咨询与建议

限定检索结果

文献类型

  • 107,765 篇 会议
  • 53,266 篇 期刊文献
  • 1,572 册 图书

馆藏范围

  • 162,602 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 94,529 篇 工学
    • 58,997 篇 计算机科学与技术...
    • 48,002 篇 软件工程
    • 21,947 篇 信息与通信工程
    • 16,097 篇 控制科学与工程
    • 13,788 篇 电气工程
    • 12,921 篇 电子科学与技术(可...
    • 10,937 篇 生物工程
    • 8,735 篇 生物医学工程(可授...
    • 8,361 篇 光学工程
    • 7,314 篇 机械工程
    • 7,072 篇 化学工程与技术
    • 5,696 篇 动力工程及工程热...
    • 5,695 篇 仪器科学与技术
    • 5,675 篇 材料科学与工程(可...
    • 3,953 篇 网络空间安全
    • 3,797 篇 安全科学与工程
  • 56,785 篇 理学
    • 25,409 篇 数学
    • 20,580 篇 物理学
    • 12,635 篇 生物学
    • 8,409 篇 统计学(可授理学、...
    • 7,357 篇 化学
    • 6,268 篇 系统科学
  • 23,321 篇 管理学
    • 14,939 篇 管理科学与工程(可...
    • 9,386 篇 图书情报与档案管...
    • 6,989 篇 工商管理
  • 8,746 篇 医学
    • 7,212 篇 临床医学
    • 6,474 篇 基础医学(可授医学...
    • 3,987 篇 药学(可授医学、理...
    • 3,692 篇 公共卫生与预防医...
  • 4,378 篇 法学
    • 3,603 篇 社会学
  • 2,880 篇 经济学
  • 2,619 篇 农学
  • 1,420 篇 教育学
  • 635 篇 文学
  • 395 篇 军事学
  • 178 篇 艺术学
  • 17 篇 哲学
  • 13 篇 历史学

主题

  • 4,991 篇 accuracy
  • 4,167 篇 deep learning
  • 3,947 篇 computer science
  • 3,813 篇 feature extracti...
  • 3,491 篇 computational mo...
  • 3,396 篇 machine learning
  • 3,190 篇 training
  • 2,554 篇 convolutional ne...
  • 2,400 篇 real-time system...
  • 2,394 篇 predictive model...
  • 2,285 篇 support vector m...
  • 2,087 篇 internet of thin...
  • 1,953 篇 artificial intel...
  • 1,923 篇 optimization
  • 1,774 篇 neural networks
  • 1,724 篇 data models
  • 1,475 篇 data mining
  • 1,472 篇 security
  • 1,423 篇 computer archite...
  • 1,359 篇 wireless sensor ...

机构

  • 2,182 篇 chitkara univers...
  • 1,098 篇 university of ch...
  • 1,087 篇 cavendish labora...
  • 1,006 篇 department of ph...
  • 945 篇 physikalisches i...
  • 944 篇 oliver lodge lab...
  • 607 篇 infn sezione di ...
  • 602 篇 infn laboratori ...
  • 580 篇 infn sezione di ...
  • 547 篇 infn sezione di ...
  • 540 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 529 篇 fakultät physik ...
  • 524 篇 department of ph...
  • 520 篇 school of physic...
  • 517 篇 imperial college...
  • 513 篇 h.h. wills physi...
  • 506 篇 school of comput...
  • 498 篇 stfc rutherford ...
  • 488 篇 nikhef national ...

作者

  • 262 篇 j. wang
  • 250 篇 barter w.
  • 250 篇 a. gomes
  • 240 篇 c. alexa
  • 237 篇 j. m. izen
  • 229 篇 s. chen
  • 227 篇 g. bella
  • 227 篇 c. amelung
  • 227 篇 blake t.
  • 226 篇 j. strandberg
  • 225 篇 d. calvet
  • 221 篇 bellee v.
  • 220 篇 beiter a.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 206 篇 bencivenni g.

