咨询与建议

限定检索结果

文献类型

  • 1,958 篇 会议
  • 1,773 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 3,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,124 篇 工学
    • 1,415 篇 计算机科学与技术...
    • 1,080 篇 软件工程
    • 377 篇 信息与通信工程
    • 290 篇 控制科学与工程
    • 257 篇 电气工程
    • 242 篇 光学工程
    • 234 篇 电子科学与技术(可...
    • 195 篇 生物工程
    • 167 篇 生物医学工程(可授...
    • 120 篇 材料科学与工程(可...
    • 115 篇 仪器科学与技术
    • 108 篇 化学工程与技术
    • 92 篇 机械工程
    • 86 篇 动力工程及工程热...
    • 73 篇 核科学与技术
  • 1,685 篇 理学
    • 830 篇 物理学
    • 676 篇 数学
    • 246 篇 生物学
    • 239 篇 统计学(可授理学、...
    • 177 篇 地球物理学
    • 171 篇 化学
    • 118 篇 系统科学
  • 474 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 132 篇 工商管理
  • 205 篇 医学
    • 173 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 89 篇 公共卫生与预防医...
    • 83 篇 药学(可授医学、理...
  • 95 篇 法学
    • 86 篇 社会学
  • 59 篇 农学
  • 46 篇 经济学
  • 33 篇 教育学
  • 13 篇 文学
  • 6 篇 艺术学
  • 4 篇 哲学
  • 3 篇 军事学
  • 1 篇 历史学

主题

  • 143 篇 computer science
  • 134 篇 accuracy
  • 106 篇 deep learning
  • 89 篇 educational inst...
  • 82 篇 feature extracti...
  • 81 篇 computational mo...
  • 81 篇 machine learning
  • 69 篇 predictive model...
  • 66 篇 training
  • 57 篇 artificial intel...
  • 53 篇 support vector m...
  • 52 篇 real-time system...
  • 52 篇 convolutional ne...
  • 47 篇 internet of thin...
  • 44 篇 data models
  • 43 篇 optimization
  • 39 篇 data mining
  • 39 篇 machine learning...
  • 38 篇 cloud computing
  • 36 篇 semantics

机构

  • 100 篇 university of sc...
  • 89 篇 tianfu cosmic ra...
  • 85 篇 hebei normal uni...
  • 83 篇 faculty of scien...
  • 83 篇 department for p...
  • 83 篇 department of ph...
  • 83 篇 state key labora...
  • 80 篇 department of ph...
  • 80 篇 west university ...
  • 79 篇 department of ph...
  • 78 篇 department of mo...
  • 78 篇 department of ph...
  • 78 篇 department of ph...
  • 78 篇 yunnan observato...
  • 77 篇 department of ph...
  • 77 篇 research center ...
  • 77 篇 university of ch...
  • 75 篇 infn e laborator...
  • 71 篇 kirchhoff-instit...
  • 69 篇 centre de calcul...

作者

  • 100 篇 bastieri d.
  • 72 篇 fang j.
  • 72 篇 feng c.f.
  • 70 篇 axikegu
  • 69 篇 jiang k.
  • 63 篇 m. klein
  • 62 篇 c. alexa
  • 62 篇 j. m. izen
  • 62 篇 g. bella
  • 62 篇 j. strandberg
  • 62 篇 d. calvet
  • 62 篇 c. amelung
  • 62 篇 n. orlando
  • 62 篇 y. tayalati
  • 62 篇 g. spigo
  • 62 篇 v. chiarella
  • 62 篇 f. siegert
  • 61 篇 a. dimitrievska
  • 61 篇 f. deliot
  • 61 篇 r. ströhmer

