咨询与建议

限定检索结果

文献类型

  • 13,740 篇 会议
  • 7,731 篇 期刊文献
  • 256 册 图书

馆藏范围

  • 21,727 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,528 篇 工学
    • 10,494 篇 计算机科学与技术...
    • 8,690 篇 软件工程
    • 3,449 篇 信息与通信工程
    • 2,242 篇 控制科学与工程
    • 1,917 篇 生物工程
    • 1,628 篇 电气工程
    • 1,414 篇 生物医学工程(可授...
    • 1,179 篇 电子科学与技术(可...
    • 1,178 篇 光学工程
    • 843 篇 网络空间安全
    • 803 篇 机械工程
    • 679 篇 安全科学与工程
    • 638 篇 动力工程及工程热...
    • 596 篇 交通运输工程
    • 587 篇 仪器科学与技术
    • 562 篇 化学工程与技术
  • 6,875 篇 理学
    • 3,496 篇 数学
    • 2,094 篇 生物学
    • 1,786 篇 物理学
    • 1,212 篇 统计学(可授理学、...
    • 746 篇 系统科学
    • 669 篇 化学
  • 4,031 篇 管理学
    • 2,442 篇 管理科学与工程(可...
    • 1,768 篇 图书情报与档案管...
    • 1,070 篇 工商管理
  • 1,569 篇 医学
    • 1,228 篇 临床医学
    • 1,121 篇 基础医学(可授医学...
    • 819 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 850 篇 法学
    • 703 篇 社会学
  • 374 篇 经济学
  • 335 篇 农学
  • 229 篇 教育学
  • 185 篇 文学
  • 33 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 918 篇 deep learning
  • 821 篇 accuracy
  • 535 篇 computational mo...
  • 499 篇 machine learning
  • 448 篇 feature extracti...
  • 441 篇 training
  • 378 篇 real-time system...
  • 376 篇 predictive model...
  • 360 篇 internet of thin...
  • 319 篇 convolutional ne...
  • 312 篇 support vector m...
  • 289 篇 computer science
  • 273 篇 data models
  • 267 篇 semantics
  • 258 篇 optimization
  • 230 篇 neural networks
  • 218 篇 computer archite...
  • 209 篇 reliability
  • 209 篇 scalability
  • 203 篇 image segmentati...

机构

  • 261 篇 department of co...
  • 170 篇 school of comput...
  • 137 篇 school of comput...
  • 136 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 school of comput...
  • 112 篇 school of comput...
  • 104 篇 college of compu...
  • 102 篇 national enginee...
  • 102 篇 department of co...
  • 101 篇 school of comput...
  • 101 篇 department of co...
  • 100 篇 department of co...
  • 100 篇 school of comput...
  • 94 篇 north-west unive...
  • 94 篇 institut univers...
  • 93 篇 department of co...
  • 88 篇 infn sezione di ...
  • 88 篇 national centre ...
  • 83 篇 tno technical sc...

作者

  • 125 篇 niyato dusit
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 86 篇 gozzini s.r.
  • 85 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 65 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 54 篇 benoit d.m.

