咨询与建议

限定检索结果

文献类型

  • 89,629 篇 会议
  • 38,976 篇 期刊文献
  • 1,183 册 图书

馆藏范围

  • 129,788 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 74,886 篇 工学
    • 50,072 篇 计算机科学与技术...
    • 40,496 篇 软件工程
    • 19,360 篇 信息与通信工程
    • 12,862 篇 控制科学与工程
    • 11,111 篇 电气工程
    • 10,298 篇 电子科学与技术(可...
    • 9,172 篇 生物工程
    • 7,291 篇 生物医学工程(可授...
    • 6,966 篇 光学工程
    • 5,333 篇 机械工程
    • 4,860 篇 化学工程与技术
    • 4,421 篇 仪器科学与技术
    • 4,392 篇 动力工程及工程热...
    • 3,983 篇 网络空间安全
    • 3,979 篇 材料科学与工程(可...
    • 3,370 篇 安全科学与工程
  • 44,002 篇 理学
    • 20,064 篇 数学
    • 15,894 篇 物理学
    • 10,429 篇 生物学
    • 6,723 篇 统计学(可授理学、...
    • 5,440 篇 化学
    • 4,503 篇 系统科学
  • 19,645 篇 管理学
    • 12,383 篇 管理科学与工程(可...
    • 8,244 篇 图书情报与档案管...
    • 5,639 篇 工商管理
  • 7,442 篇 医学
    • 6,057 篇 临床医学
    • 5,520 篇 基础医学(可授医学...
    • 3,411 篇 药学(可授医学、理...
    • 3,372 篇 公共卫生与预防医...
  • 3,746 篇 法学
    • 3,065 篇 社会学
  • 2,293 篇 经济学
  • 2,173 篇 农学
  • 1,124 篇 教育学
  • 605 篇 文学
  • 296 篇 军事学
  • 138 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 4,903 篇 accuracy
  • 4,049 篇 deep learning
  • 3,520 篇 feature extracti...
  • 3,363 篇 computer science
  • 3,117 篇 machine learning
  • 3,102 篇 computational mo...
  • 2,892 篇 training
  • 2,560 篇 convolutional ne...
  • 2,368 篇 real-time system...
  • 2,179 篇 predictive model...
  • 2,154 篇 support vector m...
  • 2,003 篇 internet of thin...
  • 1,702 篇 artificial intel...
  • 1,624 篇 data models
  • 1,609 篇 optimization
  • 1,469 篇 neural networks
  • 1,453 篇 security
  • 1,247 篇 data mining
  • 1,192 篇 wireless sensor ...
  • 1,155 篇 computer archite...

机构

  • 2,249 篇 chitkara univers...
  • 1,089 篇 cavendish labora...
  • 1,021 篇 department of ph...
  • 968 篇 physikalisches i...
  • 957 篇 oliver lodge lab...
  • 953 篇 university of ch...
  • 601 篇 infn laboratori ...
  • 600 篇 infn sezione di ...
  • 575 篇 infn sezione di ...
  • 555 篇 fakultät physik ...
  • 554 篇 infn sezione di ...
  • 544 篇 school of physic...
  • 538 篇 horia hulubei na...
  • 537 篇 school of comput...
  • 524 篇 school of physic...
  • 524 篇 department of ph...
  • 513 篇 imperial college...
  • 511 篇 h.h. wills physi...
  • 497 篇 stfc rutherford ...
  • 495 篇 nikhef national ...

作者

  • 261 篇 barter w.
  • 254 篇 a. gomes
  • 244 篇 c. alexa
  • 240 篇 j. m. izen
  • 235 篇 blake t.
  • 235 篇 j. wang
  • 234 篇 c. amelung
  • 233 篇 s. chen
  • 232 篇 g. bella
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 226 篇 bellee v.
  • 225 篇 beiter a.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 g. spigo

