咨询与建议

限定检索结果

文献类型

  • 111,945 篇 会议
  • 52,968 篇 期刊文献
  • 1,535 册 图书

馆藏范围

  • 166,448 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 96,672 篇 工学
    • 63,119 篇 计算机科学与技术...
    • 51,272 篇 软件工程
    • 23,332 篇 信息与通信工程
    • 15,422 篇 控制科学与工程
    • 13,902 篇 电气工程
    • 13,488 篇 电子科学与技术(可...
    • 11,722 篇 生物工程
    • 9,523 篇 生物医学工程(可授...
    • 9,051 篇 光学工程
    • 6,663 篇 机械工程
    • 6,441 篇 化学工程与技术
    • 5,596 篇 材料科学与工程(可...
    • 5,536 篇 仪器科学与技术
    • 5,365 篇 动力工程及工程热...
    • 4,105 篇 网络空间安全
    • 3,880 篇 安全科学与工程
  • 57,965 篇 理学
    • 26,695 篇 数学
    • 21,224 篇 物理学
    • 13,441 篇 生物学
    • 8,942 篇 统计学(可授理学、...
    • 7,213 篇 化学
    • 5,979 篇 系统科学
  • 24,177 篇 管理学
    • 14,933 篇 管理科学与工程(可...
    • 10,298 篇 图书情报与档案管...
    • 7,035 篇 工商管理
  • 9,475 篇 医学
    • 7,864 篇 临床医学
    • 7,077 篇 基础医学(可授医学...
    • 4,433 篇 药学(可授医学、理...
    • 3,918 篇 公共卫生与预防医...
  • 4,507 篇 法学
    • 3,723 篇 社会学
  • 2,802 篇 经济学
  • 2,652 篇 农学
  • 1,482 篇 教育学
  • 674 篇 文学
  • 371 篇 军事学
  • 191 篇 艺术学
  • 23 篇 哲学
  • 13 篇 历史学

主题

  • 5,514 篇 accuracy
  • 4,887 篇 computer science
  • 4,444 篇 deep learning
  • 4,104 篇 feature extracti...
  • 3,781 篇 computational mo...
  • 3,723 篇 machine learning
  • 3,439 篇 training
  • 2,752 篇 convolutional ne...
  • 2,582 篇 real-time system...
  • 2,576 篇 predictive model...
  • 2,540 篇 support vector m...
  • 2,203 篇 internet of thin...
  • 2,030 篇 optimization
  • 2,029 篇 artificial intel...
  • 1,920 篇 data models
  • 1,866 篇 neural networks
  • 1,705 篇 data mining
  • 1,579 篇 security
  • 1,556 篇 computer archite...
  • 1,503 篇 wireless sensor ...

机构

  • 2,177 篇 chitkara univers...
  • 1,085 篇 cavendish labora...
  • 1,035 篇 university of ch...
  • 1,009 篇 department of ph...
  • 957 篇 physikalisches i...
  • 945 篇 oliver lodge lab...
  • 598 篇 infn sezione di ...
  • 585 篇 infn laboratori ...
  • 573 篇 infn sezione di ...
  • 546 篇 infn sezione di ...
  • 545 篇 department of el...
  • 535 篇 fakultät physik ...
  • 534 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 517 篇 school of comput...
  • 517 篇 department of ph...
  • 516 篇 school of physic...
  • 511 篇 h.h. wills physi...
  • 507 篇 imperial college...
  • 495 篇 institute of inf...

