咨询与建议

限定检索结果

文献类型

  • 29,608 篇 会议
  • 20,361 篇 期刊文献
  • 503 册 图书

馆藏范围

  • 50,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31,035 篇 工学
    • 18,275 篇 计算机科学与技术...
    • 14,736 篇 软件工程
    • 8,018 篇 信息与通信工程
    • 5,663 篇 电气工程
    • 5,652 篇 电子科学与技术(可...
    • 5,380 篇 控制科学与工程
    • 3,594 篇 生物工程
    • 3,169 篇 光学工程
    • 2,868 篇 生物医学工程(可授...
    • 2,117 篇 机械工程
    • 2,099 篇 动力工程及工程热...
    • 1,933 篇 化学工程与技术
    • 1,864 篇 仪器科学与技术
    • 1,849 篇 材料科学与工程(可...
    • 1,091 篇 交通运输工程
    • 1,052 篇 网络空间安全
  • 18,823 篇 理学
    • 8,833 篇 数学
    • 6,990 篇 物理学
    • 4,051 篇 生物学
    • 3,239 篇 统计学(可授理学、...
    • 2,260 篇 系统科学
    • 2,210 篇 化学
  • 6,946 篇 管理学
    • 4,591 篇 管理科学与工程(可...
    • 2,535 篇 图书情报与档案管...
    • 2,283 篇 工商管理
  • 2,976 篇 医学
    • 2,389 篇 临床医学
    • 2,135 篇 基础医学(可授医学...
    • 1,265 篇 公共卫生与预防医...
    • 1,265 篇 药学(可授医学、理...
  • 1,425 篇 法学
    • 1,232 篇 社会学
  • 841 篇 经济学
  • 538 篇 农学
  • 477 篇 教育学
  • 261 篇 文学
  • 101 篇 军事学
  • 55 篇 艺术学
  • 7 篇 哲学
  • 6 篇 历史学

主题

  • 1,190 篇 accuracy
  • 1,110 篇 deep learning
  • 1,069 篇 computer science
  • 889 篇 computational mo...
  • 878 篇 machine learning
  • 755 篇 training
  • 750 篇 feature extracti...
  • 662 篇 internet of thin...
  • 566 篇 optimization
  • 554 篇 real-time system...
  • 513 篇 predictive model...
  • 476 篇 artificial intel...
  • 457 篇 convolutional ne...
  • 424 篇 support vector m...
  • 398 篇 data models
  • 374 篇 neural networks
  • 351 篇 robustness
  • 338 篇 analytical model...
  • 334 篇 wireless sensor ...
  • 333 篇 reinforcement le...

机构

  • 617 篇 department of el...
  • 185 篇 department of co...
  • 155 篇 school of electr...
  • 129 篇 school of automa...
  • 128 篇 school of comput...
  • 118 篇 department of co...
  • 115 篇 school of electr...
  • 115 篇 school of electr...
  • 110 篇 school of comput...
  • 109 篇 college of compu...
  • 106 篇 department of ph...
  • 105 篇 department of co...
  • 104 篇 faculty of scien...
  • 101 篇 departamento de ...
  • 100 篇 faculté des scie...
  • 98 篇 school of comput...
  • 93 篇 department of ph...
  • 93 篇 department of ph...
  • 91 篇 north-west unive...
  • 89 篇 department of ph...

作者

  • 323 篇 niyato dusit
  • 116 篇 han zhu
  • 95 篇 ferrara g.
  • 94 篇 ardid m.
  • 93 篇 calvo d.
  • 92 篇 chen a.
  • 91 篇 c. alexa
  • 90 篇 j. m. izen
  • 90 篇 s. veneziano
  • 90 篇 g. bella
  • 90 篇 d. calvet
  • 90 篇 c. amelung
  • 90 篇 y. tayalati
  • 89 篇 j. strandberg
  • 89 篇 n. orlando
  • 89 篇 g. spigo
  • 89 篇 v. chiarella
  • 89 篇 f. siegert
  • 88 篇 f. buehrer
  • 88 篇 a. t. law

