咨询与建议

限定检索结果

文献类型

  • 1,179 篇 会议
  • 767 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,205 篇 工学
    • 861 篇 计算机科学与技术...
    • 712 篇 软件工程
    • 333 篇 信息与通信工程
    • 189 篇 生物工程
    • 186 篇 控制科学与工程
    • 143 篇 电气工程
    • 138 篇 生物医学工程(可授...
    • 119 篇 光学工程
    • 116 篇 电子科学与技术(可...
    • 89 篇 网络空间安全
    • 81 篇 机械工程
    • 76 篇 化学工程与技术
    • 59 篇 交通运输工程
    • 58 篇 安全科学与工程
    • 50 篇 仪器科学与技术
    • 45 篇 动力工程及工程热...
  • 697 篇 理学
    • 319 篇 数学
    • 232 篇 物理学
    • 205 篇 生物学
    • 119 篇 统计学(可授理学、...
    • 83 篇 化学
    • 51 篇 系统科学
  • 359 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 149 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 118 篇 医学
    • 82 篇 基础医学(可授医学...
    • 76 篇 临床医学
    • 57 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 69 篇 法学
    • 58 篇 社会学
  • 34 篇 经济学
  • 28 篇 农学
  • 22 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 83 篇 accuracy
  • 74 篇 deep learning
  • 55 篇 feature extracti...
  • 54 篇 training
  • 48 篇 convolutional ne...
  • 43 篇 machine learning
  • 42 篇 real-time system...
  • 38 篇 computational mo...
  • 38 篇 predictive model...
  • 30 篇 optimization
  • 29 篇 artificial intel...
  • 28 篇 semantics
  • 28 篇 security
  • 27 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 21 篇 medical services
  • 20 篇 scalability
  • 20 篇 cloud computing

