咨询与建议

限定检索结果

文献类型

  • 5,590 篇 期刊文献
  • 5,462 篇 会议
  • 80 册 图书

馆藏范围

  • 11,132 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,839 篇 工学
    • 5,056 篇 计算机科学与技术...
    • 4,198 篇 软件工程
    • 1,703 篇 信息与通信工程
    • 1,167 篇 生物工程
    • 984 篇 控制科学与工程
    • 864 篇 生物医学工程(可授...
    • 852 篇 电气工程
    • 688 篇 光学工程
    • 602 篇 电子科学与技术(可...
    • 367 篇 机械工程
    • 363 篇 化学工程与技术
    • 309 篇 仪器科学与技术
    • 307 篇 网络空间安全
    • 304 篇 交通运输工程
    • 298 篇 动力工程及工程热...
    • 288 篇 安全科学与工程
  • 4,450 篇 理学
    • 2,162 篇 数学
    • 1,370 篇 生物学
    • 1,302 篇 物理学
    • 870 篇 统计学(可授理学、...
    • 490 篇 化学
    • 392 篇 系统科学
  • 1,935 篇 管理学
    • 1,140 篇 管理科学与工程(可...
    • 858 篇 图书情报与档案管...
    • 630 篇 工商管理
  • 895 篇 医学
    • 740 篇 临床医学
    • 664 篇 基础医学(可授医学...
    • 392 篇 公共卫生与预防医...
    • 382 篇 药学(可授医学、理...
  • 366 篇 法学
    • 319 篇 社会学
  • 229 篇 经济学
  • 205 篇 农学
  • 106 篇 教育学
  • 40 篇 文学
  • 17 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 475 篇 accuracy
  • 468 篇 deep learning
  • 357 篇 machine learning
  • 274 篇 feature extracti...
  • 248 篇 real-time system...
  • 242 篇 computational mo...
  • 223 篇 training
  • 216 篇 predictive model...
  • 205 篇 internet of thin...
  • 190 篇 convolutional ne...
  • 170 篇 artificial intel...
  • 163 篇 support vector m...
  • 154 篇 optimization
  • 138 篇 semantics
  • 136 篇 data models
  • 133 篇 reinforcement le...
  • 118 篇 security
  • 111 篇 neural networks
  • 105 篇 data mining
  • 101 篇 reliability

机构

  • 426 篇 department of ph...
  • 400 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 383 篇 h.h. wills physi...
  • 349 篇 van swinderen in...
  • 322 篇 yandex school of...
  • 297 篇 school of physic...
  • 296 篇 university of ch...
  • 295 篇 cavendish labora...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 242 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 210 篇 betancourt c.
  • 206 篇 brundu d.
  • 199 篇 bediaga i.
  • 191 篇 amato s.
  • 183 篇 baryshnikov f.
  • 180 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 baker s.
  • 155 篇 borisyak m.
  • 146 篇 bjørn m.
  • 146 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery

