咨询与建议

限定检索结果

文献类型

  • 71 篇 期刊文献
  • 34 篇 会议

馆藏范围

  • 105 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 32 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 9 篇 生物工程
    • 8 篇 信息与通信工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 控制科学与工程
    • 5 篇 机械工程
    • 5 篇 土木工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 电气工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 4 篇 网络空间安全
    • 3 篇 力学(可授工学、理...
    • 3 篇 光学工程
    • 3 篇 建筑学
    • 3 篇 环境科学与工程(可...
  • 55 篇 理学
    • 20 篇 物理学
    • 18 篇 数学
    • 18 篇 地球物理学
    • 12 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 化学
    • 4 篇 大气科学
  • 10 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
    • 4 篇 公共卫生与预防医...
  • 10 篇 管理学
    • 6 篇 图书情报与档案管...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 农学
  • 1 篇 经济学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 7 篇 accuracy
  • 4 篇 stars
  • 4 篇 machine learning
  • 3 篇 logic gates
  • 3 篇 feature extracti...
  • 2 篇 internet of thin...
  • 2 篇 data privacy
  • 2 篇 deep learning
  • 2 篇 lighting
  • 2 篇 key agreement
  • 2 篇 authentication
  • 2 篇 monitoring
  • 2 篇 dna
  • 2 篇 visualization
  • 2 篇 analytical model...
  • 2 篇 pipelines
  • 2 篇 sentiment analys...
  • 2 篇 gravitational ef...
  • 2 篇 software
  • 2 篇 encryption

机构

  • 12 篇 jet propulsion l...
  • 9 篇 department of ph...
  • 9 篇 the observatorie...
  • 9 篇 nasa goddard spa...
  • 9 篇 deutsches elektr...
  • 9 篇 institute of phy...
  • 9 篇 department of as...
  • 9 篇 center for gravi...
  • 8 篇 eureka scientifi...
  • 8 篇 department of ph...
  • 8 篇 institute for gr...
  • 8 篇 laboratory for m...
  • 8 篇 division of phys...
  • 8 篇 department of ph...
  • 8 篇 seti institute 3...
  • 8 篇 department of ph...
  • 8 篇 center for gravi...
  • 8 篇 school of physic...
  • 8 篇 department of as...
  • 8 篇 department of ph...

作者

  • 10 篇 ransom scott m.
  • 9 篇 mitridate andrea
  • 9 篇 cromartie h. tha...
  • 9 篇 laal nima
  • 9 篇 taylor stephen r...
  • 9 篇 fonseca emmanuel
  • 9 篇 burke-spolaor sa...
  • 9 篇 pennucci timothy...
  • 9 篇 lam michael t.
  • 9 篇 pol nihan s.
  • 9 篇 johnson aaron d.
  • 9 篇 freedman gabriel...
  • 9 篇 young olivia
  • 9 篇 decesar megan e.
  • 9 篇 unal caner
  • 9 篇 siwek magdalena ...
  • 9 篇 schmitz kai
  • 9 篇 demorest paul b.
  • 9 篇 fiore william
  • 9 篇 agazie gabriella

