咨询与建议

限定检索结果

文献类型

  • 68,185 篇 会议
  • 36,678 篇 期刊文献
  • 46 册 图书

馆藏范围

  • 104,909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 61,182 篇 工学
    • 37,894 篇 计算机科学与技术...
    • 30,443 篇 软件工程
    • 14,723 篇 信息与通信工程
    • 9,805 篇 电气工程
    • 9,571 篇 控制科学与工程
    • 9,343 篇 电子科学与技术(可...
    • 7,099 篇 生物工程
    • 5,974 篇 生物医学工程(可授...
    • 5,655 篇 光学工程
    • 5,260 篇 化学工程与技术
    • 4,629 篇 材料科学与工程(可...
    • 4,287 篇 动力工程及工程热...
    • 4,185 篇 机械工程
    • 3,634 篇 仪器科学与技术
    • 2,880 篇 网络空间安全
    • 2,560 篇 安全科学与工程
  • 39,798 篇 理学
    • 16,853 篇 物理学
    • 16,674 篇 数学
    • 8,383 篇 生物学
    • 5,813 篇 化学
    • 5,528 篇 统计学(可授理学、...
    • 3,662 篇 系统科学
  • 14,771 篇 管理学
    • 9,334 篇 管理科学与工程(可...
    • 6,060 篇 图书情报与档案管...
    • 4,495 篇 工商管理
  • 6,054 篇 医学
    • 4,944 篇 临床医学
    • 4,544 篇 基础医学(可授医学...
    • 2,792 篇 药学(可授医学、理...
    • 2,652 篇 公共卫生与预防医...
  • 2,914 篇 法学
    • 2,395 篇 社会学
  • 1,924 篇 经济学
  • 1,721 篇 农学
  • 854 篇 教育学
  • 440 篇 文学
  • 219 篇 军事学
  • 93 篇 艺术学
  • 11 篇 哲学
  • 8 篇 历史学

主题

  • 3,211 篇 accuracy
  • 2,831 篇 computer science
  • 2,661 篇 deep learning
  • 2,367 篇 feature extracti...
  • 2,196 篇 machine learning
  • 2,060 篇 computational mo...
  • 1,787 篇 training
  • 1,593 篇 internet of thin...
  • 1,585 篇 support vector m...
  • 1,544 篇 real-time system...
  • 1,523 篇 convolutional ne...
  • 1,402 篇 predictive model...
  • 1,144 篇 optimization
  • 1,035 篇 neural networks
  • 1,014 篇 wireless sensor ...
  • 926 篇 security
  • 923 篇 computer archite...
  • 904 篇 data mining
  • 839 篇 data models
  • 815 篇 image segmentati...

机构

  • 1,979 篇 infn laboratori ...
  • 1,819 篇 infn sezione di ...
  • 1,610 篇 infn sezione di ...
  • 1,359 篇 infn sezione di ...
  • 1,337 篇 infn sezione di ...
  • 1,202 篇 infn sezione di ...
  • 1,134 篇 infn sezione di ...
  • 1,130 篇 infn sezione di ...
  • 1,113 篇 yerevan physics ...
  • 1,076 篇 infn sezione di ...
  • 950 篇 infn sezione di ...
  • 939 篇 physikalisches i...
  • 890 篇 cavendish labora...
  • 875 篇 beihang universi...
  • 857 篇 department of ph...
  • 850 篇 institute of hig...
  • 828 篇 panjab universit...
  • 806 篇 helsinki institu...
  • 805 篇 infn sezione di ...
  • 778 篇 centro brasileir...

作者

  • 493 篇 waltenberger w.
  • 484 篇 lowette s.
  • 455 篇 tavernier s.
  • 412 篇 lemaitre v.
  • 406 篇 skovpen k.
  • 405 篇 adam w.
  • 404 篇 schieck j.
  • 393 篇 sznajder a.
  • 392 篇 vannerom d.
  • 386 篇 tytgat m.
  • 380 篇 tumasyan a.
  • 370 篇 alves g.a.
  • 360 篇 moraes a.
  • 348 篇 van mechelen p.
  • 347 篇 da silveira g.g.
  • 345 篇 delaere c.
  • 340 篇 jeitler m.
  • 336 篇 giammanco a.
  • 334 篇 wulz c.-e.
  • 333 篇 coelho e.

