咨询与建议

限定检索结果

文献类型

  • 1,041 篇 期刊文献
  • 992 篇 会议
  • 13 册 图书

馆藏范围

  • 2,046 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,209 篇 工学
    • 761 篇 计算机科学与技术...
    • 599 篇 软件工程
    • 297 篇 信息与通信工程
    • 190 篇 控制科学与工程
    • 165 篇 生物工程
    • 152 篇 电气工程
    • 149 篇 电子科学与技术(可...
    • 140 篇 生物医学工程(可授...
    • 108 篇 光学工程
    • 85 篇 网络空间安全
    • 77 篇 材料科学与工程(可...
    • 77 篇 化学工程与技术
    • 67 篇 机械工程
    • 58 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 51 篇 交通运输工程
    • 48 篇 安全科学与工程
  • 834 篇 理学
    • 325 篇 物理学
    • 290 篇 数学
    • 231 篇 生物学
    • 111 篇 化学
    • 107 篇 统计学(可授理学、...
  • 328 篇 管理学
    • 201 篇 管理科学与工程(可...
    • 129 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 189 篇 医学
    • 133 篇 临床医学
    • 122 篇 基础医学(可授医学...
    • 75 篇 公共卫生与预防医...
    • 50 篇 药学(可授医学、理...
  • 75 篇 法学
    • 66 篇 社会学
  • 54 篇 农学
  • 44 篇 教育学
  • 35 篇 经济学
  • 19 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 66 篇 deep learning
  • 59 篇 accuracy
  • 52 篇 machine learning
  • 41 篇 artificial intel...
  • 36 篇 feature extracti...
  • 31 篇 training
  • 30 篇 internet of thin...
  • 29 篇 convolutional ne...
  • 27 篇 computational mo...
  • 25 篇 optimization
  • 23 篇 predictive model...
  • 22 篇 real-time system...
  • 21 篇 computer science
  • 21 篇 data mining
  • 20 篇 security
  • 19 篇 support vector m...
  • 18 篇 data models
  • 17 篇 scalability
  • 17 篇 magnetic resonan...
  • 17 篇 education

机构

  • 48 篇 vivekananda glob...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 42 篇 maharishi school...
  • 41 篇 kirchhoff-instit...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 department of co...
  • 38 篇 department of ph...
  • 38 篇 ochanomizu unive...
  • 38 篇 graduate school ...
  • 38 篇 department physi...
  • 37 篇 fakultät für phy...
  • 37 篇 deutsches elektr...

作者

  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 m. klein
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert
  • 33 篇 a. e. c. coimbra

