咨询与建议

限定检索结果

文献类型

  • 13,740 篇 会议
  • 7,731 篇 期刊文献
  • 256 册 图书

馆藏范围

  • 21,727 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,528 篇 工学
    • 10,494 篇 计算机科学与技术...
    • 8,690 篇 软件工程
    • 3,449 篇 信息与通信工程
    • 2,242 篇 控制科学与工程
    • 1,917 篇 生物工程
    • 1,628 篇 电气工程
    • 1,414 篇 生物医学工程(可授...
    • 1,179 篇 电子科学与技术(可...
    • 1,178 篇 光学工程
    • 843 篇 网络空间安全
    • 803 篇 机械工程
    • 679 篇 安全科学与工程
    • 638 篇 动力工程及工程热...
    • 596 篇 交通运输工程
    • 587 篇 仪器科学与技术
    • 562 篇 化学工程与技术
  • 6,875 篇 理学
    • 3,496 篇 数学
    • 2,094 篇 生物学
    • 1,786 篇 物理学
    • 1,212 篇 统计学(可授理学、...
    • 746 篇 系统科学
    • 669 篇 化学
  • 4,031 篇 管理学
    • 2,442 篇 管理科学与工程(可...
    • 1,768 篇 图书情报与档案管...
    • 1,070 篇 工商管理
  • 1,569 篇 医学
    • 1,228 篇 临床医学
    • 1,121 篇 基础医学(可授医学...
    • 819 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 850 篇 法学
    • 703 篇 社会学
  • 374 篇 经济学
  • 335 篇 农学
  • 229 篇 教育学
  • 185 篇 文学
  • 33 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 918 篇 deep learning
  • 821 篇 accuracy
  • 535 篇 computational mo...
  • 499 篇 machine learning
  • 448 篇 feature extracti...
  • 441 篇 training
  • 378 篇 real-time system...
  • 376 篇 predictive model...
  • 360 篇 internet of thin...
  • 319 篇 convolutional ne...
  • 312 篇 support vector m...
  • 289 篇 computer science
  • 273 篇 data models
  • 267 篇 semantics
  • 258 篇 optimization
  • 230 篇 neural networks
  • 218 篇 computer archite...
  • 209 篇 reliability
  • 209 篇 scalability
  • 203 篇 image segmentati...

机构

  • 261 篇 department of co...
  • 170 篇 school of comput...
  • 137 篇 school of comput...
  • 136 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 school of comput...
  • 112 篇 school of comput...
  • 104 篇 college of compu...
  • 102 篇 national enginee...
  • 102 篇 department of co...
  • 101 篇 school of comput...
  • 101 篇 department of co...
  • 100 篇 department of co...
  • 100 篇 school of comput...
  • 94 篇 north-west unive...
  • 94 篇 institut univers...
  • 93 篇 department of co...
  • 88 篇 infn sezione di ...
  • 88 篇 national centre ...
  • 83 篇 tno technical sc...

作者

  • 125 篇 niyato dusit
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 86 篇 gozzini s.r.
  • 85 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 65 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 54 篇 benoit d.m.

