咨询与建议

限定检索结果

文献类型

  • 63,366 篇 会议
  • 29,664 篇 期刊文献
  • 990 册 图书

馆藏范围

  • 94,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54,200 篇 工学
    • 36,078 篇 计算机科学与技术...
    • 28,910 篇 软件工程
    • 14,127 篇 信息与通信工程
    • 9,379 篇 控制科学与工程
    • 8,491 篇 电气工程
    • 7,805 篇 电子科学与技术(可...
    • 6,563 篇 生物工程
    • 5,506 篇 生物医学工程(可授...
    • 5,143 篇 光学工程
    • 3,690 篇 机械工程
    • 3,494 篇 化学工程与技术
    • 3,364 篇 动力工程及工程热...
    • 3,192 篇 仪器科学与技术
    • 3,079 篇 材料科学与工程(可...
    • 3,031 篇 网络空间安全
    • 2,501 篇 安全科学与工程
  • 32,924 篇 理学
    • 14,496 篇 数学
    • 12,575 篇 物理学
    • 7,593 篇 生物学
    • 4,791 篇 统计学(可授理学、...
    • 4,034 篇 化学
    • 3,313 篇 系统科学
  • 14,039 篇 管理学
    • 8,862 篇 管理科学与工程(可...
    • 5,835 篇 图书情报与档案管...
    • 4,204 篇 工商管理
  • 5,816 篇 医学
    • 4,729 篇 临床医学
    • 4,279 篇 基础医学(可授医学...
    • 2,678 篇 公共卫生与预防医...
    • 2,603 篇 药学(可授医学、理...
  • 2,809 篇 法学
    • 2,304 篇 社会学
  • 1,715 篇 经济学
  • 1,535 篇 农学
  • 845 篇 教育学
  • 456 篇 文学
  • 194 篇 军事学
  • 89 篇 艺术学
  • 9 篇 哲学
  • 7 篇 历史学

主题

  • 3,326 篇 accuracy
  • 2,801 篇 deep learning
  • 2,684 篇 computer science
  • 2,323 篇 feature extracti...
  • 2,314 篇 machine learning
  • 2,000 篇 computational mo...
  • 1,752 篇 training
  • 1,688 篇 real-time system...
  • 1,611 篇 internet of thin...
  • 1,575 篇 support vector m...
  • 1,575 篇 convolutional ne...
  • 1,421 篇 predictive model...
  • 1,249 篇 artificial intel...
  • 1,125 篇 optimization
  • 1,005 篇 neural networks
  • 959 篇 wireless sensor ...
  • 959 篇 security
  • 887 篇 data mining
  • 862 篇 data models
  • 860 篇 computer archite...

机构

  • 1,099 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 982 篇 physikalisches i...
  • 965 篇 oliver lodge lab...
  • 724 篇 university of ch...
  • 633 篇 infn laboratori ...
  • 618 篇 chitkara univers...
  • 610 篇 infn sezione di ...
  • 593 篇 infn sezione di ...
  • 591 篇 fakultät physik ...
  • 572 篇 infn sezione di ...
  • 554 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 532 篇 department of ph...
  • 531 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 514 篇 imperial college...
  • 507 篇 nikhef national ...
  • 503 篇 stfc rutherford ...
  • 495 篇 school of physic...

作者

  • 269 篇 barter w.
  • 258 篇 a. gomes
  • 245 篇 c. alexa
  • 243 篇 j. m. izen
  • 236 篇 beiter a.
  • 235 篇 blake t.
  • 234 篇 g. bella
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 234 篇 c. amelung
  • 232 篇 j. wang
  • 231 篇 s. chen
  • 228 篇 bellee v.
  • 223 篇 g. spigo
  • 223 篇 amato s.
  • 222 篇 brundu d.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.