语言

  • 46,184 篇 英文
  • 3,775 篇 其他
  • 496 篇 中文
  • 32 篇 日文
  • 10 篇 德文
  • 8 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Engineering Department of Computer Science and Electrical Engineering"
50472 条 记 录,以下是921-930 订阅
排序:
Machine Learning Approaches for Myers-Briggs Personality Prediction  7
Machine Learning Approaches for Myers-Briggs Personality Pre...
收藏 引用
7th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2023
作者: Santhosh, Sethulakshmi Meenakshi, M. Avani, F. Abhishek, S. Anjali, T. Amrita School of Computing Department of Computer Science and Engineering Amritapuri India
In order to predict Myers-Briggs personality types from text input, this research article compares the abilities of Stochastic Gradient Descent (SGD), Naive Bayes, k-Nearest Neighbours (KNN), and Logistic Regression m... 详细信息
来源: 评论
Metaheuristic Secure Clustering Scheme for Energy Harvesting Wireless Sensor Networks
收藏 引用
computer Systems science & engineering 2023年 第4期45卷 497-512页
作者: S.Nithya Roopa P.Anandababu Sibi Amaran Rajesh Verma Department of Computer Science and Engineering Kumaraguru College of TechnologyCoimbatore641049India Department of Computer and Information Science Faculty of ScienceAnnamalai UniversityChidambaram608002India Department of Computing Technologies SRM Institute of Science and TechnologyChennai603203India Department of Electrical Engineering King Khalid UniversityAbha61411Kingdom of Saudi Arabia
Recently,energy harvesting wireless sensor networks(EHWSN)have increased significant attention among research *** harvesting energy from the neighboring environment,the sensors in EHWSN resolve the energy constraint p... 详细信息
来源: 评论
Health and Environment Monitoring System for Viral Respiratory Diseases  14
Health and Environment Monitoring System for Viral Respirato...
收藏 引用
14th International Conference on computing Communication and Networking Technologies, ICCCNT 2023
作者: Shwetha, S. Nithuna, N. Oviya, B. Swetha, J. Harini, N. Amrita School of Computing Department of Computer Science and Engineering Coimbatore India
The proposed system in this work is a contactless health and environment monitoring system designed after conducting a literature review on the most recent research on viral respiratory diseases and their impact on bu... 详细信息
来源: 评论
Towards a lightweight security framework using blockchain and machine learning
收藏 引用
Blockchain(Research and Applications) 2024年 第1期5卷 107-118页
作者: Shereen Ismail Muhammad Nouman Diana W.Dawoud Hassan Reza School of Electrical Engineering and Computer Science University of North DakotaND 58202USA Department of Computer Science COMSATS University IslamabadIslamabad 44000Pakistan College of Engineering and Information Technology University of DubaiDubaiUnited Arab Emirates
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention ... 详细信息
来源: 评论
Deep learning based approaches for accurate automated nuclei segmentation of Pap smear images  14
Deep learning based approaches for accurate automated nuclei...
收藏 引用
14th International Conference on computing Communication and Networking Technologies, ICCCNT 2023
作者: Hridya Nair, S. Nair, Kasthuri A. S. Padmanabhan, Niharika Ratnakaran, Riya Vinitha Panicker, J. Amrita School of Computing Department of Computer Science and Engineering Amritapuri India
Cervical cancer is a type of cancer that occurs among women. The cancerous cells are developed in the cells of the cervix which is the lower part of the uterus. The human papillomavirus (HPV) is responsible for the va... 详细信息
来源: 评论
Semantic Analysis Using Deep Learning for Predicting Stock Trends  2
Semantic Analysis Using Deep Learning for Predicting Stock T...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Galphade, Manisha Nikam, V.B. Yedurkar, Dhanalekshmi Singh, Prabhishek Stephan, Thompson Department of Computer Science & Engineering School of Computing MIT Art Design & Technology University Pune India Department of Computer Engineering & IT Veermata Jijabai Technological Institute Mumbai India Department of Computer Science & Engineering School of Computing MIT Art Design & Technology University Pune India School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Science & Engineering Graphic Era Deemed to Be University Uttarakhand Dehradun India
Company Investors and financial professionals mostly rely on quarterly reports to help them decide the ways to invest in stocks and assess the company's current performance. Quarterly company reports offer an abst... 详细信息
来源: 评论
Recursive Descent Parser for Abstract Syntax Tree Visualization of Mathematical Expressions  7
Recursive Descent Parser for Abstract Syntax Tree Visualizat...
收藏 引用
7th IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2023
作者: Pecheti, Shiva Teja Basavadeepthi, M.H. Kodurupaka, Nithin Belwal, Meena Amrita School of Computing Department of Computer Science and Engineering Bengaluru India
This study presents a novel method for finding and evaluating mathematical expressions using Abstract Syntax Trees (AST). The approach is particularly adaptable for both academic and professional applications since it... 详细信息
来源: 评论
Performance analysis of various classification algorithms for providing competency training to workplace risk prevention
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15123-15149页
作者: Garg, Shruti Murugan, Prabhu Manimaran, A. Sundar, Ramesh Dakshinamoorthy, Prabakar Rajaram, Gnanajeyaraman Birla Institute of Technology Ranchi Mesra India Department of ECE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai602105 India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai602105 India Department of Networking and Communication School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur India Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur India
In the workplace, risk prevention helps detect the risks and prevent accidents. To achieve this, workers' mental and physical parameters related to their health should be focused on and analyzed. It helps improve ... 详细信息
来源: 评论
Machine Learning in Lithium-Ion Battery: Applications, Challenges, and Future Trends
收藏 引用
SN computer science 2024年 第6期5卷 717页
作者: Valizadeh, Alireza Amirhosseini, Mohammad Hossein NEX Power Ltd Department of Computer Science and Digital Technologies School of Architecture Computing and Engineering University of East London
Machine Learning has garnered significant attention in lithium-ion battery research for its potential to revolutionize various aspects of the field. This paper explores the practical applications, challenges, and emer... 详细信息
来源: 评论
Block chain-based decentralized public auditing for cloud storage with improved EIGAMAL encryption model
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第2期16卷 697-711页
作者: Kumar, R. Prasanna Bandanadam, Showri Rayalu Department of Computer Science and Engineering (AIE) Amrita School of Computing Amrita Vishwa Vidyapeetham Tamil Nadu Chennai India
With the growing relevance of data integrity, public auditing mechanisms for cloud storage models are intensively researched. In public auditing systems, a third person is used to ensure the outsourced data’s integri... 详细信息
来源: 评论