咨询与建议

限定检索结果

文献类型

  • 88,304 篇 会议
  • 38,561 篇 期刊文献
  • 1,182 册 图书

馆藏范围

  • 128,047 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 73,889 篇 工学
    • 49,261 篇 计算机科学与技术...
    • 40,143 篇 软件工程
    • 18,806 篇 信息与通信工程
    • 12,255 篇 控制科学与工程
    • 10,788 篇 电气工程
    • 10,143 篇 电子科学与技术(可...
    • 9,145 篇 生物工程
    • 7,252 篇 生物医学工程(可授...
    • 6,939 篇 光学工程
    • 5,190 篇 机械工程
    • 4,793 篇 化学工程与技术
    • 4,329 篇 仪器科学与技术
    • 4,273 篇 动力工程及工程热...
    • 3,901 篇 材料科学与工程(可...
    • 3,652 篇 网络空间安全
    • 3,204 篇 安全科学与工程
  • 43,594 篇 理学
    • 19,890 篇 数学
    • 15,760 篇 物理学
    • 10,375 篇 生物学
    • 6,633 篇 统计学(可授理学、...
    • 5,300 篇 化学
    • 4,501 篇 系统科学
  • 19,216 篇 管理学
    • 12,049 篇 管理科学与工程(可...
    • 8,088 篇 图书情报与档案管...
    • 5,606 篇 工商管理
  • 7,240 篇 医学
    • 5,996 篇 临床医学
    • 5,502 篇 基础医学(可授医学...
    • 3,404 篇 药学(可授医学、理...
    • 3,221 篇 公共卫生与预防医...
  • 3,664 篇 法学
    • 2,986 篇 社会学
  • 2,275 篇 经济学
  • 2,150 篇 农学
  • 1,109 篇 教育学
  • 555 篇 文学
  • 293 篇 军事学
  • 134 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 4,637 篇 accuracy
  • 3,810 篇 deep learning
  • 3,407 篇 feature extracti...
  • 3,363 篇 computer science
  • 2,998 篇 computational mo...
  • 2,982 篇 machine learning
  • 2,833 篇 training
  • 2,461 篇 convolutional ne...
  • 2,181 篇 real-time system...
  • 2,100 篇 support vector m...
  • 2,095 篇 predictive model...
  • 1,935 篇 internet of thin...
  • 1,616 篇 artificial intel...
  • 1,540 篇 optimization
  • 1,538 篇 data models
  • 1,439 篇 neural networks
  • 1,370 篇 security
  • 1,233 篇 data mining
  • 1,168 篇 wireless sensor ...
  • 1,136 篇 computer archite...

机构

  • 2,176 篇 chitkara univers...
  • 1,088 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 959 篇 physikalisches i...
  • 958 篇 oliver lodge lab...
  • 943 篇 university of ch...
  • 599 篇 infn sezione di ...
  • 597 篇 infn laboratori ...
  • 572 篇 infn sezione di ...
  • 551 篇 fakultät physik ...
  • 550 篇 infn sezione di ...
  • 543 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 526 篇 department of ph...
  • 522 篇 school of physic...
  • 514 篇 school of comput...
  • 514 篇 imperial college...
  • 512 篇 h.h. wills physi...
  • 500 篇 stfc rutherford ...
  • 500 篇 nikhef national ...

作者

  • 254 篇 a. gomes
  • 251 篇 barter w.
  • 244 篇 c. alexa
  • 240 篇 j. m. izen
  • 237 篇 j. wang
  • 235 篇 c. amelung
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 d. calvet
  • 233 篇 s. chen
  • 229 篇 beiter a.
  • 229 篇 blake t.
  • 223 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 g. spigo
  • 213 篇 brundu d.