语言

  • 74,821 篇 英文
  • 18,358 篇 其他
  • 1,071 篇 中文
  • 84 篇 日文
  • 22 篇 法文
  • 21 篇 斯洛文尼亚文
  • 20 篇 德文
  • 7 篇 朝鲜文
  • 3 篇 阿拉伯文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 意大利文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Science and Engineering Thapar Institute of Engineering and Technology"
94020 条 记 录,以下是4771-4780 订阅
排序:
A Review on GIF-Based Steganography Techniques  5th
A Review on GIF-Based Steganography Techniques
收藏 引用
5th International Conference on Recent Innovations in Computing, ICRIC 2022
作者: Chola, Abhinav Awasthi, Lalit Kumar Singh, Samayveer Department of Computer Science and Engineering Dr B R Ambedkar National Institute of Technology Punjab Jalandhar India Department of Computer Science and Engineering National Institute of Technology Uttarakhand Srinagar India
Data privacy has been a significant concern since the beginning of the Internet, and in the current scenario, the need and importance of data privacy are increasing exponentially. Today, a multitude of media formats i... 详细信息
来源: 评论
Application of Machine Learning and Cloud Computing for Observing Health Status of Patients Remotely in Healthcare System
Application of Machine Learning and Cloud Computing for Obse...
收藏 引用
2023 International Conference on Advances in Computation, Communication and Information technology, ICAICCIT 2023
作者: Manivasagam Kumar, Anshu Murshleen, Mohd. Department of Computer Science and Information Technology Bangalore India Noida Institute of Engineering and Technology Department of Electronics and Communication Engineering Uttar Pradesh Greater Noida India Tula's Institute Department of Computer Science and Engineering Dehradun India
Strategies that may gain insight from both labeled and unlabeled data as well as from their environment are being developed through the use of machine learning. Machine learning is applied in many domains, but it is m... 详细信息
来源: 评论
Investigating the Impact of Public-Key Infrastructure in Information Security Models for Networked Applications  5th
Investigating the Impact of Public-Key Infrastructure in Inf...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Shree, Ritu Saxena, Kumud Mehta, Deepak Pandeya, Megha Department of Computer Science and Application Vivekananda Global University Jaipur India Department of Computer Science Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Public-key infrastructure (PKI) is poised to play a crucial function in the use of secure data technology systems. With the increasing complexity of these dais’s networks and packages, PKI gives a reliable way to ele... 详细信息
来源: 评论
Security Model for IoT-Based Smart Water Meter Billing System
收藏 引用
IEEE Internet of Things Magazine 2022年 第2期5卷 59-62页
作者: Bhola, Biswaranjan Kumar, Raghvendra Sharma, Rohit Mahapatra, Rajendra Prasad Department of Computer Science and Engineering Giet University India Department of Electronics and Communication Engineering Srm Institute of Science and Technology Delhi Ncr Campus Ghaziabad India Srm Institute of Science and Technology Ncr Campus Computer Science and Engineering Department and Dean of Admissions India
The water industry faces new challenges in the sustainable management of urban water systems. There are many external factors, including the effects of climate change, thirst, and urban population growth, leading to g... 详细信息
来源: 评论
Twin eye Authentication Gateway Architecture Resilient to DDoS attacks in 6LoWPAN IoT Network Using Machine Learning Techniques
Twin eye Authentication Gateway Architecture Resilient to DD...
收藏 引用
2023 IEEE International Conference on Network, Multimedia and Information technology, NMITCON 2023
作者: Manjula, L. Raju, G.T. Ramaiah Institute of Technology Visvesvaraya Technological University Department of Computer Science and Engineering Belagavi India Sjc Institute of Technology Visvesvaraya Technological University Department of Computer Science and Engineering Belagavi India
IoT technology establishes a platform for automating services by connecting diverse objects through the Internet backbone. However, the integration of IoT networks also introduces security challenges, rendering IoT in... 详细信息
来源: 评论
Deep Learning-Based Mask Identification System Using ResNet Transfer Learning Architecture
