咨询与建议

限定检索结果

文献类型

  • 17,903 篇 会议
  • 12,742 篇 期刊文献
  • 353 册 图书

馆藏范围

  • 30,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,226 篇 工学
    • 12,668 篇 计算机科学与技术...
    • 10,385 篇 软件工程
    • 4,791 篇 信息与通信工程
    • 3,393 篇 控制科学与工程
    • 2,512 篇 电气工程
    • 2,369 篇 电子科学与技术(可...
    • 2,266 篇 生物工程
    • 1,714 篇 光学工程
    • 1,611 篇 生物医学工程(可授...
    • 1,483 篇 机械工程
    • 1,185 篇 仪器科学与技术
    • 1,043 篇 化学工程与技术
    • 941 篇 动力工程及工程热...
    • 845 篇 网络空间安全
    • 788 篇 材料科学与工程(可...
    • 771 篇 安全科学与工程
    • 766 篇 交通运输工程
  • 11,066 篇 理学
    • 5,344 篇 数学
    • 3,613 篇 物理学
    • 2,601 篇 生物学
    • 1,852 篇 统计学(可授理学、...
    • 1,289 篇 系统科学
    • 1,180 篇 化学
  • 5,146 篇 管理学
    • 3,353 篇 管理科学与工程(可...
    • 1,998 篇 图书情报与档案管...
    • 1,495 篇 工商管理
  • 1,796 篇 医学
    • 1,455 篇 临床医学
    • 1,289 篇 基础医学(可授医学...
    • 817 篇 公共卫生与预防医...
  • 901 篇 法学
    • 740 篇 社会学
  • 562 篇 经济学
  • 448 篇 农学
  • 309 篇 教育学
  • 128 篇 文学
  • 88 篇 军事学
  • 48 篇 艺术学
  • 4 篇 历史学
  • 2 篇 哲学

主题

  • 872 篇 deep learning
  • 818 篇 accuracy
  • 633 篇 feature extracti...
  • 580 篇 machine learning
  • 527 篇 training
  • 473 篇 internet of thin...
  • 469 篇 computational mo...
  • 452 篇 computer science
  • 380 篇 support vector m...
  • 327 篇 predictive model...
  • 323 篇 real-time system...
  • 317 篇 convolutional ne...
  • 301 篇 optimization
  • 291 篇 artificial intel...
  • 253 篇 object detection
  • 245 篇 image segmentati...
  • 235 篇 data models
  • 226 篇 reliability
  • 212 篇 simulation
  • 204 篇 neural networks

机构

  • 578 篇 school of comput...
  • 334 篇 school of comput...
  • 285 篇 faculty of scien...
  • 276 篇 department of ph...
  • 275 篇 departamento de ...
  • 270 篇 department for p...
  • 267 篇 department of ph...
  • 267 篇 department of ph...
  • 263 篇 department of ph...
  • 259 篇 faculté des scie...
  • 225 篇 department of ph...
  • 223 篇 department of ph...
  • 219 篇 physics division...
  • 199 篇 department of ph...
  • 189 篇 yerevan physics ...
  • 175 篇 department of ph...
  • 174 篇 kirchhoff-instit...
  • 167 篇 centre de calcul...
  • 164 篇 school of comput...
  • 158 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 258 篇 m. klein
  • 256 篇 r. ströhmer
  • 255 篇 m. rijssenbeek
  • 254 篇 s. jin
  • 253 篇 g. gaudio
  • 252 篇 h. sakamoto
  • 244 篇 s. mohapatra
  • 243 篇 y. tayalati
  • 242 篇 d. guest
  • 231 篇 y. nagasaka

