咨询与建议

限定检索结果

文献类型

  • 112,054 篇 会议
  • 52,768 篇 期刊文献
  • 1,532 册 图书

馆藏范围

  • 166,354 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 96,824 篇 工学
    • 63,186 篇 计算机科学与技术...
    • 51,322 篇 软件工程
    • 23,309 篇 信息与通信工程
    • 15,432 篇 控制科学与工程
    • 13,934 篇 电气工程
    • 13,541 篇 电子科学与技术(可...
    • 11,739 篇 生物工程
    • 9,538 篇 生物医学工程(可授...
    • 9,048 篇 光学工程
    • 6,725 篇 机械工程
    • 6,383 篇 化学工程与技术
    • 5,542 篇 仪器科学与技术
    • 5,510 篇 材料科学与工程(可...
    • 5,348 篇 动力工程及工程热...
    • 4,087 篇 网络空间安全
    • 3,876 篇 安全科学与工程
  • 58,041 篇 理学
    • 26,800 篇 数学
    • 21,234 篇 物理学
    • 13,458 篇 生物学
    • 8,977 篇 统计学(可授理学、...
    • 7,170 篇 化学
    • 5,988 篇 系统科学
  • 24,194 篇 管理学
    • 14,961 篇 管理科学与工程(可...
    • 10,292 篇 图书情报与档案管...
    • 7,045 篇 工商管理
  • 9,463 篇 医学
    • 7,855 篇 临床医学
    • 7,073 篇 基础医学(可授医学...
    • 4,427 篇 药学(可授医学、理...
    • 3,910 篇 公共卫生与预防医...
  • 4,508 篇 法学
    • 3,724 篇 社会学
  • 2,795 篇 经济学
  • 2,637 篇 农学
  • 1,489 篇 教育学
  • 674 篇 文学
  • 370 篇 军事学
  • 193 篇 艺术学
  • 23 篇 哲学
  • 13 篇 历史学

主题

  • 5,499 篇 accuracy
  • 4,893 篇 computer science
  • 4,429 篇 deep learning
  • 4,108 篇 feature extracti...
  • 3,790 篇 computational mo...
  • 3,701 篇 machine learning
  • 3,428 篇 training
  • 2,737 篇 convolutional ne...
  • 2,567 篇 real-time system...
  • 2,566 篇 predictive model...
  • 2,540 篇 support vector m...
  • 2,204 篇 internet of thin...
  • 2,039 篇 optimization
  • 2,006 篇 artificial intel...
  • 1,910 篇 data models
  • 1,844 篇 neural networks
  • 1,723 篇 data mining
  • 1,569 篇 security
  • 1,555 篇 computer archite...
  • 1,501 篇 wireless sensor ...

机构

  • 2,178 篇 chitkara univers...
  • 1,079 篇 cavendish labora...
  • 1,035 篇 university of ch...
  • 1,007 篇 department of ph...
  • 944 篇 physikalisches i...
  • 929 篇 oliver lodge lab...
  • 597 篇 infn sezione di ...
  • 584 篇 infn laboratori ...
  • 575 篇 infn sezione di ...
  • 558 篇 department of el...
  • 539 篇 infn sezione di ...
  • 531 篇 school of physic...
  • 525 篇 horia hulubei na...
  • 524 篇 fakultät physik ...
  • 518 篇 department of ph...
  • 517 篇 school of physic...
  • 510 篇 imperial college...
  • 509 篇 school of comput...
  • 506 篇 h.h. wills physi...
  • 499 篇 institute of inf...

作者

  • 255 篇 barter w.
  • 251 篇 a. gomes
  • 241 篇 c. alexa
  • 238 篇 j. m. izen
  • 234 篇 j. wang
  • 232 篇 blake t.
  • 232 篇 s. chen
  • 227 篇 g. bella
  • 227 篇 j. strandberg
  • 227 篇 c. amelung
  • 227 篇 beiter a.
  • 227 篇 bellee v.
  • 226 篇 d. calvet
  • 223 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 212 篇 bencivenni g.

