咨询与建议

限定检索结果

文献类型

  • 1,029 篇 期刊文献
  • 991 篇 会议
  • 13 册 图书

馆藏范围

  • 2,033 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,199 篇 工学
    • 757 篇 计算机科学与技术...
    • 602 篇 软件工程
    • 296 篇 信息与通信工程
    • 183 篇 控制科学与工程
    • 162 篇 生物工程
    • 149 篇 电气工程
    • 148 篇 电子科学与技术(可...
    • 138 篇 生物医学工程(可授...
    • 108 篇 光学工程
    • 85 篇 网络空间安全
    • 76 篇 化学工程与技术
    • 73 篇 材料科学与工程(可...
    • 67 篇 机械工程
    • 57 篇 动力工程及工程热...
    • 56 篇 仪器科学与技术
    • 51 篇 交通运输工程
    • 48 篇 安全科学与工程
  • 829 篇 理学
    • 323 篇 物理学
    • 290 篇 数学
    • 228 篇 生物学
    • 107 篇 化学
    • 107 篇 统计学(可授理学、...
  • 329 篇 管理学
    • 201 篇 管理科学与工程(可...
    • 130 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 188 篇 医学
    • 133 篇 临床医学
    • 120 篇 基础医学(可授医学...
    • 75 篇 公共卫生与预防医...
    • 50 篇 药学(可授医学、理...
  • 76 篇 法学
    • 67 篇 社会学
  • 54 篇 农学
  • 44 篇 教育学
  • 35 篇 经济学
  • 19 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 deep learning
  • 59 篇 accuracy
  • 50 篇 machine learning
  • 40 篇 artificial intel...
  • 36 篇 feature extracti...
  • 31 篇 training
  • 29 篇 internet of thin...
  • 29 篇 convolutional ne...
  • 27 篇 computational mo...
  • 25 篇 optimization
  • 23 篇 predictive model...
  • 22 篇 real-time system...
  • 21 篇 computer science
  • 21 篇 data mining
  • 20 篇 security
  • 19 篇 support vector m...
  • 18 篇 data models
  • 17 篇 scalability
  • 17 篇 magnetic resonan...
  • 17 篇 education

机构

  • 48 篇 vivekananda glob...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 42 篇 maharishi school...
  • 41 篇 kirchhoff-instit...
  • 41 篇 department of co...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 ochanomizu unive...
  • 38 篇 graduate school ...
  • 38 篇 department physi...
  • 37 篇 fakultät für phy...
  • 37 篇 deutsches elektr...

作者

  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 m. klein
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert
  • 33 篇 a. e. c. coimbra

