咨询与建议

限定检索结果

文献类型

  • 1,194 篇 会议
  • 786 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 1,988 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,238 篇 工学
    • 884 篇 计算机科学与技术...
    • 718 篇 软件工程
    • 341 篇 信息与通信工程
    • 202 篇 控制科学与工程
    • 189 篇 生物工程
    • 150 篇 电气工程
    • 139 篇 生物医学工程(可授...
    • 121 篇 光学工程
    • 117 篇 电子科学与技术(可...
    • 90 篇 网络空间安全
    • 82 篇 机械工程
    • 79 篇 化学工程与技术
    • 60 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 50 篇 仪器科学与技术
    • 46 篇 材料科学与工程(可...
  • 709 篇 理学
    • 325 篇 数学
    • 235 篇 物理学
    • 206 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 86 篇 化学
    • 51 篇 系统科学
  • 363 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 151 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 121 篇 医学
    • 85 篇 基础医学(可授医学...
    • 78 篇 临床医学
    • 59 篇 公共卫生与预防医...
    • 49 篇 药学(可授医学、理...
  • 69 篇 法学
    • 58 篇 社会学
  • 34 篇 经济学
  • 28 篇 农学
  • 22 篇 教育学
  • 20 篇 文学
  • 9 篇 军事学
  • 2 篇 艺术学

主题

  • 83 篇 accuracy
  • 75 篇 deep learning
  • 55 篇 feature extracti...
  • 54 篇 training
  • 50 篇 convolutional ne...
  • 44 篇 machine learning
  • 42 篇 real-time system...
  • 38 篇 computational mo...
  • 38 篇 predictive model...
  • 30 篇 optimization
  • 30 篇 artificial intel...
  • 28 篇 semantics
  • 28 篇 security
  • 27 篇 data models
  • 24 篇 support vector m...
  • 23 篇 reliability
  • 23 篇 technological in...
  • 21 篇 medical services
  • 20 篇 scalability
  • 20 篇 cloud computing

机构

  • 55 篇 department of co...
  • 54 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 graduate school ...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 department of ph...
  • 39 篇 ochanomizu unive...
  • 39 篇 fakultät für phy...

作者

  • 43 篇 zhang yanning
  • 41 篇 xia yong
  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert

