咨询与建议

限定检索结果

文献类型

  • 88,145 篇 会议
  • 38,315 篇 期刊文献
  • 1,176 册 图书

馆藏范围

  • 127,636 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 73,583 篇 工学
    • 49,313 篇 计算机科学与技术...
    • 40,059 篇 软件工程
    • 18,843 篇 信息与通信工程
    • 12,354 篇 控制科学与工程
    • 10,709 篇 电气工程
    • 10,042 篇 电子科学与技术(可...
    • 9,142 篇 生物工程
    • 7,251 篇 生物医学工程(可授...
    • 6,892 篇 光学工程
    • 5,176 篇 机械工程
    • 4,632 篇 化学工程与技术
    • 4,315 篇 仪器科学与技术
    • 4,240 篇 动力工程及工程热...
    • 3,750 篇 材料科学与工程(可...
    • 3,677 篇 网络空间安全
    • 3,207 篇 安全科学与工程
  • 43,351 篇 理学
    • 19,834 篇 数学
    • 15,578 篇 物理学
    • 10,365 篇 生物学
    • 6,618 篇 统计学(可授理学、...
    • 5,221 篇 化学
    • 4,491 篇 系统科学
  • 19,192 篇 管理学
    • 12,038 篇 管理科学与工程(可...
    • 8,079 篇 图书情报与档案管...
    • 5,589 篇 工商管理
  • 7,247 篇 医学
    • 5,997 篇 临床医学
    • 5,491 篇 基础医学(可授医学...
    • 3,397 篇 药学(可授医学、理...
    • 3,213 篇 公共卫生与预防医...
  • 3,654 篇 法学
    • 2,977 篇 社会学
  • 2,268 篇 经济学
  • 2,149 篇 农学
  • 1,099 篇 教育学
  • 558 篇 文学
  • 292 篇 军事学
  • 133 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 4,643 篇 accuracy
  • 3,834 篇 deep learning
  • 3,412 篇 feature extracti...
  • 3,360 篇 computer science
  • 3,000 篇 machine learning
  • 2,998 篇 computational mo...
  • 2,840 篇 training
  • 2,459 篇 convolutional ne...
  • 2,186 篇 real-time system...
  • 2,099 篇 support vector m...
  • 2,096 篇 predictive model...
  • 1,936 篇 internet of thin...
  • 1,624 篇 artificial intel...
  • 1,546 篇 optimization
  • 1,546 篇 data models
  • 1,439 篇 neural networks
  • 1,377 篇 security
  • 1,231 篇 data mining
  • 1,171 篇 wireless sensor ...
  • 1,132 篇 computer archite...

机构

  • 2,177 篇 chitkara univers...
  • 1,088 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 959 篇 physikalisches i...
  • 958 篇 oliver lodge lab...
  • 933 篇 university of ch...
  • 599 篇 infn sezione di ...
  • 595 篇 infn laboratori ...
  • 572 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 550 篇 infn sezione di ...
  • 543 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 528 篇 department of ph...
  • 522 篇 school of physic...
  • 514 篇 imperial college...
  • 512 篇 h.h. wills physi...
  • 510 篇 school of comput...
  • 500 篇 stfc rutherford ...
  • 500 篇 nikhef national ...

作者

  • 254 篇 a. gomes
  • 251 篇 barter w.
  • 243 篇 c. alexa
  • 240 篇 j. m. izen
  • 236 篇 j. wang
  • 235 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 s. chen
  • 229 篇 blake t.
  • 228 篇 beiter a.
  • 223 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo
  • 213 篇 brundu d.

