咨询与建议

限定检索结果

文献类型

  • 13,740 篇 会议
  • 7,731 篇 期刊文献
  • 256 册 图书

馆藏范围

  • 21,727 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,528 篇 工学
    • 10,494 篇 计算机科学与技术...
    • 8,690 篇 软件工程
    • 3,449 篇 信息与通信工程
    • 2,242 篇 控制科学与工程
    • 1,917 篇 生物工程
    • 1,628 篇 电气工程
    • 1,414 篇 生物医学工程(可授...
    • 1,179 篇 电子科学与技术(可...
    • 1,178 篇 光学工程
    • 843 篇 网络空间安全
    • 803 篇 机械工程
    • 679 篇 安全科学与工程
    • 638 篇 动力工程及工程热...
    • 596 篇 交通运输工程
    • 587 篇 仪器科学与技术
    • 562 篇 化学工程与技术
  • 6,875 篇 理学
    • 3,496 篇 数学
    • 2,094 篇 生物学
    • 1,786 篇 物理学
    • 1,212 篇 统计学(可授理学、...
    • 746 篇 系统科学
    • 669 篇 化学
  • 4,031 篇 管理学
    • 2,442 篇 管理科学与工程(可...
    • 1,768 篇 图书情报与档案管...
    • 1,070 篇 工商管理
  • 1,569 篇 医学
    • 1,228 篇 临床医学
    • 1,121 篇 基础医学(可授医学...
    • 819 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 850 篇 法学
    • 703 篇 社会学
  • 374 篇 经济学
  • 335 篇 农学
  • 229 篇 教育学
  • 185 篇 文学
  • 33 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 918 篇 deep learning
  • 821 篇 accuracy
  • 535 篇 computational mo...
  • 499 篇 machine learning
  • 448 篇 feature extracti...
  • 441 篇 training
  • 378 篇 real-time system...
  • 376 篇 predictive model...
  • 360 篇 internet of thin...
  • 319 篇 convolutional ne...
  • 312 篇 support vector m...
  • 289 篇 computer science
  • 273 篇 data models
  • 267 篇 semantics
  • 258 篇 optimization
  • 230 篇 neural networks
  • 218 篇 computer archite...
  • 209 篇 reliability
  • 209 篇 scalability
  • 203 篇 image segmentati...

机构

  • 261 篇 department of co...
  • 170 篇 school of comput...
  • 137 篇 school of comput...
  • 136 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 school of comput...
  • 112 篇 school of comput...
  • 104 篇 college of compu...
  • 102 篇 national enginee...
  • 102 篇 department of co...
  • 101 篇 school of comput...
  • 101 篇 department of co...
  • 100 篇 department of co...
  • 100 篇 school of comput...
  • 94 篇 north-west unive...
  • 94 篇 institut univers...
  • 93 篇 department of co...
  • 88 篇 infn sezione di ...
  • 88 篇 national centre ...
  • 83 篇 tno technical sc...

作者

  • 125 篇 niyato dusit
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 86 篇 gozzini s.r.
  • 85 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 65 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 54 篇 benoit d.m.