语言

  • 94 篇 英文
  • 11 篇 其他
  • 1 篇 日文
检索条件"机构=Institution of Computing Science and Technology"
105 条 记 录,以下是31-40 订阅
排序:
O2CTA: Introducing Annotations from OCT to CCTA in Coronary Plaque Analysis
arXiv
收藏 引用
arXiv 2023年
作者: Li, Jun Li, Kexin Zhou, Yafeng Zhou, S. Kevin Institute of Computing Technology CAS Beijing100190 China University of Science and Technology of China Suzhou215123 China Department of Cardiology Dushu Lake Hospital Affiliated to Soochow University Suzhou215000 China Institution for Hypertension of Soochow University Suzhou215000 China
Targeted diagnosis and treatment plans for patients with coronary artery disease vary according to atherosclerotic plaque component. Coronary CT angiography (CCTA) is widely used for artery imaging and determining the... 详细信息
来源: 评论
Exploring The Impact Of Artificial Intelligence On Visual Communication In Unmasking Deep Fake And Ensuring Public Trust
Exploring The Impact Of Artificial Intelligence On Visual Co...
收藏 引用
Intelligent Systems and Machine Learning Conference (ISML)
作者: Jagendra Singh Neeraj Abbas Thajeel Rhaif Alsahlanee Abha Kiran Rajpoot Gaurav Agrawal Mohit Tiwari Computer Science Engineering Alliance School of Advanced Computing Alliance University Banglore India School of Computer Science Engineering and Technology Bennett University Greater Noida India Development and Continuous Education Center University of Thi-Qar Thi-Qar Iraq Department of CSE(AIML) KIET Group of Institution Ghaziabad India Department of CSE(AI) KIET Group of Institution Ghaziabad India Dept. of Computer Science & Engineering Bharati Vidyapeeth’s College of Engineering Delhi India
In this groundbreaking study, we delve into the pivotal role of the Vision Transformer (V-iT) in the realm of deepfake detection, seeking to unravel its effectiveness in navigating the intricate landscape of manipulat... 详细信息
来源: 评论
Power-Efficient Secured Hardware Design of AES Algorithm on High Performance FPGA  5
Power-Efficient Secured Hardware Design of AES Algorithm on ...
收藏 引用
5th International Conference on Contemporary computing and Informatics, IC3I 2022
作者: Kumar, Keshav Singh, Vijay Mishra, Gaurav Ravindra Babu, B. Tripathi, Nandita Kumar, Pramod University Institute of Computing Chandigarh University Punjab India Graphic Era Deemed to Be University Department of Computer Science & Engineering Uttarakhand Dehradun India Amity University Uttar Pradesh Amity School of Engineering & Tchnology Uttar Pradesh Greater Noida India Adama Science and Technology University CSE Department Adama Ethiopia Amity University The Institution AIPS Uttar Pradesh Greater Noida India Lloyd Institute of Engineering and Technology Department of ECE Greater Noida India
With the expansion and growth of industries, the two major issues exist that affect both civilization and the environment. technology development has made it more difficult to communicate and transmit data over secure... 详细信息
来源: 评论
Cybersecurity: Threats, Requirements, Deployments, Techniques, System Architecture, and Future Research
Cybersecurity: Threats, Requirements, Deployments, Technique...
收藏 引用
Smart Devices (ICSD), International Conference on
作者: Ajay Yadav Vijay Karnatak Amit Kumar Mishra Shalini Verma Pallaw Singh Aswal Neha Tripathi University Institute of Computing Chandigarh University Mohali Punjab India Dept. of Computer Science & Engineering THDC Institute of Hydropower Engineering and Technology Tehri India Dept. of Computer Science & Engineering Graphic Era Hill University Dehradun India Dept. of Computer Science & Engineering Doon Group Of Institution Rishikesh India Computer Science and Engineering THDC Institute of Hydropower Engineering and Technology Tehri India Department of Computer Science & Engineering Graphic Era (Deemed to be University) Dehradun India
Cybersecurity safeguards computer systems, net- works, and digital information from a wide variety of cyber-attacks. Its major purpose is to protect the privacy of users’ data and resources while maintaining their in... 详细信息
来源: 评论
Usage of specific attention improves change point detection
arXiv
收藏 引用
arXiv 2022年
作者: Dmitrienko, Anna Romanenkova, Evgenia Zaytsev, Alexey Institute for Information and Transmission Problems Moscow Russia Skolkovo Institute of Science and Technology Moscow Russia Moscow Institute of Physics and Technology Moscow Russia Institution of Russian Academy of Sciences Dorodnicyn Computing Centre Moscow Russia
The change point is a moment of an abrupt alteration in the data distribution. Current methods for change point detection are based on recurrent neural methods suitable for sequential data. However, recent works show ...
来源: 评论
LinNet: linear network for efficient point cloud representation learning  24
