咨询与建议

限定检索结果

文献类型

  • 20,159 篇 会议
  • 12,927 篇 期刊文献
  • 314 册 图书

馆藏范围

  • 33,400 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,710 篇 工学
    • 14,371 篇 计算机科学与技术...
    • 11,922 篇 软件工程
    • 4,777 篇 信息与通信工程
    • 3,240 篇 控制科学与工程
    • 2,688 篇 生物工程
    • 2,672 篇 电气工程
    • 2,179 篇 电子科学与技术(可...
    • 2,043 篇 生物医学工程(可授...
    • 1,738 篇 光学工程
    • 1,356 篇 机械工程
    • 1,242 篇 化学工程与技术
    • 1,180 篇 动力工程及工程热...
    • 1,031 篇 网络空间安全
    • 1,023 篇 仪器科学与技术
    • 979 篇 材料科学与工程(可...
    • 946 篇 安全科学与工程
  • 11,861 篇 理学
    • 5,849 篇 数学
    • 3,834 篇 物理学
    • 2,991 篇 生物学
    • 2,013 篇 统计学(可授理学、...
    • 1,360 篇 化学
    • 1,244 篇 系统科学
  • 5,560 篇 管理学
    • 3,397 篇 管理科学与工程(可...
    • 2,389 篇 图书情报与档案管...
    • 1,504 篇 工商管理
  • 2,195 篇 医学
    • 1,758 篇 临床医学
    • 1,583 篇 基础医学(可授医学...
    • 1,062 篇 公共卫生与预防医...
    • 954 篇 药学(可授医学、理...
  • 1,164 篇 法学
    • 958 篇 社会学
  • 598 篇 经济学
  • 512 篇 农学
  • 373 篇 教育学
  • 205 篇 文学
  • 64 篇 军事学
  • 43 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 1,167 篇 accuracy
  • 1,113 篇 deep learning
  • 733 篇 computational mo...
  • 714 篇 machine learning
  • 692 篇 training
  • 684 篇 feature extracti...
  • 526 篇 real-time system...
  • 521 篇 predictive model...
  • 474 篇 internet of thin...
  • 455 篇 convolutional ne...
  • 439 篇 support vector m...
  • 412 篇 data models
  • 346 篇 semantics
  • 294 篇 computer science
  • 285 篇 reliability
  • 281 篇 optimization
  • 271 篇 artificial intel...
  • 264 篇 computer archite...
  • 262 篇 scalability
  • 261 篇 neural networks

机构

  • 217 篇 school of comput...
  • 190 篇 department of co...
  • 158 篇 university of ch...
  • 154 篇 key laboratory o...
  • 128 篇 university of sc...
  • 127 篇 school of comput...
  • 121 篇 department of co...
  • 121 篇 institute of com...
  • 119 篇 school of comput...
  • 118 篇 school of comput...
  • 112 篇 department of co...
  • 111 篇 school of comput...
  • 111 篇 school of comput...
  • 101 篇 college of compu...
  • 97 篇 school of comput...
  • 97 篇 school of comput...
  • 95 篇 tianfu cosmic ra...
  • 95 篇 department of co...
  • 93 篇 north-west unive...
  • 92 篇 national enginee...

作者

  • 171 篇 niyato dusit
  • 104 篇 bastieri d.
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 chen a.
  • 94 篇 calvo d.
  • 87 篇 gal t.
  • 86 篇 bozza c.
  • 84 篇 anjali t.
  • 83 篇 zheng wei-shi
  • 75 篇 fang j.
  • 75 篇 feng c.f.
  • 69 篇 li xin
  • 69 篇 díaz a.f.
  • 67 篇 jiang k.
  • 66 篇 kuleshov d.
  • 64 篇 li cheng
  • 64 篇 liu d.
  • 64 篇 kalekin o.
  • 63 篇 chen m.j.

