咨询与建议

限定检索结果

文献类型

  • 13,731 篇 会议
  • 7,678 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 21,666 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,464 篇 工学
    • 10,427 篇 计算机科学与技术...
    • 8,697 篇 软件工程
    • 3,426 篇 信息与通信工程
    • 2,165 篇 控制科学与工程
    • 1,907 篇 生物工程
    • 1,613 篇 电气工程
    • 1,410 篇 生物医学工程(可授...
    • 1,183 篇 光学工程
    • 1,169 篇 电子科学与技术(可...
    • 831 篇 网络空间安全
    • 795 篇 机械工程
    • 680 篇 安全科学与工程
    • 635 篇 动力工程及工程热...
    • 595 篇 交通运输工程
    • 583 篇 仪器科学与技术
    • 559 篇 化学工程与技术
  • 6,863 篇 理学
    • 3,498 篇 数学
    • 2,089 篇 生物学
    • 1,779 篇 物理学
    • 1,215 篇 统计学(可授理学、...
    • 745 篇 系统科学
    • 656 篇 化学
  • 4,028 篇 管理学
    • 2,440 篇 管理科学与工程(可...
    • 1,769 篇 图书情报与档案管...
    • 1,073 篇 工商管理
  • 1,566 篇 医学
    • 1,226 篇 临床医学
    • 1,124 篇 基础医学(可授医学...
    • 823 篇 公共卫生与预防医...
    • 654 篇 药学(可授医学、理...
  • 853 篇 法学
    • 703 篇 社会学
  • 375 篇 经济学
  • 334 篇 农学
  • 237 篇 教育学
  • 184 篇 文学
  • 33 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 907 篇 deep learning
  • 817 篇 accuracy
  • 540 篇 computational mo...
  • 491 篇 machine learning
  • 448 篇 feature extracti...
  • 436 篇 training
  • 379 篇 predictive model...
  • 377 篇 real-time system...
  • 360 篇 internet of thin...
  • 321 篇 convolutional ne...
  • 312 篇 support vector m...
  • 288 篇 computer science
  • 268 篇 data models
  • 265 篇 semantics
  • 258 篇 optimization
  • 231 篇 neural networks
  • 219 篇 computer archite...
  • 208 篇 scalability
  • 206 篇 reliability
  • 203 篇 image segmentati...

机构

  • 257 篇 department of co...
  • 169 篇 school of comput...
  • 136 篇 school of comput...
  • 135 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 school of comput...
  • 113 篇 school of comput...
  • 105 篇 department of co...
  • 103 篇 college of compu...
  • 101 篇 national enginee...
  • 101 篇 department of co...
  • 101 篇 department of co...
  • 100 篇 school of comput...
  • 99 篇 school of comput...
  • 94 篇 institut univers...
  • 94 篇 department of co...
  • 93 篇 north-west unive...
  • 87 篇 infn sezione di ...
  • 87 篇 national centre ...
  • 83 篇 tno technical sc...

作者

  • 124 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 85 篇 zheng wei-shi
  • 85 篇 gozzini s.r.
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 65 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 54 篇 enzenhöfer a.

