咨询与建议

限定检索结果

文献类型

  • 13,794 篇 会议
  • 7,643 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 21,694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,432 篇 工学
    • 10,387 篇 计算机科学与技术...
    • 8,664 篇 软件工程
    • 3,407 篇 信息与通信工程
    • 2,159 篇 控制科学与工程
    • 1,904 篇 生物工程
    • 1,591 篇 电气工程
    • 1,407 篇 生物医学工程(可授...
    • 1,170 篇 光学工程
    • 1,168 篇 电子科学与技术(可...
    • 830 篇 网络空间安全
    • 791 篇 机械工程
    • 677 篇 安全科学与工程
    • 633 篇 动力工程及工程热...
    • 592 篇 交通运输工程
    • 584 篇 仪器科学与技术
    • 556 篇 化学工程与技术
  • 6,835 篇 理学
    • 3,488 篇 数学
    • 2,089 篇 生物学
    • 1,771 篇 物理学
    • 1,218 篇 统计学(可授理学、...
    • 742 篇 系统科学
    • 654 篇 化学
  • 4,012 篇 管理学
    • 2,426 篇 管理科学与工程(可...
    • 1,767 篇 图书情报与档案管...
    • 1,067 篇 工商管理
  • 1,562 篇 医学
    • 1,221 篇 临床医学
    • 1,119 篇 基础医学(可授医学...
    • 820 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 848 篇 法学
    • 701 篇 社会学
  • 373 篇 经济学
  • 334 篇 农学
  • 236 篇 教育学
  • 183 篇 文学
  • 32 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 921 篇 deep learning
  • 849 篇 accuracy
  • 534 篇 computational mo...
  • 484 篇 machine learning
  • 464 篇 feature extracti...
  • 447 篇 training
  • 393 篇 real-time system...
  • 387 篇 predictive model...
  • 370 篇 internet of thin...
  • 317 篇 support vector m...
  • 316 篇 convolutional ne...
  • 285 篇 computer science
  • 280 篇 semantics
  • 271 篇 data models
  • 256 篇 optimization
  • 230 篇 neural networks
  • 221 篇 computer archite...
  • 214 篇 reliability
  • 214 篇 scalability
  • 204 篇 image segmentati...

机构

  • 253 篇 department of co...
  • 153 篇 school of comput...
  • 140 篇 school of comput...
  • 136 篇 school of comput...
  • 127 篇 school of comput...
  • 121 篇 department of co...
  • 112 篇 school of comput...
  • 111 篇 school of comput...
  • 106 篇 department of co...
  • 101 篇 college of compu...
  • 101 篇 national enginee...
  • 101 篇 department of co...
  • 97 篇 school of comput...
  • 95 篇 department of co...
  • 95 篇 department of co...
  • 93 篇 north-west unive...
  • 93 篇 institut univers...
  • 88 篇 national centre ...
  • 87 篇 infn sezione di ...
  • 83 篇 tno technical sc...

作者

  • 123 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 89 篇 gal t.
  • 89 篇 bozza c.
  • 88 篇 anjali t.
  • 88 篇 díaz a.f.
  • 87 篇 boumaaza j.
  • 85 篇 zheng wei-shi
  • 85 篇 coleiro a.
  • 84 篇 gozzini s.r.
  • 82 篇 dallier r.
  • 73 篇 kalekin o.
  • 66 篇 anguita m.
  • 64 篇 boettcher m.
  • 63 篇 huang f.
  • 61 篇 kulikovskiy v.
  • 55 篇 enzenhöfer a.