语言

  • 1,816 篇 英文
  • 190 篇 其他
  • 26 篇 中文
  • 4 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Mobile Application & Technology Program Computer Science Department School of Computer Science"
2033 条 记 录,以下是871-880 订阅
排序:
Splicing Image Forgery Detection by Deploying Deep Learning Model  1
Splicing Image Forgery Detection by Deploying Deep Learning ...
收藏 引用
1st IEEE International Conference on Automation, Computing and Renewable Systems, ICACRS 2022
作者: Krishnamoorthy, N. Amuthadevi, C. Geedtha, M.K. Reddy, Poli Lokeshwara Anitha Rani, K.S. Gopinathan, R. Department of Masters in Computer Application SRM Institute of Science and Technology Ramapuram Campus Tamil Nadu Chennai600089 India Department of Computational Intelligence SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India Department of Information Technology Vel Tech Multi Tech Dr. Rangarajan Dr. Sakunthala Engineering College Tamil Nadu Chennai600062 India Department of Electronics and Communication Engineering Anurag University Telangana Hyderabad500088 India School of CSA REVA University Karnataka Bangalore560064 India Department of Mechatronics Engineering Sri Krishna College of Engineering and Technology Tamil Nadu Coimbatore641008 India
The use of digital images has become more important in numerous industries, including journalism, medical diagnosis, law enforcement, and forensics. Images could be easily modified due to the availability of photo-alt... 详细信息
来源: 评论
Graph Neural Networks for Graphs with Heterophily: A Survey
arXiv
收藏 引用
arXiv 2022年
作者: Zheng, Xin Wang, Yi Liu, Yixin Li, Ming Zhang, Miao Jin, Di Yu, Philip S. Pan, Shirui Monash University Melbourne Australia The Department of Computer Science Zhejiang Normal University Jinhua China Monash University Melbourne Australia The Key Laboratory of Intelligent Education Technology Application of Zhejiang Province Zhejiang Normal University Jinhua China Shenzhen China The School of Computer Science and Technology Tianjin University Tianjin China The Department of Computer Science University of Illinois at Chicago Chicago United States Griffith University QLD Australia
Recent years have witnessed fast developments of graph neural networks (GNNs) that have benefited myriads of graph analytic tasks and applications. In general, most GNNs depend on the homophily assumption that nodes b... 详细信息
来源: 评论
A Novel Approach of Ecommerce for Sales Prediction Using Hybrid ABC and AdaBoost Approach
A Novel Approach of Ecommerce for Sales Prediction Using Hyb...
收藏 引用
Electronics, Computing, Communication and Control technology (ICECCC), International Conference on
作者: N. Kogila R. Rajkumar Sudha Rajesh S. Vennila Department of Commerce B. S. Abdur Rahman Crescent Institute of Science & Technology Chennai Tamil Nadu India Department of Commerce St. Joseph's College of Arts & Science (Autonomous) (Affiliated to Annamalai University Chidambaram) Cuddalore Tamil Nadu India Department of Computational SRMIST Kattankulathur Intelligence School of Computing Chennai Tamil Nadu India Department of Computer Application St. Ann's College of Arts & Science (Affiliated to Annamalai University) Tindivanam Tamil Nadu India
For online stores to offer speedier shipping times, precise sales forecasting is essential. Online advertising campaigns and the competitive nature of comparable but distinct products are only two of many potential va... 详细信息
来源: 评论
Empirical Analysis of Prediction of Crime and Forecasting With IGWO-SVM Approach
Empirical Analysis of Prediction of Crime and Forecasting Wi...
收藏 引用
International Conference on Edge Computing and applications (ICECAA)
作者: R Vasuki Neha Ganvir Rohita Sharma K Senthil Kumar SVHN Krishna Kumari Kamlesh Singh Department of Computer Application Mannar Thirumalai Naicker College Madurai Tamilnadu India KJ College of Engineering and Management Pune Maharashtra India Fine Arts Lovely Professional University Punjab India Department of and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology Chennai Tamil Nadu India Department of CSE (Artificial Intelligence and Machine Learning) Vardhaman College of Engineering Telangana India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India
In order to understand the nuances of the crime data from recent years, in-depth analysis is necessary. Involved parties in law enforcement will benefit from this procedure in terms of making arrests and guiding effor...
来源: 评论
Multi-view clustering guided by unconstrained non-negative matrix factorization
收藏 引用
Knowledge-Based Systems 2023年 266卷
作者: Deng, Ping Li, Tianrui Wang, Dexian Wang, Hongjun Peng, Hong Horng, Shi-Jinn School of Computer and Software Engineering Xihua University Chengdu610039 China School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China Manufacturing Industry Chains Collaboration and Information Support Technology Key Laboratory of Sichuan Province Chengdu611756 China Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei106 Taiwan
Multi-view clustering based on non-negative matrix factorization (NMFMvC) is a well-known method for handling high-dimensional multi-view data. To satisfy the non-negativity constraint of the matrix, NMFMvC is usually... 详细信息
来源: 评论
