咨询与建议

限定检索结果

文献类型

  • 9,661 篇 会议
  • 8,506 篇 期刊文献
  • 203 册 图书

馆藏范围

  • 18,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,241 篇 工学
    • 7,280 篇 计算机科学与技术...
    • 5,868 篇 软件工程
    • 2,458 篇 信息与通信工程
    • 1,601 篇 电气工程
    • 1,589 篇 控制科学与工程
    • 1,487 篇 电子科学与技术(可...
    • 1,447 篇 生物工程
    • 1,176 篇 生物医学工程(可授...
    • 1,173 篇 光学工程
    • 775 篇 化学工程与技术
    • 717 篇 机械工程
    • 692 篇 材料科学与工程(可...
    • 648 篇 动力工程及工程热...
    • 642 篇 仪器科学与技术
    • 461 篇 网络空间安全
    • 415 篇 安全科学与工程
  • 7,627 篇 理学
    • 3,475 篇 数学
    • 3,129 篇 物理学
    • 1,650 篇 生物学
    • 1,140 篇 统计学(可授理学、...
    • 906 篇 化学
    • 643 篇 系统科学
  • 2,778 篇 管理学
    • 1,695 篇 管理科学与工程(可...
    • 1,195 篇 图书情报与档案管...
    • 757 篇 工商管理
  • 1,191 篇 医学
    • 982 篇 临床医学
    • 881 篇 基础医学(可授医学...
    • 544 篇 药学(可授医学、理...
    • 511 篇 公共卫生与预防医...
  • 485 篇 法学
    • 400 篇 社会学
  • 299 篇 农学
  • 289 篇 经济学
  • 204 篇 教育学
  • 50 篇 文学
  • 38 篇 军事学
  • 29 篇 艺术学
  • 5 篇 历史学
  • 3 篇 哲学

主题

  • 514 篇 deep learning
  • 433 篇 accuracy
  • 336 篇 machine learning
  • 321 篇 computational mo...
  • 271 篇 feature extracti...
  • 263 篇 internet of thin...
  • 242 篇 real-time system...
  • 229 篇 predictive model...
  • 213 篇 computer science
  • 208 篇 training
  • 203 篇 support vector m...
  • 203 篇 optimization
  • 179 篇 neural networks
  • 155 篇 image segmentati...
  • 143 篇 computer archite...
  • 135 篇 data mining
  • 134 篇 semantics
  • 126 篇 convolutional ne...
  • 124 篇 scalability
  • 117 篇 reliability

机构

  • 222 篇 institute of com...
  • 187 篇 university of ch...
  • 136 篇 university of sc...
  • 94 篇 north-west unive...
  • 92 篇 tianfu cosmic ra...
  • 89 篇 department of ph...
  • 88 篇 infn sezione di ...
  • 87 篇 institut univers...
  • 84 篇 national centre ...
  • 80 篇 infn sezione di ...
  • 80 篇 hebei normal uni...
  • 76 篇 state key labora...
  • 76 篇 tno technical sc...
  • 76 篇 institute of hig...
  • 75 篇 yunnan observato...
  • 71 篇 center for quant...
  • 70 篇 université de st...
  • 66 篇 università di ca...
  • 66 篇 key laboratory o...
  • 60 篇 school of comput...

作者

  • 110 篇 bastieri d.
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 chen a.
  • 95 篇 calvo d.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 81 篇 díaz a.f.
  • 79 篇 boumaaza j.
  • 74 篇 coleiro a.
  • 73 篇 fang j.
  • 73 篇 feng c.f.
  • 69 篇 gozzini s.r.
  • 68 篇 jiang k.
  • 68 篇 li xin
  • 67 篇 li cheng
  • 67 篇 kalekin o.
  • 66 篇 kuleshov d.
  • 66 篇 axikegu
  • 64 篇 liu d.