语言

  • 1,781 篇 英文
  • 184 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Masters of Computer Application School of Computer Science and Engineering"
1988 条 记 录,以下是631-640 订阅
排序:
Dimensionality Reduction Using UMAP and TSNE Technique
Dimensionality Reduction Using UMAP and TSNE Technique
收藏 引用
International Conference on Advances in Information Technology (ICAIT)
作者: Mudit Mittal Praveen Gujjar J Guru Prasad M S Raghavendra M Devadas Lubna Ambreen Vikash Kumar Department of Computer Science and Engg. Graphic Era (Deemed to be University) Dehradun India Faculty of Management Studies JAIN (Deemed-to-be University) Bengaluru India Department of Computer Science and Engineering Gitam School of Technology Gitam (Deemed-to-be University) Bengaluru India Department of Computer Application Graphic Era (Deemed to be University) Dehradun India
The increasing complexity and high dimensionality of datasets in various fields, such as genomics, image analysis, and natural language processing, have posed significant challenges for effective data visualization an... 详细信息
来源: 评论
Utilizing Anomaly Detection Methods for Identifying Fraudulent Activities in Credit Card Transactions  1
Utilizing Anomaly Detection Methods for Identifying Fraudule...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Prasad, N. Siva Rama Krishna Gangopadhyay, Amit Prabakaran, R. Mishra, Nilamadhab Prasad, D. Shyam Kapoor, Sneha Saveetha School of Engineering Dept. of CSE Chennai India Mohan Babu University Dept. of ECE Tirupati India Arignar Anna Institute of Science and Technology Dept. of Computer Application India VIT Bhopal University Dept. of CSE Bhopal India CVR College of Engineering Dept. of Electronics and Instrumentation Engineering Hyderabad India Swami Vivekanand Subharti University Dept of CSE Meerut India
Anomaly detection involves identifying unusual occurrences that could signal potential issues, such as security breaches, system failures, financial fraud, structural defects, or medical errors. In the context of digi... 详细信息
来源: 评论
KVSAgg: Secure Aggregation of Distributed Key-Value Sets
KVSAgg: Secure Aggregation of Distributed Key-Value Sets
收藏 引用
International Conference on Data engineering
作者: Yuhan Wu Siyuan Dong Yi Zhou Yikai Zhao Fangcheng Fu Tong Yang Chaoyue Niu Fan Wu Bin Cui School of Computer Science and National Engineering Laboratory for Big Data Analysis Technology and Application Peking University Beijing China Peng Cheng Laboratory Shenzhen China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
In global data analysis, the central server needs the global statistic of the user data stored in local clients. In such cases, an Honest-but-Curious central server might put user privacy at risk in trying to collect ...
来源: 评论
Security Challenges and Elucidations in Cloud Storage and File Systems: An Advanced Investigation Review
Security Challenges and Elucidations in Cloud Storage and Fi...
收藏 引用
Ubiquitous Computing and Intelligent Information Systems (ICUIS), International Conference on
作者: S. P. Santhoshkumar S. Hariharasudhan S. Poorna Prakash Jim Mathew Philip S. Haritha T. Nalini Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai India Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Avadi Chennai India Artificial Intelligence & Data Science Akshaya College of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Sri Ramakrishna Institute of Technology Coimbatore Tamil Nadu India Master of Computer Application Rathinam Technical Campus. Coimbatore India Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai
With the widespread adoption of cloud storage and file systems, security concerns have become paramount. This paper presents an advanced investigation into the security challenges encountered in cloud storage and file... 详细信息
来源: 评论
Step-by-Step: Controlling Arbitrary Style in Text with Large Language Models  30
Step-by-Step: Controlling Arbitrary Style in Text with Large...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Liu, Pusheng Wu, Lianwei Wang, Linyong Guo, Sensen Liu, Yang National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science Northwestern Polytechnical University China Research & Development Institute of Northwestern Polytechnical University Shenzhen China Chongqing Science & Technology Innovation Center of Northwestern Polytechnical University China State Key Laboratory of Integrated Service Networks Xidian University China School of Artificial Intelligence Optics and Electronics Northwestern Polytechnical University China
Recently, the autoregressive framework based on large language models (LLMs) has achieved excellent performance in controlling the generated text to adhere to the required style. These methods guide LLMs through promp... 详细信息
来源: 评论
A Multi-Objective Evolutionary Algorithm Based on Indicator and Performing Local Searches  4
A Multi-Objective Evolutionary Algorithm Based on Indicator ...
收藏 引用
4th International Conference on Information science and Education, ICISE-IE 2023
作者: Chen, Hanning Zeng, Xiangrui Jia, Kun Hu, Yabao Wang, Guopeng School of Computer Science and Technology Tiangong University Tianjin China Engineering Research Center of Integration and Application of Digital Learning Technology Ministry of Education Beijing China School of Artificial Intelligence Tiangong University Tianjin China Jingwei Textile Machinery Co. Ltd Beijing China College of Artificial Intelligence University of Science and Technology Tianjin China The Open University of China China
The indicator-based multi-objective optimization evolutionary algorithm has gained significant attention for its strong performance across various optimization problems. We draw on the advantages and try to make impro... 详细信息
来源: 评论
Evaluation of Machine-Learned Price Prediction Models for Block-Chain Technology  1
Evaluation of Machine-Learned Price Prediction Models for Bl...
收藏 引用
1st IEEE International Conference on Innovations in High Speed Communication and Signal Processing, IHCSP 2023
作者: Goel, Vikas Sharma, Ashutosh Ranjan, Raju Sharma, Amit Kumar KIET Group of Institutions Dept. of IT Ghaziabad India IMSUC-Ghaziabad Dept. of Computer Application Ghaziabad India School of Computing Science & Engineering Galgotia University Greater Noida India Dept. of CS&E Ch. Charan Singh University Campus Meerut India
As a new form of technology, blockchain has much to offer. The technology has a wide range of potential uses and advancements, depending on the field of application. However, further study is required to realise the p... 详细信息
来源: 评论
: heterogeneous hypergraph attention network with counterfactual learning for multimodal sentiment analysis
收藏 引用
Complex & Intelligent Systems 2025年 第4期11卷 1-16页
作者: Huang, Changqin Lin, Zhenheng Huang, Qionghao Huang, Xiaodi Jiang, Fan Chen, Jili Zhejiang Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal University Jinhua China School of Education Zhejiang Normal University Jinhua China School of Computer Science and Technology Zhejiang Normal University Jinhua China School of Computing Mathematics and Engineering Charles Sturt University Albury Australia
Multimodal sentiment analysis (MSA) has garnered significant attention for its immense potential in human-computer interaction. While cross-modality attention mechanisms are widely used in MSA to capture inter-modalit...
来源: 评论
A New Method for Predefined-Time Synchronization Control of Memristive Cohen-Grossberg Neural Networks
A New Method for Predefined-Time Synchronization Control of ...
收藏 引用
Memristive Computing and applications (ICMCA), IEEE International Conference on
作者: Aidi Liu Wenyue Yu Lili Huang Jian Guo Tengfei Lei Hui Zhao School of Computer and Information Engineering Qilu Institute of Technology Jinan China School of Computer and Information Engineering Qilu Institute of Technology Collaborative Innovation Center of Memristive Computing Application School of Computer and Information Engineering Qilu Institute of Technology Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and Engineering University of Jinan Jinan China
This article mainly conducts a series of research on the synchronization control of Cohen-Grossberg neural networks. Firstly, a memristive Cohen-Grossberg neural network model with time-varying delay was constructed, ...
来源: 评论
An Auxiliary Industrial Equipment Maintenance System Using Mixed Reality  8
An Auxiliary Industrial Equipment Maintenance System Using M...
收藏 引用
8th IEEE International Conference on Industrial engineering and applications, ICIEA 2021
作者: Su, Xia Cheng, Zheng Luo, Bin School of Automation Engineering University of Electronic Science and Technology of China Chengdu China Institute of Computer Application China Academy of Engineering Physics Mianyang China
The intellectualization of modern industrial equipment presents a great challenge to its maintenance. The traditional maintenance of equipment requires the repairer to reference related manual, resulting in low mainte... 详细信息
来源: 评论