咨询与建议

限定检索结果

文献类型

  • 13,794 篇 会议
  • 7,684 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 21,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,436 篇 工学
    • 10,390 篇 计算机科学与技术...
    • 8,665 篇 软件工程
    • 3,411 篇 信息与通信工程
    • 2,162 篇 控制科学与工程
    • 1,904 篇 生物工程
    • 1,594 篇 电气工程
    • 1,407 篇 生物医学工程(可授...
    • 1,175 篇 光学工程
    • 1,170 篇 电子科学与技术(可...
    • 834 篇 网络空间安全
    • 791 篇 机械工程
    • 677 篇 安全科学与工程
    • 633 篇 动力工程及工程热...
    • 592 篇 交通运输工程
    • 584 篇 仪器科学与技术
    • 556 篇 化学工程与技术
  • 6,839 篇 理学
    • 3,489 篇 数学
    • 2,090 篇 生物学
    • 1,772 篇 物理学
    • 1,216 篇 统计学(可授理学、...
    • 742 篇 系统科学
    • 653 篇 化学
  • 4,015 篇 管理学
    • 2,427 篇 管理科学与工程(可...
    • 1,769 篇 图书情报与档案管...
    • 1,067 篇 工商管理
  • 1,565 篇 医学
    • 1,223 篇 临床医学
    • 1,120 篇 基础医学(可授医学...
    • 820 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 849 篇 法学
    • 701 篇 社会学
  • 373 篇 经济学
  • 334 篇 农学
  • 236 篇 教育学
  • 183 篇 文学
  • 32 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 922 篇 deep learning
  • 848 篇 accuracy
  • 539 篇 computational mo...
  • 491 篇 machine learning
  • 459 篇 feature extracti...
  • 443 篇 training
  • 394 篇 real-time system...
  • 382 篇 predictive model...
  • 371 篇 internet of thin...
  • 321 篇 convolutional ne...
  • 316 篇 support vector m...
  • 285 篇 computer science
  • 269 篇 data models
  • 264 篇 semantics
  • 259 篇 optimization
  • 231 篇 neural networks
  • 220 篇 computer archite...
  • 214 篇 reliability
  • 214 篇 scalability
  • 204 篇 image segmentati...

机构

  • 261 篇 department of co...
  • 166 篇 school of comput...
  • 138 篇 school of comput...
  • 136 篇 school of comput...
  • 122 篇 department of co...
  • 118 篇 school of comput...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 105 篇 department of co...
  • 103 篇 school of comput...
  • 101 篇 college of compu...
  • 101 篇 national enginee...
  • 99 篇 department of co...
  • 98 篇 school of comput...
  • 94 篇 department of co...
  • 93 篇 north-west unive...
  • 93 篇 institut univers...
  • 87 篇 infn sezione di ...
  • 87 篇 national centre ...
  • 82 篇 tno technical sc...

作者

  • 122 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 85 篇 gozzini s.r.
  • 84 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 64 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 53 篇 benoit d.m.