收藏 引用
computer Systems science & engineering 2024年 第2期48卷 341-362页
作者: Arpit Jain Nageswara Rao Moparthi A.Swathi Yogesh Kumar Sharma Nitin Mittal Ahmed Alhussen Zamil S.Alzamil MohdAnul Haq Department of Computer Science and Engineering KoneruLakshmaiah Education FoundationVaddeswaram522302India Department of Computer Science and Engineering Sreyas Institute of Engineering and TechnologyHyderabad500068India University Centre for Research and Development Chandigarh UniversityMohali140413India Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia
Recently,the coronavirus disease 2019 has shown excellent attention in the global community regarding health and the *** Health Organization(WHO)and many others advised controlling Corona Virus Disease in *** limited ... 详细信息
来源: 评论
Deep Learning for the Investigation of Lung and Pancreatic Tumors  7
Deep Learning for the Investigation of Lung and Pancreatic T...
收藏 引用
7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2023
作者: Mahadevi, M. Marimuthu, M. Poornima, I. Gethzi Ahila Vijayalakshmi, K. Vidyabharathi, D. Priya, G Sakthi Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women Department of Computer Science Chennai India Vellore Institute of Technology School of Computer Science and Engineering Chennai India Ramco Institute of Technology Department of Cse Rajapalayam India Sona College of Technology Department of Computer Science and Engineering Salem India Ramco Institute of Technology Department of Computer Science and Engineering Rajapalayam India
Among the worst malignancies in the world are lung and pancreatic, and effective treatment depends on early identification and precise diagnosis. A powerful technique for analyzing medical images, deep learning, a cat... 详细信息
来源: 评论
Wandering Strategy-Sand Cat Swarm Optimization-Based Energy Efficient Underwater Wireless Sensor Network  2
Wandering Strategy-Sand Cat Swarm Optimization-Based Energy ...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Habelalmateen, M.I. Sravankumar, B. Keirolona Safana Seles, J. Phadke, Rekha Indupalli, Tabitha The Islamic University Najaf Iraq Vaagdevi College of Engineering Warangal India Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India Nitte Meenakshi Institute of Technology Dept of Ece Bengaluru India Department of Computer Science and Engineering Griet Telangana Hyderabad India
Underwater Wireless Sensor Network (UWSN) includes a numerous number of sensors positioned in oceans and rivers to observe in underwater environment. Though, underwater sensors are limited for energy and that is tedio... 详细信息
来源: 评论
Depth-Integrated CNN Approach for Effective Face Spoof Detection  1
Depth-Integrated CNN Approach for Effective Face Spoof Detec...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Singh, Ravi Pratap Singh, Siddhartha Shekhar Dash, Ratnakar Mishra, Vinita Debayani Gochhayat, Sudeep Kumar Muduli, Debendra National Institute of Technology Rourkela Department of Computer Science and Engineering Rourkela India NIIS Institute of Business Administration Department of MCA Bhubaneswar India CV Raman Global University Bhubaneswar Department of Computer Science and Engineering Bhubaneswar India
Facial recognition systems present certain benefits, notably their relative convenience, contactless nature, and nonintrusiveness compared to alternative biometric methods like voice recognition and fingerprint techno... 详细信息
来源: 评论
Internet of Things Based Agribot for Smart Farming and farm Monitoring
Internet of Things Based Agribot for Smart Farming and farm ...
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Srivastava, Vivek Singh, Gulbir Aggarwal, Ritu Kumar, Suneet Haryana Ambala India Graphic Era Hill University Haldwani Campus Department of Computer Science and Engineering Uttarakhand Nanital India Seth Jai Parkash Mukand Lal Institute of Engineering and Technology Department of Computer Science and Engineering Haryana Yamunanagar India Mullana Department of Computer Science and Engineering Haryana Ambala India
The agricultural business of today is data-centered, precise, and wiser than it has ever been before. This is in contrast to the impression that some people may have about the agricultural process. Almost every sector... 详细信息
来源: 评论