语言

  • 17,418 篇 英文
  • 4,166 篇 其他
  • 167 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21694 条 记 录,以下是4391-4400 订阅
排序:
Level Up ASD (Autistic Spectrum Disorder)- Interactive Learning for Autistic Children
Level Up ASD (Autistic Spectrum Disorder)- Interactive Learn...
收藏 引用
International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)
作者: Ashwin Varier Navdeep Malik Khushi Kumari Nandana Gireesh Vineetha K V Ullas S Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Autistic Spectrum Disorder (ASD) is a pervasive developmental disorder having issues with social communication, interests, coordination, attention, and health. People with autism are very sensitive and cannot afford a... 详细信息
来源: 评论
Real-Time Visualization and Detection of Malicious Network Flows in IoT Devices using a Scalable Stream Processing Pipeline
Real-Time Visualization and Detection of Malicious Network F...
收藏 引用
International Conference on Parallel Distributed and Grid computing (PDGC)
作者: S. Saravanan B. Uma Maheswari Kanagasundaram K Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Nokia Networks Bengaluru India
The continuous adoption of Internet of Things (IoT) devices has established notable security risks. In recent times, IoT devices are often targeted by malicious actors as IoT devices are limited with processing and me... 详细信息
来源: 评论
A Performance Study of Block Proposing Mechanism in Ethereum 2.0
A Performance Study of Block Proposing Mechanism in Ethereum...
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Zijie Liu Qinglin Zhao Shuhan Qi Li Feng Xiaofen Wang Sun Yi School of Computer Science and Engineering Macau University of Science and Technology Macau China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Chinese Academy of Sciences Institute of Computing Technology Beijing China
Ethereum 2.0 (ETH2) marks a significant evolution from Ethereum 1.0 (ETHl), playing a central role in the Web3.0 infrastructure. At its core, the consensus protocol Gasper greatly affects system performance. Given tha... 详细信息
来源: 评论
An Adaptive Community Detection Algorithm based on Density Peaks  9
An Adaptive Community Detection Algorithm based on Density P...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Fan, Xiang Shi, Lei-Lei Liu, Lu Han, Zi-Xuan Jiang, Liang Yuan, Bo Jiangsu University School of Computer Science and Telecommunication Engineering China Jiangsu University Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace China University of Leicester School of Computing and Mathematical Sciences United Kingdom Jiangsu University of Science and Technology School of Ocean China
Community detection is an important task for analyzing the topological function and structure of a network, as well as for various application scenarios such as advertising, marketing, and influence maximization. Labe... 详细信息
来源: 评论
Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images
收藏 引用
computer Modeling in engineering & sciences 2022年 第3期130卷 1309-1324页
作者: Rizwan Taj Feng Tao Shahzada Khurram Ateeq Ur Rehman Syed Kamran Haider Akber Abid Gardezi Saima Kanwal School of Computer and Communication Lanzhou University of TechnologyLanzhouChina Faculty of Computing The Islamia University of BahawalpurBahawalpurPakistan Department of Electrical Engineering Government College UniversityLahorePakistan College of Internet of Things Engineering Hohai UniversityChangzhouChina Department of Computer Science COMSATS University IslamabadIslamabadPakistan
In telemedicine,the realization of reversible watermarking through information security is an emerging research ***,adding watermarks hinders the distribution of pixels in the cover image because it creates distortion... 详细信息
来源: 评论
Self-Bidirectional Decoupled Distillation for Time Series Classification
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4101-4110页
作者: Xiao, Zhiwen Xing, Huanlai Qu, Rong Li, Hui Feng, Li Zhao, Bowen Yang, Jiayi Southwest Jiaotong University School of Computing and Artificial Intelligence Chengdu610031 China Tangshan Institute of Southwest Jiaotong University Tangshan063000 China Engineering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education Chengdu611756 China University of Nottingham School of Computer Science NottinghamNG7 2RD 455356 United Kingdom Xi'an Jiaotong University School of Mathematics and Statistics Xi'an710049 China Tongji University School of Software Engineering Shanghai201804 China
Over the years, many deep learning algorithms have been developed for time series classification (TSC). A learning model's performance usually depends on the quality of the semantic information extracted from lowe... 详细信息
来源: 评论
Harnessing the Power of web3: A Blockchain Approach to Crowdfunding
Harnessing the Power of web3: A Blockchain Approach to Crowd...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Richa Vivek Savant S Navin Sunder M Spoorthi Shinu M Rajagopal Roshni M Balakrishnan Department of Computer Science & Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Conventional crowdfunding methods frequently involve intermediaries, lack transparency, encounter regulatory challenges, and are not highly secure. Instead, a blockchain-based agreement can be formed, carried out, and... 详细信息
来源: 评论
A Strategic Analysis of Food Demand Using Machine Learning and Explainable AI
A Strategic Analysis of Food Demand Using Machine Learning a...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: M Adith Panduranga Katti Deepa Gupta Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
The growing importance of meal demand forecasting is increasingly recognized as vital for business growth, aiding in efficient procurement planning and minimizing waste. This paper employs the 'Meal demand forecas... 详细信息
来源: 评论
Elevating Login Security with Hybrid Encryption Enhanced QR Authentication
Elevating Login Security with Hybrid Encryption Enhanced QR ...
收藏 引用
International Conference on Communication and Electronics Systems (ICCES)
作者: Busam Venkata Lahari Busireddy Dhathri G Nithin Kavitha C.R. Department of Computer Science & Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
As the digital world continues to grow, the need for robust and secure authentication systems to protect sensitive information has never been more important. This paper introduces a developing approach to login securi... 详细信息
来源: 评论
Smart Steps to Sporting Success: IoT-Driven Footwear Innovations
Smart Steps to Sporting Success: IoT-Driven Footwear Innovat...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: S Thangam Gadi Joshith S Santhosh V Harish J Jesy Janet Kumari Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Using the cloud platform Blynk IoT, smart sneakers with built-in step and calorie monitoring were created with athletes in mind. The primary characteristic of the smart shoe is its ability to detect early signals of c... 详细信息
来源: 评论