咨询与建议

限定检索结果

文献类型

  • 1,194 篇 会议
  • 786 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,988 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,238 篇 工学
    • 884 篇 计算机科学与技术...
    • 718 篇 软件工程
    • 341 篇 信息与通信工程
    • 202 篇 控制科学与工程
    • 189 篇 生物工程
    • 150 篇 电气工程
    • 139 篇 生物医学工程(可授...
    • 121 篇 光学工程
    • 117 篇 电子科学与技术(可...
    • 90 篇 网络空间安全
    • 82 篇 机械工程
    • 79 篇 化学工程与技术
    • 60 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 50 篇 仪器科学与技术
    • 46 篇 材料科学与工程(可...
  • 709 篇 理学
    • 325 篇 数学
    • 235 篇 物理学
    • 206 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 86 篇 化学
    • 51 篇 系统科学
  • 363 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 151 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 121 篇 医学
    • 85 篇 基础医学(可授医学...
    • 78 篇 临床医学
    • 59 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 69 篇 法学
    • 58 篇 社会学
  • 34 篇 经济学
  • 28 篇 农学
  • 22 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 83 篇 accuracy
  • 75 篇 deep learning
  • 55 篇 feature extracti...
  • 54 篇 training
  • 50 篇 convolutional ne...
  • 44 篇 machine learning
  • 42 篇 real-time system...
  • 38 篇 computational mo...
  • 38 篇 predictive model...
  • 30 篇 optimization
  • 30 篇 artificial intel...
  • 28 篇 semantics
  • 28 篇 security
  • 27 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 21 篇 medical services
  • 20 篇 scalability
  • 20 篇 cloud computing