语言

  • 103,383 篇 英文
  • 25,010 篇 其他
  • 1,639 篇 中文
  • 142 篇 日文
  • 23 篇 德文
  • 23 篇 斯洛文尼亚文
  • 22 篇 法文
  • 15 篇 朝鲜文
  • 3 篇 阿拉伯文
  • 3 篇 俄文
  • 2 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Silicon Institute of Technology"
129788 条 记 录,以下是771-780 订阅
排序:
Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques
收藏 引用
Cyber-Physical Systems 2023年 第3期9卷 244-259页
作者: Kshirsagar, Deepak Kumar, Sandeep Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee India Department of Computer Engineering and IT College of Engineering Pune Pune India
The use of machine learning models in intrusion detection systems (IDSs) takes more time to build the model with many features and degrade the performance. The present paper proposes an ensemble of filter feature sele... 详细信息
来源: 评论
PUPC-GANs: A Novel Image Conversion Model using Modified CycleGANs in Healthcare
收藏 引用
Recent Advances in computer science and Communications 2023年 第7期16卷 66-73页
作者: Taneja, Shweta Suri, Bhawna Kumar, Aman Chowdhry, Ashish Kumar, Harsh Dwivedi, Kautuk Department Computer Science & Engineering Bhagwan Parshuram Institute of Technology GGSIPU Delhi India
Introduction: Magnetic Resonance Imaging (MRI) and Computed Tomography (CT) both have their areas of specialty in the medical imaging world. MRI is considered to be a safer modality as it exploits the magnetic propert... 详细信息
来源: 评论
Reconstruction probability-based anomaly detection using variational auto-encoders
收藏 引用
International Journal of computers and Applications 2023年 第3期45卷 231-237页
作者: Iqbal, Touseef Qureshi, Shaima Department of Computer Science and Engineering National Institute of Technology Jammu and Kashmir Srinagar India
Anomaly detection is a method of categorizing unexpected data points or events in a dataset. Variational Auto-Encoders (VAEs) have proved to handle complex problems in a variety of disciplines. We propose a technique ... 详细信息
来源: 评论
Deep learning model for plant-leaf disease detection in precision agriculture
收藏 引用
International Journal of Intelligent Systems Technologies and Applications 2023年 第1期21卷 72-91页
作者: Bajpai, Chandrabhanu Sahu, Ramnarayan Naik, K. Jairam Department of Computer Science and Engineering National Institute of Technology Raipur Chhattisgarh Raipur India
Crop disease in the agricultural is the main factor limiting yield and food quality. It requires timely diagnosis of crop illnesses for the better economy developing country. Manual crop illness assessment is limited ... 详细信息
来源: 评论
PERFORMANCE TEST OF V2X VEHICLE COLLISION WARNING ALGORITHM BASED ON COMBINATION OF VIRTUAL REALITY FUSION
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2023年 第2期85卷 111-124页
作者: Han, Baojian Zhang, Yu Liu, Yunxiang Zhu, Jianlin Zhang, Qing School of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai201418 China
Proposing a performance testing methodology for vehicle collision warning algorithm at intersections, this approach addresses the issues of the key V2X technology being challenging to simulate with real-scene data in ... 详细信息
来源: 评论
A Privacy-Preserving Quantum Blockchain Technique for Electronic Medical Records
收藏 引用
IEEE engineering Management Review 2023年 第4期51卷 137-144页
作者: Venkatesh, Ranjitha Hanumantha, Brahmananda Savadatti Gandhi Institute of Technology and Management Department of Computer Science Engineering Bengaluru561203 India
Nowadays, electronic medical records are increasing rapidly. Electronic medical records consist of sensitive and confidential information. These pieces of information need to be protected from attackers during the exc... 详细信息
来源: 评论
Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods
收藏 引用
International Journal of Cloud Computing 2023年 第5期12卷 450-481页
作者: Devi, B.S. Kiruthika Subbulakshmi, T. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India
Cloud computing has emerged as the most successful service model for the IT/ITES community due to the various long-term incentives offered in terms of reduced cost, availability, reliability and improved QoS to the cl... 详细信息
来源: 评论
An Efficient Real Time Decision Making System for Autonomous Vehicle Using Timber Chased Wolf Optimization Based Ensemble Classifier
收藏 引用
Journal of engineering science and technology Review 2023年 第1期16卷 75-84页
作者: Jaiswal, Swati Mohan, B. Chandra School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
An autonomous vehicle is anticipated to increase comfort, safety, energy efficiency, emissions reduction, and mobility. The development of autonomous vehicles depends on decision-making algorithms that can handle comp... 详细信息
来源: 评论
Fuzzing:Progress,Challenges,and Perspectives
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1-29页
作者: Zhenhua Yu Zhengqi Liu Xuya Cong Xiaobo Li Li Yin Institute of Systems Security and Control College of Computer Science and TechnologyXi'an University of Science and TechnologyXi'an710054China School of Mathematics and Information Science Baoji University of Arts and SciencesBaoji721013China Institute of Systems Engineering Macao University of Science and TechnologyTaipaMacaoChina
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi... 详细信息
来源: 评论
A Network Model to Study the Underlying Characteristics of Phishing Sites
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第1期6卷 46-49页
作者: Gayen, Avijit Santra, Sukriti Dey, Ayush Jana, Angshuman Indian Institute of Information Technology Guwahati Department of Computer Science and Engineering Guwahati781015 India Swami Vivekanda University Department of Computer Science and Engineering Kolkata700121 India Techno India University Department of Computer Science and Engineering Kolkata700091 India
In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into... 详细信息
来源: 评论