语言

  • 99,666 篇 英文
  • 4,275 篇 其他
  • 1,001 篇 中文
  • 84 篇 日文
  • 23 篇 法文
  • 19 篇 德文
  • 8 篇 斯洛文尼亚文
  • 7 篇 朝鲜文
  • 6 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Engineering Indian Institute of Technology"
104909 条 记 录,以下是41-50 订阅
排序:
A geometric-approach based Combinatorial Transformative Scalogram analysis for multiclass identification of pathologies in a voice signal
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Khumukcham, Ranita Nongmeikapam, Kishorjit Department of Electronics and Communication Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India Department of Computer Science and Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from th... 详细信息
来源: 评论
Comparing HAProxy Scheduling Algorithms during the DDoS Attacks
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第2期6卷 139-142页
作者: Kumar, Anmol Somani, Gaurav Agarwal, Mayank Indian Institute of Technology Patna Department of Computer Science and Engineering Patna800013 India Central University of Rajasthan Department of Computer Science and Engineering Ajmer305817 India
Web-services have become most common IT enablers today. Cyber attacks such as the distributed denial of service (DDoS) attacks pose availability concerns which may result into service outages and consequently financia... 详细信息
来源: 评论
Transfer Learning-Based Class Imbalance-Aware Shoulder Implant Classification from X-Ray Images
收藏 引用
Journal of Bionic engineering 2024年 第2期21卷 892-912页
作者: Marut Jindal Birmohan Singh Department of Computer Science and Engineering Sant Longowal Institute of Engineering and TechnologySangrur148106PunjabIndia
Total shoulder arthroplasty is a standard restorative procedure practiced by orthopedists to diagnose shoulder arthritis in which a prosthesis replaces the whole joint or a part of the *** is often challenging for doc... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
A New Approach to Determine Feasible Operating Region of Unbalanced Distribution Networks with Distributed Photovoltaics
收藏 引用
IEEE Transactions on Power Delivery 2025年 第3期40卷 1493-1504页
作者: Prasad, Manorath Rather, Zakir Hussain Razzaghi, Reza Doolla, Suryanarayana Indian Institute of Technology Bombay Department of Energy Science and Engineering Mumbai India Monash University Department of Electrical and Computer Systems Engineering Melbourne Australia
Amidst rising distributed generation and its potential role in grid management, this article presents a new realistic approach to determine the operational space and flexibility potential of an unbalanced active distr... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 989-1000页
作者: Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita Department of Computer Science and Engineering Manipal Institute of Technology BengaluruManipal Academy of Higher EducationManipal576104KarnatakaIndia Department of Computer Science&Engineering ICFAI UniversityAgartala799210India Department of Computer Science&Engineering Central Institute of TechnologyKokrajhar783370India
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the... 详细信息
来源: 评论
Image-based rice leaf disease detection using CNN and generative adversarial network
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 439-456页
作者: Ramadan, Syed Taha Yeasin Islam, Md Shafiqul Sakib, Tanjim Sharmin, Nusrat Rahman, Md. Mokhlesur Rahman, Md. Mahbubur Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka Bangladesh
Rice is a major crop and staple food for more than half of the world’s population and plays a vital role in ensuring food security as well as the global economy pests and diseases pose a threat to the production of r... 详细信息
来源: 评论
Effect of Coke Addition on Sintering Kinetics during Induration of a Single Hematite Pellet
收藏 引用
ISIJ International 2025年 第5期65卷 589-600页
作者: Anand, Raja Ankit Viswanathan, Neelakantan Nurni Pande, Manish Marotrao Department of Metallurgical Engineering and Materials Science Indian Institute of Technology Bombay Mumbai400076 India Department of Metallurgical Engineering and Materials Science Indian Institute of Technology Bombay Mumbai400076 India
Induration is a thermal treatment process wherein the green pellet properties are enhanced for subsequent reduction processes such as blast furnace and DRI production. During induration, the pellet essentially undergo... 详细信息
来源: 评论
Boosting cervical cancer detection with a multi-stage architecture and complementary information fusion
收藏 引用
Soft Computing 2025年 第2期29卷 1191-1206页
作者: Sahoo, Pranab Saha, Sriparna Sharma, Saksham Kumar Mondal, Samrat Computer Science and Engineering Indian Institute of Technology Patna India Computer Science University of Maryland Baltimore CountyMD United States
Cervical cancer is one of the most fatal and prevalent illnesses affecting women globally. Early detection of cervical cancer is crucial for effective treatment. Pap smear tests are commonly used, but population-based... 详细信息
来源: 评论