语言

  • 9,740 篇 英文
  • 1,346 篇 其他
  • 56 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=The Data Engineering at the Department of Computer Science"
11132 条 记 录,以下是1-10 订阅
排序:
Identification of Human Activity from Video Streaming Smartphone data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
Secure container Orchestration: A framework for detecting and mitigating Orchestrator - level vulnerabilities
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18351-18371页
作者: Mahavaishnavi, V. Saminathan, R. Prithviraj, R. Department of Artificial Intelligence and Data Science Panimalar Engineering College Tamil Nadu Chennai600123 India Department of Computer Science and Engineering Annamalai University Chidambaram India Department of Computer Science and Engineering Annamalai University Chidambaram India
This paper presents Secure Orchestration, a novel framework meticulously planned to uphold rigorous security measures over the profound security concerns that lie within the container orchestration platforms, especial... 详细信息
来源: 评论
A survey on cross-user federated recommendation
收藏 引用
science China(Information sciences) 2025年 第4期68卷 7-32页
作者: Enyue YANG Yudi XIONG Wei YUAN Weike PAN Qiang YANG Zhong MING College of Computer Science and Software Engineering Shenzhen University School of Electrical Engineering and Computer Science The University of Queensland WeBank AI Lab WeBank Department of Computer Science and Engineering Hong Kong University of Science and Technology College of Big Data and Internet Shenzhen Technology University Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ)
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri... 详细信息
来源: 评论
Deep learning framework for automatic detection and classification of sleep apnea severity from polysomnography signals
收藏 引用
Neural Computing and Applications 2024年 第28期36卷 17483-17493页
作者: Raja Brundha, A. Lakshmi Sangeetha, A. Balajiganesh, A. Department of Artificial Intelligence and Data Science Sri Sai Ram Engineering College Chennai India Department of Computer Science Engineering Velammal Engineering College Chennai India
Sleep apnea (SA) is a sleep-related breathing disorder characterized by breathing pauses during sleep. A person’s sleep schedule is significantly influenced by that person’s hectic lifestyle, which may include unhea... 详细信息
来源: 评论
Blockchain with drug traceability in medical supply chain with Henry gas solubility optimisation algorithm
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 135-148页
作者: Devi, P. Yamini Sriramya, P. Department of Computer Science and Engineering Saveetha School of Engineering Thandalam Tamil Nadu Chennai India Department of Data Science Saveetha School of Engineering SIMATS Tamil Nadu Chennai India
The drug traceability model is used for ensuring drug quality and its safety for customers in the medical supply chain. The healthcare supply chain is a complex network, which is susceptible to failures and leakage of... 详细信息
来源: 评论
Drone Detection and Tracking using Deep Convolutional Neural Networks from Real-time CCTV Footage
收藏 引用
IEIE Transactions on Smart Processing and Computing 2024年 第4期13卷 313-321页
作者: Allmamun, Md Akter, Fahima Talukdar, Muhammad Borhan Uddin Chakraborty, Sovon Uddin, Jia Department of Computer Science and Engineering European University of Bangladesh Dhaka Bangladesh Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Computer Science and Engineering University of Liberal Arts Bangladesh Dhaka Bangladesh AI and Big Data Department Woosong University Daejeon Korea Republic of
Drones are flying objects that may be controlled remotely or programmed to do a wide range of tasks, including aerial photography, videography, surveys, crop and animal monitoring, search and rescue missions, package ... 详细信息
来源: 评论
REAL-TIME GLUCOSE MONITORING SYSTEM AND DIETARY RECOMMENDATIONS FOR DIABETES MELLITUS USING FOG COMPUTING
收藏 引用
Telecommunications and Radio engineering (English translation of Elektrosvyaz and Radiotekhnika) 2025年 第5期84卷 55-67页
作者: Sathish, N. Elangovan, D. Nagalakshmi, R. Suresh, G. Chitra, Devi D. Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Information Technology Saveetha Engineering College Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Artificial Intelligence and Data Science Kings Engineering College Sriperumbudur India Department of Computer Science And Engineering S.A. Engineering College Chennai India
This systematic review gave special attention to diabetes and the advancements in food and nutrition needed to prevent or manage diabetes in all its forms. There are two main forms of diabetes mellitus: Type 1 (T1D) a... 详细信息
来源: 评论
Performance Evaluation of a Multi-input Interleaved Boost Converter with a Tuned Proportional-integral Controller
收藏 引用
Chinese Journal of Electrical engineering 2024年 第4期10卷 119-128页
作者: Sucharita Pal Dola Sinha Mou Das Mahapatra Saibal Majumder Sovan Bhattacharya Chan Byopadhyay Department of Electrical Engineering Asansol Engineering CollegeAsansol 713305India Department of Electrical Engineering Dr.B.C.Roy Engineering CollegeDurgapur 713206India Department of Computer Science and Engineering(Data Science) Dr.B.C.Roy Engineering CollegeDurgapur 713206India Department of Computer Science and Engineering University of BremenBremen 28359Germany
The need for renewable energy access has led to the use of variable input converter approaches because renewable energy sources often generate electricity in an unpredictable manner. A high-performance multi-input boo... 详细信息
来源: 评论
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali Department of Computer Applications Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India Department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex... 详细信息
来源: 评论
Automated face recognition using deep learning technique and center symmetric multivariant local binary pattern
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 263-281页
作者: Sekhar, J.C. Josephson, P. Joel Chinnasamy, A. Maheswari, M. Sankar, S. Kalangi, Ruth Ramya Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Electronics and Communication Engineering Malla Reddy Engineering College Telangana Hyderabad India Department of Data Science and Business Systems School of Computing SRMIST Kattankulathur Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vijayawada India
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,... 详细信息
来源: 评论