咨询与建议

限定检索结果

文献类型

  • 108,061 篇 会议
  • 53,088 篇 期刊文献
  • 1,559 册 图书

馆藏范围

  • 162,707 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 94,825 篇 工学
    • 58,863 篇 计算机科学与技术...
    • 47,809 篇 软件工程
    • 21,912 篇 信息与通信工程
    • 16,047 篇 控制科学与工程
    • 13,947 篇 电气工程
    • 13,103 篇 电子科学与技术(可...
    • 10,928 篇 生物工程
    • 8,713 篇 生物医学工程(可授...
    • 8,187 篇 光学工程
    • 7,308 篇 机械工程
    • 7,049 篇 化学工程与技术
    • 6,090 篇 材料科学与工程(可...
    • 5,687 篇 动力工程及工程热...
    • 5,673 篇 仪器科学与技术
    • 3,951 篇 网络空间安全
    • 3,784 篇 安全科学与工程
  • 56,626 篇 理学
    • 25,443 篇 数学
    • 20,534 篇 物理学
    • 12,613 篇 生物学
    • 8,513 篇 统计学(可授理学、...
    • 7,353 篇 化学
    • 6,259 篇 系统科学
  • 23,246 篇 管理学
    • 14,879 篇 管理科学与工程(可...
    • 9,378 篇 图书情报与档案管...
    • 6,963 篇 工商管理
  • 8,684 篇 医学
    • 7,160 篇 临床医学
    • 6,439 篇 基础医学(可授医学...
    • 3,987 篇 药学(可授医学、理...
    • 3,664 篇 公共卫生与预防医...
  • 4,371 篇 法学
    • 3,600 篇 社会学
  • 2,867 篇 经济学
  • 2,608 篇 农学
  • 1,417 篇 教育学
  • 634 篇 文学
  • 394 篇 军事学
  • 181 篇 艺术学
  • 17 篇 哲学
  • 13 篇 历史学

主题

  • 5,121 篇 accuracy
  • 4,228 篇 deep learning
  • 3,944 篇 computer science
  • 3,868 篇 feature extracti...
  • 3,560 篇 computational mo...
  • 3,420 篇 machine learning
  • 3,225 篇 training
  • 2,572 篇 convolutional ne...
  • 2,510 篇 real-time system...
  • 2,430 篇 predictive model...
  • 2,313 篇 support vector m...
  • 2,139 篇 internet of thin...
  • 1,968 篇 optimization
  • 1,953 篇 artificial intel...
  • 1,768 篇 data models
  • 1,765 篇 neural networks
  • 1,502 篇 security
  • 1,499 篇 data mining
  • 1,421 篇 computer archite...
  • 1,364 篇 wireless sensor ...

机构

  • 2,179 篇 chitkara univers...
  • 1,092 篇 university of ch...
  • 1,082 篇 cavendish labora...
  • 1,010 篇 department of ph...
  • 944 篇 oliver lodge lab...
  • 940 篇 physikalisches i...
  • 607 篇 infn sezione di ...
  • 601 篇 infn laboratori ...
  • 581 篇 infn sezione di ...
  • 549 篇 infn sezione di ...
  • 542 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 528 篇 fakultät physik ...
  • 523 篇 department of ph...
  • 521 篇 school of physic...
  • 515 篇 imperial college...
  • 513 篇 school of comput...
  • 505 篇 h.h. wills physi...
  • 496 篇 stfc rutherford ...
  • 484 篇 nikhef national ...