语言

  • 3,478 篇 英文
  • 271 篇 其他
  • 20 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Department of Computer Science and Institute for Advanced Computing Studies"
3767 条 记 录,以下是391-400 订阅
排序:
Active disturbance reduction scheme for descriptor semi-Markovian jump systems with nonlinear uncertainties
收藏 引用
The European Physical Journal Special Topics 2024年 1-13页
作者: Mohanapriya, S. Harshavarthini, S. Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham Bengaluru India Department of Mathematics School of Advanced Sciences Vellore Institute of Technology Chennai India
By using an active disturbance reduction strategy, the current study addresses the tracking problem of descriptor semi-Markovian jump systems against unknown nonlinear uncertainties (UNC) and aperiodic disturbances. I...
来源: 评论
Recent Advancements in Hyperspectral Face Recognition: A Review  13
Recent Advancements in Hyperspectral Face Recognition: A Rev...
收藏 引用
13th International Conference on computing Communication and Networking Technologies, ICCCNT 2022
作者: Das, Samiran Chatterjee, Sujoy JIS University Centre for Data Science JIS Institute for Advanced Studies and Research Kolkata India Amity University Department of Computer Science and Engineering Kolkata India
The increasing demand for high-accuracy face recognition methods and the rapid advancement in instrumentation has made hyperspectral face recognition a viable alternative to traditional face recognition. The high-secu... 详细信息
来源: 评论
Detection of Selfish Nodes based on Node Energy in Mobile Adhoc Networks - MANETs  1
Detection of Selfish Nodes based on Node Energy in Mobile Ad...
收藏 引用
1st IEEE International Conference on Automation, computing and Renewable Systems, ICACRS 2022
作者: Sarumathi, R. Jayalakshmi, V. VISTAS Chennai India Dept. of Computer Science RajeswariVedhachalam Govt. Arts College Chengalpet India School of Computing Sciences Vels Institute of Science Technology and Advanced Studies VISTAS Chennai India
One of the most essential self-configuring and independent wireless networks is the MANET. MANET employs a large number of intermediate nodes to exchange information without the need for any centralized infrastructure... 详细信息
来源: 评论
Machine Learning for Drug Discovery: Predicting Drug-Protein Binding Affinities using Graph Convolutional Networks  5
Machine Learning for Drug Discovery: Predicting Drug-Protein...
收藏 引用
5th IEEE International Conference on Recent Trends in computer science and Technology, ICRTCST 2024
作者: Radhamahendran, S. Dogra, Akriti Mendhe, Dinesh Tilak Babu, S.B.G. Dixit, Shriniket Singh, Surya Pratap Vels Institute of Science Technology and Advanced Studies School of Life Sciences Department of Bioinformatics Chennai Pallavaram India Manav Rachna Dental College Department of Oral & Maxillofacial Surgery Haryana Faridabad India State University of New Jersey Computer and Information Research Scientist Office of Research Computing Rutgers New BrunswickNJ United States Aditya Engineering College Department of ECE Surampalem India Vellore Institute of Technology School of Computer Science Engineering Tamil Nadu Vellore India UPUMS Department of Multi-Disciplinary Research Unit UP Etawah India
Determining the potential interactions between ligands and proteins is a crucial first step in developing new drugs. Graph BAR, our novel prediction model, makes accurate guesses about the strength of ligand-protein b... 详细信息
来源: 评论
Named Entity Recognition for Protecting Sensitive Data using Hybrid CNN
Named Entity Recognition for Protecting Sensitive Data using...
收藏 引用
International Conference on Smart Systems and Inventive Technology (ICSSIT)
作者: Sheela Gowr. P Kumar. N Department of Computer science and Engineering Vels Institute of Science Technology and Advanced Studies Chennai India
Named entity recognition is a natural language processing technique that effectively recognizes and categorizes named entities in a document. The named entity recognition helps to bring out dynamic information about a... 详细信息
来源: 评论
Enhancing Chest X-ray Pathology Prediction through Data-Driven Approaches and Transfer Learning
收藏 引用
Procedia computer science 2025年 258卷 3447-3456页
作者: Rekha R. Nair Kishore S Tina Babu Vishnu Vilashini S Department of Computer Science and Engineering Alliance School of Advanced Computing Alliance University Bengaluru India Department of Computer Applications Nitte (Deemed to be University) Nitte Institute of Professional Education Mangalore India Analyst Capgemini Bellandur Karnataka India
Chest X-ray pathology prediction play a very important role in early disease detection, enabling timely intervention and improving patient outcomes. This project undertakes a comprehensive exploration of medical imagi... 详细信息
来源: 评论
A Trust Secure Attacker Detection with Upgraded Deep Learning-Assistance for SDN Networks
A Trust Secure Attacker Detection with Upgraded Deep Learnin...
收藏 引用
International Conference on System Modeling & Advancement in Research Trends (SMART)
作者: M. Sabarish A.S. Arunachalam Department of Computer Science Vels Institute of Science Technology & Advanced Studies (VISTAS) Chennai Tamilnadu
Software Defined Networking (SDN) technologies may be used to properly identify and monitor network security vulnerabilities brought about by the emergence of programmable features. SDN is a real possibility for moder...
来源: 评论
Deep Learning-Based Alzheimer's Disease Classification using Transfer Learning and Data Augmentation
Deep Learning-Based Alzheimer's Disease Classification using...
收藏 引用
Intelligent Technologies (CONIT), International Conference on
作者: Deva Anand P. Sheela Gowr S. Logesh S. M. Anand Department of Computer Science and Engineering Vels Institute of Science Technology and Advanced Studies Chennai India
Alzheimer's disease is a pressing healthcare concern worldwide, highlighting the importance of early and accurate detection. Deep learning models, particularly those utilizing transfer learning, have shown promise...
来源: 评论
Modeling and Clustering of Parabolic Granular Data
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3728-3742页
作者: Tang, Yiming Gao, Jianwei Pedrycz, Witold Hu, Xianghui Xi, Lei Ren, Fuji Hu, Min Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6R 2V4 Canada Hefei University of Technology School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Polish Academy of Sciences Systems Research Institute Warsaw00-901 Poland Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Southeast University School of Computer Science and Engineering Nanjing211189 China University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China
At present, there exist some problems in granular clustering methods, such as lack of nonlinear membership description and global optimization of granular data boundaries. To address these issues, in this study, revol... 详细信息
来源: 评论
Web Based Cyber Attack Detection for Industrial System (PLC) Using Deep Learning
Web Based Cyber Attack Detection for Industrial System (PLC)...
收藏 引用
Advances in computing, Communication and Applied Informatics (ACCAI), International Conference on
作者: A. Yasir Kalaivani Kathirvelu M. K. Arif Department of Computer Science and Engineering School of Engineering Vels Institute of Science Technology and Advanced Studies Chennai Tamil Nadu India
Web apps are frequently targeted by cyber-attacks due to their network access and security flaws. Instances of attacks targeting online applications might pose significant risks. The issue of cyber security continues ... 详细信息
来源: 评论