咨询与建议

限定检索结果

文献类型

  • 13,988 篇 会议
  • 7,805 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 22,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,686 篇 工学
    • 10,615 篇 计算机科学与技术...
    • 8,789 篇 软件工程
    • 3,543 篇 信息与通信工程
    • 2,296 篇 控制科学与工程
    • 1,910 篇 生物工程
    • 1,692 篇 电气工程
    • 1,416 篇 生物医学工程(可授...
    • 1,190 篇 电子科学与技术(可...
    • 1,189 篇 光学工程
    • 891 篇 网络空间安全
    • 805 篇 机械工程
    • 713 篇 安全科学与工程
    • 651 篇 动力工程及工程热...
    • 628 篇 交通运输工程
    • 600 篇 仪器科学与技术
    • 561 篇 化学工程与技术
  • 6,957 篇 理学
    • 3,534 篇 数学
    • 2,101 篇 生物学
    • 1,812 篇 物理学
    • 1,233 篇 统计学(可授理学、...
    • 745 篇 系统科学
    • 674 篇 化学
  • 4,128 篇 管理学
    • 2,520 篇 管理科学与工程(可...
    • 1,821 篇 图书情报与档案管...
    • 1,084 篇 工商管理
  • 1,600 篇 医学
    • 1,238 篇 临床医学
    • 1,127 篇 基础医学(可授医学...
    • 844 篇 公共卫生与预防医...
    • 656 篇 药学(可授医学、理...
  • 866 篇 法学
    • 717 篇 社会学
  • 384 篇 经济学
  • 339 篇 农学
  • 245 篇 教育学
  • 192 篇 文学
  • 33 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 961 篇 deep learning
  • 875 篇 accuracy
  • 542 篇 computational mo...
  • 516 篇 machine learning
  • 472 篇 feature extracti...
  • 451 篇 training
  • 404 篇 real-time system...
  • 385 篇 predictive model...
  • 378 篇 internet of thin...
  • 323 篇 support vector m...
  • 321 篇 convolutional ne...
  • 285 篇 computer science
  • 278 篇 data models
  • 269 篇 semantics
  • 259 篇 optimization
  • 230 篇 neural networks
  • 223 篇 computer archite...
  • 220 篇 reliability
  • 219 篇 scalability
  • 209 篇 image segmentati...

机构

  • 267 篇 department of co...
  • 169 篇 school of comput...
  • 137 篇 school of comput...
  • 137 篇 school of comput...
  • 124 篇 department of co...
  • 118 篇 school of comput...
  • 114 篇 school of comput...
  • 112 篇 department of co...
  • 107 篇 department of co...
  • 103 篇 college of compu...
  • 103 篇 school of comput...
  • 101 篇 school of comput...
  • 101 篇 national enginee...
  • 100 篇 department of co...
  • 96 篇 north-west unive...
  • 95 篇 institut univers...
  • 93 篇 department of co...
  • 90 篇 infn sezione di ...
  • 87 篇 national centre ...
  • 85 篇 tno technical sc...

作者

  • 125 篇 niyato dusit
  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 calvo d.
  • 95 篇 chen a.
  • 91 篇 gal t.
  • 91 篇 bozza c.
  • 91 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 89 篇 coleiro a.
  • 87 篇 gozzini s.r.
  • 84 篇 zheng wei-shi
  • 83 篇 anjali t.
  • 83 篇 dallier r.
  • 71 篇 kalekin o.
  • 63 篇 anguita m.
  • 63 篇 boettcher m.
  • 59 篇 kulikovskiy v.
  • 59 篇 huang f.
  • 55 篇 benoit d.m.

