咨询与建议

限定检索结果

文献类型

  • 13,740 篇 会议
  • 7,731 篇 期刊文献
  • 256 册 图书

馆藏范围

  • 21,727 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,528 篇 工学
    • 10,494 篇 计算机科学与技术...
    • 8,690 篇 软件工程
    • 3,449 篇 信息与通信工程
    • 2,242 篇 控制科学与工程
    • 1,917 篇 生物工程
    • 1,628 篇 电气工程
    • 1,414 篇 生物医学工程(可授...
    • 1,179 篇 电子科学与技术(可...
    • 1,178 篇 光学工程
    • 843 篇 网络空间安全
    • 803 篇 机械工程
    • 679 篇 安全科学与工程
    • 638 篇 动力工程及工程热...
    • 596 篇 交通运输工程
    • 587 篇 仪器科学与技术
    • 562 篇 化学工程与技术
  • 6,875 篇 理学
    • 3,496 篇 数学
    • 2,094 篇 生物学
    • 1,786 篇 物理学
    • 1,212 篇 统计学(可授理学、...
    • 746 篇 系统科学
    • 669 篇 化学
  • 4,031 篇 管理学
    • 2,442 篇 管理科学与工程(可...
    • 1,768 篇 图书情报与档案管...
    • 1,070 篇 工商管理
  • 1,569 篇 医学
    • 1,228 篇 临床医学
    • 1,121 篇 基础医学(可授医学...
    • 819 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 850 篇 法学
    • 703 篇 社会学
  • 374 篇 经济学
  • 335 篇 农学
  • 229 篇 教育学
  • 185 篇 文学
  • 33 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 918 篇 deep learning
  • 821 篇 accuracy
  • 535 篇 computational mo...
  • 499 篇 machine learning
  • 448 篇 feature extracti...
  • 441 篇 training
  • 378 篇 real-time system...
  • 376 篇 predictive model...
  • 360 篇 internet of thin...
  • 319 篇 convolutional ne...
  • 312 篇 support vector m...
  • 289 篇 computer science
  • 273 篇 data models
  • 267 篇 semantics
  • 258 篇 optimization
  • 230 篇 neural networks
  • 218 篇 computer archite...
  • 209 篇 reliability
  • 209 篇 scalability
  • 203 篇 image segmentati...

机构

  • 261 篇 department of co...
  • 170 篇 school of comput...
  • 137 篇 school of comput...
  • 136 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 school of comput...
  • 112 篇 school of comput...
  • 104 篇 college of compu...
  • 102 篇 national enginee...
  • 102 篇 department of co...
  • 101 篇 school of comput...
  • 101 篇 department of co...
  • 100 篇 department of co...
  • 100 篇 school of comput...
  • 94 篇 north-west unive...
  • 94 篇 institut univers...
  • 93 篇 department of co...
  • 88 篇 infn sezione di ...
  • 88 篇 national centre ...
  • 83 篇 tno technical sc...

作者

  • 125 篇 niyato dusit
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 86 篇 gozzini s.r.
  • 85 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 65 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 54 篇 benoit d.m.

