咨询与建议

限定检索结果

文献类型

  • 88,407 篇 会议
  • 37,986 篇 期刊文献
  • 1,172 册 图书

馆藏范围

  • 127,565 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 73,662 篇 工学
    • 49,083 篇 计算机科学与技术...
    • 39,937 篇 软件工程
    • 18,746 篇 信息与通信工程
    • 12,202 篇 控制科学与工程
    • 10,780 篇 电气工程
    • 10,135 篇 电子科学与技术(可...
    • 9,125 篇 生物工程
    • 7,223 篇 生物医学工程(可授...
    • 6,781 篇 光学工程
    • 5,173 篇 机械工程
    • 4,620 篇 化学工程与技术
    • 4,292 篇 仪器科学与技术
    • 4,228 篇 动力工程及工程热...
    • 4,011 篇 材料科学与工程(可...
    • 3,648 篇 网络空间安全
    • 3,192 篇 安全科学与工程
  • 43,173 篇 理学
    • 19,825 篇 数学
    • 15,518 篇 物理学
    • 10,338 篇 生物学
    • 6,666 篇 统计学(可授理学、...
    • 5,184 篇 化学
    • 4,486 篇 系统科学
  • 19,136 篇 管理学
    • 11,996 篇 管理科学与工程(可...
    • 8,065 篇 图书情报与档案管...
    • 5,577 篇 工商管理
  • 7,184 篇 医学
    • 5,945 篇 临床医学
    • 5,463 篇 基础医学(可授医学...
    • 3,399 篇 药学(可授医学、理...
    • 3,198 篇 公共卫生与预防医...
  • 3,651 篇 法学
    • 2,976 篇 社会学
  • 2,258 篇 经济学
  • 2,140 篇 农学
  • 1,106 篇 教育学
  • 554 篇 文学
  • 292 篇 军事学
  • 137 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 4,758 篇 accuracy
  • 3,869 篇 deep learning
  • 3,457 篇 feature extracti...
  • 3,357 篇 computer science
  • 3,062 篇 computational mo...
  • 3,005 篇 machine learning
  • 2,865 篇 training
  • 2,477 篇 convolutional ne...
  • 2,287 篇 real-time system...
  • 2,132 篇 support vector m...
  • 2,132 篇 predictive model...
  • 1,972 篇 internet of thin...
  • 1,617 篇 artificial intel...
  • 1,577 篇 data models
  • 1,572 篇 optimization
  • 1,424 篇 neural networks
  • 1,419 篇 security
  • 1,254 篇 data mining
  • 1,178 篇 wireless sensor ...
  • 1,135 篇 computer archite...

机构

  • 2,178 篇 chitkara univers...
  • 1,083 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 956 篇 physikalisches i...
  • 950 篇 oliver lodge lab...
  • 928 篇 university of ch...
  • 599 篇 infn sezione di ...
  • 598 篇 infn laboratori ...
  • 577 篇 infn sezione di ...
  • 549 篇 infn sezione di ...
  • 543 篇 school of physic...
  • 542 篇 fakultät physik ...
  • 533 篇 horia hulubei na...
  • 525 篇 department of ph...
  • 523 篇 school of physic...
  • 519 篇 school of comput...
  • 514 篇 imperial college...
  • 510 篇 h.h. wills physi...
  • 498 篇 stfc rutherford ...
  • 494 篇 nikhef national ...

作者

  • 255 篇 barter w.
  • 253 篇 a. gomes
  • 242 篇 c. alexa
  • 239 篇 j. m. izen
  • 234 篇 c. amelung
  • 234 篇 blake t.
  • 234 篇 j. wang
  • 232 篇 g. bella
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 232 篇 beiter a.
  • 231 篇 s. chen
  • 227 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 214 篇 g. spigo

