咨询与建议

限定检索结果

文献类型

  • 8,278 篇 会议
  • 6,318 篇 期刊文献
  • 253 册 图书

馆藏范围

  • 14,849 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,071 篇 工学
    • 5,690 篇 计算机科学与技术...
    • 4,586 篇 软件工程
    • 2,033 篇 信息与通信工程
    • 1,669 篇 控制科学与工程
    • 1,235 篇 电气工程
    • 1,096 篇 电子科学与技术(可...
    • 1,000 篇 生物工程
    • 779 篇 机械工程
    • 738 篇 光学工程
    • 718 篇 生物医学工程(可授...
    • 480 篇 仪器科学与技术
    • 450 篇 动力工程及工程热...
    • 394 篇 化学工程与技术
    • 334 篇 材料科学与工程(可...
    • 334 篇 交通运输工程
    • 320 篇 安全科学与工程
  • 5,120 篇 理学
    • 2,668 篇 数学
    • 1,352 篇 物理学
    • 1,178 篇 生物学
    • 900 篇 统计学(可授理学、...
    • 787 篇 系统科学
    • 466 篇 化学
  • 2,351 篇 管理学
    • 1,550 篇 管理科学与工程(可...
    • 854 篇 图书情报与档案管...
    • 776 篇 工商管理
  • 764 篇 医学
    • 626 篇 临床医学
    • 553 篇 基础医学(可授医学...
    • 318 篇 公共卫生与预防医...
    • 310 篇 药学(可授医学、理...
  • 391 篇 法学
    • 333 篇 社会学
  • 272 篇 经济学
  • 151 篇 教育学
  • 149 篇 农学
  • 31 篇 文学
  • 29 篇 军事学
  • 25 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 414 篇 computer science
  • 283 篇 deep learning
  • 239 篇 computational mo...
  • 192 篇 optimization
  • 170 篇 machine learning
  • 157 篇 feature extracti...
  • 148 篇 educational inst...
  • 142 篇 systems engineer...
  • 142 篇 neural networks
  • 141 篇 internet of thin...
  • 138 篇 artificial intel...
  • 129 篇 data mining
  • 124 篇 computer archite...
  • 119 篇 accuracy
  • 116 篇 predictive model...
  • 116 篇 control systems
  • 112 篇 reinforcement le...
  • 112 篇 support vector m...
  • 109 篇 simulation
  • 108 篇 software enginee...

机构

  • 99 篇 school of comput...
  • 86 篇 school of comput...
  • 86 篇 state key labora...
  • 83 篇 school of comput...
  • 81 篇 school of comput...
  • 81 篇 graduate school ...
  • 74 篇 school of comput...
  • 49 篇 school of comput...
  • 45 篇 ieee
  • 43 篇 school of comput...
  • 42 篇 information syst...
  • 41 篇 department of el...
  • 40 篇 academy of mathe...
  • 40 篇 pillar of inform...
  • 38 篇 the school of co...
  • 37 篇 school of comput...
  • 37 篇 department of co...
  • 36 篇 department of la...
  • 36 篇 school of comput...
  • 34 篇 graduate school ...

作者

  • 125 篇 niyato dusit
  • 67 篇 johansson karl h...
  • 49 篇 guo hong
  • 46 篇 hisao ishibuchi
  • 36 篇 pedrycz witold
  • 31 篇 xiong zehui
  • 29 篇 tao dacheng
  • 28 篇 e. rogers
  • 28 篇 rajkumar buyya
  • 26 篇 tsiftsis theodor...
  • 24 篇 shen xuemin
  • 24 篇 karl h. johansso...
  • 23 篇 kang jiawen
  • 22 篇 yang yang
  • 22 篇 niu jianwei
  • 21 篇 chen xiaowu
  • 21 篇 xu minrui
  • 20 篇 mengchu zhou
  • 20 篇 xiaoqing wen
  • 20 篇 arjan durresi

