咨询与建议

限定检索结果

文献类型

  • 3,938 篇 会议
  • 3,716 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 7,755 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,750 篇 工学
    • 2,871 篇 计算机科学与技术...
    • 2,323 篇 软件工程
    • 884 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 602 篇 电气工程
    • 573 篇 生物工程
    • 508 篇 生物医学工程(可授...
    • 497 篇 电子科学与技术(可...
    • 447 篇 光学工程
    • 410 篇 化学工程与技术
    • 391 篇 机械工程
    • 365 篇 仪器科学与技术
    • 309 篇 材料科学与工程(可...
    • 294 篇 动力工程及工程热...
    • 185 篇 环境科学与工程(可...
    • 174 篇 安全科学与工程
  • 3,095 篇 理学
    • 1,339 篇 物理学
    • 1,152 篇 数学
    • 673 篇 生物学
    • 430 篇 化学
    • 387 篇 统计学(可授理学、...
    • 265 篇 系统科学
    • 257 篇 地球物理学
  • 1,187 篇 管理学
    • 782 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 371 篇 工商管理
  • 582 篇 医学
    • 486 篇 临床医学
    • 402 篇 基础医学(可授医学...
    • 241 篇 药学(可授医学、理...
    • 238 篇 公共卫生与预防医...
  • 210 篇 法学
  • 163 篇 经济学
  • 138 篇 农学
  • 130 篇 教育学
  • 24 篇 艺术学
  • 21 篇 军事学
  • 19 篇 文学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 232 篇 deep learning
  • 221 篇 machine learning
  • 172 篇 accuracy
  • 153 篇 feature extracti...
  • 130 篇 internet of thin...
  • 129 篇 computational mo...
  • 121 篇 artificial intel...
  • 115 篇 real-time system...
  • 105 篇 predictive model...
  • 105 篇 training
  • 80 篇 support vector m...
  • 79 篇 security
  • 76 篇 optimization
  • 73 篇 convolutional ne...
  • 71 篇 neural networks
  • 71 篇 data models
  • 70 篇 monitoring
  • 67 篇 semantics
  • 66 篇 covid-19
  • 63 篇 cloud computing

机构

  • 107 篇 university of sc...
  • 94 篇 north-west unive...
  • 94 篇 institut univers...
  • 92 篇 tianfu cosmic ra...
  • 91 篇 national centre ...
  • 90 篇 department of ph...
  • 88 篇 infn sezione di ...
  • 87 篇 hebei normal uni...
  • 83 篇 state key labora...
  • 83 篇 tno technical sc...
  • 81 篇 yunnan observato...
  • 81 篇 université de st...
  • 80 篇 infn sezione di ...
  • 78 篇 nikhef national ...
  • 77 篇 university of jo...
  • 73 篇 ncsr demokritos ...
  • 70 篇 key laboratory f...
  • 69 篇 university würzb...
  • 66 篇 università di ca...
  • 65 篇 university moham...

作者

  • 113 篇 bastieri d.
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 chen a.
  • 95 篇 calvo d.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 díaz a.f.
  • 82 篇 boumaaza j.
  • 82 篇 gozzini s.r.
  • 81 篇 coleiro a.
  • 79 篇 dallier r.
  • 75 篇 enzenhöfer a.
  • 74 篇 axikegu
  • 74 篇 boettcher m.
  • 73 篇 fang j.
  • 73 篇 feng c.f.
  • 69 篇 jiang k.
  • 69 篇 kalekin o.
  • 69 篇 celli s.

