咨询与建议

限定检索结果

文献类型

  • 9,661 篇 会议
  • 8,506 篇 期刊文献
  • 203 册 图书

馆藏范围

  • 18,370 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,241 篇 工学
    • 7,280 篇 计算机科学与技术...
    • 5,868 篇 软件工程
    • 2,458 篇 信息与通信工程
    • 1,601 篇 电气工程
    • 1,589 篇 控制科学与工程
    • 1,487 篇 电子科学与技术(可...
    • 1,447 篇 生物工程
    • 1,176 篇 生物医学工程(可授...
    • 1,173 篇 光学工程
    • 775 篇 化学工程与技术
    • 717 篇 机械工程
    • 692 篇 材料科学与工程(可...
    • 648 篇 动力工程及工程热...
    • 642 篇 仪器科学与技术
    • 461 篇 网络空间安全
    • 415 篇 安全科学与工程
  • 7,627 篇 理学
    • 3,475 篇 数学
    • 3,129 篇 物理学
    • 1,650 篇 生物学
    • 1,140 篇 统计学(可授理学、...
    • 906 篇 化学
    • 643 篇 系统科学
  • 2,778 篇 管理学
    • 1,695 篇 管理科学与工程(可...
    • 1,195 篇 图书情报与档案管...
    • 757 篇 工商管理
  • 1,191 篇 医学
    • 982 篇 临床医学
    • 881 篇 基础医学(可授医学...
    • 544 篇 药学(可授医学、理...
    • 511 篇 公共卫生与预防医...
  • 485 篇 法学
    • 400 篇 社会学
  • 299 篇 农学
  • 289 篇 经济学
  • 204 篇 教育学
  • 50 篇 文学
  • 38 篇 军事学
  • 29 篇 艺术学
  • 5 篇 历史学
  • 3 篇 哲学

主题

  • 514 篇 deep learning
  • 433 篇 accuracy
  • 336 篇 machine learning
  • 321 篇 computational mo...
  • 271 篇 feature extracti...
  • 263 篇 internet of thin...
  • 242 篇 real-time system...
  • 229 篇 predictive model...
  • 213 篇 computer science
  • 208 篇 training
  • 203 篇 support vector m...
  • 203 篇 optimization
  • 179 篇 neural networks
  • 155 篇 image segmentati...
  • 143 篇 computer archite...
  • 135 篇 data mining
  • 134 篇 semantics
  • 126 篇 convolutional ne...
  • 124 篇 scalability
  • 117 篇 reliability

机构

  • 222 篇 institute of com...
  • 187 篇 university of ch...
  • 136 篇 university of sc...
  • 94 篇 north-west unive...
  • 92 篇 tianfu cosmic ra...
  • 89 篇 department of ph...
  • 88 篇 infn sezione di ...
  • 87 篇 institut univers...
  • 84 篇 national centre ...
  • 80 篇 infn sezione di ...
  • 80 篇 hebei normal uni...
  • 76 篇 state key labora...
  • 76 篇 tno technical sc...
  • 76 篇 institute of hig...
  • 75 篇 yunnan observato...
  • 71 篇 center for quant...
  • 70 篇 université de st...
  • 66 篇 università di ca...
  • 66 篇 key laboratory o...
  • 60 篇 school of comput...

作者

  • 110 篇 bastieri d.
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 chen a.
  • 95 篇 calvo d.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 81 篇 díaz a.f.
  • 79 篇 boumaaza j.
  • 74 篇 coleiro a.
  • 73 篇 fang j.
  • 73 篇 feng c.f.
  • 69 篇 gozzini s.r.
  • 68 篇 jiang k.
  • 68 篇 li xin
  • 67 篇 li cheng
  • 67 篇 kalekin o.
  • 66 篇 kuleshov d.
  • 66 篇 axikegu
  • 64 篇 liu d.

