咨询与建议

限定检索结果

文献类型

  • 86,621 篇 会议
  • 37,968 篇 期刊文献
  • 1,188 册 图书

馆藏范围

  • 125,777 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 72,599 篇 工学
    • 48,718 篇 计算机科学与技术...
    • 39,731 篇 软件工程
    • 18,635 篇 信息与通信工程
    • 12,002 篇 控制科学与工程
    • 10,743 篇 电气工程
    • 9,952 篇 电子科学与技术(可...
    • 9,143 篇 生物工程
    • 7,191 篇 生物医学工程(可授...
    • 6,776 篇 光学工程
    • 5,145 篇 机械工程
    • 4,616 篇 化学工程与技术
    • 4,293 篇 仪器科学与技术
    • 4,218 篇 动力工程及工程热...
    • 3,709 篇 材料科学与工程(可...
    • 3,591 篇 网络空间安全
    • 3,164 篇 安全科学与工程
  • 43,016 篇 理学
    • 19,673 篇 数学
    • 15,443 篇 物理学
    • 10,358 篇 生物学
    • 6,560 篇 统计学(可授理学、...
    • 5,187 篇 化学
    • 4,497 篇 系统科学
  • 19,005 篇 管理学
    • 11,938 篇 管理科学与工程(可...
    • 8,002 篇 图书情报与档案管...
    • 5,517 篇 工商管理
  • 7,134 篇 医学
    • 5,907 篇 临床医学
    • 5,446 篇 基础医学(可授医学...
    • 3,409 篇 药学(可授医学、理...
    • 3,116 篇 公共卫生与预防医...
  • 3,623 篇 法学
    • 2,951 篇 社会学
  • 2,261 篇 经济学
  • 2,121 篇 农学
  • 1,071 篇 教育学
  • 555 篇 文学
  • 291 篇 军事学
  • 132 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 4,371 篇 accuracy
  • 3,632 篇 deep learning
  • 3,356 篇 computer science
  • 3,323 篇 feature extracti...
  • 2,942 篇 machine learning
  • 2,907 篇 computational mo...
  • 2,751 篇 training
  • 2,331 篇 convolutional ne...
  • 2,051 篇 support vector m...
  • 2,023 篇 real-time system...
  • 1,991 篇 predictive model...
  • 1,920 篇 internet of thin...
  • 1,545 篇 artificial intel...
  • 1,476 篇 optimization
  • 1,468 篇 data models
  • 1,427 篇 neural networks
  • 1,337 篇 security
  • 1,228 篇 data mining
  • 1,151 篇 wireless sensor ...
  • 1,102 篇 computer archite...

机构

  • 2,136 篇 chitkara univers...
  • 1,088 篇 cavendish labora...
  • 1,016 篇 department of ph...
  • 962 篇 physikalisches i...
  • 956 篇 oliver lodge lab...
  • 922 篇 university of ch...
  • 604 篇 infn sezione di ...
  • 598 篇 infn laboratori ...
  • 577 篇 infn sezione di ...
  • 560 篇 infn sezione di ...
  • 544 篇 fakultät physik ...
  • 543 篇 school of physic...
  • 539 篇 horia hulubei na...
  • 533 篇 department of ph...
  • 524 篇 school of physic...
  • 519 篇 imperial college...
  • 513 篇 h.h. wills physi...
  • 507 篇 nikhef national ...
  • 505 篇 stfc rutherford ...
  • 492 篇 school of physic...

作者

  • 256 篇 a. gomes
  • 251 篇 barter w.
  • 244 篇 c. alexa
  • 241 篇 j. m. izen
  • 238 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 236 篇 d. calvet
  • 235 篇 j. wang
  • 235 篇 s. chen
  • 229 篇 blake t.
  • 228 篇 beiter a.
  • 223 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 g. spigo
  • 216 篇 boettcher t.
  • 214 篇 f. siegert

语言

  • 119,741 篇 英文
  • 4,638 篇 其他
  • 1,449 篇 中文
  • 143 篇 日文
  • 31 篇 法文
  • 27 篇 德文
  • 15 篇 朝鲜文
  • 8 篇 斯洛文尼亚文
  • 7 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Apex Institute of Technology-Computer Science and Engineering"
125777 条 记 录,以下是1-10 订阅
排序:
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
Prediction of banana leaf disease by intelligent algorithm through digital image using neural network technique
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Nagu, Bharathiraja Kaur, Gaganpreet Shanmugavelu, Murugesan M.R.M, Veeramanickam Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Information Technology Tagore Engineering College Tamil Nadu Chennai India Apex Institute of Technology-Computer Science and Engineering Chandigarh University Punjab India
A lot of research shows that there could be several reasons why the duality of agricultural products has been reduced. Plant diseases make up one of the most important components of this quality. Therefore, the reduct... 详细信息
来源: 评论
MLRT-UNet:An Efficient Multi-Level Relation Transformer Based U-Net for Thyroid Nodule Segmentation
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 413-448页
作者: Kaku Haribabu Prasath R Praveen Joe IR Department of Computer Science and Engineering RMK College of Engineering and TechnologyTiruvallur601206India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
Beyond chat-GPT: a BERT-AO approach to custom question answering system
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 12513-12530页
作者: Sophia, J. Jinu Jacob, T. Prem Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Sathyabama Institute of Science and Technology Chennai India
This work introduces a novel Custom Question Answering (CQA) model leveraging Adam optimized Bidirectional Encoder Representations from Transformers (BERT-AO). This model tackles the challenge of combining textual and... 详细信息
来源: 评论
COVID-19 emergency decision-making using q-rung linear diophantine fuzzy set,differential evolutionary and evidential reasoning techniques
收藏 引用
Applied Mathematics(A Journal of Chinese Universities) 2025年 第1期40卷 182-206页
作者: G Punnam Chander Sujit Das Department of Computer science and Engineering National Institute of TechnologyWarangal 506004India
In this paper,a robust and consistent COVID-19 emergency decision-making approach is proposed based on q-rung linear diophantine fuzzy set(q-RLDFS),differential evolutionary(DE)optimization principles,and evidential r... 详细信息
来源: 评论
Image-based rice leaf disease detection using CNN and generative adversarial network
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 439-456页
作者: Ramadan, Syed Taha Yeasin Islam, Md Shafiqul Sakib, Tanjim Sharmin, Nusrat Rahman, Md. Mokhlesur Rahman, Md. Mahbubur Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka Bangladesh
Rice is a major crop and staple food for more than half of the world’s population and plays a vital role in ensuring food security as well as the global economy pests and diseases pose a threat to the production of r... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
Visually enhanced multi-secret sharing scheme with arithmetic modulo, DWT, and particle swarm optimization for Meaningful Shares
收藏 引用
Cluster Computing 2025年 第5期28卷 1-28页
作者: Rawat, Arjun Singh Deshmukh, Maroti Singh, Maheep Department of Computer Science and Engineering National Institute of Technology Uttarakhand Srinagar Garhwal India Department of Computer Science Doon University Dehradun India Department of Computer Science and Engineering National Institute of Technology Delhi India
Traditional multi-secret sharing (MSS) schemes generate random shares to secure secrets, but their noisy appearance can raise suspicion. To address this, we present an advanced (n+1,n+1) MSS scheme that generates mean... 详细信息
来源: 评论