语言

  • 17,458 篇 英文
  • 4,166 篇 其他
  • 168 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21735 条 记 录,以下是921-930 订阅
排序:
Cyberbullying Detection on Multiclass Data Using Machine Learning and A Hybrid CNN-BiLSTM Architecture
Cyberbullying Detection on Multiclass Data Using Machine Lea...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Balaji, Peddi Gowtham Katariya, Priyanka Prakash Sruthi, S. Venugopalan, Manju Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
Cyberbullying has emerged as a significantly concerning online societal issue in the past few years with the proliferation of social media platforms. To address and overcome this pressing communal concern and successf... 详细信息
来源: 评论
An intrusion detection system based on hybrid machine learning classifier
收藏 引用
Journal of Intelligent and Fuzzy Systems 2023年 第3期44卷 4245-4255页
作者: Reji, M. Joseph, Christeena Nancy, P. Lourdes Mary, A. Department of Electronics and Communication Engineering Rohini College of Engineering and Technology Tamilnadu Kanyakumari India Department of Electronics and Communication Engineering Srm Institute of Science and Technology Tamilnadu Chennai India Department of Computing Technologies School of Computing Srm Institute of Science and Technology Kattankulathur Campus Chennai India Department of Computer Science and Engineering Rohini College of Engineering and Technology Tamilnadu Kanyakumari India
Intrusion detection systems (IDS) can be used to detect irregularities in network traffic to improve network security and protect data and systems. From 2.4 times in 2018 to three times in 2023, the number of devices ... 详细信息
来源: 评论
Deep Learning Algorithms in Mobile Edge with Real-Time Abnormal Event Detection for 5G-IoT Devices
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第17期17卷 59-71页
作者: Praveenchandar, J. Kumar, S. Vinoth Paul, A. Christopher Mukunthan, M.A. Maharajan, K. Department of Computer Science and Engineering Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India Department of Computer Science and Engineering School of Computing Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Tamil Nadu Avadi India Department of Information Technology Karpagam Institute of Technology Tamil Nadu Coimbatore India Department of Computer Science and Engineering School of Computing Kalasalingam Academy of Research and Education Tamil Nadu Krishnankoil India
IoT is becoming increasingly popular due to its quick expansion and variety of applications. In addition, 5G technology helps with communication and network connectivity. This work integrates C-RAN with IoT networks t... 详细信息
来源: 评论
Enabling Precise Diabetic Retinopathy Severity Prediction through Convolutional Neural Networks  10
Enabling Precise Diabetic Retinopathy Severity Prediction th...
收藏 引用
10th International Conference on Advanced computing and Communication Systems, ICACCS 2024
作者: Shruti, P. Reddy, Tanuja Konda Abhiram, S. Singh, Rimjhim Padam Kanchan, Sneha Amrita School of Computing Amrita Vishwa Vidyapeetam Department of Computer Science & Engineering Bengaluru India Universiti Tunku Abdul Rahman Dept. of Internet Engineering and Computer science Malaysia
Diabetes retinopathy (DR) continues to be a major public health concern, needing efficient and reliable approaches for early identification and severity categorization. In this work, we used deep learning to improve t... 详细信息
来源: 评论
Low-Cost Network Jammer for Wi-Fi Network in Civilian Areas  5
Low-Cost Network Jammer for Wi-Fi Network in Civilian Areas
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Thangam, S. Gupta, Pradeep Kumar Kartthikeyan, N. Mukil, L.D. Niranjan, D.K. Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
This application presents a novel approach to address the challenge of intercepting unmanned aerial vehicles (UAVs) operating within the 2.4 GHz frequency band. Jamming device operating at 2.4 GHz, with an Arduino Nan... 详细信息
来源: 评论
License Plate Detection using YOLO v8 and Performance Evaluation of EasyOCR, PaddleOCR and Tesseract  15
License Plate Detection using YOLO v8 and Performance Evalua...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Reddy, P Praneeth Shruthi, P Sai Himanshu, P. Singh, Tripty Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
License plate recognition is critical to the functioning of the control and surveillance systems. Vehicle identification is based on number plates, which are made up of a certain arrangement of letters and digits. How... 详细信息
来源: 评论
Artificial gannet optimization enabled deep convolutional neural network for autism spectrum disorders classification using MRI image
收藏 引用
Multimedia Tools and Applications 2024年 第30期83卷 74757-74783页
作者: Prasad, Vadamodula Ganeshan, R. Rajeswari, R. Department of Computer Science & amp Engineering Lendi Institute of Engineering & ampTechnology Jonnada Village Andhra Pradesh Vizianagaram District 535005 India School of Computing Science and Engineering VIT Bhopal University Kothrikalan Madhya Pradesh Sehore466114 India Department of Electronics and Communication Engineering Rajalakshmi Institute of Technology Chennai India
Autism Spectrum Disorder (ASD) is a neurodevelopment-based disability caused by variations in the brain. This may cause impact on social skills and communication of an individual. Autism is a highly challenging issue ... 详细信息
来源: 评论
AI-Progressions in Automated Facial Paralysis Evaluation: A Comprehensive Survey of Traditional to Deep Learning Approaches  4
AI-Progressions in Automated Facial Paralysis Evaluation: A ...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Kiruthiga, S. Anbuananth, C. Dhilipkumar, V. Annamalai University Faculty of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu India School of Computing Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science & Engineering Chennai India
Deep learning mechanisms allow computers to solve complex real-time problems with complex neural networks, it employs a vital role in health sector, for assisting the medical practitioners with quick and accurate deci... 详细信息
来源: 评论
Enhancing Healthcare Record Privacy Through the Integration of Visual Cryptography and Diverse Image Encryption Techniques  9
Enhancing Healthcare Record Privacy Through the Integration ...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Chinnasamy, P. Deepalakshmi, P. Sandeep, Dayina Ganesh, Addala Siva Krishna, Angalakurthi Jaya Priya, D. Divya School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Krishnankoil Virudhunagar India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
The methodology of this research focuses on analyzing real-world breaches, such as the Star Health Insurance leak, and demonstrating how multi-layered encryption techniques could have mitigated the impact. By splittin... 详细信息
来源: 评论
Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography
收藏 引用
Mathematical Biosciences and engineering 2024年 第3期21卷 4762-4778页
作者: Liu, Tao Vairagar, Shubhangi Adagale, Sushadevi Karthick, T. Karunya, Catherine Esther Blesswin, A. John Mary, G. Selva Tianjin Sino-German University of Applied Sciences Tianjin300350 China Department of Artificial Intelligence and Data Science Dr. D. Y. Patil Institute of Technology Pimpri Pune411018 India Department of Computer Engineering KJEI's Trinity Academy of Engineering Pune411048 India Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur603203 India Computer Science and Engineering School of Computing SRM Institute of Science and Technology Kattankulathur603203 India Directorate of Learning and Development SRM Institute of Science and Technology Kattankulathur603203 India
The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and f... 详细信息
来源: 评论