咨询与建议

限定检索结果

文献类型

  • 92,076 篇 会议
  • 40,911 篇 期刊文献
  • 1,204 册 图书

馆藏范围

  • 134,191 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 77,154 篇 工学
    • 50,778 篇 计算机科学与技术...
    • 41,288 篇 软件工程
    • 19,491 篇 信息与通信工程
    • 12,743 篇 控制科学与工程
    • 11,488 篇 电气工程
    • 10,643 篇 电子科学与技术(可...
    • 9,515 篇 生物工程
    • 7,630 篇 生物医学工程(可授...
    • 7,117 篇 光学工程
    • 5,539 篇 机械工程
    • 5,320 篇 化学工程与技术
    • 4,798 篇 材料科学与工程(可...
    • 4,762 篇 动力工程及工程热...
    • 4,476 篇 仪器科学与技术
    • 3,813 篇 网络空间安全
    • 3,388 篇 安全科学与工程
  • 45,932 篇 理学
    • 20,594 篇 数学
    • 17,031 篇 物理学
    • 10,820 篇 生物学
    • 6,868 篇 统计学(可授理学、...
    • 5,819 篇 化学
    • 4,637 篇 系统科学
  • 19,910 篇 管理学
    • 12,563 篇 管理科学与工程(可...
    • 8,299 篇 图书情报与档案管...
    • 5,884 篇 工商管理
  • 7,631 篇 医学
    • 6,290 篇 临床医学
    • 5,797 篇 基础医学(可授医学...
    • 3,615 篇 药学(可授医学、理...
    • 3,399 篇 公共卫生与预防医...
  • 3,769 篇 法学
    • 3,069 篇 社会学
  • 2,443 篇 经济学
  • 2,308 篇 农学
  • 1,145 篇 教育学
  • 560 篇 文学
  • 309 篇 军事学
  • 140 篇 艺术学
  • 12 篇 哲学
  • 9 篇 历史学

主题

  • 5,003 篇 accuracy
  • 4,046 篇 deep learning
  • 3,573 篇 feature extracti...
  • 3,363 篇 computer science
  • 3,161 篇 computational mo...
  • 3,120 篇 machine learning
  • 2,971 篇 training
  • 2,629 篇 convolutional ne...
  • 2,484 篇 real-time system...
  • 2,237 篇 predictive model...
  • 2,214 篇 support vector m...
  • 2,112 篇 internet of thin...
  • 1,673 篇 artificial intel...
  • 1,641 篇 data models
  • 1,630 篇 optimization
  • 1,496 篇 neural networks
  • 1,471 篇 security
  • 1,254 篇 data mining
  • 1,249 篇 wireless sensor ...
  • 1,152 篇 computer archite...

机构

  • 2,179 篇 chitkara univers...
  • 1,089 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 965 篇 physikalisches i...
  • 957 篇 oliver lodge lab...
  • 935 篇 university of ch...
  • 600 篇 infn sezione di ...
  • 599 篇 infn laboratori ...
  • 575 篇 infn sezione di ...
  • 557 篇 fakultät physik ...
  • 554 篇 infn sezione di ...
  • 542 篇 school of physic...
  • 538 篇 horia hulubei na...
  • 524 篇 school of physic...
  • 524 篇 department of ph...
  • 523 篇 school of comput...
  • 513 篇 imperial college...
  • 511 篇 h.h. wills physi...
  • 497 篇 stfc rutherford ...
  • 493 篇 nikhef national ...