语言

  • 19,244 篇 英文
  • 2,366 篇 其他
  • 158 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21727 条 记 录,以下是4671-4680 订阅
排序:
Pan-Sharpening Using Fusion of 2D-DFRFT, 2D-DWT, and CNN
Pan-Sharpening Using Fusion of 2D-DFRFT, 2D-DWT, and CNN
收藏 引用
Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA), International Conference on
作者: Gadiraju Hemanth Sai Varma Gudivada Lohit Sai Phaniveer Tippa Srivallabh Tripuramallu Pramodh Nidhin Prabhakar T V Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
In recent years, the demand for high-resolution remote sensing imaging has increased in a variety of fields, including environmental monitoring, urban planning, agriculture, and disaster management. Multispectral imag... 详细信息
来源: 评论
Secure Fuzzy Keyword Search in Cloud computing using Levenshtein Distance and Cryptographic Indexing
Secure Fuzzy Keyword Search in Cloud Computing using Levensh...
收藏 引用
Data Intelligence and Cognitive Informatics (ICDICI), International Conference on
作者: Jahnavi M Haritha K Gowtham R S V Shinu M Rajgopal Dept of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Growing usage of the cloud for computing, the necessity for safe and security storage and retrieval of information procedures has become important. This study provides a novel way to tackle the difficulty of searching... 详细信息
来源: 评论
Encryption scheme using Mealy Machine
Encryption scheme using Mealy Machine
收藏 引用
Global Conference for Advancement in Technology (GCAT)
作者: Hemanth Ramasubbu Sricharan Silaparasetty Mehul Singh Bhakuni Niharika Panda Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
This novel encryption scheme leverages a Mealy machine for dynamic encryption. To significantly enhance data security, it enforces strong key requirements (with mixed uppercase letters, digits, and special characters)... 详细信息
来源: 评论
A Comprehensive Analysis of Machine Learning Algorithms for Suitable Crop Prediction in Agriculture
A Comprehensive Analysis of Machine Learning Algorithms for ...
收藏 引用
Cognitive Robotics and Intelligent Systems (ICC - ROBINS), International Conference on
作者: Kriti Priya Shah Subodh Narayan Sah Kadam Prajwal Dharmaraj K Dinesh Kumar Dept of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Agricultural productivity is major concern for the global food community. According to the 2011 census, about 49% of the people in India are engaged in farming or related activities. Agriculture provides almost 17% of... 详细信息
来源: 评论
A Novel Zero-Knowledge Authentication Protocol for Secure Communication in VANET
A Novel Zero-Knowledge Authentication Protocol for Secure Co...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Ardra Vinod Malavika Vinodkumar S V Mayur Pranav P Remyakrishnan Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
Vehicular Ad Hoc Network (VANET) is a particular subclass of the mobile ad-hoc network that raises several security challenges, notably how users authenticate the network. The work explores using zero-knowledge proofs... 详细信息
来源: 评论
FretMate: ChatGPT-Powered Adaptive Guitar Learning Assistant  25
FretMate: ChatGPT-Powered Adaptive Guitar Learning Assistant
收藏 引用
30th International Conference on Intelligent User Interfaces, IUI 2025
作者: Shu, Xin Shi, Lei Cheng, Jiacheng Ouyang, Lingling Chu, Mengdi Shu, Xinhuan Open Lab Newcastle University Newcastle Upon Tyne United Kingdom Open Lab School of Computing Newcastle University Newcastle upon Tyne United Kingdom Computer Science and Engineering The Ohio State University ColumbusOH United States School of Computing Newcastle University Newcastle Upon Tyne United Kingdom
Learning to play the guitar poses significant challenges for beginners, who often choose to practice alone to avoid the embarrassment of making mistakes in front of others. This isolation leads to a lack of timely fee... 详细信息
来源: 评论
Sentiment Analysis of Telugu News Articles Decoding Textual Nuances
Sentiment Analysis of Telugu News Articles Decoding Textual ...
收藏 引用
Emerging Trends in Information Technology and engineering (ic-ETITE), Conference on
作者: V Balaji Viswanadh Eswar Prasad K Bharathi Mohan G Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
In the field of Natural Language Processing, analyzing sentiment in Telugu presents distinctive challenges owing to the limited availability of annotated datasets. This paper presents a sophisticated method utilizing ...
来源: 评论
Visual Question Answering in Malayalam Text
Visual Question Answering in Malayalam Text
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), International Conference on
作者: Jose Joseph V Anand Ram YadhuKrishna P Anjali T Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amrita School of Computing Amritapuri India
One of the most important tasks in combining computer vision and natural language understanding is Visual Question Answering (VQA). This paper focuses on the VQA problem in Malayalam, a language known for its unique D... 详细信息
来源: 评论
Enhancing Digital Image Security using Visual Cryptography Integrated with AES and RSA Encryption Techniques
Enhancing Digital Image Security using Visual Cryptography I...
收藏 引用
Delhi Section Conference (DELCON), IEEE
作者: Prajna Aasritha Adabala Rajani Sai Venkata Gowtham Thambi Jaishitha Vadluri Sai Rishisri Kavitha C. R. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Visual cryptography (VC) designed to secure visual information such as images and text by dividing it into multiple shares. A key advantage of visual cryptography is its ability to decrypt information without the need... 详细信息
来源: 评论
CAMUS: Attribute-Aware Counterfactual Augmentation for Minority Users in Recommendation  23
CAMUS: Attribute-Aware Counterfactual Augmentation for Minor...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Ying, Yuxin Zhuang, Fuzhen Zhu, Yongchun Wang, Deqing Zheng, Hongwei Institute of Artificial Intelligence Beihang University Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Engineering Beihang University Beijing China Beijing Academy of Blockchain and Edge Computing Beijing China Zhongguancun Lab Beijing China Sklsde School of Computer Science Beihang University Beijing China
Embedding-based methods currently achieved impressive success in recommender systems. However, such methods are more likely to suffer from bias in data distribution, especially the attribute bias problem. For example,... 详细信息
来源: 评论