语言

  • 19,244 篇 英文
  • 2,366 篇 其他
  • 158 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21727 条 记 录,以下是481-490 订阅
排序:
EEG-Based Emotion Recognition Using Deep Learning Models  2
EEG-Based Emotion Recognition Using Deep Learning Models
收藏 引用
2nd International Conference on Recent Trends in Microelectronics, Automation, computing, and Communications Systems, ICMACC 2024
作者: Meghana, Alokam BilakantiVanshika, V. VedaSamhitha, Karnam Murali, Keerthana Singh, Rimjhim Padam Palaniswamy, Suja Amrita School of Computing Department of Computer Science & Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Emotion recognition is an emerging field of research and modalities like images, videos, speech, text, physiological signals, and EEG are used for the same. In this work, EEG based emotion recognition has been propose... 详细信息
来源: 评论
Real-Time Speaker Identification and Subtitle Overlay with Multithreaded Audio Video Processing  5
Real-Time Speaker Identification and Subtitle Overlay with M...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Madamanchi, Sahith Kushal, Gona Ravikumar, Srikesh Dhanvin, Puli Remya, M.S. Nedungadi, Prema Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
Active Speaker Detection is pivotal in a multitude of applications, particularly in processing live Audio-Video (AV) streams. Current implementations predominantly focus on processing saved video files, limiting their... 详细信息
来源: 评论
Design and Implementation of the Dynamic Source Routing Protocol with Packet Numbering for Efficient Route Discovery, Improved Packet Delivery and Routing Optimization in Dynamic Network Scenarios  13
Design and Implementation of the Dynamic Source Routing Prot...
收藏 引用
13th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2024
作者: Kannan, Srinidhi Suryamritha, M. Balaji, Varshini Rajesh, M. Sreevidya, B. Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Dynamic Source Routing (DSR) protocol is mostly used in the wireless mesh network, where all the nodes are in a mesh topology, it is also used in Mobile ad-hoc Networks (MANETs). As it is in mesh topology that the com... 详细信息
来源: 评论
A Graph-Based Approach for Estimating Object Interactions in Surveillance Video Synopsis  2
A Graph-Based Approach for Estimating Object Interactions in...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Sood, Varnika Ray, Santosh Kumar Mahato, Kiran Kumar Sidharth, A.V. Namitha, Kalakunnath Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Video synopsis is a technique that condenses surveillance videos into compact equivalent videos. The objective of this paper is to identify and group related moving objects (also referred to as tubes) in a video using... 详细信息
来源: 评论
Shallow-Sec: Malware Detection in Real-Time Devices using Feature Weightage and Shallow Learning Models  5
Shallow-Sec: Malware Detection in Real-Time Devices using Fe...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Priyanka, Panaganti Udhayakumar Deepak, K. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India
In the domain of mobile security, particularly in APK (Android Application Package) malware detection, ensuring robust threat identification is critical for safeguarding user devices and sensitive data. This study add... 详细信息
来源: 评论
IoT-Cloud based Intelligent System for Crop Yield Prediction: A Review  15
IoT-Cloud based Intelligent System for Crop Yield Prediction...
收藏 引用
15th International Conference on Advances in computing, Control, and Telecommunication Technologies, ACT 2024
作者: Shalini, G. Beena, B.M. Khanna, Manju Department of Computer Science & Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Crop yield prediction is a crucial and challenging task in agriculture due to the complex and non-linear parameters involved. It mainly depends on three fluctuating factors namely soil, weather and environment hence t... 详细信息
来源: 评论
Preventing Accident Through Blockchain and IoT  15
Preventing Accident Through Blockchain and IoT
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Sriram, Suthir Sonar, Pradip Sah Nivethitha, V. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India
In today's changing world, the rise in car accidents and deaths on the road is an outcome of increasing traffic and population growth. The World Health Organization (WHO) states that a concerning 1.35 million live... 详细信息
来源: 评论
Video Based Steganography for Audio using LSB Approach
Video Based Steganography for Audio using LSB Approach
收藏 引用
2024 IEEE International Conference on computer Vision and Machine Intelligence, CVMI 2024
作者: Srinidhi, Srivageesh K Vishal, K.S. Shashank, U Someswara Nidhin Prabhakar, T.V. Singh, Rimjhim Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
In the rapidly evolving field of information security, video steganography offers a promising solution for concealing sensitive data within multimedia content. The proposed approach introduces a novel approach that in... 详细信息
来源: 评论
Dissecting Digital Dangers: A MITRE-Aligned Analysis of Two Prominent Malware Instances  15
Dissecting Digital Dangers: A MITRE-Aligned Analysis of Two ...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Rao, Subhiksha Suresh Mishra, Sahil Rajesh, M. Savant, Richa Vivek Sreevidya, B. Department of Computer Science & Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
The increasing complexity of malware requires a more thorough comprehension of how they operate. Using the MITRE ATT&CK framework, this project delves into the TrickBot and AsyncRAT malwares, offering a thorough e... 详细信息
来源: 评论
Comparative Analysis of Classifiers for Cyber Attack Prediction on LUflow Dataset with Explainability  9
Comparative Analysis of Classifiers for Cyber Attack Predict...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Gunti, Geethika Sree, Kuruva Divya Gupta, Deepa Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science & Engineering Bangalore India
As the cyber threats areevolving, intrusions exploit vulnerabilities in software or systems and can occur 24/7, targeting individuals and *** Intrusion detection system (IDS) is designed to help in the detection of cy... 详细信息
来源: 评论