作者

  • 260 篇 barter w.
  • 254 篇 a. gomes
  • 243 篇 c. alexa
  • 240 篇 j. m. izen
  • 235 篇 blake t.
  • 234 篇 c. amelung
  • 234 篇 j. wang
  • 233 篇 s. chen
  • 232 篇 g. bella
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 229 篇 beiter a.
  • 226 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 113,871 篇 英文
  • 18,880 篇 其他
  • 1,564 篇 中文
  • 142 篇 日文
  • 48 篇 德文
  • 48 篇 法文
  • 16 篇 斯洛文尼亚文
  • 15 篇 朝鲜文
  • 4 篇 阿拉伯文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering SRM Institute of Science And Technology"
134191 条 记 录,以下是4821-4830 订阅
排序:
A Comprehensive Review on Deep Learning System Testing  24th
A Comprehensive Review on Deep Learning System Testing
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Ying Shan, Chun Liu, Zhen Liao, Shuyan Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Computer School Beijing Information Science and Technology University Beijing China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing China
Deep learning(DL) systems exhibit multiple behavioral characteristics such as correctness, robustness, and fairness. Ensuring that these behavioral characteristics function properly is crucial for maintaining the accu... 详细信息
来源: 评论
Enhanced Cloud Data Security with Lightweight Chaotic Map and Quantum Key Distribution
Enhanced Cloud Data Security with Lightweight Chaotic Map an...
收藏 引用
2024 International Conference on Knowledge engineering and Communication Systems, ICKECS 2024
作者: Devi, M. Varshana Aasha, G. Vimal, P. Gowtham, K. Nivitha, K. K. S. Rangasamy College of Technology Computer Science and Engineering Tiruchengode637 215 India Vellore Institute of Technology Computer Science and Engineering Vellore632014 India
In today's digital landscape, ensuring the security of data transmitted and stored in the cloud is paramount. Traditional encryption methods face challenges in scalability and susceptibility to quantum threats. Th... 详细信息
来源: 评论
Reliable Fetal Health Assessment through Ensemble Techniques in Machine Learning  5
Reliable Fetal Health Assessment through Ensemble Techniques...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Rajkumar, M. Madhan, E.S. Karthikeyan, D. Gopal, Mohanraj Nithish, G. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore Campus Tamil Nadu India Vellore Institute of Technology School of Computer Science and Engineering Tamil Nadu Vellore632014 India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore Campus Tamil Nadu India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Tamil Nadu Vellore632104 India Vellore Institute of Technology Vellore Campus Tamil Nadu India
Ensuring the well-being of foetuses during pregnancy is crucial for preventing child and maternal mortality, aligning with the United Nations' Sustainable Development Goals. Utilizing a dataset of 2126 records fro... 详细信息
来源: 评论
FMHADP:Design of an Efficient Pre-Forensic Layer for Mitigating Hybrid Attacks via Deep Learning Pattern Analysis
收藏 引用
Journal of Harbin institute of technology(New Series) 2024年 第5期31卷 55-67页
作者: Meesala Sravani B Kiran Kumar M Rekha Sundari D Tejaswi Department of Computer Science and Engineering GMR Institute of TechnologyRajam 532127Andhra PradeshIndia Information Technology Anil Neerukonda Institute of Technology&Science(Autonomous)Sangivalasa 531162BheemunipatnamIndia
Network attack detection and mitigation require packet collection,pre-processing,feature analysis,classification,and *** for these tasks sometimes become complex or inefficient when applied to real-time data *** mitig... 详细信息
来源: 评论
Predicting and Curing Depression Using Long Short Term Memory and Global Vector
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5837-5852页
作者: Ayan Kumar Abdul Quadir Md J.Christy Jackson Celestine Iwendi School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India School of Creative Technologies University of BoltonBoltonUK
In today’s world, there are many people suffering from mentalhealth problems such as depression and anxiety. If these conditions are notidentified and treated early, they can get worse quickly and have far-reachingne... 详细信息
来源: 评论
Patterns of Widespread Structural Abnormalities in Autism Spectrum Disorder using Diffusion Tensor Imaging
Patterns of Widespread Structural Abnormalities in Autism Sp...
收藏 引用
2024 International Conference on Communication, computer sciences and engineering, IC3SE 2024
作者: Bharti, Dilip Kumar Singh, Sanjay Kumar Kumar, Mukesh Kanaujia, Vishal Kumar Aeri, Manisha Abes Engineering College Computer Science And Engineering-Data Science Ghaziabad India Kashi Institute Of Technology Department Of Computer Science & Applications Mirzamurad U.P Varanasi India Graphic Era Hill University Computer Science And Engineering Uttarakhand Dehradun248002 India Abes Engineering College Computer Science And Engineering Data Science Department Ghaziabad India
Diffusion tensor imaging (DTI) is a neuroimaging approach that lets in for the visualization and quantification of the structural integrity of white depend fibers in the brain. In latest years, DTI has come to be an e... 详细信息
来源: 评论
Cooperative Caching Strategy Based on Two-Layer Caching Model for Remote Sensing Satellite Networks
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3903-3922页
作者: Rui Xu Xiaoqiang Di Hao Luo Hui Qi Xiongwen He Wenping Lei School of Computer Science and Technology Changchun University of Science and TechnologyChangchun130022China School of Information Engineering Henan Institute of Science and TechnologyXinxiang453003China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and TechnologyChangchun130022China Information Center Changchun University of Science and TechnologyChangchun130022China Beijing Institute of Spacecraft System Engineering Beijing100094China Beijing Institute of Space Mechanic and Electricity Beijing100094China
In Information Centric Networking(ICN)where content is the object of exchange,in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite *** ... 详细信息
来源: 评论
Exploring diverse topological rough group structures: results and applications
收藏 引用
International Journal of Information technology (Singapore) 2025年 第2期17卷 1197-1205页
作者: Dhanasekar, Keerthana Visalakshi, V. Department of Mathematics College of Engineering and Technology SRM Institute of Science and Technology SRM Nagar Tamil Nadu Kattankulathur 603203 India Department of Mathematics C. Kandaswami Naidu College for Women Tamil Nadu Cuddalore 607001 India
Various topological rough group structures, such as S-topological rough groups, s-topological rough groups, Irr-topological rough groups, and irresolute topological rough groups, naturally arise in numerous topologica... 详细信息
来源: 评论
Integration of smart Sensors and Machine Learning Algorithms for Automated Pest Management  1
Integration of smart Sensors and Machine Learning Algorithms...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Yadav, Krrish Roy, Sritama Vellore Institute of Technology School of Computer Science and Engineering Chennai India Vellore Institute of Technology School of Electronics Engineering Chennai600127 India
This paper presents a new IoT-based approach for agricultural pest control, incorporating machine learning techniques. Traditional pest monitoring methods are labor-intensive and often result in the overuse of pestici... 详细信息
来源: 评论
PrivShape: Extracting Shapes in Time Series under User-Level Local Differential Privacy  40
PrivShape: Extracting Shapes in Time Series under User-Level...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Mao, Yulian Ye, Qingqing Hu, Haibo Wang, Qi Huang, Kai Southern University of Science and Technology Department of Computer Science and Engineering China The Hong Kong Polytechnic University Department of Electrical and Electronic Engineering Hong Kong Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology China School of Computer Science and Engineering Macau University of Science and Technology China
Time series have numerous applications in finance, healthcare, IoT, and smart city. In many of these applications, time series typically contain personal data, so privacy infringement may occur if they are released di... 详细信息
来源: 评论