语言

  • 1,824 篇 英文
  • 195 篇 其他
  • 26 篇 中文
  • 4 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Mobile Application & Technology Program Computer Science Department School of Computer Science"
2046 条 记 录,以下是621-630 订阅
排序:
Legal Protection of Copyright on Copyrighted Content Downloaded Through the Internet  2020
Legal Protection of Copyright on Copyrighted Content Downloa...
收藏 引用
5th International Conference on Intelligent Information technology, ICIIT 2020
作者: Indrawan, Arvin Stevens, Garry Brianto, Gratianus Martin Gaol, Ford Lumban Oktavia, Tanty Mobile Application and Technology-School of Computer Science Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Program-Doctor of Computer Science Bina Nusantara University Jakarta Indonesia Information Systems Program-School of Information Systems Bina Nusantara University Jakarta Indonesia
The development of the internet made new problems within the scope of copyright. The internet is used to download copyrighted content and use it without permission from the creators. The legal protection of copyright ... 详细信息
来源: 评论
Accessible Authentication Using Keyword Search through Homomorphic Encryption  1
Accessible Authentication Using Keyword Search through Homom...
收藏 引用
1st IEEE International Interdisciplinary Humanitarian Conference for Sustainability, IIHC 2022
作者: Vekariya, Vipul Manjunath, R. Gill, Jasmeen Gopianand, M. Kumar, Avneesh Jha, Amaresh Parul University Department of CSE PIET Gujarat Vadodara India Department of Data Science & Mathamatics Bangalore India RIMT University Department of CSE Godindgarh Mandi India PSNA College of Engineering and Technology Department of Computer Applications Dindigul India Galgotias University Department of Computer Application Uttar Pradesh Greater Noida India School of Modern Media UPES Dehradun India
Data storage presents substantial issues due to concerns about data security and privacy. In this study, we provide a search-based, interoperable, verified public key cryptography system. The searchability is signific... 详细信息
来源: 评论
Assessing the Robustness of Machine Learning Algorithms against Emerging Privacy and Security Threats in Medical applications
Assessing the Robustness of Machine Learning Algorithms agai...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Srikrishna Baskar Rao Sarbojeet Goswami Manish Kumar Goyal Department of Aerospace Engineering School of Engineering and Technology JAIN (Deemed to be University) Bangalore Karnataka India Department of optometry ARKA JAIN University Jamshedpur Jharkhand India Department of Computer Science & Application Vivekananda Global University Jaipur India
Using gadgets to realize algorithms in medical packages can provide new insights and talents, including new approaches to diagnose illnesses or reveal treatments. Rising privacy and security threats pose potential dan... 详细信息
来源: 评论
Correlation Between 3D Magnetic Resonance Imaging and Clinical Outcomes in Traumatic Brain Injury
Correlation Between 3D Magnetic Resonance Imaging and Clinic...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: H. Srikantha Ginu Anie Joseph Surendra Yadav Department of Civil Engineering School of Engineering and Technology JAIN (Deemed to be University) Bangalore Karnataka India Department of Nursing ARKA JAIN University Jamshedpur Jharkhand India Department of Computer Science & Application Vivekananda Global University Jaipur India
This article identifies a correlation between the 3D Magnetic Resonance Imaging (MR) of patients with worrying brain harm (TBI) and the patient’s medical results. The research team compares 3-D MR imaging outcomes wi... 详细信息
来源: 评论
Exploring Consumer Behavior in E-Commerce with AI Personalization and Market Trends Analysis Models
Exploring Consumer Behavior in E-Commerce with AI Personaliz...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Gaurav Kumar G. Devayani C Saraswathi R. Melba Kani Sandeep Dongre M. S. Mohamed Mallick School of Computer Application Lovely Professional University Phagwara India Department of Computer Science and Business Systems M.Kumarasamy College of Engineering Karur India School of Management Studies Bannari Amman Institute of Technology Erode India Master of Business Administration Mar Ephraem college of Engineering and Technology Kanyakumari India Symbiosis Institute of Business Management (SIBM) Constituent of Symbiosis International (Deemed University) Nagpur India Department of Computer Science Engineering Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology (Deemed to be University) Chennai India
Online retailers must monitor and respond to changing consumer trends to stay competitive. AI-driven customization's revolutionary impact on market trends is the focus of this study on online buying and customer b... 详细信息
来源: 评论
Enabling Clinical Decision-Making in Smart Healthcare through AI/ML Algorithms
Enabling Clinical Decision-Making in Smart Healthcare throug...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Vikas Kumar Kharbas Y R Meena Praveen Kumar Thakur Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Civil Engineering School of Engineering and Technology JAIN (Deemed to be University) Bangalore Karnataka India Department of Law ARKA JAIN University Jamshedpur Jharkhand India
Using AI/ML algorithms in clever healthcare has emerged as a promising improvement to facilitate green and effective medical choice-making. This novel era uses gadgets mastering and predictive analytics to extract dee... 详细信息
来源: 评论
Exploring Spectrum Sharing Algorithms for 6G Cellular Communication Networks
Exploring Spectrum Sharing Algorithms for 6G Cellular Commun...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Ashutosh Pattanaik Shweta Zahid Ahmed Department of Mechanical Engineering School of Engineering and Technology JAIN (Deemed to be University) Bangalore Karnataka India Department of Pharmacy ARKA JAIN University Jamshedpur Jharkhand India Department of Computer Science & Application Vivekananda Global University Jaipur India
6G cell verbal exchange networks might be the successor to 5G networks, and their success relies heavily upon optimization measures that are enabled through the exploration of spectrum-sharing algorithms (SSAs). SSAs ... 详细信息
来源: 评论
Improving Cancer Prediction in Recommender Systems through Gradient Boosting
Improving Cancer Prediction in Recommender Systems through G...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: Pompi Das Sengupta Vikas Kumar Kharbas H Adarsha Department of Management ARKA JAIN University Jamshedpur Jharkhand India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Mechanical Engineering School of Engineering and Technology JAIN (Deemed to be University) Bangalore Karnataka India
The analysis of various styles of most cancers is frequently reliant on accurate prediction models. Recommender systems are powerful equipment that allows the prediction of cancer development and recurrence based tota... 详细信息
来源: 评论
DHAKR: Learning Deep Hierarchical Attention-Based Kernelized Representations for Graph Classification  39
DHAKR: Learning Deep Hierarchical Attention-Based Kernelized...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Qian, Feifei Bai, Lu Cui, Lixin Li, Ming Lyu, Ziyu Du, Hangyuan Hancock, Edwin School of Artificial Intelligence Engineering Research Center of Intelligent Technology and Educational Application Ministry of Education Beijing Normal University Beijing China School of Information Central University of Finance and Economics Beijing China Zhejiang Key Laboratory of Intelligent Education Technology and Application Zhejiang Normal University Jinhua China Zhejiang Institute of Optoelectronics Jinhua China School of Cyber Science and Technology Sun Yat-Sen University Shenzhen China School of Computer and Information Technology Shanxi University Taiyuan China Department of Computer Science University of York York United Kingdom
Graph-based representations are powerful tools for analyzing structured data. In this paper, we propose a novel model to learn Deep Hierarchical Attention-Based Kernelized Representations (DHAKR) for graph classificat... 详细信息
来源: 评论
Human-computer Interaction and Knowledge Transfer: Study of E-Learning Achievement
Human-Computer Interaction and Knowledge Transfer: Study of ...
收藏 引用
International Conference of computer and Informatics Engineering (IC2IE)
作者: Doni Purnama Alamsyah Norfaridatul Ahkmaliah Othman Johan Muliadi Kerta Doni Morika Yudi Ramdhani Creativepreneurship Department BINUS Business School Bina Nusantara University Jakarta Indonesia Department of Management Technology Universiti Teknikal Malaysia Melaka Melaka Malaysia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia Design Interior Department School of Design Bina Nusantara University Jakarta Indonesia Information System Program Satu University Bandung Indonesia
Human-computer interaction influences the effectiveness of e-learning knowledge transfer, so it is necessary to pay attention to user engagement and achievement. The aim of this research is to examine the factors that... 详细信息
来源: 评论