语言

  • 150,525 篇 英文
  • 9,806 篇 其他
  • 2,075 篇 中文
  • 319 篇 日文
  • 25 篇 德文
  • 20 篇 法文
  • 20 篇 朝鲜文
  • 12 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 3 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 葡萄牙文
  • 1 篇 意大利文
  • 1 篇 土耳其文
检索条件"机构=Institute for Systems and Computer Engineering Technology and Science"
162603 条 记 录,以下是281-290 订阅
排序:
Enhancing User Authentication with a Secure Human-Computable Password Scheme  2
Enhancing User Authentication with a Secure Human-Computable...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Ayeswarya, S. John Singh, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Authentication in the digital world has become a challenging and difficult task. The username-password combination is no longer reliable and the tools that support authentication mechanism are all breakable. In additi... 详细信息
来源: 评论
Dynamic and Energy Efficient Data Traffic Scheduling for Earlier Forest Fire Detection using WSN  2
Dynamic and Energy Efficient Data Traffic Scheduling for Ear...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Swetha, R. Navaneethan, C. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
In general, data traffic volume is significant in sensor networks, and communication often occurs with variable capacity during early forest fire detection using Wireless Sensor Networks (WSN). Initially, optimal rout... 详细信息
来源: 评论
Enhancing Video Protection: A Reversible Digital Watermarking approach using Swin features and Arnold Transform enabled Multi-Aggregation Model  3
Enhancing Video Protection: A Reversible Digital Watermarkin...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Dilip, Mali Satish Agilandeeswari, L. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Nowadays, the widespread internet technology brings out rapid advancement in the use of videos for sharing huge amounts of secret data. Conversely, the privacy of transmitted digital content is jeopardized by digital ... 详细信息
来源: 评论
Virtual Hue: A Web Application for Anemia Prognosis
Virtual Hue: A Web Application for Anemia Prognosis
收藏 引用
2024 International Conference on Smart systems for Applications in Electrical sciences, ICSSES 2024
作者: Vivekananda, Gn Pradeep, L. Vellore Institute of Technology VIT School of Computer Science Engineering & Information Systems India
Anemia is a state of bad health condition where there is the presence of a low amount of red blood cells in the blood. We aim to build a simple Anemia prediction Web Application, that predicts whether a patient is ane... 详细信息
来源: 评论
Survival Analysis of Superficial Bladder Cancer patients using DeepSurv and Cox models  2
Survival Analysis of Superficial Bladder Cancer patients usi...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Supriya, K. Anitha, A. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The advancements in technology help in analyzing and predicting the disease of human life using automation. Out of various technologies, Machine Learning (ML) and Deep learning (DL) provide some promising results to h... 详细信息
来源: 评论
Enhancing User Authentication through Keystroke Dynamics Analysis using Isolation Forest algorithm  2
Enhancing User Authentication through Keystroke Dynamics Ana...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Iyapparaja, M. Karunanithi, Isvarya Sahana Bhat, U. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Authentication in modern era, has evolved significantly to address the increasing complexity and security challenges of our digital world. Traditional methods of authentication, such as passwords and PINS have proven ... 详细信息
来源: 评论
A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks  3
A hybrid wrapper technique enabled Network Intrusion Detecti...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Ramaiah, Mangayarkarasi Padma, Adla Vishnukumar, Ravula Rahamathulla, Mohemmed Yousuf Chithanuru, Vasavi Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
In the age of smart era, usage of IoT devices is inevitable. As the number of IoT devices increases, the amount of data they generate also increases, which in turn leads to security breaches. Continuous monitoring thr... 详细信息
来源: 评论
A Study on Enhanced Curricula Delivery Using Augmented/Virtual Reality  2
A Study on Enhanced Curricula Delivery Using Augmented/Virtu...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Sarath, T. Brindha, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
In human perceptive, Augmented Reality (AR) or Virtual Reality(VR) is an effective and deep technology because it creates new replicated world. The AR or VR technique is a distinctive and lucrative application;its imm... 详细信息
来源: 评论
Imbalanced multilabel retinal disease classification using threshold moving and ensemble learning
收藏 引用
Multimedia Tools and Applications 2025年 1-19页
作者: Pendharkar, Gaurav Balaji, Sudharshanan Kumar, B. Muhesh Malathi, G. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai600127 India
Billions of people worldwide are affected by vision impairment majorly caused due to age-related degradation and refractive errors. Diabetic Retinopathy(DR) and Macular Hole(MH) are among the most prevalent senescent ... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论