LinNet: linear network for efficient point cloud representat...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Hao Deng Kunlei Jing Shengmei Cheng Cheng Liu Jiawei Ru Jiang Bo Lin Wang State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services School of Information Science and Technology Northwest University and Shaanxi Key Laboratory of Higher Education Institution of Generative Artificial Intelligence and Mixed Reality School of Software Engineering Xi'an Jiaotong University and Department of Computing The Hong Kong Polytechnic University
Point-based methods have made significant progress, but improving their scalability in large-scale 3D scenes is still a challenging problem. In this paper, we delve into the point-based method and develop a simpler, f...
来源: 评论
Machine Learning Neural Network Classifier Interfaced Skin Cancer Identification for Medical Diagnosis System
Machine Learning Neural Network Classifier Interfaced Skin C...
收藏 引用
Advancement in Renewable Energy and Intelligent Systems (AREIS), International Conference on
作者: Chempavathy B Kavitha Veerappan Jose P Shaji. K. A. Theodore R. Rajasree S. Gnana Prasanna Dept. of CSE New Horizon College of Engineering Bangalore Dept. of ECE Kongu Engineering College Erode India Dept. of CSE Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India College of Computing and Information Science University of Technology and Applied Sciences Sultanate of Oman Dept. of ECE Chennai Institution of Technology Chennai India Dept. of CSE St. Martins Engineering College Secunderabad Telangana
Skin cancer, which lethal, is one of the top three tumours caused by DNA damage. This damaged DNA causes cells to grow uncontrolled, and they are currently growing swiftly. Numerous trainings performed on the automati... 详细信息
来源: 评论
A Deep Learning Approach for Personalized Precision Medicine for Cancer Treatment
A Deep Learning Approach for Personalized Precision Medicine...
收藏 引用
Intelligent Systems and Machine Learning Conference (ISML)
作者: Jagendra Singh Neeraj Kamal Upreti Sambhajiraje Patil Gaurav Agrawal Mohit Tiwari Computer Science Engineering Alliance School of Advanced Computing Alliance University Banglore India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Science CHRIST (Deemed to be University) Ghaziabad India Centre for Online Learning Dr. D. Y. Patil Vidyapeeth Pune India Department of Computer Science Engineering (AI) KIET Group of Institution Ghaziabad India Dept. of Computer Science & Engineering Bharati Vidyapeeth’s College of Engineering Delhi India
Current research combines multiple machine learning models to provide comprehensive insights into tailor-made medicine for lung cancer. The study identified micropatterns of malignant disorders using a dataset of 3222... 详细信息
来源: 评论
Cloud computing based Smart Traffic Management System with Priority Switching for Health Care Services
Cloud Computing based Smart Traffic Management System with P...
收藏 引用
Applied Artificial Intelligence and computing (ICAAIC), International Conference on
作者: X.S. Asha Shiny D. Ravikumar A. Chinnasamy S. Hemavathi Department of Computer Science and Engineering Nalla Malla Reddy Engineering College (Autonomous Institution) Hyderabad Telangana India Department of Electronics and Communication Engineering Kings Engineering College Chennai Tamil Nadu India Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science Engineering Sri Sairam Engineering College Chennai Tamil Nadu India
Regular cities can be transformed into intelligent structures by leveraging information and communication technologies. Innovative city development could be significantly impacted by the Internet of Things paradigm, c...
来源: 评论
Automated Defect Detection in Electronic Components using Convolutional Neural Networks
Automated Defect Detection in Electronic Components using Co...
收藏 引用
International Conference on science technology Engineering and Management (ICONSTEM)
作者: A. Shobanadevi Sreekanth Kottu K R Senthil Kumar K. Amudha K. Praveena R. Venkatesh Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science & Engineering Mallareddy University Hyderabad Telangana India Department of Mechanical Engineering R.M.K. Engineering College Kavaraipettai Tamil Nadu India Department of Science and Humanities-Physics R.M.D. Engineering College (An Autonomous Institution) Kavaraipettai Tamil Nadu India Department of Electronics and Communication Engineering Mohan Babu University Erstwhile SreeVidyanikethan Engineering College Andhra Pradesh India Department of Physics PSNA College of Engineering and Technology (Autonomous) Dindigul Tamil Nadu India
This exploration paper explores the operation of convolutional neural networks(CNNs) in automating the discovery of blights in electronic factors. With the rapid-fire advancement of technology, the demand for high- qu... 详细信息
来源: 评论