语言

  • 27,470 篇 英文
  • 5,686 篇 其他
  • 303 篇 中文
  • 6 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing Science and Engineering School Of Computing Science & Engineering"
33400 条 记 录,以下是531-540 订阅
排序:
Consumer Behaviour Analysis for Customer Segmentation and Purchase Prediction  10
Consumer Behaviour Analysis for Customer Segmentation and Pu...
收藏 引用
10th International Conference on Advanced computing and Communication Systems, ICACCS 2024
作者: Gopakumar, Amritha Shine, Aathira Ajim, Amina Anjali, T. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
E-commerce, short for electronic commerce, is the practice of placing orders online or negotiating a sale's terms and price. Although e-commerce is often associated with selling products and services to consumers,... 详细信息
来源: 评论
Enhanced CNN Architecture with Comprehensive Performance Metrics for Emotion Recognition  1
收藏 引用
13th International Conference on Information Systems and Advanced Technologies, ICISAT 2023
作者: Ravichandran, M. Bharathi, P. Praveenna Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Engaging gameplay in video games provides a wide array of advantages, encompassing entertainment and personal growth. Immersive gaming experiences often stem from games that adapt to the player’s emotional state. In ... 详细信息
来源: 评论
A Homomorphic Encryption Compiler for Blood Pressure Analysis  3
A Homomorphic Encryption Compiler for Blood Pressure Analysi...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Balaji, Varshini Kannan, Srinidhi Suryamritha, M. Belwal, Meena Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
The growing concern for data privacy, particularly in the medical domain, underscores the necessity of encrypting sensitive medical information to prevent unauthorized access and misuse. Homomorphic Encryption (HE) pr... 详细信息
来源: 评论
Continuous Sign Language Recognition using Convolutional Neural Network  2
Continuous Sign Language Recognition using Convolutional Neu...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Shankara Narayanan, V. Sneha Varsha, M. Padmavathi, S. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore India
Automatic Continuous Sign Language Recognition is a task that aims at associating words/phrases for sign language gestures. The scope of building a CSLR framework extends beyond bridging the communication barrier betw... 详细信息
来源: 评论
BiT5: A Bidirectional NLP Approach for Advanced Vulnerability Detection in Codebase  5
BiT5: A Bidirectional NLP Approach for Advanced Vulnerabilit...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Prabith, G.S. Rohit Narayanan, M. Arya, A. Aneesh Nadh, R. Binu, P.K. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India Department of Computer Science and Applications Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
In this research paper, a detailed investigation presents the utilization of the BiT5 Bidirectional NLP model for detecting vulnerabilities within codebases. The study addresses the pressing need for techniques enhanc... 详细信息
来源: 评论
Encryption scheme using Mealy Machine  5
Encryption scheme using Mealy Machine
收藏 引用
5th IEEE Global Conference for Advancement in Technology, GCAT 2024
作者: Ramasubbu, Hemanth Silaparasetty, Sricharan Bhakuni, Mehul Singh Panda, Niharika Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
This novel encryption scheme leverages a Mealy machine for dynamic encryption. To significantly enhance data security, it enforces strong key requirements (with mixed uppercase letters, digits, and special characters)... 详细信息
来源: 评论
Design and Implementation of the Dynamic Source Routing Protocol with Packet Numbering for Efficient Route Discovery, Improved Packet Delivery and Routing Optimization in Dynamic Network Scenarios  13
Design and Implementation of the Dynamic Source Routing Prot...
收藏 引用
13th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2024
作者: Kannan, Srinidhi Suryamritha, M. Balaji, Varshini Rajesh, M. Sreevidya, B. Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Dynamic Source Routing (DSR) protocol is mostly used in the wireless mesh network, where all the nodes are in a mesh topology, it is also used in Mobile ad-hoc Networks (MANETs). As it is in mesh topology that the com... 详细信息
来源: 评论
Investigating Natural Language Techniques for Accurate Noun and Verb Extraction  2
Investigating Natural Language Techniques for Accurate Noun ...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Nair, Reshma P. Thushara, M.G. Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amrita School of Computing Amritapuri India Department of Computer Science and Applications Amrita Vishwa Vidyapeetham Amrita School of Computing Amritapuri India
Natural language processing (NLP) has witnessed significant advancements in recent decades. Automatically classifying parts of speech, like nouns and verbs, from textual input has transformed text analysis and languag... 详细信息
来源: 评论
Optimizing 802.11 MAC Protocol: A Design and Implementation Approach for Improved Throughput, Efficiency, QoS, and Reduced Latency in Low Contention Networks for Voice and Video Communication
Optimizing 802.11 MAC Protocol: A Design and Implementation ...
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable Technology, ICRISST 2024
作者: Pandey, Mayank Kunda, Naga Sai Shreya Pranave, K.C. Rajesh, M. Sreevidya, B. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
This study suggests modifications to the already existing IEEE 802.11 MAC protocol, by proposing the elimination of the back-off period following collisions and recommending the use of Distributed Inter-Frame Space (D... 详细信息
来源: 评论
A Construction of Secure and Efficient Authenticated Key Exchange Protocol for Deploying Internet of Drones in Smart City  1st
A Construction of Secure and Efficient Authenticated Key E...
收藏 引用
1st International Conference on Artificial Intelligence of Things, ICAIoT 2023
作者: Chaudhary, Dharminder Soni, Tanmay Singh, Soumyendra Gupta, Surisetty Mahesh Chandra Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
The concept of a smart city is increasing because of the demand for intelligent drones. So, the Internet of Drones came into picture, providing several benefits/services for daily life. Services that IoD offers are mo... 详细信息
来源: 评论