语言

  • 19,244 篇 英文
  • 2,366 篇 其他
  • 158 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21727 条 记 录,以下是4871-4880 订阅
排序:
Thoracic Surgery Outcome Prediction: Harnessing Machine Learning for Post-Operative Life Expectancy Assessment
Thoracic Surgery Outcome Prediction: Harnessing Machine Lear...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Adithya Rajendran S Abhishek Akhbar Sha T Anjali Department of Computer Science and Engineering Amrita School of Computing Amritapuri India
Lung cancer, a complex and formidable disease, frequently necessitates surgical intervention as a pivotal aspect of its treatment. Accurate prediction of post-operative life expectancy holds paramount significance in ...
来源: 评论
Network Intrusion Classifier with Optimized Clustering Algorithm for the Efficient Classification
Network Intrusion Classifier with Optimized Clustering Algor...
收藏 引用
Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), International Conference on
作者: Balajee R M Suresh Kallam M K Jayanthi Kannan Faculty of Engineering and Technology School of Computer Science and Engineering JAIN (Deemed to be University) Bangalore India School of Computing Science and Engineering VIT Bhopal University Kothrikalan Sehore Madhya Pradesh India
Nowadays network security is becoming more and more challenging due to increasing number of network attacks. The major attack which carried out on the network seems to be DoS attack, DDoS attack, Botnet Attack and Bru...
来源: 评论
Exploring the Power of Deep Learning for Seamless Background Audio Generation in Videos
Exploring the Power of Deep Learning for Seamless Background...
收藏 引用
International Conference on computing and Networking Technology (ICCNT)
作者: Anjana S. Nambiar Kanigolla Likhita K. V. S. Sri Pujya Niharika Panda Department of Computer Science and Engineering Amrita School of Computing Bengaluru India
In the realm of image and signal processing, "data" refers to any piece of information that can be transformed into a format that can be efficiently processed. It is projected that by 2025, there will be 180...
来源: 评论
Covid-19 Classification using Fine-tuned EfficientNet Architecture
Covid-19 Classification using Fine-tuned EfficientNet Archit...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Srigiri Sruthi Siddharth Emadaboina Pradyumna Machavarapu Rimjhim Padam Singh Sneha Kanchan Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India Department of Internet Engineering and Computer Science Universiti Tunku Abdul Rahman Malaysia
This work utilizes an Efficient Net-based deep learning architecture, leveraging its efficiency and scalability for image classification tasks. We employ a Dataset of chest X-ray images, including COVID-19 cases as we... 详细信息
来源: 评论
Brain Tumor Segmentation and Survival Prediction using Multimodal MRI Scans with Deep learning Algorithms
Brain Tumor Segmentation and Survival Prediction using Multi...
收藏 引用
2022 International Conference on Innovative computing, Intelligent Communication and Smart Electrical Systems, ICSES 2022
作者: Anjanayya, S. Gayathri, V.M. Pitchai, R. SRM Institute of Science and Technology School of Computing Tamilnadu Kattankulathur India B v Raju Institute of Technology Department of Computer Science and Engineering Narsapur India
Brain tumours developed by the brain's abnormal cell growth. Medical imaging devices are classified into two types: MRI and CT are widely used to scan brain tumors. MRI images are used to scan the interior compone... 详细信息
来源: 评论
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based Adaptive Live Streaming  36
LALISA: Adaptive Bitrate Ladder Optimization in HTTP-based A...
收藏 引用
36th IEEE/IFIP Network Operations and Management Symposium, NOMS 2023
作者: Tashtarian, Farzad Bentaleb, Abdelhak Amirpour, Hadi Taraghi, Babak Timmerer, Christian Hellwagner, Hermann Zimmermann, Roger Alpen-Adria-Universitat Klagenfurt Christian Doppler Laboratory Athena Austria Concordia University Department of Computer Science and Software Engineering Canada National University of Singapore School of Computing Singapore
Video content in Live HTTP Adaptive Streaming (HAS) is typically encoded using a pre-defined, fixed set of bitrate-resolution pairs (termed Bitrate Ladder), allowing play-back devices to adapt to changing network cond... 详细信息
来源: 评论
Ecoskinomics: Exploring the Ecological Factors Shaping Skin Health
Ecoskinomics: Exploring the Ecological Factors Shaping Skin ...
收藏 引用
2023 Innovations in Power and Advanced computing Technologies, i-PACT 2023
作者: Abhishek, S. Anjali, T. Lekshmi, S. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India Department of Dermatology Amrita Institute of Medical Sciences Amrita Vishwa Vidyapeetham Kochi India
This comprehensive research paper thoroughly investigates the profound implications of environmental factors on skin health. It meticulously examines the multifaceted contributions of pollution, UV radiation, climate ... 详细信息
来源: 评论
AUTOTEE: Automated Migration and Protection of Programs in Trusted Execution Environments
arXiv
收藏 引用
arXiv 2025年
作者: Han, Ruidong Yang, Zhou Ma, Chengyan Liu, Ye Niu, Yuqing Ma, Siqi Gao, Debin Lo, David School of Computing and Information Systems Singapore Management University Singapore School of Computer Science and Engineering UNSW Sydney Australia
Trusted Execution Environments (TEEs) isolate a special space within a device’s memory that is not accessible to the normal world (also known as Untrusted Environment), even when the device is compromised. Thus, deve... 详细信息
来源: 评论
Machine Learning Approaches for Myers-Briggs Personality Prediction
Machine Learning Approaches for Myers-Briggs Personality Pre...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Sethulakshmi Santhosh Meenakshi M Avani F S Abhishek Anjali T Department of Computer Science and Engineering Amrita School of Computing Amritapuri India
In order to predict Myers-Briggs personality types from text input, this research article compares the abilities of Stochastic Gradient Descent (SGD), Naive Bayes, k-Nearest Neighbours (KNN), and Logistic Regression m...
来源: 评论
Detection of the Crown of Thorns starfish using YOLOv5  8
Detection of the Crown of Thorns starfish using YOLOv5
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Kunekar, Pankaj Patil, Pradnya Vishal Bbhagat, Babeetta Patil, Tejal H. Rajas, Neha Sawant, Pratiksha Yuvraj Vishwakarma Institute of Technology Department of Information Technology Maharashtra Pune India Pillai Hoc College of Engineering Computer Engineering Rasayani India Mit School of Computing Maharashtra Pune India Sinhgad College of Engineering Department of Ai&ds Maharashtra Pune India Vishwakarma Institute of Technology Department of Ai&ds Maharashtra Pune India PVG's College of Science and Commerce Department of Computer Science Maharashtra Pune India
The invasive Crown-of-Thorns starfish (COTS) poses a significant threat to coral reef ecosystems. Early detection and removal are crucial to mitigating their impact. This research proposes a YOLOv5-based object detect... 详细信息
来源: 评论