咨询与建议

限定检索结果

文献类型

  • 20,415 篇 会议
  • 13,181 篇 期刊文献
  • 314 册 图书

馆藏范围

  • 33,910 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,980 篇 工学
    • 14,670 篇 计算机科学与技术...
    • 12,071 篇 软件工程
    • 4,961 篇 信息与通信工程
    • 3,419 篇 控制科学与工程
    • 2,781 篇 电气工程
    • 2,696 篇 生物工程
    • 2,191 篇 电子科学与技术(可...
    • 2,059 篇 生物医学工程(可授...
    • 1,789 篇 光学工程
    • 1,381 篇 机械工程
    • 1,257 篇 化学工程与技术
    • 1,213 篇 动力工程及工程热...
    • 1,111 篇 网络空间安全
    • 1,055 篇 仪器科学与技术
    • 997 篇 安全科学与工程
    • 936 篇 材料科学与工程(可...
  • 12,052 篇 理学
    • 5,890 篇 数学
    • 3,915 篇 物理学
    • 3,006 篇 生物学
    • 2,010 篇 统计学(可授理学、...
    • 1,400 篇 化学
    • 1,247 篇 系统科学
  • 5,714 篇 管理学
    • 3,524 篇 管理科学与工程(可...
    • 2,450 篇 图书情报与档案管...
    • 1,528 篇 工商管理
  • 2,257 篇 医学
    • 1,792 篇 临床医学
    • 1,596 篇 基础医学(可授医学...
    • 1,097 篇 公共卫生与预防医...
    • 956 篇 药学(可授医学、理...
  • 1,186 篇 法学
    • 978 篇 社会学
  • 612 篇 经济学
  • 521 篇 农学
  • 383 篇 教育学
  • 216 篇 文学
  • 65 篇 军事学
  • 43 篇 艺术学
  • 7 篇 哲学
  • 4 篇 历史学

主题

  • 1,194 篇 accuracy
  • 1,165 篇 deep learning
  • 757 篇 machine learning
  • 744 篇 computational mo...
  • 706 篇 training
  • 695 篇 feature extracti...
  • 544 篇 real-time system...
  • 534 篇 predictive model...
  • 483 篇 internet of thin...
  • 468 篇 convolutional ne...
  • 447 篇 support vector m...
  • 430 篇 data models
  • 344 篇 semantics
  • 294 篇 computer science
  • 293 篇 reliability
  • 283 篇 artificial intel...
  • 280 篇 optimization
  • 268 篇 scalability
  • 267 篇 neural networks
  • 261 篇 computer archite...

机构

  • 235 篇 school of comput...
  • 204 篇 department of co...
  • 166 篇 university of ch...
  • 157 篇 key laboratory o...
  • 128 篇 university of sc...
  • 122 篇 school of comput...
  • 122 篇 department of co...
  • 118 篇 school of comput...
  • 116 篇 institute of com...
  • 114 篇 school of comput...
  • 113 篇 school of comput...
  • 112 篇 department of co...
  • 108 篇 department of co...
  • 105 篇 school of comput...
  • 103 篇 college of compu...
  • 103 篇 school of comput...
  • 101 篇 school of comput...
  • 96 篇 north-west unive...
  • 91 篇 tianfu cosmic ra...
  • 91 篇 national enginee...

作者

  • 176 篇 niyato dusit
  • 105 篇 bastieri d.
  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 chen a.
  • 97 篇 calvo d.
  • 86 篇 gal t.
  • 86 篇 bozza c.
  • 82 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 72 篇 li xin
  • 69 篇 li cheng
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 65 篇 díaz a.f.
  • 63 篇 liu d.
  • 62 篇 chen m.j.
  • 62 篇 kalekin o.