语言

  • 118,268 篇 英文
  • 8,290 篇 其他
  • 1,507 篇 中文
  • 142 篇 日文
  • 15 篇 朝鲜文
  • 14 篇 法文
  • 13 篇 德文
  • 10 篇 斯洛文尼亚文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Engineering Silicon Institute of Technology"
128047 条 记 录,以下是301-310 订阅
排序:
Intelligent surveillance support system
收藏 引用
Discover Internet of Things 2023年 第1期3卷 9页
作者: Saketh, Meduri Nandal, Neha Tanwar, Rohit Reddy, B. Pradyun Department of Computer Science Engineering Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad India Geethanjali College of Engineering and Technology Hyderabad India School of Computer Science University of Petroleum and Energy Studies Dehradun India Department of Computer Science Engineering Sreenidhi Institute of Engineering and Technology Hyderabad India
The Intelligent Surveillance Support System(ISSS) is an innovative software solution that enables real-time monitoring and analysis of security footage to detect and identify potential threats. This system incorporate... 详细信息
来源: 评论
Optimization enabled LeNet for big data classification using MapReduce framework on COVID-19 data
收藏 引用
Australian Journal of Electrical and Electronics engineering 2024年 第4期21卷 409-424页
作者: Patle, Bhagyashree R. Vijayarajan, V. VIT Vellore India School of Computer Science and Engineering Vellore Institute of Technology Vellore India
The big data clustering is a requisite for generating the data in the digitalised globe. The old-fashioned clustering approaches are not large sized and highly unorganised big data. Thus, to obtain the efficiency of b... 详细信息
来源: 评论
Person re-identification using vision transformer and centroid triplet loss
收藏 引用
Multimedia Tools and Applications 2024年 第29期83卷 73777-73788页
作者: Ijjina, Earnest Paul Medipelly, Rampavan Beerukuri, Santosh Kumar Vinnakota, Sowmya Nelakurthi, Vijay Chowdary Department of Computer Science and Engineering National Institute of Technology Warangal Telangana Warangal506004 India
In the current digital era, video surveillance has become a part of daily life. The person re-identification(re-ID) task involves choosing a person as a target in one camera feed and recognizing that target in footage... 详细信息
来源: 评论
PCA-IFNNR: Principal component analysis based image fusion directed nearest neighbor representation for dark face image super resolution
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Kumar, Banti Rajput, Shyam Singh Department of Computer Science & amp Engineering National Institute of Technology Patna Patna800005 India
Facial image captured under uncontrolled environment often degraded by blur, noise and low-light effect which significantly affect the performance of different real life applications. To solve this problem numerous fa... 详细信息
来源: 评论
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science and Engineering University College of EngineeringTindivanamMelpakkamTamil nadu 604001India Department of Computer Engineering National Institute of Technology KurukshetraIndia
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri... 详细信息
来源: 评论
Mining user's navigation structure by filtering impurity nodes for generating relevant predictions
收藏 引用
International Journal of Cognitive Computing in engineering 2023年 第1期4卷 248-258页
作者: Jindal, Honey Sardana, Neetu Vidyarthi, Ankit Gupta, Deepak Mahmud, Mufti Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India Department of Computer Science and Engineering Maharaja Agrasen Institute of Technology Delhi India United Kingdom
Web Navigation Prediction (WNP) has been popularly used for finding future probable web pages. Obtaining relevant information from a large web is challenging, as its size is growing with every second. Web data may con... 详细信息
来源: 评论
Sentiment analysis of multi social media using machine and deep learning models: a review
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90033-90051页
作者: Vasanthi, P. Madhu Viswanatham, V. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India
The Internet has become an important origin of text information, which is then used inside a wide range of research domains. This has been regarded as a necessary foundation for institutions to obtain valuable informa... 详细信息
来源: 评论
Deep Learning Based Face Detection and Identification of Criminal Suspects
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2331-2343页
作者: S.Sandhya A.Balasundaram Ayesha Shaik School of Computer Science and Engineering Vellore Institute of Technology(VIT)Chennai600127India School of Computer Science and Engineering Center for Cyber Physical SystemsVellore Institute of Technology(VIT)Chennai600127India
Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past *** of the most tedious tasks is to track a suspect once a crime is *** most ... 详细信息
来源: 评论
Blockchain-based rumor detection approach for COVID-19
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 435-449页
作者: Rani, Poonam Jain, Vibha Shokeen, Jyoti Balyan, Arnav Department of Computer Engineering Netaji Subhas University of Technology Delhi India Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Haryana Rohtak India
The ubiquity of handheld devices and easy access to the Internet help users get easy and quick updates from social media. Generally, people share information with their friends and groups without inspecting the posts... 详细信息
来源: 评论
Enhanced Cybercrime Detection on Twitter Using Aho-Corasick Algorithm and Machine Learning Techniques
收藏 引用
Informatica (Slovenia) 2024年 第18期48卷 97-108页
作者: Rawat, Romil Raj, A. Samson Arun Chakrawarti, Rajesh Kumar Sankaran, Krishnan Sakthidasan Sarangi, Sanjaya Kumar Rawat, Hitesh Rawat, Anjali Department of Computer Science Engineering Shri Vaishnav Institute of Information Technology Shri Vaishnav Vidyapeeth Vishwavidyalaya Indore India Division of Computer Science and Engineering School of Computer Science and Technology Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India MP Indore India Department od Electronics and Communication Engeneering Hindustan Institute of Technology and Science Chennai India Department of Computer Science and Engineering Utkal University Bhubaneswar India Department of Business Management and Economics University of Extremadura Spain Department of Computer and Communication Technology University of Extremadura Spain
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ... 详细信息
来源: 评论