咨询与建议

限定检索结果

文献类型

  • 16,475 篇 会议
  • 8,697 篇 期刊文献
  • 292 册 图书

馆藏范围

  • 25,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,566 篇 工学
    • 11,828 篇 计算机科学与技术...
    • 9,806 篇 软件工程
    • 3,949 篇 信息与通信工程
    • 2,502 篇 控制科学与工程
    • 2,168 篇 生物工程
    • 1,865 篇 电气工程
    • 1,596 篇 生物医学工程(可授...
    • 1,450 篇 电子科学与技术(可...
    • 1,344 篇 光学工程
    • 964 篇 机械工程
    • 892 篇 网络空间安全
    • 758 篇 安全科学与工程
    • 754 篇 动力工程及工程热...
    • 723 篇 仪器科学与技术
    • 652 篇 交通运输工程
    • 641 篇 化学工程与技术
  • 7,934 篇 理学
    • 4,035 篇 数学
    • 2,382 篇 生物学
    • 2,151 篇 物理学
    • 1,396 篇 统计学(可授理学、...
    • 872 篇 系统科学
    • 737 篇 化学
  • 4,549 篇 管理学
    • 2,757 篇 管理科学与工程(可...
    • 1,991 篇 图书情报与档案管...
    • 1,232 篇 工商管理
  • 1,746 篇 医学
    • 1,374 篇 临床医学
    • 1,261 篇 基础医学(可授医学...
    • 880 篇 公共卫生与预防医...
    • 743 篇 药学(可授医学、理...
  • 971 篇 法学
    • 798 篇 社会学
  • 433 篇 经济学
  • 367 篇 农学
  • 282 篇 教育学
  • 192 篇 文学
  • 38 篇 艺术学
  • 37 篇 军事学
  • 6 篇 哲学
  • 3 篇 历史学

主题

  • 971 篇 deep learning
  • 927 篇 accuracy
  • 659 篇 computational mo...
  • 564 篇 feature extracti...
  • 551 篇 machine learning
  • 539 篇 training
  • 406 篇 internet of thin...
  • 392 篇 predictive model...
  • 385 篇 real-time system...
  • 352 篇 support vector m...
  • 343 篇 convolutional ne...
  • 325 篇 data models
  • 301 篇 semantics
  • 288 篇 computer science
  • 283 篇 computer archite...
  • 260 篇 optimization
  • 238 篇 scalability
  • 237 篇 reliability
  • 233 篇 image segmentati...
  • 229 篇 neural networks

机构

  • 261 篇 school of comput...
  • 243 篇 department of co...
  • 166 篇 school of comput...
  • 149 篇 school of comput...
  • 135 篇 school of comput...
  • 122 篇 department of co...
  • 118 篇 school of comput...
  • 115 篇 institute of com...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 103 篇 department of co...
  • 103 篇 school of comput...
  • 101 篇 college of compu...
  • 100 篇 national enginee...
  • 98 篇 school of comput...
  • 96 篇 department of co...
  • 93 篇 north-west unive...
  • 91 篇 institut univers...
  • 89 篇 department of co...
  • 87 篇 infn sezione di ...

作者

  • 122 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 87 篇 boumaaza j.
  • 84 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 82 篇 coleiro a.
  • 81 篇 gozzini s.r.
  • 78 篇 dallier r.
  • 73 篇 kalekin o.
  • 61 篇 huang f.
  • 61 篇 anguita m.
  • 56 篇 kulikovskiy v.
  • 54 篇 singh kamred udh...
  • 53 篇 benoit d.m.

