咨询与建议

限定检索结果

文献类型

  • 13,535 篇 会议
  • 7,602 篇 期刊文献
  • 256 册 图书

馆藏范围

  • 21,393 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,219 篇 工学
    • 10,258 篇 计算机科学与技术...
    • 8,571 篇 软件工程
    • 3,382 篇 信息与通信工程
    • 2,112 篇 控制科学与工程
    • 1,903 篇 生物工程
    • 1,575 篇 电气工程
    • 1,389 篇 生物医学工程(可授...
    • 1,151 篇 电子科学与技术(可...
    • 1,149 篇 光学工程
    • 825 篇 网络空间安全
    • 790 篇 机械工程
    • 665 篇 安全科学与工程
    • 628 篇 动力工程及工程热...
    • 587 篇 交通运输工程
    • 577 篇 仪器科学与技术
    • 554 篇 化学工程与技术
  • 6,781 篇 理学
    • 3,450 篇 数学
    • 2,083 篇 生物学
    • 1,749 篇 物理学
    • 1,196 篇 统计学(可授理学、...
    • 743 篇 系统科学
    • 652 篇 化学
  • 3,993 篇 管理学
    • 2,418 篇 管理科学与工程(可...
    • 1,754 篇 图书情报与档案管...
    • 1,055 篇 工商管理
  • 1,545 篇 医学
    • 1,204 篇 临床医学
    • 1,105 篇 基础医学(可授医学...
    • 804 篇 公共卫生与预防医...
    • 654 篇 药学(可授医学、理...
  • 839 篇 法学
    • 697 篇 社会学
  • 372 篇 经济学
  • 329 篇 农学
  • 225 篇 教育学
  • 185 篇 文学
  • 32 篇 军事学
  • 27 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 895 篇 deep learning
  • 811 篇 accuracy
  • 532 篇 computational mo...
  • 495 篇 machine learning
  • 444 篇 feature extracti...
  • 437 篇 training
  • 379 篇 real-time system...
  • 376 篇 predictive model...
  • 359 篇 internet of thin...
  • 309 篇 support vector m...
  • 305 篇 convolutional ne...
  • 287 篇 computer science
  • 273 篇 data models
  • 268 篇 semantics
  • 258 篇 optimization
  • 234 篇 neural networks
  • 215 篇 computer archite...
  • 208 篇 scalability
  • 207 篇 reliability
  • 197 篇 image segmentati...

机构

  • 265 篇 department of co...
  • 167 篇 school of comput...
  • 136 篇 school of comput...
  • 135 篇 school of comput...
  • 111 篇 school of comput...
  • 110 篇 department of co...
  • 110 篇 school of comput...
  • 100 篇 national enginee...
  • 100 篇 department of co...
  • 100 篇 school of comput...
  • 99 篇 department of co...
  • 98 篇 college of compu...
  • 98 篇 department of co...
  • 94 篇 north-west unive...
  • 94 篇 school of comput...
  • 94 篇 institut univers...
  • 93 篇 department of co...
  • 89 篇 national centre ...
  • 88 篇 infn sezione di ...
  • 83 篇 tno technical sc...

作者

  • 117 篇 niyato dusit
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 93 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 86 篇 gozzini s.r.
  • 83 篇 zheng wei-shi
  • 82 篇 dallier r.
  • 81 篇 anjali t.
  • 73 篇 kalekin o.
  • 66 篇 anguita m.
  • 65 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 54 篇 benoit d.m.