作者

  • 256 篇 j. wang
  • 253 篇 barter w.
  • 251 篇 a. gomes
  • 239 篇 c. alexa
  • 237 篇 j. m. izen
  • 230 篇 blake t.
  • 228 篇 s. chen
  • 226 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 c. amelung
  • 223 篇 d. calvet
  • 223 篇 bellee v.
  • 221 篇 beiter a.
  • 221 篇 bowcock t.j.v.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 amato s.
  • 215 篇 brundu d.
  • 214 篇 boettcher t.
  • 208 篇 g. spigo

语言

  • 139,772 篇 英文
  • 20,753 篇 其他
  • 2,116 篇 中文
  • 317 篇 日文
  • 36 篇 德文
  • 30 篇 法文
  • 20 篇 朝鲜文
  • 18 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 4 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute for Systems and Computer Engineering Technology and Science"
162708 条 记 录,以下是291-300 订阅
排序:
Design of a Hybrid AI- based Phishing Website Detection using LSTM, CNN, and Random Forest based Ensemble Learning Analysis  8
Design of a Hybrid AI- based Phishing Website Detection usin...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace technology, ICECA 2024
作者: Kavya, S. Sumathi, D. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Phishing attacks are always surfacing as key threats against internet users, necessitating advanced detection methods. Blacklist-based systems and rule-based models of phishing detection generally have had critical li... 详细信息
来源: 评论
A Study on Enhanced Curricula Delivery Using Augmented/Virtual Reality  2
A Study on Enhanced Curricula Delivery Using Augmented/Virtu...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Sarath, T. Brindha, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
In human perceptive, Augmented Reality (AR) or Virtual Reality(VR) is an effective and deep technology because it creates new replicated world. The AR or VR technique is a distinctive and lucrative application;its imm... 详细信息
来源: 评论
Enhancing User Authentication with a Secure Human-Computable Password Scheme  2
Enhancing User Authentication with a Secure Human-Computable...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Ayeswarya, S. John Singh, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Authentication in the digital world has become a challenging and difficult task. The username-password combination is no longer reliable and the tools that support authentication mechanism are all breakable. In additi... 详细信息
来源: 评论
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 645-656页
作者: Zequn NIU Jingfeng XUE Yong WANG Tianwei LEI Weijie HAN Xianwei GAO School of Computer Science and Technology Beijing Institute of Technology School of Space Information Space Engineering University
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ... 详细信息
来源: 评论
Face Recognition Based Attendance Management System Using Deep Learning Method  2
Face Recognition Based Attendance Management System Using De...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Angulakshmi, M. Susithra, V. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Deep learning and transfer learning are extremely important in the internet sector and the health care industry. Face recognition technology is essential in practically every industry in our digital age. Several impro... 详细信息
来源: 评论
A Hybrid Approach to Validate and Retrieve Fingerprint Image for Authenticating Database Sensitive Information Access and to Verify Some of Topological Multi-Granular Rough Sets Properties on Authenticated Database Fields  2
A Hybrid Approach to Validate and Retrieve Fingerprint Image...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Raghavan, R. John Singh, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to princip... 详细信息
来源: 评论
Krushi Snehi: A Web-Based Application for Safe and Smart Farming  8th
Krushi Snehi: A Web-Based Application for Safe and Smart Far...
收藏 引用
8th International Conference on Information and Communication technology for Competitive Strategies, ICTCS 2023
作者: Jain, Sanyam Thaseen, Sumaiya School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The challenges stemming from crop diseases and a limited grasp of optimal fertilization practices have significantly burdened farmers, leading to reduced crop yields and a ripple effect of interconnected issues. This ... 详细信息
来源: 评论
Imbalanced multilabel retinal disease classification using threshold moving and ensemble learning
收藏 引用
Multimedia Tools and Applications 2025年 1-19页
作者: Pendharkar, Gaurav Balaji, Sudharshanan Kumar, B. Muhesh Malathi, G. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai600127 India
Billions of people worldwide are affected by vision impairment majorly caused due to age-related degradation and refractive errors. Diabetic Retinopathy(DR) and Macular Hole(MH) are among the most prevalent senescent ... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
A brief review on Quantum Key Distribution Protocols
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Kumar, Mandeep Mondal, Bhaskar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna800005 India
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin... 详细信息
来源: 评论