咨询与建议

限定检索结果

文献类型

  • 17,903 篇 会议
  • 12,742 篇 期刊文献
  • 353 册 图书

馆藏范围

  • 30,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,226 篇 工学
    • 12,668 篇 计算机科学与技术...
    • 10,385 篇 软件工程
    • 4,791 篇 信息与通信工程
    • 3,393 篇 控制科学与工程
    • 2,512 篇 电气工程
    • 2,369 篇 电子科学与技术(可...
    • 2,266 篇 生物工程
    • 1,714 篇 光学工程
    • 1,611 篇 生物医学工程(可授...
    • 1,483 篇 机械工程
    • 1,185 篇 仪器科学与技术
    • 1,043 篇 化学工程与技术
    • 941 篇 动力工程及工程热...
    • 845 篇 网络空间安全
    • 788 篇 材料科学与工程(可...
    • 771 篇 安全科学与工程
    • 766 篇 交通运输工程
  • 11,066 篇 理学
    • 5,344 篇 数学
    • 3,613 篇 物理学
    • 2,601 篇 生物学
    • 1,852 篇 统计学(可授理学、...
    • 1,289 篇 系统科学
    • 1,180 篇 化学
  • 5,146 篇 管理学
    • 3,353 篇 管理科学与工程(可...
    • 1,998 篇 图书情报与档案管...
    • 1,495 篇 工商管理
  • 1,796 篇 医学
    • 1,455 篇 临床医学
    • 1,289 篇 基础医学(可授医学...
    • 817 篇 公共卫生与预防医...
  • 901 篇 法学
    • 740 篇 社会学
  • 562 篇 经济学
  • 448 篇 农学
  • 309 篇 教育学
  • 128 篇 文学
  • 88 篇 军事学
  • 48 篇 艺术学
  • 4 篇 历史学
  • 2 篇 哲学

主题

  • 872 篇 deep learning
  • 818 篇 accuracy
  • 633 篇 feature extracti...
  • 580 篇 machine learning
  • 527 篇 training
  • 473 篇 internet of thin...
  • 469 篇 computational mo...
  • 452 篇 computer science
  • 380 篇 support vector m...
  • 327 篇 predictive model...
  • 323 篇 real-time system...
  • 317 篇 convolutional ne...
  • 301 篇 optimization
  • 291 篇 artificial intel...
  • 253 篇 object detection
  • 245 篇 image segmentati...
  • 235 篇 data models
  • 226 篇 reliability
  • 212 篇 simulation
  • 204 篇 neural networks

机构

  • 578 篇 school of comput...
  • 334 篇 school of comput...
  • 285 篇 faculty of scien...
  • 276 篇 department of ph...
  • 275 篇 departamento de ...
  • 270 篇 department for p...
  • 267 篇 department of ph...
  • 267 篇 department of ph...
  • 263 篇 department of ph...
  • 259 篇 faculté des scie...
  • 225 篇 department of ph...
  • 223 篇 department of ph...
  • 219 篇 physics division...
  • 199 篇 department of ph...
  • 189 篇 yerevan physics ...
  • 175 篇 department of ph...
  • 174 篇 kirchhoff-instit...
  • 167 篇 centre de calcul...
  • 164 篇 school of comput...
  • 158 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 258 篇 m. klein
  • 256 篇 r. ströhmer
  • 255 篇 m. rijssenbeek
  • 254 篇 s. jin
  • 253 篇 g. gaudio
  • 252 篇 h. sakamoto
  • 244 篇 s. mohapatra
  • 243 篇 y. tayalati
  • 242 篇 d. guest
  • 231 篇 y. nagasaka