语言

  • 7,191 篇 英文
  • 509 篇 其他
  • 53 篇 中文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computing Engineering and Science"
7755 条 记 录,以下是181-190 订阅
排序:
Advancement in Image Restoration Through GAN-based Approach  15
Advancement in Image Restoration Through GAN-based Approach
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Rama, P. Pandiaraj, A. Angayarkanni, V. Prakash, Y. Jagadeesh, S. SRM Institute of Science and Technology Computing Technologies College of Engineering and Technology Faculty of Engineering and Technology SRM Nagar TN Kattankulathur603203 India SRM Institute of Science and Technology Computing Technologies College of Engineering and Technology SRM Nagar TN Kattankulathur603203 India
This paper introduces IR-GAN (Image Restoration Generative Adversarial Network), a groundbreaking tool accessible on GitHub, designed to elevate image quality and rejuvenate damaged or low-resolution photographs. Leve... 详细信息
来源: 评论
Hyperspectral anomaly detection via memory‐augmented autoencoders
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1274-1287页
作者: Zhe Zhao Bangyong Sun Faculty of Printing Packaging Engineering and Digital Media TechnologyXi'an University of TechnologyXi'anChina Norwegian Colour and Visual Computing Laboratory Norwegian University of Science and TechnologyGjovikNorway
Recently,the autoencoder(AE)based method plays a critical role in the hyperspectral anomaly detection ***,due to the strong generalised capacity of AE,the abnormal samples are usually reconstructed well along with the... 详细信息
来源: 评论
Utilizing Big Data Analytics for Social Media Insights  5
Utilizing Big Data Analytics for Social Media Insights
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Vedhika Srinidhi, V.S. Sanjana, S. Rozario, Neo Joseph Dewan, Sia Gouthaman, P. School of Computing College of Engineering & Technology SRM Institute of Science and Technology Department of Networking and Communications Kattankulathur603203 India School of Computing Faculty of Engineering & Technology SRM Institute of Science and Technology Department of Networking and Communications Kattankulathur603203 India
Big Data analytics is a rapidly evolving field that offers profound insights into various sectors by enabling the analysis of massive and diverse datasets. This research paper focuses on the application of Big Data te... 详细信息
来源: 评论
Real-Time Weapon Detection System for Enhanced Security Monitoring  4
Real-Time Weapon Detection System for Enhanced Security Moni...
收藏 引用
4th International Conference on Ubiquitous computing and Intelligent Information Systems, ICUIS 2024
作者: Kuppili, Rohan Agarwal, Khusboo Bhosale, Tanmay Gouthaman, P. School of Computing College of Engineering and Technology Srm Institute of Science and Technology Department of Networking and Communications Kattankulathur603203 India School of Computing Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur603203 India
Innovative technology for weapon detection during security monitoring is necessary today due to the rising threats of violence and terror. The paper discusses a detailed design of a weapon detection system intended fo... 详细信息
来源: 评论
Real-time polling to help corral university-learners' wandering minds
收藏 引用
Journal of Research in Innovative Teaching and Learning 2022年 第1期15卷 98-109页
作者: Price, Trevor John Built Environment Faculty of Computing Engineering and Science University of South Wales
Purpose: This research investigates the use of real-time online polling to enhance university teaching and learning. Design/methodology/approach: Using a case study and employing action research, this work shows how p... 详细信息
来源: 评论
A Comparative Study on Spam Identification using Naive Bayes and SVM  5
A Comparative Study on Spam Identification using Naive Bayes...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Verma, Shashwat Agrawal, Shikhar Gulati, Shreshth Gouthaman, P. Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications School of Computing Tamil Nadu Chennai India
Email is one of the most frequently employed digital means of communication among individuals use on an on-going basis. Sending unidentified messages to someone is termed as spam. The internet remains the most accessi... 详细信息
来源: 评论
Analysis and Prediction of Lettuce Crop Yield in Aeroponic Vertical Farming using Logistic Regression Method  2
Analysis and Prediction of Lettuce Crop Yield in Aeroponic V...
收藏 引用
2nd International Conference on Sustainable computing and Data Communication Systems, ICSCDS 2023
作者: Gowtham, R. Jebakumar, R. Srm Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Computing Technologies Chengalpattu Tamil Nadu Kattankulathur India
Human population growth strains food supplies, resulting in more than one billion of the world's 6.5 billion people facing hunger, which is the leading cause of death. In consequence, increasing crop production th... 详细信息
来源: 评论
SecureML: Machine Learning-Powered Malware Detection  2
SecureML: Machine Learning-Powered Malware Detection
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Awasthi, Animay Ahsan, Mohd Vanusha, D. Delsi Robinsha, S. Department of Computing Technologies School of Computing SRM Institute of Science and Technology Chengalpattu District Tamilnadu Kattankulathur603 203 India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Chengalpattu District Tamilnadu Kattankulathur603 203 India
As malware threats become increasingly complex, the development of advanced detection systems is necessary to protect digital assets. SecureML Using Machine Learning presents an innovative approach to combat the escal... 详细信息
来源: 评论
AFuNet: an attention-based fusion network to classify texts in a resource-constrained language
收藏 引用
Neural computing and Applications 2025年 第9期37卷 6725-6748页
作者: Hossain, Md. Rajib Hoque, Mohammed Moshiul Dewan, M. Ali Akber Hoque, Enamul Siddique, Nazmul Department of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada School of Information Technology York University TorontoONM3J 1P3 Canada School of Computing Engineering and Intelligent Systems Ulster University Coleraine United Kingdom
In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec... 详细信息
来源: 评论
Financial Fraud Detection for Credit Card Transactions Using Apache Spark  5
Financial Fraud Detection for Credit Card Transactions Using...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Jha, Pratyush Srivastava, Srijan Gandhi, Tanishq Gouthaman, P. School of Computing College of Engineering and Technology SRM Institute of Science and Technology Department of Networking and Communications Kattankulathur603203 India School of Computing SRM Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur603203 India
The financial sector's rapid adoption of digital transformation has made identifying fraud a progressively complex challenge, since modern fraudulent activities present significant risks to institutions globally. ... 详细信息
来源: 评论