咨询与建议

限定检索结果

文献类型

  • 22,990 篇 会议
  • 12,363 篇 期刊文献
  • 448 册 图书

馆藏范围

  • 35,801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,276 篇 工学
    • 17,539 篇 计算机科学与技术...
    • 14,489 篇 软件工程
    • 5,131 篇 信息与通信工程
    • 3,280 篇 控制科学与工程
    • 2,871 篇 生物工程
    • 2,207 篇 电气工程
    • 2,003 篇 生物医学工程(可授...
    • 1,714 篇 光学工程
    • 1,641 篇 电子科学与技术(可...
    • 1,251 篇 机械工程
    • 1,093 篇 网络空间安全
    • 917 篇 安全科学与工程
    • 869 篇 动力工程及工程热...
    • 859 篇 化学工程与技术
    • 828 篇 仪器科学与技术
    • 798 篇 交通运输工程
  • 11,398 篇 理学
    • 6,274 篇 数学
    • 3,170 篇 生物学
    • 2,746 篇 物理学
    • 1,978 篇 统计学(可授理学、...
    • 1,200 篇 系统科学
    • 999 篇 化学
  • 6,598 篇 管理学
    • 3,815 篇 管理科学与工程(可...
    • 3,076 篇 图书情报与档案管...
    • 1,750 篇 工商管理
  • 2,090 篇 医学
    • 1,670 篇 临床医学
    • 1,503 篇 基础医学(可授医学...
    • 1,034 篇 公共卫生与预防医...
    • 882 篇 药学(可授医学、理...
  • 1,337 篇 法学
    • 1,113 篇 社会学
  • 599 篇 经济学
  • 508 篇 农学
  • 469 篇 教育学
  • 231 篇 文学
  • 65 篇 艺术学
  • 57 篇 军事学
  • 13 篇 哲学
  • 5 篇 历史学

主题

  • 1,156 篇 deep learning
  • 1,144 篇 accuracy
  • 882 篇 computer science
  • 844 篇 computational mo...
  • 788 篇 feature extracti...
  • 743 篇 training
  • 732 篇 machine learning
  • 548 篇 semantics
  • 539 篇 predictive model...
  • 475 篇 data models
  • 468 篇 internet of thin...
  • 453 篇 real-time system...
  • 438 篇 support vector m...
  • 428 篇 convolutional ne...
  • 358 篇 artificial intel...
  • 321 篇 optimization
  • 313 篇 scalability
  • 302 篇 computer archite...
  • 285 篇 reliability
  • 273 篇 data mining

机构

  • 587 篇 school of comput...
  • 231 篇 institute of com...
  • 198 篇 department of co...
  • 175 篇 school of comput...
  • 160 篇 department of co...
  • 149 篇 department of co...
  • 147 篇 department of co...
  • 139 篇 school of comput...
  • 137 篇 school of comput...
  • 130 篇 school of comput...
  • 126 篇 school of comput...
  • 122 篇 department of co...
  • 119 篇 school of comput...
  • 118 篇 school of comput...
  • 114 篇 college of intel...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 school of comput...
  • 102 篇 school of comput...
  • 102 篇 key laboratory o...

作者

  • 137 篇 hai jin
  • 131 篇 niyato dusit
  • 125 篇 jin hai
  • 108 篇 zheng wei-shi
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 82 篇 anjali t.
  • 82 篇 díaz a.f.
  • 72 篇 kalekin o.
  • 69 篇 boumaaza j.
  • 60 篇 huang f.
  • 60 篇 coleiro a.
  • 56 篇 kulikovskiy v.
  • 55 篇 zhang lei
  • 54 篇 gozzini s.r.
  • 53 篇 benoit d.m.