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 43 篇 zhang yanning
  • 41 篇 xia yong
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,781 篇 英文
  • 184 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
1988 条 记 录,以下是541-550 订阅
排序:
LUOJIA Explorer: An Auto-UAV for Unexposed Space Exploration
LUOJIA Explorer: An Auto-UAV for Unexposed Space Exploration
收藏 引用
2024 Symposium on Spatial Information to Empower the Metaverse
作者: Sun, Shangzhe Chen, Chi Yang, Bisheng Li, Liuchun Xu, Yuhang Jin, Ang State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan China Engineering Research Center for Spatio-temporal Data Smart Acquisition and Application Ministry of Education of China China Institute of Artificial Intelligence in Geomatics Wuhan University Wuhan China Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan China
With the advancement of technology, unexposed spaces have emerged as a new type of strategic area, attracting significant attention from researchers. These spaces often present complex environments, such as extreme li... 详细信息
来源: 评论
Dynamic Textual Prompt For Rehearsal-free Lifelong Person Re-identification
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Hongyu Jiao, Bingliang Wang, Wenxuan Wang, Peng Zhang, Yanning The National Engineering Laboratory for Integrated AeroSpace-Ground-Ocean Big Data Application Technology School of Computer Science Northwestern Polytechnical University Xi’an710060 China
Lifelong person re-identification attempts to recognize people across cameras and integrate new knowledge from continuous data streams. Key challenges involve addressing catastrophic forgetting caused by parameter upd... 详细信息
来源: 评论
A Unified Representation Model and View Mapping Algorithm for Path-Mapping-Based Redirection Gains in Redirected Walking
A Unified Representation Model and View Mapping Algorithm fo...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI EA 2025
作者: Bao, Xiyu Bian, Yulong Xin, Shiqing Qi, Meng Yang, Chenglei Shandong University Shandong Jinan China Shandong University Weihai China Shandong University Jinan China School of Information Science and Engineering Shandong Normal University Jinan China School of Computer Science & Technology Shandong University Jinan China Shandong Key Laboratory of Intelligent Electronic Packaging Testing and Application Weihai China
Among various redirected walking techniques, redirection gains guide users’ visual perception by introducing deviations between virtual and physical walking trajectories. This allows users wearing virtual reality hea... 详细信息
来源: 评论
Comparison of Tumor Segmentation Techniques from Medical Images  7
Comparison of Tumor Segmentation Techniques from Medical Ima...
收藏 引用
7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2023
作者: Gururaj, Bharathi Nair, Prajith Prakash Harish, L. Shanmugasundaram, V. Alaskar, Kamal Maranan, Ramya Ece Acs College of Engineering Karnataka India Cmr Institute of Technology Information Science and Engineering Karnataka India Sona College of Technology Department of Electrical and Electronics Engineering Chennai India Institute of Management Department of Computer Application Maharashtra Kolhapur India Saveetha School of Engineering Simats Department of Research and Innovation Tamil Nadu Chennai India
A Brain Tumor (BT) is one of the leading causes of mortality worldwide. Because of this, early diagnosis is crucial. BT localization and segmentation from magnetic resonance imaging (MRI) is a challenging but crucial ... 详细信息
来源: 评论
A Conflicting Evidence Fusion Method Based on a Greedy Strategy
A Conflicting Evidence Fusion Method Based on a Greedy Strat...
收藏 引用
computer, Vision and Intelligent Technology (ICCVIT), International Conference on
作者: Haibo Li Jianyu Xiao Qi Tang School of Computer Science and Technology Huaibei Normal University Huaibei China Anhui Engineering Research Center for Intelligent Computing and Application on Cognitive Behavior Huaibei China
To address the issue of the conventional D-S combination rule not effectively dealing with highly conflicting evidence fusion, a conflicting evidence fusion algorithm utilizing a greedy strategy is proposed. First, by... 详细信息
来源: 评论
Innovative anti-phishing framework using machine learning approach with evolutionary optimization to secure multimedia applications
收藏 引用
Multimedia Tools and applications 2025年 1-28页
作者: Sharma, Bhawna Khurana, Savita Sharma, Gaurav Rani, Sunita Nandal, Sudesh Kumari Chandi, Pragya Rastogi, Rashi Castilla, Ángel Kuc Goyal, Nitin Department of Computer Science & Engineering JMIT Radaur India Department of Information Technology JMIT Radaur India Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidalaya Sonipat India Department of Electronics and Communication Engineering BPS Mahila Vishwavidalaya Sonipat India Department of Computer Science & Engineering University Institute of Engineering and Technology Kurukshetra University Haryana India Department of Computer Application Sir Chhotu Ram Institute of Engineering and Technology CCS University Meerut India Engineering Research & Innovation Group Universidad Europea del Atlántico Santander Spain Department of Project Management Universidad Internacional Iberoamericana Campeche México Department of Project Management Universidad Internacional Iberoamericana Arecibo USA Department of Computer Science & Engineering School of Engineering and Technology Central University of Haryana Mahendergarh India
The transmission of users’ personal data via networks poses an increased risk of being exposed to phishing threats. Phishing URLs hiding malicious web addresses have become a widespread means of compromising user pri...
来源: 评论
Leveraging UAV Technology for Enhanced Disaster Management: Innovations and applications
Leveraging UAV Technology for Enhanced Disaster Management: ...
收藏 引用
2024 IEEE International Conference on Signal Processing and Advance Research in Computing, SPARC 2024
作者: Upadhyay, Govind Murari Vats, Prashant Shanker, Surabhi Bhushan, Saloni Mittal, Sonu Mandot, Manju Manipal University Jaipur Dept. of Computer Application Rajasthan Jaipur India Manipal University Jaipur School of CSE Dept. of CSE Rajasthan Jaipur India K.R. Mangalam University School of Engineering & Technology Dept. of CSE Sohna Road Haryana Gurugram India Chhatrapati Shivaji Maharaj University Dept. of Computer Science/IT Maharashtra Panvel India Amity Institute of Information Technology Amity University Noida Dept. of CSE Uttar Pradesh India J. R. N. Rajasthan Vidyapeeth University Dept. of Computer Science/IT Rajasthan Udaipur India
Unmanned Aerial Vehicles (UAVs) have substantially advanced the sector by providing improved real-time monitoring, data collecting, and situational awareness capabilities when integrated into disaster management techn... 详细信息
来源: 评论
Word-Constrained Response Generation for International Chinese Language Education based on Decoder Backward Attention  23
Word-Constrained Response Generation for International Chine...
收藏 引用
3rd International Conference on Artificial Intelligence, Automation and Algorithms, AI2A 2023
作者: Sun, Jingbo Song, Tianbao Liu, Haitao Peng, Weiming Song, Jihua School of Artificial Intelligence Beijing Normal University Beijing China School of Computer Science and Engineering Beijing Technology and Business University Beijing China Chinese Character Research and Application Laboratory Beijing Normal University Beijing China Linguistic Data Consortium University of Pennsylvania PhiladelphiaPA United States
Dialogue systems are a valuable technology in the field of natural language processing to improve work, learning, and daily life. Currently, dialogue systems are employed as an educational technology for mentoring, ev... 详细信息
来源: 评论
Exploiting Convolutional Neural Networks for Automated Pathology Image Classification
Exploiting Convolutional Neural Networks for Automated Patho...
收藏 引用
Optimization Computing and Wireless Communication (ICOCWC), International Conference on
作者: Sunil Sharma C Menaka Akhilendra Pratap Singh Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
Convolutional neural networks (CNNs) are a deep mastering method for the computerized pathology photograph category. With the improvement of superior imaging techniques, the quantity of virtual and representable patho...
来源: 评论
Prediction of Reliability of Data in Underwater Communication Network Using Fuzzy Logic
Prediction of Reliability of Data in Underwater Communicatio...
收藏 引用
Optimization Computing and Wireless Communication (ICOCWC), International Conference on
作者: Surendra Yadav Gobi N Rakesh Kumar Yadav Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Computer Science and Information Technology Jain (Deemed to be University) Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
This paper uses fuzzy logic to propose a reliability prediction set of rules for the underwater communication community. The set of rules uses fixed fuzzy rules to expect communication reliability among nodes in an un...
来源: 评论