语言

  • 19,888 篇 英文
  • 1,393 篇 其他
  • 150 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 荷兰文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21393 条 记 录,以下是81-90 订阅
排序:
A review on the energy efficient resource allocation schemes with improved quality of services in green cloud computing
A review on the energy efficient resource allocation schemes...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, computing and Security, ICABCS 2023
作者: Fiaz, A.S. Syed Sonai, Veeramani Computer Science and Engineering Amrita Viswa Vidhyapeetham School of Computing Chennai India Department of Computer Science and Engineering School of Engineering Shiv Nadar University Chennai India
The vast changes in the computing utilization have created a need with the improvised resource availability and reliability. The virtualization of servers and data centers to increase their efficiency has transformed ... 详细信息
来源: 评论
Cyber Chronicles: Tracking Behavior Patterns for Detecting Threats in Large Networks  3
Cyber Chronicles: Tracking Behavior Patterns for Detecting T...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Ramasubbu, Senthilnathan Thangavel, Senthil Kumar Jeyakumar, G. Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
One of the primary challenges in cybersecurity is that even one un-detected, appropriately unanalyzed malicious security event can hide the attack vectors of a potential hacker. It is essential to detect the data brea... 详细信息
来源: 评论
Blockchain-based Decentralized Digital Forensics Case Management System using IPFS  3
Blockchain-based Decentralized Digital Forensics Case Manage...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Viswanathan, Jayaraj Kumar, S. Udhaya Amrita School of Computing Department of Computer Science and Engineering Chennai India
Blockchain technology has gained significant attention for its ability to provide a decentralized and immutable platform for various applications. In this paper, we propose a Blockchain based Decentralized Case Manage... 详细信息
来源: 评论
Empowering data structure visualization through modification in Python  15
Empowering data structure visualization through modification...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Puvvadi, Harsha Vardhan Angala, Hari Prasad Swaroop, Bandi Vishnu Reddy, Busa Thanuj Sathwik Belwal, Meena Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
This article introduces a novel approach to data structure visualization through the development of a new programming language, utilizing Python's Lex-YACC library for lexical analysis and parsing, and the Turtle ... 详细信息
来源: 评论
Hybrid model with improved score level fusion for heart disease classification
收藏 引用
Multimedia Tools and Applications 2024年 第18期83卷 54951-54987页
作者: Maithani, Ankit Verma, Garima Department of Computer Science and Engineering School of Computing DIT University Makka Wala Uttarakhand Dehradun248009 India School of Computing DIT University Uttarakhand Dehradun248009 India
The heart, an essential organ of the body, pumps blood filled with oxygen to every area of the body through a complex network of veins and arteries. Any condition affecting the heart is referred to as heart disease. I... 详细信息
来源: 评论
Reliability Analysis of Correlated Competitive and Dependent Components Considering Random Isolation Times
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 2763-2777页
作者: Shuo Cai Tingyu Luo Fei Yu Pradip Kumar Sharma Weizheng Wang Lairong Yin School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China Department of Computing Science University of AberdeenAberdeenUK School of Automotive and Mechanical Engineering Changsha University of Science and TechnologyChangsha410114China
In the Internet of Things(IoT)system,relay communication is widely used to solve the problem of energy loss in long-distance transmission and improve transmission *** Body Sensor Network(BSN)systems,biosensors communi... 详细信息
来源: 评论
Comparison of CNN-based deep learning architectures for rice diseases classification
收藏 引用
Artificial Intelligence in Agriculture 2023年 第3期9卷 22-35页
作者: Md Taimur Ahad Yan Li Bo Song Touhid Bhuiyan Department of Computer Science and Engineering Daffodil International UniversitySavarBangladesh School of Mathematics Physics and Computing University of Southern QueenslandToowoombaAustralia School of Engineering University of Southern Queensland ToowoombaAustralia Department of Computer Science and Engineering Faculty of Science and Information TechnologyDaffodil International UniversityBangladesh
Although convolutional neural network(CNN)paradigms have expanded to transfer learning and ensemble models from original individual CNN architectures,few studies have focused on the performance comparison of the appli... 详细信息
来源: 评论
Optimizing DDoS Attack Detection Using Machine Learning  2
Optimizing DDoS Attack Detection Using Machine Learning
收藏 引用
2nd International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Aggarwal, Saransh Behera, Bhagrajyoti Singh, Murari Kumar Sharma, Ajeet Kumar School of Computing Science and Engineering Sharda University Greater Noida India School of Computer Science and Engineering Sharda University Greater Noida India
The increase in the Distributed Denial of Service attack (DDoS) leads to a significant threat to the network security. Inability to timely and accurately detect DDoS attacks disrupts services offered by companies and ... 详细信息
来源: 评论
Unsupervised machine learning approach for tailoring educational content to individual student weaknesses
收藏 引用
High-Confidence computing 2024年 第4期4卷 91-104页
作者: Shabab Intishar Rahman Shadman Ahmed Tasnim Akter Fariha Ammar Mohammad Muhammad Nayeem Mubasshirul Haque Sriram Chellappan Jannatun Noor Department of Computer Science and Engineering BRAC UniversityDhaka 1212Bangladesh Department of Computer Science and Engineering University of South FloridaFL 33620USA Computing for Sustainability and Social Good(C2SG)Research Group Department of Computer Science and EngineeringSchool of Data and SciencesBRAC UniversityDhaka 1212Bangladesh
By analyzing data gathered through Online Learning(OL)systems,data mining can be used to unearth hidden relationships between topics and trends in student ***,in this paper,we show how data mining techniques such as c... 详细信息
来源: 评论
Hyperspectral imagery quality assessment and band reconstruction using the prophet model
收藏 引用
CAAI Transactions on Intelligence Technology 2025年 第1期10卷 47-61页
作者: Ping Ma Jinchang Ren Zhi Gao Yinhe Li Rongjun Chen National Subsea Centre School of ComputingEngineering and TechnologyRobert Gordon UniversityAberdeenUK School of Computer Science Guangdong Polytechnic Normal UniversityGuangzhouChina School of Remote Sensing and Information Engineering Wuhan UniversityWuhanChina
In Hyperspectral Imaging(HSI),the detrimental influence of noise and distortions on data quality is profound,which has severely affected the following-on analytics and decisionmaking such as land *** study presents an... 详细信息
来源: 评论