语言

  • 29,690 篇 英文
  • 5,898 篇 其他
  • 284 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Computing"
35801 条 记 录,以下是131-140 订阅
排序:
Analysis of Cardiac Disease based on AI Prediction Techniques using data analytics approach  4
Analysis of Cardiac Disease based on AI Prediction Technique...
收藏 引用
4th International Conference on Soft computing for Security Applications, ICSCSA 2024
作者: Sivanathbabu, R. Kamalakkannan, S. School of Computing Sciences Department of Computer Science Chennai India School of Computing Sciences Department of Information Technology Chennai India
Patients who have an increased likelihood of coronary heart disease can reduce their consequences by changing their lifestyle, with the support of early diagnosis. Healthcare expenses are rising above, both company bu... 详细信息
来源: 评论
Enhancing Secure Data Transmission Through Deep Learning-Based Image Steganography and Super-Resolution Generative Adversarial Networks
收藏 引用
SN computer science 2024年 第8期5卷 1-15页
作者: Ramesh, Sreyas Sukanth, B.N. Jaswanth, Sathyavarapu Sri Singh, Rimjhim Padam Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
In the era of multimedia technology digital images are essential and keeping them safe from unauthorised access is crucial. To address this issue, the proposed research explores the intersection of image steganography... 详细信息
来源: 评论
Convergence of Deep Learning and Forensic Methodologies Using Self-attention Integrated EfficientNet Model for Deep Fake Detection
收藏 引用
SN computer science 2024年 第8期5卷 1-12页
作者: Singh, Rimjhim Padam Sree, Nichenametla Hima Reddy, Koti Leela Sai Praneeth Jashwanth, Kandukuri Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
The immensely increasing number of Deepfake technologies poses significant challenges to digital media integrity, leading to the immediate need for effective Deepfake detection methods. In light of the growing threat ... 详细信息
来源: 评论
A Novel Preprocessing Technique to Aid the Detection of Infected Areas of CT Images in COVID-19 Patients Artificial Intelligence (AI) for Communication Systems  2
A Novel Preprocessing Technique to Aid the Detection of Infe...
收藏 引用
2nd IEEE International Conference on Trends in Quantum computing and Emerging Business Technologies, TQCEBT 2024
作者: Kalaivani, J. Arunachalam, A.S. Gobinath, R. School of Computing Sciences Department of Computer Science Chennai India Christ University Department of Computer Science Bengaluru India
An innovative preprocessing method for discerning infected areas in CT images of COVID-19 is described in this abstract. The methodology being suggested exploits the capabilities of artificial intelligence (AI) to imp... 详细信息
来源: 评论
Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication:Progress, Insights and Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第7期11卷 1539-1556页
作者: Weihao Song Zidong Wang Zhongkui Li Jianan Wang Qing-Long Han IEEE the State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering ScienceCollege of Engineering Peking University the Department of Computer Science Brunel University London the School of Aerospace Engineering Beijing Institute of Technology the School of Science Computing and Engineering Technologies Swinburne University of Technology
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical *** main objective of nonlinear filtering is to i... 详细信息
来源: 评论
A Multi-path Droplet Routing Protocol for Digital Microfluidic Biochip
收藏 引用
Informatica (Slovenia) 2024年 第7期48卷 95-102页
作者: Swain, Jyotiranjan Pyne, Sumanta School of Computing and Information Technology REVA University Bangalore India Department of Computer Science and Engineering National Institute of Technology Rourkela India
Digital microfluidic biochip provides an alternative platform to synthesize the biochemical protocols. Droplet routing in biochemical synthesis involves moving multiple droplets across the biochip simultaneously. It i... 详细信息
来源: 评论
IoT-Based Fire Alarm System and Motion Detector: A Comprehensive Protocol Analysis for Enhanced Performance  9
IoT-Based Fire Alarm System and Motion Detector: A Comprehen...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Samudrala, Sai Santhoshi Haneesha Thambi, Jaishitha Vadluri, Sai Rishisri Rajagopal, Shinu M. Bhaskaran, Sreebha Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bangalore India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bengaluru India
Fire alarm systems play a vital role in providing early warnings, facilitating prompt evacuation in emergency situations. These systems ensure the security of individuals by alerting them to possible risks and allowin... 详细信息
来源: 评论
Multi-view stereo algorithms based on deep learning: a survey
收藏 引用
Multimedia Tools and Applications 2025年 第6期84卷 2877-2908页
作者: Huang, Hongbo Yan, Xiaoxu Zheng, Yaolin He, Jiayu Xu, Longfei Qin, Dechun Computer School Beijing Information Science & Technology University Beijing China Institute of Computing Intelligence Beijing Information Science & Technology University Beijing China Foreign Languages School Beijing Information Science & Technology University Beijing China
Multi-View Stereo (MVS) is a long-standing and fundamental task in computer vision, which aims to reconstruct the 3D geometry of a scene from a set of overlapping images. With known camera parameters, MVS matches pixe... 详细信息
来源: 评论
AST-Based and Token-Based Neural Networks for Source Code Classification: A Comparative Performance Analysis  15
AST-Based and Token-Based Neural Networks for Source Code Cl...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Parvathy, R. Thushara, Mg Amrita School of Computing Department of Computer Science & Engineering Amrita vishwa Vidyapeetham Amritapuri India Amrita School of Computing Department of Computer Science & Applications Amrita vishwa Vidyapeetham Amritapuri India
Programming languages function as a medium for expressing instructions in the context of computer program creation. A prevalent convention in programming is categorizing source code into fragments, a strategy that enh... 详细信息
来源: 评论
A blockchain-empowered authentication scheme for worm detection in wireless sensor network
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 265-272页
作者: Yuling Chen Xiong Yang Tao Li Yi Ren Yangyang Long State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Computing Science University of East AngliaNorwichNR57TJUK
Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and *** special structure of WSN brings both convenience and *** example,a malicious participa... 详细信息
来源: 评论