语言

  • 20,804 篇 英文
  • 4,511 篇 其他
  • 207 篇 中文
  • 5 篇 德文
  • 2 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Computer Engineering"
25464 条 记 录,以下是61-70 订阅
排序:
Object Detection in Shelf Image of the Retail store using Single Stage Detector  2
Object Detection in Shelf Image of the Retail store using Si...
收藏 引用
2nd IEEE International Conference on Recent Advances in Information Technology for Sustainable Development, ICRAIS 2024
作者: Bagyammal, T. Mahesh Madhav, K. Dhiraj Kumar, Y. Arthi Sri, N. Siva Srinivas, V. Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
The primary objective is to develop a robust system for precise object identification on retail shelves, accurate item counting, and product categorization through class detection. This multifaceted approach directly ... 详细信息
来源: 评论
Empowering data structure visualization through modification in Python  15
Empowering data structure visualization through modification...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Puvvadi, Harsha Vardhan Angala, Hari Prasad Swaroop, Bandi Vishnu Reddy, Busa Thanuj Sathwik Belwal, Meena Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
This article introduces a novel approach to data structure visualization through the development of a new programming language, utilizing Python's Lex-YACC library for lexical analysis and parsing, and the Turtle ... 详细信息
来源: 评论
Cyber Chronicles: Tracking Behavior Patterns for Detecting Threats in Large Networks  3
Cyber Chronicles: Tracking Behavior Patterns for Detecting T...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Ramasubbu, Senthilnathan Thangavel, Senthil Kumar Jeyakumar, G. Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
One of the primary challenges in cybersecurity is that even one un-detected, appropriately unanalyzed malicious security event can hide the attack vectors of a potential hacker. It is essential to detect the data brea... 详细信息
来源: 评论
Blockchain-based Decentralized Digital Forensics Case Management System using IPFS  3
Blockchain-based Decentralized Digital Forensics Case Manage...
收藏 引用
3rd IEEE International Conference on Blockchain and Distributed Systems Security, ICBDS 2024
作者: Viswanathan, Jayaraj Kumar, S. Udhaya Amrita School of Computing Department of Computer Science and Engineering Chennai India
Blockchain technology has gained significant attention for its ability to provide a decentralized and immutable platform for various applications. In this paper, we propose a Blockchain based Decentralized Case Manage... 详细信息
来源: 评论
A hybrid memory architecture supporting fine-grained data migration
收藏 引用
Frontiers of computer Science 2024年 第2期18卷 31-41页
作者: Ye CHI Jianhui YUE Xiaofei LIAO Haikun LIU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Department of Computer Science Michigan Technological UniversityMichigan 49931USA
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually... 详细信息
来源: 评论
GAN-Based Federated Adversarial Learning for Enhancing Security Towards Consumer Digital Ecosystems
收藏 引用
IEEE Transactions on Consumer Electronics 2025年 第1期71卷 1102-1114页
作者: Murmu, Anita Kumar, Piyush Namasudra, Suyel Reddy, M Rajasekhar National Institute of Technology Patna Department of Computer Science and Engineering Patna India Bennett University School of Computer Science Engineering and Technology India National Institute of Technology Department of Computer Science and Engineering Patna India National Institute of Technology Agartala Department of Computer Science and Engineering Tripura India Amrita Vishwa Vidyapeetham Amrita School of Computing Andhra Pradesh India
Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing the collaborative training of a common model to protect privacy facilities. Before... 详细信息
来源: 评论
A Game Theoretic Link Scheduler for Wireless Networks with Heterogeneous Energy Sources
收藏 引用
China Communications 2024年 第12期21卷 108-125页
作者: He Tengjiao Kwanwu Chin Wang Yishun Sieteng Soh College of Information Science and Technology Jinan UniversityGuangzhouChina School of Electrical Computer and Telecommunications EngineeringUniversity of WollongongNSWAustralia School of Electrical Engineering Computing and Mathematical SciencesCurtin UniversityWAAustralia
This paper considers link scheduling in a wireless network comprising of two types of nodes:(i)hybrid access points(HAPs)that harvest solar en-ergy,and(ii)devices that harvest radio frequency(RF)energy whenever HAPs *... 详细信息
来源: 评论
Ensuring Zero Trust IoT Data Privacy: Differential Privacy in Blockchain using Federated Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 1-1页
作者: Hussain, Altaf Akbar, Wajahat Hussain, Tariq Bashir, Ali Kashif Dabel, Maryam M. Al Ali, Farman Yang, Bailin School of Electronic and Control Engineering Chang’an University Xi’an China School of Computer Science and Technology and School of Mathematics and Statistics Zhejiang Gongshang University Hangzhou China Department of Computing and Mathematics Manchester Metropolitan University UK Department of Computer Science and Engineering College of Computer Science and Engineering University of Hafr Al Batin Saudi Arabia Department of Applied AI School of Convergence College of Computing and Informatics Sungkyunkwan University Seoul South Korea
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to... 详细信息
来源: 评论
Generating Markov Logic Networks Rulebase Based on Probabilistic Latent Semantics Analysis
收藏 引用
Tsinghua Science and Technology 2023年 第5期28卷 952-964页
作者: Shan Cui Tao Zhu Xiao Zhang Liming Chen Lingfeng Mao Huansheng Ning School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Computer School University of South ChinaHengyang 421001China School of Computing Ulster UniversityBelfastBT151APUK
Human Activity Recognition(HAR)has become a subject of concern and plays an important role in daily *** uses sensor devices to collect user behavior data,obtain human activity information and identify *** Logic Networ... 详细信息
来源: 评论
DSAF: A Dual-Stage Attention Based Multimodal Fusion Framework for Medical Visual Question Answering
收藏 引用
SN computer Science 2025年 第4期6卷 1-16页
作者: Mukesh, K. Jayaprakash, S.L. Prasanna Kumar, R. Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Tamilnadu Chennai 601103 India
In the realm of clinical healthcare, medical visual question answering systems emerge as a pivotal innovation that plays a crucial role in clinical decision-making and patient care. They are designed to interpret medi... 详细信息
来源: 评论