语言

  • 19,244 篇 英文
  • 2,366 篇 其他
  • 158 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21727 条 记 录,以下是4641-4650 订阅
排序:
UZNER: A Benchmark for Named Entity Recognition in Uzbek  12th
UZNER: A Benchmark for Named Entity Recognition in Uzbek
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese computing, NLPCC 2023
作者: Yusufu, Aizihaierjiang Jiang, Liu Ainiwaer, Abidan Teng, Chong Yusufu, Aizierguli Li, Fei Ji, Donghong Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China School of Computer Science and Technology Xinjiang Normal University Urumqi China
Named entity recognition (NER) is a key task in natural language processing, and entity recognition can provide necessary semantic information for many downstream tasks. However, the performance of NER is often limite... 详细信息
来源: 评论
Dynamic Face Interaction: Simulating 3D Spatial Relationships with Mesa and OpenCV
Dynamic Face Interaction: Simulating 3D Spatial Relationship...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Ravi Charan Podupuganti Hemanth Injeti Ashish Paul Kandula Rishu Jaiswal Anantha Hothri Inuguri Manju Khanna Department of Computer Science and Engineering Amrita School of Computing Bangalore Amrita Vishwa Vidyapeetham India
The dynamic face interaction model simulates real-time spatial connections by calculating distances between recognized faces and a camera by merging Mesa and OpenCV. It leverages OpenCV’s Haar cascades to offer dynam... 详细信息
来源: 评论
Enhancing Web Security with Two-Way Authenticated SSL Communication
Enhancing Web Security with Two-Way Authenticated SSL Commun...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Akshith Kosanam Neeharika Ayalasomayajula G Vivek C.R Kavitha Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
The use of two-way SSL or Secure Socket Layer communication becomes the key for effectively creating a secure two-way communication between the servers and the clients in web applications. This research delves into an... 详细信息
来源: 评论
A Comparative Analysis of Black-Box and White-Box Models for IOT Botnet Detection
A Comparative Analysis of Black-Box and White-Box Models for...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Richa Vivek Savant Spoorthi M Penumarty Krishna Mohan Sreebha Bhaskaran Shinu M. Rajagopal Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Botnets pose a significant threat to network security, especially to the potential server crashes they can cause. The proposed study focuses on methods for identifying the presence of and the type of botnet activity, ... 详细信息
来源: 评论
Advancing Ophthalmic Diagnostics: Employing Deep Learning for Precision Detection of Retinal Damage in OCT Images
Advancing Ophthalmic Diagnostics: Employing Deep Learning fo...
收藏 引用
Data science and Network Security (ICDSNS), International Conference on
作者: M Rithani R Prasanna Kumar Veda Chatiyode Janani Srinivasan Anusha Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Retinal optical coherence tomography imaging is an important diagnostic tool for early detection and monitoring of various retinal disorders. This study aims to improve diagnostic accuracy by leveraging deep learning ... 详细信息
来源: 评论
Scrutinization of Threats from a Cloud-based Network Traffic Environment
Scrutinization of Threats from a Cloud-based Network Traffic...
收藏 引用
International Conference on computing for Sustainable Global Development (INDIACom)
作者: Shraddha Chopra A. G. Sreedevi Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
In this age of digitalization, securing computer networks is of utmost importance to protect sensitive data and critical infrastructure. Threat scrutinization plays an integral role in identifying and thwarting cyber ...
来源: 评论
Enhancing Multimedia Security through Advanced Image Authentication and Encryption
Enhancing Multimedia Security through Advanced Image Authent...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Kotha Chakradhar K Thulasi Tharun Shinu M. Rajagopal Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
With this flood of multimedia data, protecting it is an absolute necessity. This paper describes a complete method for securing images that combines encryption and watermarking. A technique of the sort suggested furth... 详细信息
来源: 评论
Thyroid Disease Prediction Using Machine Learning Techniques
Thyroid Disease Prediction Using Machine Learning Techniques
收藏 引用
Electronic Systems and Intelligent computing (ICESIC), International Conference on
作者: Sompalli Pranath Kumar Pasuladi Narsimha Reddy V Nivethitha Suthir Sriram Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Thyroid disorders are primarily observed in people in the age range of 30 to 60 years; however, the disease is said to be very prevalent in women. Some of the risk factors for thyroid disorders include other diseases ... 详细信息
来源: 评论
A Comprehensive Comparison of Machine Learning Techniques for Heart Disease Prediction
A Comprehensive Comparison of Machine Learning Techniques fo...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Devika Madhusoodanan R Vismaya Hridyalakshmi Santhosh Manju Venugopalan Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Heart disease, affecting millions worldwide, poses an alarming threat to global health due to its high prevalence and significant impact on mortality rates. Despite advances in medical technology, early detection rema... 详细信息
来源: 评论
Pedestrian Intention Detection for Autonomous Driving: A Novel Object Detection Approach
Pedestrian Intention Detection for Autonomous Driving: A Nov...
收藏 引用
International Conference on Electrical Energy Systems (ICEES)
作者: A Padmavathi Dheeraj Reddy Pullela Shaik Nazeer Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Detecting pedestrian intentions is crucial for safer interactions between autonomous driving and pedestrians. This study addresses this challenge by proposing an object detection model for autonomous driving using YOL... 详细信息
来源: 评论