语言

  • 19,261 篇 英文
  • 2,291 篇 其他
  • 155 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21666 条 记 录,以下是4481-4490 订阅
排序:
Detection of Real and Manipulated Videos using the Transfer Learning Approach of Deep-Learning Models
Detection of Real and Manipulated Videos using the Transfer ...
收藏 引用
Global Conference for Advancement in Technology (GCAT)
作者: Bandi Rupendra Reddy Daka Chandra Rup Mathi Rohith Meena Belwal Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Deepfake (manipulated images and videos) identification is critical in multimedia forensics, as it can spread misinformation, threaten privacy, and have legal implications. To address this problem, researchers and pra... 详细信息
来源: 评论
Revolutionizing Healthcare Waste Management: Leveraging Blockchain For Enhanced Efficiency and Transparency
Revolutionizing Healthcare Waste Management: Leveraging Bloc...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: G Venkat Sai Kumar C Rohith Reddy B.M Beena Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
The handling of healthcare waste poses substantial difficulties, such as inefficiency, lack of transparency, and failure to comply with regulations. This research examines a novel strategy for addressing these difficu... 详细信息
来源: 评论
A Scalable Machine Learning Model for Sales Forecasting using PySpark
A Scalable Machine Learning Model for Sales Forecasting usin...
收藏 引用
Knowledge engineering and Communication Systems (ICKECS), International Conference on
作者: Talluri Harshitha Simhadri Tanya Thadakaluru Jaswanthi Manju Venugopalan Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Sales forecasting is a useful tool used for estimating future demand and sales. It provides insightful information for strategic decision-making, resource allocation, and inventory control. This research aims to utili... 详细信息
来源: 评论
Advancing of Microservices Architecture with Dockers
Advancing of Microservices Architecture with Dockers
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Kriti Priya Sah Nikunj Jain Priyanshu Jha Jawed Hawari B.M Beena Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Docker has revolutionized web hosting. It offers efficiency, scalability, security, and automation. With Docker, businesses and individuals can simplify their hosting. With the help of Docker, the development process ... 详细信息
来源: 评论
Protecting Data Mobility in Cloud Networks Using Metadata Security
收藏 引用
computer Systems science & engineering 2022年 第7期42卷 105-120页
作者: R.Punithavathi M.Kowsigan R.Shanthakumari Miodrag Zivkovic Nebojsa Bacanin Marko Sarac Department of Information Technology M.Kumarasamy College of EngineeringKarur639113India Department of Computer Science and Engineering School of ComputingSRM Institute of TechnologyKattankulathur CampusChennai603203India Department of Information Technology Kongu Engineering CollegeErode638060India Singidunum University Belgrade11000Serbia
At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement *** mobility in cloud environments uses protection protocols and algorithms to ... 详细信息
来源: 评论
Deepfake Image Forgery Detection using Local Feature Descriptors
Deepfake Image Forgery Detection using Local Feature Descrip...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: S Dienash T R Swapna Dept of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham India
Deepfake Image Forgery,generates fake images after manipulating the original source images. This increases the risk of losing trust in images or videos. This paper proposes an efficient methodology to detect Deepfake ... 详细信息
来源: 评论
Enhancing Medical Record Security: Using Role-based Access Control, Digital Signatures, and RSA Encryption
Enhancing Medical Record Security: Using Role-based Access C...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Aditya Vijjapu Anusha P Alagawadi Anish Maddi C.R Kavitha Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Medicare, the proposed web application provides a unique way to store medical records in a secure manner by encrypting and providing role-based access control, where doctors can view the records of all patients but pa... 详细信息
来源: 评论
A Comparative Analysis of ML & DL Models for Fetal Health Classification Using Cardiotocographic Data
A Comparative Analysis of ML & DL Models for Fetal Health Cl...
收藏 引用
Innovation in Technology (APCIT), Asia Pacific Conference on
作者: Tata Kaushik Tunuguntla Aasritha Sri Vani Vithyatharshana N Sangita Khare Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetam India
Traditional diagnostic methods in fetal health are frequently hindered by class imbalance and complex data, which puts early intervention and optimal perinatal outcomes at risk. This study fills this important gap by ... 详细信息
来源: 评论
Interactive Code Parsing and Expression Tree Visualization
Interactive Code Parsing and Expression Tree Visualization
收藏 引用
Innovative computing, Intelligent Communication and Smart Electrical Systems (ICSES), International Conference on
作者: Ve.Ram Akathya Yadukul Suresh Sahen Shivadutt Kavitha C.R. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Binary information trees are key visualization and evaluation tools, particularly during the passing of algorithms and synthesizing designs. This paper is an interactive tool for producing binary information trees ove... 详细信息
来源: 评论
Weapon Classification with Xception: An Efficient Deep Learning Approach
Weapon Classification with Xception: An Efficient Deep Learn...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Yeshwanth A R Bhuvaneswari Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Intelligent security systems require robust capabilities for weapon detection and classification. This study employs the Xception architecture, leveraging its unique features such as depth-wise separable convolutions ...
来源: 评论