咨询与建议

限定检索结果

文献类型

  • 86,615 篇 会议
  • 38,032 篇 期刊文献
  • 1,190 册 图书

馆藏范围

  • 125,837 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 72,599 篇 工学
    • 48,705 篇 计算机科学与技术...
    • 39,753 篇 软件工程
    • 18,625 篇 信息与通信工程
    • 11,992 篇 控制科学与工程
    • 10,730 篇 电气工程
    • 9,926 篇 电子科学与技术(可...
    • 9,149 篇 生物工程
    • 7,196 篇 生物医学工程(可授...
    • 6,802 篇 光学工程
    • 5,145 篇 机械工程
    • 4,616 篇 化学工程与技术
    • 4,296 篇 仪器科学与技术
    • 4,219 篇 动力工程及工程热...
    • 3,698 篇 材料科学与工程(可...
    • 3,575 篇 网络空间安全
    • 3,164 篇 安全科学与工程
  • 43,038 篇 理学
    • 19,694 篇 数学
    • 15,450 篇 物理学
    • 10,368 篇 生物学
    • 6,571 篇 统计学(可授理学、...
    • 5,189 篇 化学
    • 4,500 篇 系统科学
  • 19,022 篇 管理学
    • 11,951 篇 管理科学与工程(可...
    • 8,008 篇 图书情报与档案管...
    • 5,526 篇 工商管理
  • 7,134 篇 医学
    • 5,913 篇 临床医学
    • 5,448 篇 基础医学(可授医学...
    • 3,409 篇 药学(可授医学、理...
    • 3,119 篇 公共卫生与预防医...
  • 3,631 篇 法学
    • 2,956 篇 社会学
  • 2,262 篇 经济学
  • 2,124 篇 农学
  • 1,074 篇 教育学
  • 556 篇 文学
  • 293 篇 军事学
  • 132 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 4,369 篇 accuracy
  • 3,620 篇 deep learning
  • 3,356 篇 computer science
  • 3,322 篇 feature extracti...
  • 2,918 篇 machine learning
  • 2,907 篇 computational mo...
  • 2,750 篇 training
  • 2,329 篇 convolutional ne...
  • 2,049 篇 support vector m...
  • 2,021 篇 real-time system...
  • 1,984 篇 predictive model...
  • 1,916 篇 internet of thin...
  • 1,542 篇 artificial intel...
  • 1,478 篇 optimization
  • 1,469 篇 data models
  • 1,416 篇 neural networks
  • 1,329 篇 security
  • 1,228 篇 data mining
  • 1,151 篇 wireless sensor ...
  • 1,100 篇 computer archite...

机构

  • 2,136 篇 chitkara univers...
  • 1,089 篇 cavendish labora...
  • 1,018 篇 department of ph...
  • 963 篇 physikalisches i...
  • 959 篇 oliver lodge lab...
  • 924 篇 university of ch...
  • 607 篇 infn sezione di ...
  • 600 篇 infn laboratori ...
  • 577 篇 infn sezione di ...
  • 561 篇 infn sezione di ...
  • 547 篇 fakultät physik ...
  • 546 篇 school of physic...
  • 539 篇 horia hulubei na...
  • 531 篇 department of ph...
  • 522 篇 school of physic...
  • 517 篇 imperial college...
  • 513 篇 h.h. wills physi...
  • 505 篇 nikhef national ...
  • 503 篇 stfc rutherford ...
  • 490 篇 school of physic...

作者

  • 256 篇 a. gomes
  • 251 篇 barter w.
  • 244 篇 c. alexa
  • 241 篇 j. m. izen
  • 238 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 236 篇 d. calvet
  • 235 篇 j. wang
  • 235 篇 s. chen
  • 229 篇 beiter a.
  • 229 篇 blake t.
  • 223 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 g. spigo
  • 216 篇 boettcher t.
  • 214 篇 f. siegert