语言

  • 142,634 篇 英文
  • 21,956 篇 其他
  • 1,868 篇 中文
  • 153 篇 日文
  • 35 篇 德文
  • 22 篇 法文
  • 22 篇 朝鲜文
  • 16 篇 斯洛文尼亚文
  • 4 篇 阿拉伯文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Computer Aided Engineering and Computer Science"
166354 条 记 录,以下是151-160 订阅
排序:
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 2035-2051页
作者: Sandeep Dasari Rajesh Kaluri School of Computer Science Engineering and Information Systems Vellore Institute of TechnologyVellore632014India
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may... 详细信息
来源: 评论
Analysis of IoT Applications in Highly Precise Agriculture Farming
收藏 引用
Recent Patents on engineering 2025年 第2期19卷 71-81页
作者: Reddy N, Latha Masila P, Gopinath School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore632014 India
Background: The IoT (Internet of Things) assigns to the capacity of Device-to-Machine (D2M) connections, which is a vital component in the development of the digital economy. IoT integration with a human being enables... 详细信息
来源: 评论
Time series forecasting using transformer neural network
收藏 引用
International Journal of computers and Applications 2024年 第10期46卷 880-888页
作者: Bhogade, Vaibhav Nithya, B. Dept. of Computer Science and Engineering National Institute of Technology Tiruchirappalli India
Time series forecasting is a vital component of data science, giving essential insights that help decision-makers to predict future trends across a number of sectors. This paper focuses on projecting complicated stock... 详细信息
来源: 评论
Supportive particle swarm optimization with time-conscious scheduling (SPSO-TCS) algorithm in cloud computing for optimized load balancing
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 192-198页
作者: Menaka, M. Sendhil Kumar, K.S. School of Computer Science and Engineering Vellore Institute of Technology Vellore632014 India
Task scheduling for virtual machines (VMs) has shown to be essential for the effective development of cloud computing at the lowest cost and fastest turnaround time. A number of research gaps about job schedule optimi... 详细信息
来源: 评论
Query reformulation system based on WordNet and word vectors clusters
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 9119-9137页
作者: Jumde, Amol Keskar, Ravindra Department of Computer Science and Engineering Visvesvaraya National Institute of Technology Nagpur India
With tremendous evolution in the internet world, the internet has become a household thing. Internet users use search engines or personal assistants to request information from the internet. Search results are greatly... 详细信息
来源: 评论
A Study of Federated Learning with Internet of Things for Data Privacy and Security using Privacy Preserving Techniques
收藏 引用
Recent Patents on engineering 2024年 第1期18卷 1-17页
作者: Shakeer, Shaik Mahamad Rajasekhara Babu, M. School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Vellore India
To address the privacy concerns that arise from centralizing model training on a large number of IoT devices, a revolutionary new distributed learning framework called federated learning has been developed. This setup... 详细信息
来源: 评论
Dimensionality reduction using neural networks for lattice-based cryptographic keys
收藏 引用
International Journal of computers and Applications 2024年 第10期46卷 889-910页
作者: Wahlang, Roisan Chandrasekaran, K. Computer Science and Engineering Department National Institute of Technology Karnataka Surathkal India
Post Quantum Cryptography has received an increasing amount of active research. This has been made prominent by the ever-growing field of quantum computing which poses a formidable threat to the modern cybersecurity l... 详细信息
来源: 评论
Optimized Neural Network for Automated Cardiovascular Disease Classification: Meta-heuristic Enabled Model
收藏 引用
SN computer science 2025年 第1期6卷 1-14页
作者: Kusuma, S. Jothi, K.R. Department of Computer Science & Engineering (Data Science) Madanapalle Institute of Technology & Science Madanapalle India School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Cardiovascular disease remains a major issue for mortality and morbidity, making accurate classification crucial. This paper introduces a novel heart disease classification model utilizing Electrocardiogram (ECG) sign... 详细信息
来源: 评论
Enhancing IoT intrusion detection through machine learning with AN-SFS: a novel approach to high performing adaptive feature selection
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-26页
作者: Walling, Supongmen Lodh, Sibesh Department of Computer Science and Engineering National Institute of Technology Nagaland Dimapur India
The vast volume of redundant and irrelevant network traffic data poses significant hurdles for intrusion detection. Effective feature selection is crucial for eliminating irrelevant information. Presently, most filter... 详细信息
来源: 评论