语言

  • 17,321 篇 英文
  • 901 篇 其他
  • 165 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Institute of Engineering and Computing Science"
18370 条 记 录,以下是101-110 订阅
排序:
Enhanced Fruit Fly Optimization Algorithm for Wrapper Based Feature Selection in Cancer Prediction  1
Enhanced Fruit Fly Optimization Algorithm for Wrapper Based ...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous computing, IC-CGU 2024
作者: Saranya, P. Viji, D. Jangiti, Aditya School of Computing College of Engineering and Technology SRM Institute of Science and Technology Department of Computational Intelligence Tamil Nadu Chennai India School of Computing College of Engineering and Technology SRM Institute of Science and Technology Department of Computing Technologies Tamil Nadu Chennai India
Nowadays, smart healthcare appliances generate vast amount of medical data. Such huge amount of data requires classification methodologies, through which disease diagnostics can be carried out. Chronic diseases like c... 详细信息
来源: 评论
NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tiered Mitigation Strategy  25
NetProbe: Deep Learning-Driven DDoS Detection with a Two-Tie...
收藏 引用
26th International Conference on Distributed computing and Networking, ICDCN 2025
作者: Jha, Prianshu Singh, Gurpreet Kumar, Amit Agrawal, Dewesh Patel, Yashwant Singh Forough, Javad Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Punjab Patiala India Department of Computing Science Umea University Umeå Sweden
Web servers are the backbone of modern Internet infrastructure, serving as the primary medium for online information distribution. Despite their critical role, web servers are susceptible to cyber-attacks. While curre... 详细信息
来源: 评论
VitalLink: NodeMCU IoT Solution for Vital Signs Surveillance  7
VitalLink: NodeMCU IoT Solution for Vital Signs Surveillance
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Ramitha Rajeswari, J. Chamanthi, Reddy Mary Posonia, A. Albert Mayan, J. Sathyabama Institute of Science And Technology Department of Computer Science And Engineering Chennai India Sathyabama Institute of Science And Technology School of Computing Chennai India
This research study proposes the development of comprehensive vital sign surveillance designed for real-time patient assessment. The system integrates multiple sensors, including the LM35 temperature sensor, Heartbeat... 详细信息
来源: 评论
Unravelling State-wise Crime Patterns with Ensemble Machine Learning and Data Visualization for Public Safety  2
Unravelling State-wise Crime Patterns with Ensemble Machine ...
收藏 引用
2nd International Conference on Artificial Intelligence and Machine Learning Applications, AIMLA 2024
作者: Sri Harsha, M.V.R. Akhil, M.H.S. Ronald Doni, A. Albert Mayan, J. Yovan Felix, A. Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India Sathyabama Institute of Science and Technology School of Computing Chennai India
This study, detailed below, introduces a new method of handling crimes in particular states, using ensemble machine learning and data visualization techniques in particular, as a way to enhance public safety. Crime de... 详细信息
来源: 评论
SecuDroid : Android Malware Detection using ML classifier on Static Features  2
SecuDroid : Android Malware Detection using ML classifier on...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Vanusha, D. Singh, Shashank Jha, Abhijeet Kumar Delsi Robinsha, S. School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Department of Computing Technologies Tamil Nadu Kattankulathur603203 India School of Computing SRM Institute of Science and Technology Department of Computing Technologies Tamil Nadu Kattankulathur603203 India
The Android operating system's widespread use has unfortunately made it a target for malware attacks, underlining the necessity for robust detection strategies. Existing literature has explored the potential of ma... 详细信息
来源: 评论
Performance Evaluation of Biometric Authentication Using Fragment Jaya Optimizer-Based Deep CNN with Multi-kernel SVM
收藏 引用
SN Computer science 2024年 第4期5卷 337页
作者: Umasankari, N. Muthukumar, B. Shanmuganathan, C. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India School of Computing Department of CSE Sathyabama Institute of Science and Technology Chennai India Rajalakshmi Engineering College Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
The earlier research clearly indicated that the bimodal authentication system has more efficiency than unimodal and multimodal. This is due to the reason for the best intact biometric traits of fingerprint and retina.... 详细信息
来源: 评论
Adversarial Attacks Using Carlini Wagner
Adversarial Attacks Using Carlini Wagner
收藏 引用
2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Baddukonda, Tarun Aditya Kanakam, Ronit Kumar Yasotha, B. Srm Institute of Science and Technology Department of Computer Science and Engineering Kaatankulathur Tamilnadu Chennai India School of Computing Srm Institute of Science and Technology Department of Computing Technologies Kaatankulathur Tamilnadu Chennai India
Adversarial attacks in the Artificial Intelligence have received extensive coverage in the latest years. Such attacks have affected deep learning models and neural networks due to the weaknesses that are part of the A... 详细信息
来源: 评论
Security of Images Using Pascal's Triangle Chaotic Encryption Scheme and with Biometric Authentication in Cloud Storage  4
Security of Images Using Pascal's Triangle Chaotic Encryptio...
收藏 引用
4th International Conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Gupta, Raghav Gullapalli, Manasa Suseela, G. School of Computing Science and Engineering Srm Institute of Science and Technology Department of Networking and Communications Tamil Nadu Kattankulathur603203 India School of Computing Science and Engineering Faculty of Engineering and Technology Srm Institute of Science and Technology Department of Networking and Communications Tamil Nadu Kattankulathur603203 India
A key component of cloud computing is cloud storage, which allows data to be stored on remote servers. The result is a reduction in the amount of storage space required on local devices, allowing data to be accessed f... 详细信息
来源: 评论
Bridging the Semantic Gap: A Deep Learning Framework for Semantic Video Search Integrating Vision and Language for Enhanced Video Retrieval  10
Bridging the Semantic Gap: A Deep Learning Framework for Sem...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Annamalai, J. Arjun Sneha, S. Sharon Ashokkumar, C. Srm Institute of Science and Technology School of Computing College of Engineering and Technology Department of Computing Technologies Chennai Kattankulathur603203 India
Traditional video search engines often rely on tags or manual annotations for content retrieval, limiting the accuracy and efficiency of search results. Moreover, keyword-centric searches may not adeptly capture the n... 详细信息
来源: 评论
H-hop independently submodular maximization problem with curvature
收藏 引用
High-Confidence computing 2024年 第3期4卷 75-81页
作者: Yang Lv Chenchen Wu Dachuan Xu Ruiqi Yang Beijing Institute for Scientific and Engineering Computing Beijing University of TechnologyBeijing 100124China College of Science Tianjin University of TechnologyTianjin 300382China
The Connected Sensor Problem(CSP)presents a prevalent challenge in the realms of communication and Internet of Things(IoT)*** primary aim is to maximize the coverage of users while maintaining connectivity among K ***... 详细信息
来源: 评论