咨询与建议

限定检索结果

文献类型

  • 108,061 篇 会议
  • 53,346 篇 期刊文献
  • 1,573 册 图书

馆藏范围

  • 162,979 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 94,764 篇 工学
    • 58,883 篇 计算机科学与技术...
    • 47,823 篇 软件工程
    • 21,921 篇 信息与通信工程
    • 16,075 篇 控制科学与工程
    • 13,905 篇 电气工程
    • 13,055 篇 电子科学与技术(可...
    • 10,928 篇 生物工程
    • 8,713 篇 生物医学工程(可授...
    • 8,213 篇 光学工程
    • 7,305 篇 机械工程
    • 7,046 篇 化学工程与技术
    • 6,012 篇 材料科学与工程(可...
    • 5,691 篇 动力工程及工程热...
    • 5,673 篇 仪器科学与技术
    • 3,963 篇 网络空间安全
    • 3,785 篇 安全科学与工程
  • 56,636 篇 理学
    • 25,427 篇 数学
    • 20,531 篇 物理学
    • 12,618 篇 生物学
    • 8,485 篇 统计学(可授理学、...
    • 7,348 篇 化学
    • 6,259 篇 系统科学
  • 23,268 篇 管理学
    • 14,895 篇 管理科学与工程(可...
    • 9,383 篇 图书情报与档案管...
    • 6,963 篇 工商管理
  • 8,691 篇 医学
    • 7,166 篇 临床医学
    • 6,440 篇 基础医学(可授医学...
    • 3,987 篇 药学(可授医学、理...
    • 3,665 篇 公共卫生与预防医...
  • 4,370 篇 法学
    • 3,598 篇 社会学
  • 2,870 篇 经济学
  • 2,610 篇 农学
  • 1,418 篇 教育学
  • 634 篇 文学
  • 395 篇 军事学
  • 181 篇 艺术学
  • 17 篇 哲学
  • 13 篇 历史学

主题

  • 5,121 篇 accuracy
  • 4,233 篇 deep learning
  • 3,944 篇 computer science
  • 3,868 篇 feature extracti...
  • 3,558 篇 computational mo...
  • 3,430 篇 machine learning
  • 3,224 篇 training
  • 2,594 篇 convolutional ne...
  • 2,509 篇 real-time system...
  • 2,428 篇 predictive model...
  • 2,317 篇 support vector m...
  • 2,128 篇 internet of thin...
  • 1,979 篇 artificial intel...
  • 1,974 篇 optimization
  • 1,792 篇 neural networks
  • 1,768 篇 data models
  • 1,507 篇 security
  • 1,490 篇 data mining
  • 1,428 篇 computer archite...
  • 1,380 篇 wireless sensor ...

机构

  • 2,183 篇 chitkara univers...
  • 1,094 篇 university of ch...
  • 1,088 篇 cavendish labora...
  • 1,011 篇 department of ph...
  • 955 篇 physikalisches i...
  • 943 篇 oliver lodge lab...
  • 610 篇 infn laboratori ...
  • 608 篇 infn sezione di ...
  • 581 篇 infn sezione di ...
  • 553 篇 infn sezione di ...
  • 541 篇 school of physic...
  • 539 篇 fakultät physik ...
  • 536 篇 horia hulubei na...
  • 522 篇 school of physic...
  • 522 篇 department of ph...
  • 519 篇 school of comput...
  • 514 篇 imperial college...
  • 512 篇 h.h. wills physi...
  • 495 篇 stfc rutherford ...
  • 481 篇 nikhef national ...

作者

  • 260 篇 j. wang
  • 258 篇 barter w.
  • 250 篇 a. gomes
  • 240 篇 c. alexa
  • 237 篇 j. m. izen
  • 233 篇 blake t.
  • 229 篇 s. chen
  • 227 篇 c. amelung
  • 226 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 beiter a.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 211 篇 bencivenni g.