语言

  • 108,359 篇 英文
  • 17,807 篇 其他
  • 1,520 篇 中文
  • 142 篇 日文
  • 20 篇 德文
  • 20 篇 法文
  • 16 篇 斯洛文尼亚文
  • 15 篇 朝鲜文
  • 3 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 波兰文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science Engineering Sreyas Institute of Engineering and Technology"
127565 条 记 录,以下是611-620 订阅
排序:
VireNet-SSD: object detection model for resource-constrained applications based on self-organized operational neural networks
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8547-8569页
作者: Kamath, Vidya Renuka, A. Department of Computer Science and Engineering Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India
Discovering deep learning-based computer vision solutions for use with constrained devices is exceptionally hard, and the trade-offs are often too undermining. Deep learning models are enormous, which makes it challen... 详细信息
来源: 评论
Challenge Response Protocol using Multivariate Polynomial Cryptography
Challenge Response Protocol using Multivariate Polynomial Cr...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Jaiswal, Chandra Keshwar Sharma, Arpit Chaturvedi, Atul Allenhouse Institute of Technology Computer Science and Engineering Kanpur India
The objective of this paper is to define the meaning of a multivariate public key using two or more multivariate encrypted parties A and B which targets to improve the existing multivariate public key encryption. Two ... 详细信息
来源: 评论
Twin attention based multi-task convolutional bidirectional long short term memory for facial expression recognition
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8037-8070页
作者: Sreenivas, Velagapudi Sivaneasan, B. Vani, K. Suvarna Chakrabarti, Prasun Singapore Institute of Technology Singapore138683 Singapore Engineering Cluster Singapore Institute of Technology Singapore138683 Singapore Department of Computer Science and Engineering AI/ML Research Group Head VR Siddhartha Engineering College Andhra Pradesh Vijayawada520007 India Department of Computer Science and Engineering Sir Padampat Singhania University Rajasthan Udaipur313601 India
Facial Expression Recognition (FER) aims to detect the emotional state of facial images. It is playing an increasingly important role in several application areas, including human–computer interaction (HCI), video tr... 详细信息
来源: 评论
Analysis of community question-answering issues via machine learning and deep learning:State-of-the-art review
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第1期8卷 95-117页
作者: Pradeep Kumar Roy Sunil Saumya Jyoti Prakash Singh Snehasish Banerjee Adnan Gutub Department of Computer Science and Engineering Indian Institute of Information TechnologySuratIndia Indian Institute of Information Technology DharwadIndia Department of Computer Science and Engineering National Institute of TechnologyPatnaIndia The York Management School University of YorkYorkUK Computer Engineering Department College of Computer&Information SystemsUmm Al-Qura UniversityMakkahSaudi Arabia
Over the last couple of decades,community question-answering sites(CQAs)have been a topic of much academic *** have often leveraged traditional machine learning(ML)and deep learning(DL)to explore the ever-growing volu... 详细信息
来源: 评论
Proposed Solution for Currency Classification and Fake Currency Detection Using Machine Learning  4
Proposed Solution for Currency Classification and Fake Curre...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Narale, Dnyaneshwari. B. Pujar, Anita. M. Pardeshi, K.R. Walchand Institute of Technology Computer Science and Engineering Solapur India
The rapid advancement of digital technologies has greatly impacted financial systems, creating challenges in accurately classifying currencies and detecting counterfeits in various real-world scenarios. Traditional ap... 详细信息
来源: 评论
DNA Computing with Water Strider Based Vector Quantization for Data Storage Systems
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6429-6444页
作者: A.Arokiaraj Jovith S.Rama Sree Gudikandhula Narasimha Rao K.Vijaya Kumar Woong Cho Gyanendra Prasad Joshi Sung Won Kim Department of Networking and Communications College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science Engineering Aditya Engineering CollegeSurampalemAndhra Pradesh533437India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Computer Science and Engineering Vignan’s Institute of Engineering for WomenVisakhapatnam530049India Department of Software Convergence Daegu Catholic UniversityGyeongsan38430Korea Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-siGyeongbuk-do38541Korea
The exponential growth of data necessitates an effective data storage scheme,which helps to effectively manage the large quantity of *** accomplish this,Deoxyribonucleic Acid(DNA)digital data storage process can be em... 详细信息
来源: 评论
Advancements in Isogeny-Based Cryptography: A Mathematical Approach to Post-Quantum Security
Advancements in Isogeny-Based Cryptography: A Mathematical A...
收藏 引用
2025 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2025
作者: Soni, Abhay Singh, Sunidhi Chaturvedi, Atul Allenhouse Institute of Technology Computer Science and Engineering Kanpur India
In this paper, we have discussed isogeny-based cryptography as a rather appealing option for post-quantum security. We provide analysis of current protocols like SIDH (Supersingular Isogeny Diffie-Hellman) and SIKE (S... 详细信息
来源: 评论
Performance Evaluation of Biometric Authentication Using Fragment Jaya Optimizer-Based Deep CNN with Multi-kernel SVM
收藏 引用
SN computer science 2024年 第4期5卷 1-9页
作者: Umasankari, N. Muthukumar, B. Shanmuganathan, C. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India School of Computing Department of CSE Sathyabama Institute of Science and Technology Chennai India Rajalakshmi Engineering College Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
The earlier research clearly indicated that the bimodal authentication system has more efficiency than unimodal and multimodal. This is due to the reason for the best intact biometric traits of fingerprint and retina.... 详细信息
来源: 评论
Contemporary Approaches to Analyze Non-stationary Time-series: Some Solutions and Challenges
收藏 引用
Recent Advances in computer science and Communications 2023年 第2期16卷 61-80页
作者: Dixit, Ankit Jain, Shikha Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Enhancement of technology yields more complex time-dependent outcomes for better understanding and analysis. These outcomes generate more complex, unstable, and high-dimensional data from non-stationary environments. ... 详细信息
来源: 评论
Comprehensive insights into healthcare IoT: the role of machine learning and deep learning approaches
收藏 引用
Multimedia Tools and Applications 2025年 1-42页
作者: Kumar, Atul Dewang, Rupesh Kumar Computer Science and Engineering Department Motilal Nehru National Institute of Technology Allahabad Uttar Pradesh Prayagraj211004 India
Conventional healthcare systems have long struggled to address the varied needs of large patient populations, often leading to inefficiencies and less-than-optimal outcomes. Yet, the advent of machine learning (ML) an... 详细信息
来源: 评论