语言

  • 14,059 篇 英文
  • 585 篇 其他
  • 175 篇 中文
  • 32 篇 日文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and Systems Engineering"
14849 条 记 录,以下是81-90 订阅
排序:
Review on IOMT Security through Distributed Machine Learning  2
Review on IOMT Security through Distributed Machine Learning
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Bhaskar, Swasthika Vanitha, M. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
In this constructive healthcare industry, AI-based IOMT (Internet of Medical Things) is one of the highly used Technologies. The virtual world is customary to lose responsible data in cyberspace. Without any doubt, IO... 详细信息
来源: 评论
Equalizer Zero-Determinant Strategy in Discounted Repeated Stackelberg Asymmetric Game
收藏 引用
Journal of systems science & Complexity 2024年 第1期37卷 184-203页
作者: CHENG Zhaoyang CHEN Guanpu HONG Yiguang Key Laboratory of Systems and Control Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China School of Electrical Engineering and Computer Science KTH Royal Institute of Technology10044 StockholmSweden. Department of Control Science and Engineering Tongji UniversityShanghai 201804China Shanghai Research Institute for Intelligent Autonomous Systems Tongji UniversityShanghai 210201China
This paper focuses on the performance of equalizer zero-determinant(ZD)strategies in discounted repeated Stackelberg asymmetric *** the leader-follower adversarial scenario,the strong Stackelberg equilibrium(SSE)deriv... 详细信息
来源: 评论
Face Recognition Based Attendance Management System Using Deep Learning Method  2
Face Recognition Based Attendance Management System Using De...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Angulakshmi, M. Susithra, V. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Deep learning and transfer learning are extremely important in the internet sector and the health care industry. Face recognition technology is essential in practically every industry in our digital age. Several impro... 详细信息
来源: 评论
Enhancing User Authentication with a Secure Human-Computable Password Scheme  2
Enhancing User Authentication with a Secure Human-Computable...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Ayeswarya, S. John Singh, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Authentication in the digital world has become a challenging and difficult task. The username-password combination is no longer reliable and the tools that support authentication mechanism are all breakable. In additi... 详细信息
来源: 评论
A Hybrid Approach to Validate and Retrieve Fingerprint Image for Authenticating Database Sensitive Information Access and to Verify Some of Topological Multi-Granular Rough Sets Properties on Authenticated Database Fields  2
A Hybrid Approach to Validate and Retrieve Fingerprint Image...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Raghavan, R. John Singh, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Content based image retrieval has already begun to turn into an intriguing and exceptionally needed field to meet with the client prerequisite. Fingerprint approvals likewise have become a fascinating field to princip... 详细信息
来源: 评论
Securing the Industrial IoT: A Novel Network Intrusion Detection Models  3
Securing the Industrial IoT: A Novel Network Intrusion Detec...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Ramaiah, Mangayarkarasi Rahamathulla, Mohemmed Yousuf Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
The growth of automation in the industry makes securing IoT networks a critical priority. A resilient network intrusion detection system (NIDS) can reduce cyber threats. Detecting network traffic irregularities with d... 详细信息
来源: 评论
Enhancing Video Protection: A Reversible Digital Watermarking approach using Swin features and Arnold Transform enabled Multi-Aggregation Model  3
Enhancing Video Protection: A Reversible Digital Watermarkin...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Dilip, Mali Satish Agilandeeswari, L. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Nowadays, the widespread internet technology brings out rapid advancement in the use of videos for sharing huge amounts of secret data. Conversely, the privacy of transmitted digital content is jeopardized by digital ... 详细信息
来源: 评论
A Study on Enhanced Curricula Delivery Using Augmented/Virtual Reality  2
A Study on Enhanced Curricula Delivery Using Augmented/Virtu...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Sarath, T. Brindha, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
In human perceptive, Augmented Reality (AR) or Virtual Reality(VR) is an effective and deep technology because it creates new replicated world. The AR or VR technique is a distinctive and lucrative application;its imm... 详细信息
来源: 评论
Survival Analysis of Superficial Bladder Cancer patients using DeepSurv and Cox models  2
Survival Analysis of Superficial Bladder Cancer patients usi...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Supriya, K. Anitha, A. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The advancements in technology help in analyzing and predicting the disease of human life using automation. Out of various technologies, Machine Learning (ML) and Deep learning (DL) provide some promising results to h... 详细信息
来源: 评论
Enhancing User Authentication through Keystroke Dynamics Analysis using Isolation Forest algorithm  2
Enhancing User Authentication through Keystroke Dynamics Ana...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Iyapparaja, M. Karunanithi, Isvarya Sahana Bhat, U. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Authentication in modern era, has evolved significantly to address the increasing complexity and security challenges of our digital world. Traditional methods of authentication, such as passwords and PINS have proven ... 详细信息
来源: 评论