语言

  • 119,766 篇 英文
  • 4,672 篇 其他
  • 1,453 篇 中文
  • 143 篇 日文
  • 37 篇 法文
  • 32 篇 德文
  • 15 篇 朝鲜文
  • 8 篇 斯洛文尼亚文
  • 7 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Apex Institute of Technology-Computer Science and Engineering"
125837 条 记 录,以下是121-130 订阅
排序:
Thoracic-net: Explainable artificial intelligence (XAI) based few shots learning feature fusion technique for multi-classifying thoracic diseases using medical imaging
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5397-5433页
作者: Bhosale, Yogesh H. Patnaik, K. Sridhar Zanwar, S.R. Singh, Saket Kr. Singh, Vandana Shinde, U.B. Department of Computer Science & Engineering Birla Institute of Technology Ranchi Mesra India India India India
Background & Need: The early detection of thoracic diseases and COVID-19 (coronavirus disease) significantly limits propagation and increases therapeutic outcomes. This article focuses on swiftly distinguishi... 详细信息
来源: 评论
Phishing Webpage Detection: Unveiling the Threat Landscape and Investigating Detection Techniques
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第2期27卷 974-1007页
作者: Kulkarni, Aditya Balachandran, Vivek Das, Tamal Indian Institute of Technology Dharwad Department of Computer Science and Engineering Dharwad580011 India Singapore Institute of Technology InfoComm Technology 10 Dover Dr Singapore
In the realm of cybersecurity, phishing stands as a prevalent cyber attack, where attackers employ various tactics to deceive users into gathering their sensitive information, potentially leading to identity theft or ... 详细信息
来源: 评论
Bidirectional Legendre memory unit: bidirectional memory for person authentication combining voice and online signature
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1541-1563页
作者: Kumar, Rohitesh Ghosh, Rajib Department of Computer Science and Engineering National Institute of Technology Patna Ashok Rajpath Patna800005 India
With the increasing popularity of smart portable electronic gadgets, voice-based online person verification systems have become prevalent. However, these systems are susceptible to attacks where illegitimate individua... 详细信息
来源: 评论
Automated breast nuclei feature extraction for segmentation in histopathology images using Deep-CNN-based gaussian mixture model and color optimization technique
收藏 引用
Multimedia Tools and Applications 2025年 1-27页
作者: Murmu, Anita Kumar, Piyush Computer Science and Engineering National Institute of Technology Patna Ashok Rajpath Bihar Patna800005 India
Hematoxylin and eosin (H&E) staining are the key sources for identifying breast cancer patterns with different colors and shapes of nuclei cells for segmenting histopathology nucleus images. In nucleus cells, the ... 详细信息
来源: 评论
Verification of news and certificate, and plagiarism detector
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Jain, Pushpak Anand, Dewansh Rajni Behal, Vansh Kapoor, Vipul Sharma, Neha Jindal, Neeru Department of Electronics and Communication Engineering Thapar Institute of Engineering and Technology Punjab Patiala India Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Chitkara University Punjab Patiala India
Fake news, Fake certification, and Plagiarism are the most common issues arising these days. During this COVID-19 situation, there are a lot of rumors and fake news spreading and some of us are using fake certificatio... 详细信息
来源: 评论
A moment-based pooling approach in convolutional neural networks for breast cancer histopathology image classification
收藏 引用
Neural Computing and Applications 2025年 第2期37卷 1127-1156页
作者: Kumar, Arvind Singh, Chandan Sachan, Manoj Kumar Department of Computer Science and Engineering Sant Longowal Institute of Engineering and Technology Longowal Punjab Sangrur148106 India Department of Computer Science Punjabi University Punjab Patiala147002 India
Automated analysis of breast cancer (BC) histopathology images is a challenging task due to the high resolution, multiple magnifications, color variations, the presence of image artifacts, and morphological variabilit... 详细信息
来源: 评论
BGRU-MTRA: bilinear GRU networks with multi-path temporal residual attention for suspicious activity recognition
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 185-212页
作者: Pandey, Ajeet Kumar, Piyush Computer Science and Engineering National Institute of Technology Patna Ashok Rajpath Bihar Patna800005 India
Suspicious activity recognition (SAR) is an active research field in computer vision and image processing due to the rapid demand for intelligent video surveillance systems. However, current automated systems focus to... 详细信息
来源: 评论
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4228-4242页
作者: Shen, Meng Wu, Jinhe Ye, Ke Xu, Ke Xiong, Gang Zhu, Liehuang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing Institute of Technology School of Computer Science Beijing100081 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Institute of Information Engineering Chinese Academy of Sciences Beijing100190 China
Traffic encryption is widely used to protect communication privacy but is increasingly exploited by attackers to conceal malicious activities. Existing malicious encrypted traffic detection methods rely on large amoun... 详细信息
来源: 评论
Multi-View Test-Time Adaptation for Semantic Segmentation in Clinical Cataract Surgery
收藏 引用
IEEE Transactions on Medical Imaging 2025年 第5期44卷 2307-2318页
作者: Li, Heng Ou, Mingyang Li, Haojin Qiu, Zhongxi Niu, Ke Fu, Huazhu Liu, Jiang Southern University of Science and Technology Research Institute of Trustworthy Autonomous Systems Shenzhen518055 China Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China Beijing Information Science and Technology University Computer School Beijing100192 China Institute of High Performance Computing Agency for Science Technology and Research Fusionopolis Way 138632 Singapore Southern University of Science and Technology Research Institute of Trustworthy Autonomous Systems Department of Computer Science and Engineering Shenzhen518055 China
Cataract surgery, a widely performed operation worldwide, is incorporating semantic segmentation to advance computer-assisted intervention. However, the tissue appearance and illumination in cataract surgery often dif... 详细信息
来源: 评论
Adaptive Attention Mechanisms Based Multicriteria Recommender Systems for Improved User Preference Discovery
收藏 引用
SN computer science 2025年 第4期6卷 1-16页
作者: Rajput, Ishwari Singh Tewari, Anand Shanker Tiwari, Arvind Kumar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna India Department of Computer Science & Engineering Kamla Nehru Institute of Technology Sultanpur (UP) India
Personalized recommender systems are becoming more popular to reduce the issue of information overload. It is also observed that the recommendations provided by multi-criteria recommender system (MCRS) are more accura... 详细信息
来源: 评论