咨询与建议

限定检索结果

文献类型

  • 88,684 篇 会议
  • 38,455 篇 期刊文献
  • 1,176 册 图书

馆藏范围

  • 128,315 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 73,963 篇 工学
    • 49,555 篇 计算机科学与技术...
    • 40,263 篇 软件工程
    • 18,941 篇 信息与通信工程
    • 12,434 篇 控制科学与工程
    • 10,769 篇 电气工程
    • 10,082 篇 电子科学与技术(可...
    • 9,183 篇 生物工程
    • 7,292 篇 生物医学工程(可授...
    • 6,919 篇 光学工程
    • 5,227 篇 机械工程
    • 4,687 篇 化学工程与技术
    • 4,334 篇 仪器科学与技术
    • 4,286 篇 动力工程及工程热...
    • 3,836 篇 材料科学与工程(可...
    • 3,707 篇 网络空间安全
    • 3,223 篇 安全科学与工程
  • 43,580 篇 理学
    • 19,912 篇 数学
    • 15,670 篇 物理学
    • 10,412 篇 生物学
    • 6,642 篇 统计学(可授理学、...
    • 5,270 篇 化学
    • 4,508 篇 系统科学
  • 19,307 篇 管理学
    • 12,122 篇 管理科学与工程(可...
    • 8,115 篇 图书情报与档案管...
    • 5,632 篇 工商管理
  • 7,296 篇 医学
    • 6,040 篇 临床医学
    • 5,533 篇 基础医学(可授医学...
    • 3,419 篇 药学(可授医学、理...
    • 3,237 篇 公共卫生与预防医...
  • 3,673 篇 法学
    • 2,994 篇 社会学
  • 2,287 篇 经济学
  • 2,167 篇 农学
  • 1,106 篇 教育学
  • 561 篇 文学
  • 294 篇 军事学
  • 133 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 4,691 篇 accuracy
  • 3,871 篇 deep learning
  • 3,431 篇 feature extracti...
  • 3,364 篇 computer science
  • 3,018 篇 computational mo...
  • 3,016 篇 machine learning
  • 2,859 篇 training
  • 2,487 篇 convolutional ne...
  • 2,213 篇 real-time system...
  • 2,112 篇 support vector m...
  • 2,111 篇 predictive model...
  • 1,955 篇 internet of thin...
  • 1,639 篇 artificial intel...
  • 1,570 篇 optimization
  • 1,554 篇 data models
  • 1,441 篇 neural networks
  • 1,395 篇 security
  • 1,241 篇 data mining
  • 1,182 篇 wireless sensor ...
  • 1,138 篇 computer archite...

机构

  • 2,177 篇 chitkara univers...
  • 1,088 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 959 篇 physikalisches i...
  • 956 篇 oliver lodge lab...
  • 933 篇 university of ch...
  • 599 篇 infn sezione di ...
  • 595 篇 infn laboratori ...
  • 572 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 550 篇 infn sezione di ...
  • 543 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 522 篇 school of physic...
  • 514 篇 imperial college...
  • 512 篇 h.h. wills physi...
  • 510 篇 school of comput...
  • 500 篇 stfc rutherford ...
  • 500 篇 nikhef national ...

作者

  • 254 篇 a. gomes
  • 251 篇 barter w.
  • 243 篇 c. alexa
  • 240 篇 j. m. izen
  • 236 篇 j. wang
  • 235 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 s. chen
  • 229 篇 blake t.
  • 228 篇 beiter a.
  • 223 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 214 篇 g. spigo
  • 213 篇 brundu d.