语言

  • 17,321 篇 英文
  • 901 篇 其他
  • 165 篇 中文
  • 5 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Institute of Engineering and Computing Science"
18370 条 记 录,以下是151-160 订阅
排序:
Harvesting Knowledge: An Innovative Ontology Framework for Agricultural Advancement using NPL methodologies  3
Harvesting Knowledge: An Innovative Ontology Framework for A...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Deepa, R. Das, Manisha Thilakavathy, P. Bennet Prabhu, A. Surendran, R. Srm Institute of Science and Technology School of Computing Department of Computing Technologies Chennai India Andhrapradesh Rajam India Vels Institute of Science and Engineering Vels Institute of Science Technology and Advanced Studies Computer Science and Engineering Chennai India Kone Elevator India Technology & Engineering Centre Tamil Nadu Chennai India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Chennai India
This paper introduces Agricultural Advancement using NLP (AA-NLP) techniques as a strategy to overcome the limitations of traditional agricultural management information systems. There is a lot of unstructured data av... 详细信息
来源: 评论
Guardians of Truth: Exploring Techniques for Veracity Identification in social media during an Infodemic  3
Guardians of Truth: Exploring Techniques for Veracity Identi...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Suthanthiradevi, P. Revathy, G. Sathish Kumar, P. Karthikeyan, B. Muthu, Lakshmi.V SRM institute of Science and Technology Data Science and Business Systems School of Computing India Vels Institute of science Technology and Advanced studies Department of Computer science and engineering India Rajalakshmi institute of technology Computer and Communication Engineering India SASTRA Deemed University School of Computing India St. Joseph's Institute of Technology Department of Computer Science and Engineering India
With the recent advent of technology, social networks are accessible 24/7 using mobile devices. During covid-19 pandemic the propagation of misinformation are mostly related to the disease, its cures and prevention. W... 详细信息
来源: 评论
Safe Spaces Analysis for Mental Health  12th
Safe Spaces Analysis for Mental Health
收藏 引用
12th International Conference on Recent Trends in computing, ICRTC 2024
作者: Kelawala, Harsh Shah, Zeal Selvaraj, P. Department of Computing Technologies College of Engineering and Technology Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur 603203 India
Mental health is a paramount concern in contemporary urban environments, necessitating comprehensive approaches to understanding its determinants and formulating effective interventions. This research project adopts a... 详细信息
来源: 评论
Object Detection Using Deep Learning for Blind People with Voice Feedback
Object Detection Using Deep Learning for Blind People with V...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Pongiannan, R.K. Franklin, J. Richard Pravin, A. Maria, Marissa Mishra, Sarvottam Kumar Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur India Srm Institute of Science and Technology Department of Electrical and Electronics Engineering Kattankulathur India Computer Science Engineering Srm Institute of Science and Technology Kattankulathur India
BlindSpace is an innovative application aimed at improving the lives of visually challenged individuals. Leveraging cutting-edge image captioning and object detection technologies, the app allows users to capture imag... 详细信息
来源: 评论
Multi Head Graph Attention for Drug Response Predicton  3
Multi Head Graph Attention for Drug Response Predicton
收藏 引用
3rd International Conference on Smart Data Intelligence, ICSMDI 2023
作者: Selvi Rajendran, P. Sivannarayna, M. Computer Science and Engineering School of Computing Hindustan Institute of Technology and Science Chennai India
Precision medicine is based on curing diseases based on a patient's genetic profile, lifestyle, and environmental factors. This method improves clinical trial success rates and speed up drug regulatory approval. P... 详细信息
来源: 评论
A Hierarchical Hybrid Deep-Net Framework for Water Demand Forecasting Using OPHO Optimization and Deep Learning Techniques
收藏 引用
Iranian Journal of science and Technology - Transactions of Civil engineering 2025年 1-17页
作者: Jeyavelu, Subha Mohan, Kowsigan Department of Computing Technologies College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chengalpattu 603203 India
Intelligent water supply relies heavily on water demand forecasting. Due to nonlinear changes in the water consumption process, traditional prediction models have significant limitations regarding precision and consis... 详细信息
来源: 评论
Advanced Weather Monitoring and Disaster Mitigation System with Interactive Weather Visualizations, Flood Zone Detection, Unplanned Drainage Identification, and Emergency Shelter Mapping including Optional Drought Intensity Prediction Capabilities  7
Advanced Weather Monitoring and Disaster Mitigation System w...
收藏 引用
7th International Conference on Circuit Power and computing Technologies, ICCPCT 2024
作者: Ranjani, M. Devaraju, Perada Sreeharshitha, Yengalasetty Viswesh, Mekala Dubey, Siddhanth SRM Institute of Science and Technology Faculty of Engineering and Technology Chennai India SRM Institute of Science and Technology Department of Computing Technologies Chennai India
The Advanced Weather Monitoring and Disaster Mitigation System is an essential resource for enhanced preparedness and response to unexpected events. It applies modern methods to show us dynamic weather images, detect ... 详细信息
来源: 评论
Securing Cloud-based Data Sharing with Accountable Proxy Re-Encryption  4
Securing Cloud-based Data Sharing with Accountable Proxy Re-...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Mahalakshmi, E. Vaidhegi, A. Jayakumar, D. Ramkumar, M.O. Rajmohan, R. Department of Computer Science and Engineering Villupuram India Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur India
Cloud computing has been a considerable way to store and share data among different communities in the past few decades. However, it has always been a challenge to ensure that the data is secured during cloud data tra... 详细信息
来源: 评论
Deep Neural Decision Forests for Accurate ESD Prediction: A Novel Approach  2
Deep Neural Decision Forests for Accurate ESD Prediction: A ...
收藏 引用
2nd International Conference on Automation, computing and Renewable Systems, ICACRS 2023
作者: Desai, Dhyani Dhaval Mittapalli, Jishnu Saurav Tyagi, Karmanya School of Computing Science and Engineering Vellore Institute of Technology Chennai India
S kin is one of the most versatile and is one of the largest organs in the body. It has many important functions, it regulates the temperature of the body and at the same time also protects our internal organs from ex... 详细信息
来源: 评论
Key Logger for Recording the Keystroke of the Targeted Machine  1
Key Logger for Recording the Keystroke of the Targeted Machi...
收藏 引用
1st IEEE International Conference on computing and Data science, ICCDS 2024
作者: Gnanavel, S. Sreekrishna, M. Shivaramakrishnan, P. Yaswanth, R. Gopika, G.S. Supriya, S. SRM Institute of Science and Technology Faculty of Engineering and Technology Dept of Computing Technologies Kattankulathur603203 India Sathyabama Institute of Science and Technology Dept of Computer Science Engineering Chennai600119 India
In the recent digital era security has become more challenging. There is a plethora of ways to find solution to ensure monitor the system and provide required security. Key logger is one of the cyber attacks which rec... 详细信息
来源: 评论