语言

  • 26,030 篇 英文
  • 4,481 篇 其他
  • 444 篇 中文
  • 93 篇 日文
  • 12 篇 德文
  • 8 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer Science Engineering and Information Systems Vellore Institute of Technology"
30998 条 记 录,以下是481-490 订阅
排序:
A Trust-based Framework for the Detection and Avoidance of Blackhole Nodes in Opportunistic Networks  9
A Trust-based Framework for the Detection and Avoidance of B...
收藏 引用
9th International Conference on Signal Processing and Communication, ICSC 2023
作者: Kundu, Protyasha Saha, Swarnadeep Kundu, Anindita Barai, Smritikona Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore India
An Opportunistic Network (OppNet), as opposed to a ubiquitous centralized network, relies on sporadic and opportunistic encounters between nodes to facilitate communication. The uncertainty about the node's nature...
来源: 评论
Benchmarking Semantic Segmentation Approaches for Polyp and Lesion Detection in Medical Imaging  2
Benchmarking Semantic Segmentation Approaches for Polyp and ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Pandiyaraju, V. Sunil, Meghana Shravya, V. Venkatraman, Shravan Kannan, A. Vellore Institute of Technology School of Computer Science and Engineering Chennai India Anna University Department of Information Science and Technology Chennai India
In medical imaging, semantic segmentation is essential because it can precisely locate and isolate regions of interest, such lesions or tumours, from intricate anatomical systems. Deep learning (DL) has led to a subst... 详细信息
来源: 评论
A novel optimised GWOAN algorithm for scheduling task and power consumption in MEC network
收藏 引用
International Journal of Intelligent systems Technologies and Applications 2023年 第4期21卷 386-401页
作者: Sivakumar, P. Murugan, Murali Somasundaram, S.K. Prabhu, S. Nagendra School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai600127 India Engineering Retail Business Professional Georgia United States School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India Department of Computational Intelligence SRM Institute of Science and Technology Tamil Nadu Chennai632014 India
In recent decades, the 5G and internet of things (IoT) are occupied with several applications like face recognition, traffic control, video surveillance and telecommunication, etc. Mobile-edge computing (MEC) is a pro... 详细信息
来源: 评论
TizenRT OS Based Data Compression Algorithms for IoT Devices  4
TizenRT OS Based Data Compression Algorithms for IoT Devices
收藏 引用
4th IEEE International Conference on Computing, Communication, and Intelligent systems, ICCCIS 2023
作者: Chamak, Tanmoy Roy Kaushik, Sachi Singhal, Shiven Dadheech, Aditya Anitha, Prof. A. Jenicka, Prof. S. Thapa, Vidisha School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Samsung Research Institute Karnataka Bangalore India
The paper investigates the integration and adaptation of the LZ4 compression algorithm within the context of TizenRT, in addition to existing algorithms Miniz and LZMA. TizenRT, a real-Time operating system tailored f... 详细信息
来源: 评论
Detecting AI-Generated Deep Fakes Using ResNext CNN and LSTM-Based RNN: A Robust Approach for Real-Time Video Manipulation Detection
Detecting AI-Generated Deep Fakes Using ResNext CNN and LST...
收藏 引用
International Conference on. Cryptology and Network Security with Machine Learning, ICCNSML 2023
作者: Dhar, Akanksha Agrawal, Ekansh School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India
The increasing computational power has greatly empowered deep learning algorithms, making the creation of highly realistic and virtually undetectable synthetic videos, commonly known as deep fakes, remarkably simple. ... 详细信息
来源: 评论
Hardware Acceleration for Embedded Scripting Programming Language ‘mruby/c’
Computer Software
收藏 引用
computer Software 2024年 第2期41卷 60-79页
作者: Maeda, Hiroyuki Tanaka, Kazuaki Fukuoka Industrial Technology Center Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Japan
In this paper, we propose hardware acceleration to improve a performance of scripting programming languages for embedded developments. Scripting programming languages enable more efficient software developments and sc... 详细信息
来源: 评论
Real Time Bimodal Emotion Recognition using Hybridized Deep Learning Techniques  2
Real Time Bimodal Emotion Recognition using Hybridized Deep ...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Bhat, Akshata A. Kavitha, S. Satapathy, Shashank Mouli Kavipriya, J. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India
Emotion detection has become an important study subject due to the potential uses that it has in many other domains. It incorporates data from various sources, such as facial expressions, voice patterns, physiological... 详细信息
来源: 评论
Phishtor: Phishing Detection Using Machine Learning
Phishtor: Phishing Detection Using Machine Learning
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable technology, ICRISST 2024
作者: Rangasamy, Gokul Primya, T. Kumar, Gurupriya Sivakumar, Harinath Kanagaraj, G. Sathish Kumar, D. Kpr Institute of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India Kumaraguru College of Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India Vellore Institute of Technology School of Computer Science Engineering and Information Technology Tamil Nadu Vellore India
Nowadays, the majority of people rely heavily on the internet. Online transactions, online sign-ups, and online purchasing are used by everyone. One kind of threat to websites is phishing, which is an illegal activity... 详细信息
来源: 评论
Tackling E-Waste Management Using Decentralized Marketplace Leveraging Ethereum Blockchain
Tackling E-Waste Management Using Decentralized Marketplace ...
收藏 引用
2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication, IConSCEPT 2024
作者: Allu, Himasri Bharti, Anjali Satapathy, Shashank Mouli School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India
This study explores the implementation of a decen-tralized marketplace using blockchain technology for e-waste management. Through stakeholder-driven validation using the proof of stake and on-chain attestation, the p... 详细信息
来源: 评论
Optimal feature extraction and classification-oriented medical insurance prediction model: machine learning integrated with the internet of things
收藏 引用
International Journal of computers and Applications 2022年 第3期44卷 278-290页
作者: Chowdhury, Subrata Mayilvahanan, P. Govindaraj, Ramya School of Computer Science Vels Institute of Science Technology & Advanced Studies TN Chennai India School of Information Technology and Engineering Vellore Institute of Technology TN Vellore India
This paper plans to develop an effective machine learning system integrated with the Internet of Things (IoT) to predict the health insurance amount. IoT in healthcare enables interoperability, machine-to-machine comm... 详细信息
来源: 评论