语言

  • 117,814 篇 英文
  • 8,376 篇 其他
  • 1,475 篇 中文
  • 142 篇 日文
  • 15 篇 朝鲜文
  • 14 篇 法文
  • 13 篇 德文
  • 10 篇 斯洛文尼亚文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering Sreyas Institute of Engineering and Technology"
127636 条 记 录,以下是121-130 订阅
排序:
Border Sensitive Knowledge Distillation for Rice Panicle Detection in UAV Images
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 827-842页
作者: Anitha Ramachandran Sendhil Kumar K.S. School of Computer Science and Engineering VIT(Vellore Institute of Technology)VelloreVellore632014India
Research on panicle detection is one of the most important aspects of paddy phenotypic analysis.A phenotyping method that uses unmanned aerial vehicles can be an excellent alternative to field-based ***,it entails man... 详细信息
来源: 评论
Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3469-3487页
作者: Sureka Sivavelu Venkatesh Palanisamy School of Computer Science Engineering and Information Systems Vellore Institute of TechnologyVellore632014India
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software w... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
EPASAD:ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
收藏 引用
Cybersecurity 2024年 第3期7卷 32-48页
作者: Vikas Maurya Rachit Agarwal Saurabh Kumar Sandeep Shukla Department of Computer Science and Engineering Indian Institute of Technology KanpurkanpurIndia Merkle Science BangaloreIndia
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se... 详细信息
来源: 评论
Unleashing the potential of ChatGPT in education: Revolutionizing learning and collaboration
收藏 引用
IEEE Potentials 2024年 第6期43卷 13-22页
作者: Chandrasekaran, Balaji Nair, Smrithy Girijakumari Sreekantan College of Engineering Guindy Anna University Department of Computer Science and Engineering Chennai600025 India Vellore Institute of Technology School of Computer Science and Engineering Chennai600127 India
ChatGPT, an advanced language model powered by artificial intelligence, has emerged as a transformative tool in the field of education. This article explores the potential of ChatGPT in revolutionizing learning and co... 详细信息
来源: 评论
SMART LAVATORY SOLUTION: INTEGRATING IOT AND DEEP LEARNING MODELS FOR ENHANCED HYGIENE
收藏 引用
Scalable Computing 2025年 第3期26卷 1057-1070页
作者: Patel, Jigna Shah, Aeshwi Rushali, Chaudhari Patel, Jitali Ukani, Vijay Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat Ahmedabad India
In the current era of smart technology, integrating the Internet of Things (IoT) with Artificial Intelligence has revolutionized several fields, including public health and sanitation. The smart lavatory solution prop... 详细信息
来源: 评论
Identification of Human Activity from Video Streaming Smartphone Data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
Bifurcation analysis and control study of improved full-speed differential model in connected vehicle environment
收藏 引用
Chinese Physics B 2024年 第7期33卷 245-266页
作者: 艾文欢 雷正清 李丹洋 方栋梁 刘大为 College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China College of Electrical Engineering Lanzhou Institute of TechnologyLanzhou 730050China
In recent years, the traffic congestion problem has become more and more serious, and the research on traffic system control has become a new hot spot. Studying the bifurcation characteristics of traffic flow systems ... 详细信息
来源: 评论
Analyzing Hierarchical Relationships and Quality of Embedding in Latent Space
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第4期6卷 843-858页
作者: Chatterjee, Ankita Mukherjee, Jayanta Das, Partha Pratim Indian Institute of Technology Kharagpur Department of Computer Science and Engineering Kharagpur721302 India
Existing learning models partition the generated representations using hyperplanes which form well defined groups of similar embeddings that is uniquely mapped to a particular class. However, in practical applications... 详细信息
来源: 评论
Network Security and Cryptography: Threats, Obstacles and Solutions-A Bibliometric Analysis
Recent Advances in Computer Science and Communications
收藏 引用
Recent Advances in computer science and Communications 2025年 第2期18卷 83-101页
作者: Singh, Purushottam Dutta, Sandip Pranav, Prashant Department of Computer Science and Engineering Birla Institute of Technology Mesra Ranchi835215 India
Background: In the wake of escalating cyber threats and the indispensability of ro-bust network security mechanisms, it becomes crucial to understand the evolving landscape of cryptographic research. Recognizing the s... 详细信息
来源: 评论