT University Pune India
This article proposed a novel sinusoidal oscillator with quadrature voltage mode response employing a recently explored active element second-generation voltage conveyor (VCII). The derived oscillator configuration ut... 详细信息
来源: 评论
CGFSSO: the co-operative guidance factor based Salp Swarm Optimization algorithm for MPPT under partial shading conditions in photovoltaic systems
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-16页
作者: Raj, S. Antony Elakkiya, E. Rajmohan, Shathanaa Samuel, G. Giftson Electrical and Electronics Engineering St Ann’s College of Engineering and Technology Andhra Pradesh Chirala India Computer Science and Engineering SRM University Andhra Pradesh Amaravati India Ramanujan Computing Centre College of Engineering Guindy Campus Anna University Chennai India Electrical and Electronics Engineering Arifa Institute of Technology Nagapattinam India
The increasing adoption of solar photovoltaic (PV) power generation stems from its renewable and eco-friendly attributes. However, conventional Maximum Power Point Tracking (MPPT) methods encounter difficulties in eff... 详细信息
来源: 评论
A Hybrid Binary Image Encryption Strategy Integrating Phase Shifted Holography, Fourier Transform, and Arnold Cat Map
A Hybrid Binary Image Encryption Strategy Integrating Phase ...
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Shrivastava, Shriyanshu Kumar, Nagendra Swami, Pragya Chatterjee, Amit ABV-IIITM Gwalior Department of Electrical and Electronics Engineering Gwalior474015 India NIT Jamshedpur Department of Electronics and Communication Engineering Jamshedpur831014 India School of Computing DIT University Dehradun248009 India
This work presents a hybrid binary image encryption strategy using virtual optics, phase shifted holography, Fourier transform based spectral conversion, and Arnold Cat Map based key hiding. The confidential informati... 详细信息
来源: 评论