语言

  • 118,427 篇 英文
  • 8,442 篇 其他
  • 1,477 篇 中文
  • 142 篇 日文
  • 15 篇 朝鲜文
  • 14 篇 法文
  • 13 篇 德文
  • 10 篇 斯洛文尼亚文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering Rajalakshmi Institute of Technology"
128315 条 记 录,以下是31-40 订阅
排序:
Transfer Learning-Based Class Imbalance-Aware Shoulder Implant Classification from X-Ray Images
收藏 引用
Journal of Bionic engineering 2024年 第2期21卷 892-912页
作者: Marut Jindal Birmohan Singh Department of Computer Science and Engineering Sant Longowal Institute of Engineering and TechnologySangrur148106PunjabIndia
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doc... 详细信息
来源: 评论
COVID-19 emergency decision-making using q-rung linear diophantine fuzzy set,differential evolutionary and evidential reasoning techniques
收藏 引用
Applied Mathematics(A Journal of Chinese Universities) 2025年 第1期40卷 182-206页
作者: G Punnam Chander Sujit Das Department of Computer science and Engineering National Institute of TechnologyWarangal 506004India
In this paper,a robust and consistent COVID-19 emergency decision-making approach is proposed based on q-rung linear diophantine fuzzy set(q-RLDFS),differential evolutionary(DE)optimization principles,and evidential r... 详细信息
来源: 评论
Facial Expression Recognition with High Response-Based Local Directional Pattern (HR-LDP) Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2067-2086页
作者: Sherly Alphonse Harshit Verma School of Computer Science and Engineering Vellore Institute of TechnologyChennaiIndia
Although lots of research has been done in recognizing facial expressions,there is still a need to increase the accuracy of facial expression recognition,particularly under uncontrolled *** use of Local Directional Pa... 详细信息
来源: 评论
A SYSTEMATIC STUDY ABOUT CRYPTO JACKING
A SYSTEMATIC STUDY ABOUT CRYPTO JACKING
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Sriman, B. Kumar, S. Goutham Dhanushram, S. Balaji, K. Priyan, P. Ajay Computer Science Engineering Rajalakshmi Institute of Technology Tamil Nadu Chennai India Computer Science and Business Systems Rajalakshmi Institute of Technology Tamil Nadu Chennai India
In this paper, we examine Crypto Jacking which is the significant threat to the world and how this threat is handled by the advanced technologies like Artificial Intelligence. Cryptocurrencies are based on blockchain,... 详细信息
来源: 评论
Personalized Method for Voting in Wireless Mobile Adhoc Networks with Intrusion Detection using NS2 Simulation Model  5
Personalized Method for Voting in Wireless Mobile Adhoc Netw...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Muthukumar, S. Senthil Pandi, S. Menaga, D. Sudhahar, T.N. St.Joseph's Institute of Technology Department of Computer Science and Engineering Tamilnadu Chennai India Rajalakshmi Engineering College Department of Computer Science and Engineering Tamilnadu Chennai India Rajalakshmi Institute of Technology Department of Artificial Intelligence and Data Science Tamilnadu Chennai India
Mobile Ad hoc Networks (MANETs) are wireless networks that are self-configuring, infrastructure-less, and dynamic. The nodes in these networks have limited access to available resources. MANETs use intrusion detection... 详细信息
来源: 评论
An Investigational Study of Detecting Acute Lymphoblastic Leukemia using computer Vision  2
An Investigational Study of Detecting Acute Lymphoblastic Le...
收藏 引用
2nd International Conference on Smart Technologies and Systems for Next Generation Computing, ICSTSN 2023
作者: Ashok, M. Tharani, K. Venkatasriram, S. Ramasamy, Kumar Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India
Among all divesting cancers, Hematologists predict that the Leukemia is mostly occur on the children, teenagers, and young adults. Moreover 85% of cancer cases are detected younger than the age of 15. Due to a Genetic... 详细信息
来源: 评论
A High-Speed Compression and Secure Authentication Framework for Data Sharing Cloud-Enabled Big Data Environments
A High-Speed Compression and Secure Authentication Framework...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Abirami, I. Selvi, S. Lalitha, R. Julian, Anitha Rmk Engineering College Department of Computer Science and Engineering Chennai India Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai India Saveetha Engineering College Department of Computer Science and Engineering Chennai India
With rapidly expanding cloud-enabled big data environments, there is an imperative need for efficient data-sharing mechanisms that are multidimensional and balance both speed and security. In this connection, high-spe... 详细信息
来源: 评论
Image-based rice leaf disease detection using CNN and generative adversarial network
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 439-456页
作者: Ramadan, Syed Taha Yeasin Islam, Md Shafiqul Sakib, Tanjim Sharmin, Nusrat Rahman, Md. Mokhlesur Rahman, Md. Mahbubur Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka Bangladesh
Rice is a major crop and staple food for more than half of the world’s population and plays a vital role in ensuring food security as well as the global economy pests and diseases pose a threat to the production of r... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
Fire and Smoke Detection Using Deep Learning  2
Fire and Smoke Detection Using Deep Learning
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Divya, B. Kavitha, S. Muthu Pandeeswari, R. Sreenidhi, R. Ponvaishnavi, M.R. Loshine, S. Sri Sai Ram Institute of Technology Dept of Computer Science and Engineering India India Rajalakshmi Engineering College Dept of Computer Science and Engineering Thandalam India
Of late, wildfires and commercial fires like fires in a shopping complex, firework factories, and industries, continue to cause extensive destruction throughout the world, frequently causing human fatalities. The solu... 详细信息
来源: 评论