语言

  • 25,476 篇 英文
  • 8,209 篇 其他
  • 326 篇 中文
  • 7 篇 法文
  • 6 篇 德文
  • 6 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computing Science and Engineering School Of Computing Science & Engineering"
33910 条 记 录,以下是641-650 订阅
排序:
Real-Time Speaker Identification and Subtitle Overlay with Multithreaded Audio Video Processing  5
Real-Time Speaker Identification and Subtitle Overlay with M...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Madamanchi, Sahith Kushal, Gona Ravikumar, Srikesh Dhanvin, Puli Remya, M.S. Nedungadi, Prema Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Amritapuri India
Active Speaker Detection is pivotal in a multitude of applications, particularly in processing live Audio-Video (AV) streams. Current implementations predominantly focus on processing saved video files, limiting their... 详细信息
来源: 评论
Insider threat detection of ransomware using AutoML
Insider threat detection of ransomware using AutoML
收藏 引用
International Conference on Artificial Intelligence, Blockchain, computing and Security, ICABCS 2023
作者: Bhuvaneswari, R. Kumar, Enaganti Karun Padmasini, Annadanam Varma, K. V. Priyanka Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
Insider threats are one of the biggest issues that modern-day organizations and many large-scale companies face. The inside threats are caused by the insiders who are authorized individuals, also may have proper acces... 详细信息
来源: 评论
Malicious URL Detection: Comparative Study of Machine Learning Algorithms  15
Malicious URL Detection: Comparative Study of Machine Learni...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Jaswanthi, Thadakaluru Harshitha, Talluri Tanya, Simhadri Belwal, Meena Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Malicious URLs can be detected by leveraging lexical analysis and machine learning, where the parsed components of the URL are parsed, and its features include domain reputation, URL length, and the presence of suspic... 详细信息
来源: 评论
Design and Implementation of the Dynamic Source Routing Protocol with Packet Numbering for Efficient Route Discovery, Improved Packet Delivery and Routing Optimization in Dynamic Network Scenarios  13
Design and Implementation of the Dynamic Source Routing Prot...
收藏 引用
13th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2024
作者: Kannan, Srinidhi Suryamritha, M. Balaji, Varshini Rajesh, M. Sreevidya, B. Amrita School of Computing Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Bengaluru India
Dynamic Source Routing (DSR) protocol is mostly used in the wireless mesh network, where all the nodes are in a mesh topology, it is also used in Mobile ad-hoc Networks (MANETs). As it is in mesh topology that the com... 详细信息
来源: 评论
Shallow-Sec: Malware Detection in Real-Time Devices using Feature Weightage and Shallow Learning Models  5
Shallow-Sec: Malware Detection in Real-Time Devices using Fe...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Priyanka, Panaganti Udhayakumar Deepak, K. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India
In the domain of mobile security, particularly in APK (Android Application Package) malware detection, ensuring robust threat identification is critical for safeguarding user devices and sensitive data. This study add... 详细信息
来源: 评论
A Graph-Based Approach for Estimating Object Interactions in Surveillance Video Synopsis  2
A Graph-Based Approach for Estimating Object Interactions in...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Sood, Varnika Ray, Santosh Kumar Mahato, Kiran Kumar Sidharth, A.V. Namitha, Kalakunnath Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Video synopsis is a technique that condenses surveillance videos into compact equivalent videos. The objective of this paper is to identify and group related moving objects (also referred to as tubes) in a video using... 详细信息
来源: 评论
YOLOv8-Powered Driver Monitoring: A Scalable and Efficient Approach for Real-Time Distraction Detection  8
YOLOv8-Powered Driver Monitoring: A Scalable and Efficient A...
收藏 引用
8th International Conference on Inventive Computation Technologies, ICICT 2025
作者: Kaif, Abu Santosh, Tiwari Shridhar AshokKumar, C. Jothi Kumar, C. Department of Computing Technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India Department of Computing Technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India Department of Computing Technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India
Driver distraction remains a significant factor in road accidents, necessitating efficient and real-time monitoring systems. This study proposes an advanced driver distraction detection system using YOLOv8. The datase... 详细信息
来源: 评论
Investigating Natural Language Techniques for Accurate Noun and Verb Extraction  2
Investigating Natural Language Techniques for Accurate Noun ...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Nair, Reshma P. Thushara, M.G. Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amrita School of Computing Amritapuri India Department of Computer Science and Applications Amrita Vishwa Vidyapeetham Amrita School of Computing Amritapuri India
Natural language processing (NLP) has witnessed significant advancements in recent decades. Automatically classifying parts of speech, like nouns and verbs, from textual input has transformed text analysis and languag... 详细信息
来源: 评论
Advancing of Microservices Architecture with Dockers  15
Advancing of Microservices Architecture with Dockers
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Sah, Kriti Priya Jain, Nikunj Jha, Priyanshu Hawari, Jawed Beena, B.M. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Docker has revolutionized web hosting. It offers efficiency, scalability, security, and automation. With Docker, businesses and individuals can simplify their hosting. With the help of Docker, the development process ... 详细信息
来源: 评论
Deep Learning based Approach to Streamline Resume Categorization and Ranking  5
Deep Learning based Approach to Streamline Resume Categoriza...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Ramyar, R. Nagarani, Gundapaneni Natarajan, S. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Chennai India
In today's world, a lot people are searching and applying for jobs. When there is a need for company to recruit new employees, it is difficult for them to select the correct resume according to their job descripti... 详细信息
来源: 评论