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 43 篇 zhang yanning
  • 40 篇 xia yong
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,820 篇 英文
  • 111 篇 其他
  • 23 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
1954 条 记 录,以下是241-250 订阅
排序:
Utilizing the Fem Approach, PSO, and Firefly Algorithm, Surge Wire Grades Ring Modification was Achieved  11
Utilizing the Fem Approach, PSO, and Firefly Algorithm, Surg...
收藏 引用
11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022
作者: Kaur, Amandeep Singh, Harveer Chandigarh School of Business Department of Master of Computer Application Jhanjeri India Sanskriti University Department of Computer Science Engineering Uttar Pradesh Mathura India
As well as an arrester, semi power and electromagnetic current distributions have been seen, which impacts the dependability and lifespan of the device. With the HV load resistor, a rating ring is used to provide an e... 详细信息
来源: 评论
Deep Learning-Based Diagnostic Tool for Brain Tumours  3
Deep Learning-Based Diagnostic Tool for Brain Tumours
收藏 引用
3rd International Conference on Innovative Sustainable Computational Technologies, CISCT 2023
作者: Singh, Arun Rakhra, Manik Singh, Dalwinder Sharma, Arvind Kumar, Rakesh Lovely Professional University Department of Computer Science & Engineering Jalandhar Phagwara India School of Computer Application Lovely Professional University Punjab Phagwara India Lovely Professional University Department of Mathematics Punjab Phagwara144411 India
In this work, we provide the results of our experiments on Brain Tumour Classification and explore their implications. MRI, short for magnetic resonance imaging, is a crucial piece of medical imaging technology that c... 详细信息
来源: 评论
Using Classifier with Gated Recurrent Unit-Sigmoid Perceptron, Order to Get the Right Bird Species Detection  11
Using Classifier with Gated Recurrent Unit-Sigmoid Perceptro...
收藏 引用
11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022
作者: Sikand, Rainy Singh, Harveer Chandigarh School of Business Department of Master of Computer Application Jhanieri India Sanskriti University Department of Computer Science Engineering Uttar Pradesh Mathura India
The method for classifying a picture using the CNN algorithm and various activation functions is the subject of this research study. From a human perspective, there are several sorts of situations found in birds, such... 详细信息
来源: 评论
Vision-Based Locomotion Control for Humanoid Robots: A Study on Vision-Guided Walking Strategies
Vision-Based Locomotion Control for Humanoid Robots: A Study...
收藏 引用
2023 International Conference on Computational Intelligence and Sustainable engineering Solution, CISES 2023
作者: Pandey, Saroj Kumar Kumar, Lalan Kumar, Gaurav Kumar, Ankit Singh, Kamred Udham Singh, Teekam Gla University Department of Computer Engineering & Applications UP Mathura India Gl Bajaj Institute of Technology and Management Department of Master of Computer Application India School of Computing Graphic Era Hill University Dehradun India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India
Recently, there has been a lot of research on using vision to direct humanoid robots as they walk. Focusing on the major methodologies, difficulties, and prospects, this review article presents an overview of the curr... 详细信息
来源: 评论
An Overview of Video Tampering Detection Techniques: State-of-the-Art and Future Directions
An Overview of Video Tampering Detection Techniques: State-o...
收藏 引用
2023 International Conference on Computational Intelligence and Sustainable engineering Solution, CISES 2023
作者: Pandey, Saroj Kumar Kumar, Lalan Kumar, Gaurav Kumar, Ankit Singh, Kamred Udham Singh, Teekam Gla University Department of Computer Engineering & Applications UP Mathura India Gl Bajaj Institute of Technology and Management Department of Master of Computer Application India School of Computing Graphic Era Hill University Dehradun India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India
In the realm of video processing and forensics, finding video tampering is a critical challenge. The purposeful change or manipulation of video material to conceal or falsely depict the original information is referre... 详细信息
来源: 评论
IoT based Truck Wheel Temperature Monitoring System
IoT based Truck Wheel Temperature Monitoring System
收藏 引用
2024 Asian Conference on Intelligent Technologies, ACOIT 2024
作者: Zaid, Mohd Ahmad, Nadeem Aljamal, Mohammed Patel, Sarosh Khan, Asif Dept. of Computer Science and Engineering Integral University Lucknow India Dept. of Electronics and Communication Engg. Goel Institute of Technology and Managment Lucknow India School of Engineering University of Bridgeport United States Integral Robotics Lab Dept. of Computer Application Integral University Lucknow India
The main objective of this paper is to design an IoT based truck wheel temperature monitoring system using Arduino board with the aim to overcome endanger and raise the safety measures for truck and goods. By designin... 详细信息
来源: 评论
A High-capacity Information Hiding Scheme Based on Blakley Secret Sharing  4
A High-capacity Information Hiding Scheme Based on Blakley S...
收藏 引用
4th International Symposium on Artificial Intelligence and Intelligent Manufacturing, AIIM 2024
作者: Zhou, Jincheng Li, Yue Shen, Yujie Tang, Dan Cai, Hongliang Gong, Jing Bai, Ningchao School of Software Engineering Chengdu University of Information Technology Chengdu China Sichuan Province Engineering Technology Research Center of Support Software of lnformatization Application Chengdu China School of Computer Science and Engineering Sichuan University of Science & Engineering Yibin China Sichuan Provincial Big Data Technical Service Center Chengdu China
A high-capacity reversible information hiding scheme based on Blakley secret sharing is proposed to address the issues of low embedding rate and weak disaster recovery performance of images when using reversible infor... 详细信息
来源: 评论
Profiling Industrial 3D Parts with Complex Shapes Using 2D Imagery  15
Profiling Industrial 3D Parts with Complex Shapes Using 2D I...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Mahato, Nivedan Kaushik, Harshita Swadimath, Uma C. Arka Jain University Department of Mechnical Engineering Jharkhand Jamshedpur India Vivekananda Global University Department of Computer Science & Application Jaipur India School of Mangement - Pg Department of Management Karnataka Bangalore India
Commercial 3-D element profiling via second imagery is a modern technique to acquire the 3-D geometric characteristics of quite complicated shapes frequently encountered in industrial additives. This approach makes us... 详细信息
来源: 评论
Integrated Intelligent Computing Models for Cognitive-Based Neurological Disease Interpretation in Children: A Survey
收藏 引用
EAI Endorsed Transactions on Pervasive Health and Technology 2024年 10卷
作者: Tandon, Archana Mazumdar, Bireshwar Dass Pal, Manoj Kumar Faculty of Computer Application United University Prayagraj India School of Computer Science Engineering and Technology Bennett University U.P Greater Noida India Faculty of Computer Science & Engineering United University Prayagraj India
INTRODUCTION: This piece of work provides the description of integrated intelligent computing models for the interpretation of cognitive-based neurological diseases in children. These diseases can have a significant i... 详细信息
来源: 评论
ZKCross: An Efficient and Reliable Cross-Chain Authentication Scheme Based on Lightweight Attribute-Based Zero-Knowledge Proof  24th
ZKCross: An Efficient and Reliable Cross-Chain Authenticati...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Xu, Yuwei Cai, Hailang Chen, Jialuo Xiang, Qiao Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China School of Informatics Xiamen University Xiamen China College of Computer Science Nankai University Tianjin China
The consortium blockchain finds wide application in finance and logistics. However, these independent networks create information silos. Cross-chain authentication aims to bridge these gaps. It verifies qualifications... 详细信息
来源: 评论