A Deep Learning Aided Intelligent Framework for Condition Monitoring of Electrical Machinery
A Deep Learning Aided Intelligent Framework for Condition Mo...
收藏 引用
Devices for Integrated Circuit (DevIC)
作者: Biswarup Ganguly Radha Kumari Ray Arunava Chatterjee Subho Paul Electrical Engineering Department Meghnad Saha Institute of Technology Kolkata India Application Development Associate Accenture Kolkata India Electrical Engineering Department Raghunathpur Govt. Polytechnic Purulia India School of Electrical Engineering and Computer Science Washington State University Pullman WA USA
Single-phase induction motors (SPIM) are fairly efficiently employed in household devices and possess wide applications in the industrial system. Typically, current signature-analysis (CSA) based methods have been use... 详细信息
来源: 评论
An Analysis of mobile Security Protocols in Wireless Sensor Networks
An Analysis of Mobile Security Protocols in Wireless Sensor ...
收藏 引用
Smart Generation Computing, Communication and Networking (SMART GENCON), International Conference on
作者: Sheril. S Priyanka D. More Rahul Mishra Neeraj Das Ramachandran T Zahid Ahmed Department of Mechanical Engineering Prince Shri Venkateshwara Padmavathy Engineering College Chennai Department of Computer Engineering Vishwakarma Institute of Information Technology Pune India Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and technology Chitkara University Punjab India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Department of Mechanical Engineering Faculty of Engineering and Technology Bangalore Karnataka India Department of Computer Science & Application Vivekananda Global University Jaipur India
This examines examines the cutting-edge state of security protocols for wi-fi sensor networks within the mobile communications area. We examine the performance of present protection protocols for wi-fi sensor networks...
来源: 评论
Reconstructing suspended sediment concentrations in the Mekong River Basin via semi-supervised-based deep neural networks
收藏 引用
science of the Total Environment 2024年 955卷 176758页
作者: Nguyen, Thi Thu Ha Vu, Duc Quang Doan, Ngoc Phu Chi, Huynh Thi Khanh Li, Peixin Binh, Doan Van An, Yimeng Dung, Pham Tuan Hoang, Tuan A. Son, Mai Thai Laboratory of Environmental Sciences and Climate Change Institute for Computational Science and Artificial Intelligence Van Lang University Ho Chi Minh City Viet Nam Faculty of Environment School of Technology Van Lang University Ho Chi Minh City Viet Nam Department of Computer Science and Information System Thai Nguyen University of Education Viet Nam School of Electronics Electrical Engineering and Computer Science Queen's University Belfast United Kingdom College of Economics and Management Nanjing University of Aeronautics and Astronautics China Master program in Water Technology Reuse and Management Faculty of Engineering Vietnamese-German University Binh Duong Province Ben Cat City Viet Nam
The Mekong River Basin (MRB) is crucial for the livelihoods of over 60 million people across six Southeast Asian countries. Understanding long-term sediment changes is crucial for management and contingency plans, but... 详细信息
来源: 评论
Pinching Antennas: Principles, applications and Challenges
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Zheng Wang, Ning Sun, Yanshi Ding, Zhiguo Schober, Robert Karagiannidis, George K. Wong, Vincent W.S. Dobre, Octavia A. Fujian Provincial Engineering Technology Research Center of Photoelectric Sensing Application Fujian Normal University Fuzhou350117 China School of Information and Control Engineering China University of Mining and Technology Xuzhou221116 China School of Computer Science and Information Engineering Hefei University of Technology Hefei230009 China Khalifa University Abu Dhabi United Arab Emirates University of Manchester ManchesterM1 9BB United Kingdom Germany Group Electrical & Computer Engineering Dept. Aristotle University of Thessaloniki Thessaloniki54 124 Greece Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada Department of Electrical and Computer Engineering Memorial University St. John’sNL Canada
Flexible-antenna systems, such as fluid antennas and movable antennas, have been recognized as key enabling technologies for sixth-generation (6G) wireless networks, as they can intelligently reconfigure the effective... 详细信息
来源: 评论
Any Bluetooth device can be hacked. Know how?
Cyber Security and Applications
收藏 引用
Cyber Security and applications 2024年 2卷
作者: Muraleedhara, Prathibha Christo, Mary Subaja J, Jaya Yuvasini  D College of Technology – Information Security and Program Management University of Houston 77204 TX United States Department of Networking and Communication School of Computing SRM Institute of Science and Technology Kantankulathur Chennai India Department of Electronics and Communication Engineering Hindustan College of Engineering and Technology India Assistant Professor Department of Computer Science and Business Systems Thiagarajar College of Engineering Madurai 625015 India
In today's world, Bluetooth technology is integrated into almost every device we use, from wireless headsets, mice, and keyboards to cars and smart home devices. But with the convenience of this technology comes t... 详细信息
来源: 评论