作者

  • 260 篇 barter w.
  • 250 篇 a. gomes
  • 241 篇 c. alexa
  • 239 篇 j. m. izen
  • 234 篇 j. wang
  • 234 篇 s. chen
  • 233 篇 blake t.
  • 231 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 230 篇 d. calvet
  • 226 篇 bellee v.
  • 225 篇 beiter a.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 142,648 篇 英文
  • 22,023 篇 其他
  • 1,883 篇 中文
  • 152 篇 日文
  • 35 篇 德文
  • 22 篇 法文
  • 22 篇 朝鲜文
  • 16 篇 斯洛文尼亚文
  • 4 篇 阿拉伯文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Vels Institute of Science and Engineering"
166448 条 记 录,以下是201-210 订阅
排序:
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 2035-2051页
作者: Sandeep Dasari Rajesh Kaluri School of Computer Science Engineering and Information Systems Vellore Institute of TechnologyVellore632014India
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may... 详细信息
来源: 评论
A secure and privacy preserving model for healthcare applications based on blockchain-layered architecture
收藏 引用
International Journal of computers and Applications 2024年 第12期46卷 1206-1218页
作者: Sanober, Adla Anwar, Shamama Department of Computer Science and Engineering Birla Institute of Technology Ranchi Mesra India
Blockchain is one of the emerging technologies that are applied in various fields and its application in Healthcare 4.0 is crucial to handle the vast amount of health records that are growing continuously everyday. Th... 详细信息
来源: 评论
mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
收藏 引用
Journal of Reliable Intelligent Environments 2023年 第3期9卷 333-347页
作者: Prabhakaran, Varun Kulandasamy, Ashokkumar Department of Computer Science and Engineering St.Joseph’s College of Engineering Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st... 详细信息
来源: 评论
A novel binary quantizer for variational autoencoder-based image compressor
收藏 引用
International Journal of computers and Applications 2024年 第8期46卷 604-620页
作者: Thulasidharan, Pillai Praveen Nath, Keshab Department of Computer Science and Engineering Indian Institute of Information Technology Kottayam India
Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t... 详细信息
来源: 评论
Time series forecasting using transformer neural network
收藏 引用
International Journal of computers and Applications 2024年 第10期46卷 880-888页
作者: Bhogade, Vaibhav Nithya, B. Dept. of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Time series forecasting is a vital component of data science, giving essential insights that help decision-makers to predict future trends across a number of sectors. This paper focuses on projecting complicated stock... 详细信息
来源: 评论
Analysis of IoT Applications in Highly Precise Agriculture Farming
收藏 引用
Recent Patents on engineering 2025年 第2期19卷 71-81页
作者: Reddy N, Latha Masila P, Gopinath School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore632014 India
Background: The IoT (Internet of Things) assigns to the capacity of Device-to-Machine (D2M) connections, which is a vital component in the development of the digital economy. IoT integration with a human being enables... 详细信息
来源: 评论
Dimensionality reduction using neural networks for lattice-based cryptographic keys
收藏 引用
International Journal of computers and Applications 2024年 第10期46卷 889-910页
作者: Wahlang, Roisan Chandrasekaran, K. Computer Science and Engineering Department National Institute of Technology Karnataka Surathkal India
Post Quantum Cryptography has received an increasing amount of active research. This has been made prominent by the ever-growing field of quantum computing which poses a formidable threat to the modern cybersecurity l... 详细信息
来源: 评论
Query reformulation system based on WordNet and word vectors clusters
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 9119-9137页
作者: Jumde, Amol Keskar, Ravindra Department of Computer Science and Engineering Visvesvaraya National Institute of Technology Nagpur India
With tremendous evolution in the internet world, the internet has become a household thing. Internet users use search engines or personal assistants to request information from the internet. Search results are greatly... 详细信息
来源: 评论
Generating Long Financial Report Using Conditional Variational Autoencoders With Knowledge Distillation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1669-1680页
作者: Wang, Ziao Ren, Yunpeng Zhang, Xiaofeng Wang, Yiyuan Harbin Institute of Technology Department of Computer Science Engineering Shenzhen518055 China
Generating financial reports from a piece of news is a challenging task due to the lack of sufficient background knowledge to effectively generate long financial reports. To address this issue, this article proposes a... 详细信息
来源: 评论
Enhancing IoT intrusion detection through machine learning with AN-SFS: a novel approach to high performing adaptive feature selection
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-26页
作者: Walling, Supongmen Lodh, Sibesh Department of Computer Science and Engineering National Institute of Technology Nagaland Dimapur India
The vast volume of redundant and irrelevant network traffic data poses significant hurdles for intrusion detection. Effective feature selection is crucial for eliminating irrelevant information. Presently, most filter... 详细信息
来源: 评论