语言

  • 26,030 篇 英文
  • 4,481 篇 其他
  • 444 篇 中文
  • 93 篇 日文
  • 12 篇 德文
  • 8 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer Science Engineering and Information Systems Vellore Institute of Technology"
30998 条 记 录,以下是341-350 订阅
排序:
Pancreatic Cancer Diagnosis using Swarm Optimization Combined with Machine Learning Techniques  3
Pancreatic Cancer Diagnosis using Swarm Optimization Combine...
收藏 引用
3rd International Conference on Smart Technologies, Communication and Robotics, STCR 2023
作者: Bharanidharan, N. Aggarwal, Pratham Batra, Aryan Shah, Deep Sannasi Chakravarthy, S.R. Rajaguru, Harikumar Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India Bannari Amman Institute of Technology Department of Electronics and Communication Engineering Sathyamangalam India
When compared to different types of malignant tumors, pancreatic malignancy is the 12th widespread tumor disease among humans globally. Pancreatic cancer can be identified at the earlier stages using microarray gene a... 详细信息
来源: 评论
Effective Mobility Identification in Mobile Fog Environment with the Internet of Things
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第15期16卷 157-171页
作者: Deepa, D. Jothi, K.R. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Fog extends the cloud to be closer to the end devices so that it acts on IoT data within a millisecond. Almost 60% of data can be analyzed that is physically near to the IoT data. This proximity has various advantages... 详细信息
来源: 评论
ASSESSING THE ACCURACY AND ETHICAL IMPLICATIONS OF AUTOMATED CRIMINAL DETECTION USING A DEEP LEARNING APPROACH
ASSESSING THE ACCURACY AND ETHICAL IMPLICATIONS OF AUTOMATED...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Jagadeesan, S. Sujigarasharma, K. Manjula, R. Vetriselvi, T. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India Department of IOT School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
This study examines the accuracy and ethical implications of using convolutional neural networks (CNN) for automated crime detection. A CNN model was trained on a dataset of criminal mugshots to identify potential cri... 详细信息
来源: 评论
Performance Analysis of CNN Models for Evaluating Biglycan as a Biomarker in Predicting Breast Cancer
Performance Analysis of CNN Models for Evaluating Biglycan a...
收藏 引用
International Conference on computer Vision and Internet of Things 2023, ICCVIoT 2023
作者: Krishnan, Sushil Sundaresan, Yokesh Babu Bachelor of Technology in Computer Science and Engineering Vellore Institute of Technology Vellore India School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Breast cancer is found in the present generation at a higher level. Since the middle of the 20th century numerous unfavorable changes have been made to food, our way of life, obesity, the situation, and our microbiome... 详细信息
来源: 评论
An with effective ensemble classifier for network intrusion detection system
收藏 引用
Peer-to-Peer Networking and Applications 2025年 第2期18卷
作者: Nandhini, U. Santhosh Kumar, S.V.N. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The increasing frequency of network attacks poses a significant challenge in maintaining network security. In response to security vulnerabilities, the employment of Intrusion Detection systems (IDS) has become crucia... 详细信息
来源: 评论
Conditional adversarial segmentation and deep learning approach for skin lesion sub-typing from dermoscopic images
收藏 引用
Neural Computing and Applications 2024年 第26期36卷 16445-16463页
作者: Mirunalini, P. Desingu, Karthik Aswatha, S. Deepika, R. Deepika, V. Jaisakthi, S.M. Department of Computer Science Engineering Sri Sivasubramaniya Nadar College of Engineering Chennai603110 India School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Chennai600127 India
Automatic skin lesion subtyping is a crucial step for diagnosing and treating skin cancer and acts as a first level diagnostic aid for medical experts. Although, in general, deep learning is very effective in image pr... 详细信息
来源: 评论
Utilizing Machine Learning to foster employee mental health in modern workplace environment
Utilizing Machine Learning to foster employee mental health ...
收藏 引用
2024 IEEE International Students' Conference on Electrical, Electronics and computer science, SCEECS 2024
作者: Chauhan, Tania Renjith, P.N. Vellore Institute of Technology Chennai India Vellore Institute of Technology School of Computer Science and Engineering Chennai India
This study offers a novel approach to tackling the increasing problem of workplace stress by utilizing machine learning techniques. Professionals in modern work contexts experience heightened levels of stress due to d... 详细信息
来源: 评论
Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals
收藏 引用
computer systems science & engineering 2023年 第5期45卷 1851-1867页
作者: V.Harshini T.Dhanwin A.Shahina N.Safiyyah A.Nayeemulla Khan Department of Information Technology Sri Sivasubramaniya Nadar College of EngineeringChennai603110India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the huma... 详细信息
来源: 评论
Uncovering the Hidden Patterns of the COVID-19 Global Pandemic: An in-Depth Data Analytics Approach
收藏 引用
SN computer science 2024年 第8期5卷 1-15页
作者: Sarobin, M. Vergin Raja Rathore, Jinen Mishra, Rajat Moolya, Vinay Vittal Seth, Yash School of Computer Science and Engineering Vellore Institute of Technology TN Chennai 600127 India
COVID-19 is a highly infectious respiratory illness caused by the novel coronavirus. It was first identified in Wuhan, China in December 2019 and has since spread globally, infecting and killing a vast number of peopl... 详细信息
来源: 评论
A Review of Intelligent Configuration and Its Security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论