语言

  • 140,011 篇 英文
  • 20,768 篇 其他
  • 2,134 篇 中文
  • 317 篇 日文
  • 36 篇 德文
  • 30 篇 法文
  • 20 篇 朝鲜文
  • 18 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 4 篇 阿拉伯文
  • 3 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute for Systems and Computer Engineering Technology and Science"
162980 条 记 录,以下是671-680 订阅
排序:
Enhancing Data Security and Privacy through Blockchain and Machine Learning
Enhancing Data Security and Privacy through Blockchain and M...
收藏 引用
2024 MIT Art, Design and technology School of Computing International Conference, MITADTSoCiCon 2024
作者: Machhale, Gurunath Purushothama, B.R. Modi, Chirag N. National Institute of Technology Computer Science and Engineering Goa Cuncolim India National Institute of Technology Computer Science and Engineering Karnataka Surathkal India
Blockchain and Machine Learning (BML) are two of the most rapidly advancing technologies that are revolutionizing various industries worldwide. Blockchain is a widely known decentralized, immutable technology that pro... 详细信息
来源: 评论
An autoencoder based unsupervised clustering approach to analyze the effect of E-learning on the mental health of Indian students during the Covid-19 pandemic
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Banerjee, Pritha Jana, Chandan Saha, Jayita Chowdhury, Chandreyee Computer Application and Science Institute of Engineering and Management West Bengal Kolkata700091 India Computer Science and Engineering Jadavpur University West Bengal Kolkata700032 India Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal Karnataka Bengaluru560064 India
Due to the Covid-19 pandemic, the education system in India has changed to remote that is, online study mode. Though there are works on the effect of teaching learning on Indian students, the effect of online mode and... 详细信息
来源: 评论
Hobby Based Learning for Automata Theory and Computability  2
Hobby Based Learning for Automata Theory and Computability
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Pallavi, N. Darshna, A. Naik Manjula, L. Keerthi, P. Ramaiah Institute of Technology Department of Computer Science and Engineering Bangalore India Impact Institute of Technology Department of Computer Science and Engineering Bangalore India
In the traditional form of instruction, the teacher and pupil converse face to face. The discussion is started by the instructor, who generally discusses the material from the required textbooks. Many students might n... 详细信息
来源: 评论
Semantic Segmentation of Lumbar Vertebrae Using Meijering U-Net(MU-Net)on Spine Magnetic Resonance Images
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 733-757页
作者: Lakshmi S V V Shiloah Elizabeth Darmanayagam Sunil Retmin Raj Cyril Department of Computer Science and Engineering College of Engineering GuindyAnna UniversityChennai600025India Department of Information Technology Madras Institute of TechnologyAnna UniversityChrompetChennai600044India
Lower back pain is one of the most common medical problems in the world and it is experienced by a huge percentage of people *** to its ability to produce a detailed view of the soft tissues,including the spinal cord,... 详细信息
来源: 评论
EAMR-Net: A multiscale effective spatial and cross-channel attention network for retinal vessel segmentation
收藏 引用
Mathematical Biosciences and engineering 2024年 第3期21卷 4742-4761页
作者: Prethija, G. Katiravan, Jeevaa School of Computer Science and Engineering Vellore Institute of Technology Chennai600127 India Department of Information Technology Velammal Engineering College Chennai600066 India
Delineation of retinal vessels in fundus images is essential for detecting a range of eye disorders. An automated technique for vessel segmentation can assist clinicians and enhance the efficiency of the diagnostic pr... 详细信息
来源: 评论
A Trust-based Framework for the Detection and Avoidance of Blackhole Nodes in Opportunistic Networks  9
A Trust-based Framework for the Detection and Avoidance of B...
收藏 引用
9th International Conference on Signal Processing and Communication, ICSC 2023
作者: Kundu, Protyasha Saha, Swarnadeep Kundu, Anindita Barai, Smritikona Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore India
An Opportunistic Network (OppNet), as opposed to a ubiquitous centralized network, relies on sporadic and opportunistic encounters between nodes to facilitate communication. The uncertainty about the node's nature...
来源: 评论
Enhanced text-independent speaker recognition using MFCC, Bi-LSTM, and CNN-based noise removal techniques
收藏 引用
International Journal of Speech technology 2024年 第4期27卷 1013-1026页
作者: Tiwari, Manish Verma, Deepak Kumar Department of Computer Science and Engineering University Institute of Engineering and Technology Chhatrapati Shahu Ji Maharaj University UP Kanpur India
This research article introduces a novel approach to text-independent speaker recognition by integrating Mel-Frequency Cepstral Coefficients (MFCC) and Bidirectional Long Short-Term Memory (Bi-LSTM) networks, with noi... 详细信息
来源: 评论
A Hybrid Deep Learning Framework for Estimating Human 3D Pose from 2D Joint Positions
A Hybrid Deep Learning Framework for Estimating Human 3D Pos...
收藏 引用
2024 International Conference on Advances in Computing, Communication, Electrical, and Smart systems, iCACCESS 2024
作者: Sultana, Zinia Islam, Muhammad Nazrul Kabir, Md. Hasanul Computer Science and Engineering Military Institute of Science and Technology Dhaka Bangladesh Computer Science and Engineering Islamic University of Technology Gazipur Bangladesh
For computers to understand human activity or behavior in a variety of scenarios, reliable 3D human posture estimation is a prerequisite. Several difficulties have made such work more complex as it is influenced by va... 详细信息
来源: 评论
Chaos Theory Based Gravitational Search Algorithm For Medical Image Segmentation  27th
Chaos Theory Based Gravitational Search Algorithm For Medica...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Rather, Sajad Ahmad Roy, Partha Pratim Das, Sujit Department of Computer Science and Engineering Indian Institute of Technology Roorkee247667 India Department of Computer Science and Engineering National Institute of Technology Telangana506004 India
Multilevel thresholding plays a crucial role in image processing, with extensive applications in object detection, machine vision, medical imaging, and traffic control systems. It entails the partitioning of an image ... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论