语言

  • 15,935 篇 英文
  • 6,011 篇 其他
  • 179 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
22050 条 记 录,以下是4761-4770 订阅
Comprehensive Music Genre Classification: Exploring Advanced Machine Learning Techniques with the GTZAN Dataset
Comprehensive Music Genre Classification: Exploring Advanced...
收藏 引用
Global Conference for Advancement in Technology (GCAT)
作者: Meghraj G K Y Nishanth Akshat Kuttan Manju Venugopalan Dept of Computer Science and Engineering Amrita School of Computing Bangalore Amrita Vishwa Vidyapeetham India
Music is a universal language that comes in a wide variety of genres to suit different interests and moods. In order to achieve this organization, music genre classification—the process of automatically classifying a... 详细信息
来源: 评论
Empowering IoT Security: Leveraging Deep Neural Networks Against Ransomware and DDoS Attacks
Empowering IoT Security: Leveraging Deep Neural Networks Aga...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: K Geetha Dharmindar Chaudhary K. Shrivarshini Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidhyapeetham Chennai India
Using Internet of Things (IoT) devices has become more efficient and convenient, but it has also increased the potential of security breaches, particularly from ransomware and Distributed Denial of Service (DDoS) assa... 详细信息
来源: 评论
Rainfall Prediction Enhancement Using SMOTE and Machine Learning Algorithms
Rainfall Prediction Enhancement Using SMOTE and Machine Lear...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: R Hemanth Kumar B Vishnu Prasad Himanshu Yadav Manju Venugopalan Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Rainfall prediction is not an easy task when utilizing conventional approaches. For many stakeholders, including people planning their daily lives, farmers caring their crop, and fishermen who depend on the weather fo... 详细信息
来源: 评论
Dual-Attention Protein Secondary Structure Prediction (DAPSS-Pred)
Dual-Attention Protein Secondary Structure Prediction (DAPSS...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Gundala Pallavi R Prasanna Kumar Ir Oviya Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Protein secondary structure prediction is a critical task in bioinformatics, essential for understanding protein function and aiding drug discovery. Traditional methods have achieved significant milestones, but there ... 详细信息
来源: 评论
Identifying Sentiment in Legal Case Judgments using Random Forest Classifier
Identifying Sentiment in Legal Case Judgments using Random F...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Bhupathi Vishva Pavani Desham Mahitha Priyanka Prabhakar Peeta Basa Pati Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
This paper explores sentiment analysis in legal judgments using machine learning techniques. Six machine learning models, including Naïve Bayes, K Nearest Neighbors, Logistic Regression, Support Vector Machine, R... 详细信息
来源: 评论
Data-Driven Insights: Mall Customer Segmentation through Fuzzy C-Means Clustering
Data-Driven Insights: Mall Customer Segmentation through Fuz...
收藏 引用
2024 IEEE International BIT Conference, BITCON 2024
作者: Babu, Tina Ebin, P.M. Nair, Rekha R Alliance University Alliance School of Advanced Computing Department of Computer Science and Engineering Bengaluru India
This study, employed the Fuzzy C-Means clustering algorithm to segment mall customers based on various demographic and spending attributes. Using a dataset of 200 mall customers, the study analyzed their annual income... 详细信息
来源: 评论
Petri Net Model of MITM Attack Based on NDP Protocol
Petri Net Model of MITM Attack Based on NDP Protocol
收藏 引用
2022 International Conference on Networking and Network Applications, NaNA 2022
作者: Zhang, Liumei Han, Yu Wang, Yichuan Quan, Ruiqin School of Computer Science Xi’an Shiyou University Xi’an China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China Xinjiang Institute of Engineering China
Neighbor Discovery Protocol (NDP) is one of the core protocols of IPv6 networks. Since NDP messages are an unauthenticated stateless protocol, they are vulnerable to various types of attacks, and Man-In-The-Middle (MI... 详细信息
来源: 评论
Cloud-Native CDN Monitoring Using CI/CD
Cloud-Native CDN Monitoring Using CI/CD
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Richa Vivek Savant S Navin Sunder Samarth Seshadri Niharika Panda Shinu M Rajagopal Department of Computer Science & Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
In a time where digital content consumption reigns, it is essential to efficiently deliver multimedia resources. This research seeks to transform how content is delivered by implementing and overseeing a secure, monit... 详细信息
来源: 评论
PyroCyclone Eye: Satellite Detection System For Wildfire And Cyclone
PyroCyclone Eye: Satellite Detection System For Wildfire And...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Anirudh C Vinayan P Pankaj Sreenadh Venugopal T Anjali Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
Cyclones and wildfires are deadly; they do significant damage to human life and property. This requires an effective early warning system that would ensure a timely intervention since the normal methods are not effici... 详细信息
来源: 评论
Semantic Similarity Analysis for Resume Filtering using PySpark
Semantic Similarity Analysis for Resume Filtering using PySp...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Akhilesh P Amal Krishna K S Karthick Bharadwaj Manju Venugopalan Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Technology is expanding and applicants are making their resumes look better by developing their skill set for the current environment. Each resume now looks very promising and manually screening resumes and finding ou... 详细信息
来源: 评论