咨询与建议

限定检索结果

文献类型

  • 2,954 篇 会议
  • 944 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 3,922 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,304 篇 工学
    • 1,919 篇 计算机科学与技术...
    • 1,652 篇 软件工程
    • 677 篇 信息与通信工程
    • 425 篇 控制科学与工程
    • 424 篇 生物工程
    • 305 篇 生物医学工程(可授...
    • 277 篇 电气工程
    • 226 篇 光学工程
    • 206 篇 电子科学与技术(可...
    • 181 篇 安全科学与工程
    • 179 篇 网络空间安全
    • 165 篇 机械工程
    • 146 篇 动力工程及工程热...
    • 134 篇 化学工程与技术
    • 128 篇 交通运输工程
    • 120 篇 仪器科学与技术
  • 1,334 篇 理学
    • 602 篇 数学
    • 464 篇 生物学
    • 360 篇 物理学
    • 233 篇 统计学(可授理学、...
    • 163 篇 系统科学
    • 151 篇 化学
  • 763 篇 管理学
    • 442 篇 管理科学与工程(可...
    • 365 篇 图书情报与档案管...
    • 235 篇 工商管理
  • 388 篇 医学
    • 330 篇 临床医学
    • 309 篇 基础医学(可授医学...
    • 210 篇 公共卫生与预防医...
    • 172 篇 药学(可授医学、理...
  • 163 篇 法学
    • 135 篇 社会学
  • 118 篇 农学
  • 104 篇 经济学
  • 44 篇 教育学
  • 23 篇 文学
  • 2 篇 军事学

主题

  • 263 篇 accuracy
  • 246 篇 deep learning
  • 164 篇 machine learning
  • 151 篇 convolutional ne...
  • 140 篇 feature extracti...
  • 121 篇 support vector m...
  • 119 篇 real-time system...
  • 117 篇 predictive model...
  • 116 篇 training
  • 115 篇 computational mo...
  • 108 篇 internet of thin...
  • 96 篇 machine learning...
  • 78 篇 data models
  • 75 篇 security
  • 68 篇 artificial intel...
  • 64 篇 technological in...
  • 61 篇 medical services
  • 60 篇 prediction algor...
  • 59 篇 sentiment analys...
  • 58 篇 analytical model...

机构

  • 680 篇 school of comput...
  • 492 篇 school of comput...
  • 166 篇 vellore institut...
  • 113 篇 vellore institut...
  • 107 篇 school of comput...
  • 106 篇 school of comput...
  • 101 篇 school of comput...
  • 93 篇 school of inform...
  • 63 篇 school of comput...
  • 57 篇 school of comput...
  • 54 篇 school of electr...
  • 49 篇 school of comput...
  • 42 篇 school of electr...
  • 34 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of comput...
  • 29 篇 vellore institut...
  • 28 篇 school of comput...
  • 26 篇 school of comput...
  • 26 篇 computer science...

作者

  • 39 篇 tyagi amit kumar
  • 31 篇 gadekallu thippa...
  • 21 篇 trilok nath pand...
  • 20 篇 pandey trilok na...
  • 17 篇 kathiravan srini...
  • 17 篇 thippa reddy gad...
  • 16 篇 harshith john
  • 16 篇 maddikunta prave...
  • 16 篇 dutta anurag
  • 16 篇 sudhansu shekhar...
  • 15 篇 bibhuti bhusan d...
  • 15 篇 amit kumar tyagi
  • 15 篇 sengan sudhakar
  • 14 篇 pandiyaraju v.
  • 14 篇 kannan a.
  • 14 篇 dhanalakshmi r.
  • 14 篇 patra sudhansu s...
  • 13 篇 kumaran k
  • 13 篇 bhattacharya swe...
  • 13 篇 vijayarajan v.

语言

  • 3,641 篇 英文
  • 280 篇 其他
  • 23 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Shool of Computer Science and Engineering Vellore Institute of Technology"
3922 条 记 录,以下是111-120 订阅
排序:
A Computationally efficient CNN-based Deep Learning Technique for Sickle Cell Detection
A Computationally efficient CNN-based Deep Learning Techniqu...
收藏 引用
2024 IEEE International Conference on Electronic Systems and Intelligent Computing, ICESIC 2024
作者: Hemavarshini, S. Sathya Shree, S. Arumuga Arun, R. Vellore Institute of Technology School of Computer Science and Engineering Vellore India
An amino acid change in the hemoglobin protein causes sickle cell disease (SCD), a prevalent hereditary illness that causes red blood cells to take on a sickle shape. These malformed cells cause severe health complica... 详细信息
来源: 评论
Comparative and Preventive Analysis of Dictionary Attacks  1st
Comparative and Preventive Analysis of Dictionary Attacks
收藏 引用
1st International Conference on Sci/Tech and engineering, ICSTE 2023
作者: Shourya, Sanat Venkatachalam, Ilayaraja Patel, Harpal Mittal, Manit School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Hacking is one of the most widespread issues that the general public faces today. Hackers essentially use some social engineering techniques, combined with the publicly available information, to crack open the social ... 详细信息
来源: 评论
Face Identification of Suspects Using Sequential -Deep Convolutional Neural Network  2
Face Identification of Suspects Using Sequential -Deep Convo...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Munusamy, Vaishnavi Senthilkumar, Sudha School of Computer Science and Engineering Vellore Institute of Technology Vellore India
In terms of increasing terrorism, criminal behaviour, and anti-social events, there has been a need for safety systems to identify criminals. Face Recognition is one of the vibrant technologies that are very useful fo... 详细信息
来源: 评论
Flourishing Fields: Modernizing Farming with Real Time AI-powered Tomato Disease Detection and Monitoring
Flourishing Fields: Modernizing Farming with Real Time AI-po...
收藏 引用
2024 International Conference on Integration of Emerging Technologies for the Digital World, ICIETDW 2024
作者: Sriram, G. Saran, D. Vignesh, M. Nallusamy, Priyanka Arumuga Arun, R. Adaline Suji, R. Vellore Institute of Technology School of Computer Science and Engineering Vellore India
The agricultural sector faces significant challenges due to plant diseases, which can drastically reduce crop yields and quality. This paper presents a cutting-edge solution for real-time detection and instant remedia... 详细信息
来源: 评论
An Enhanced Feature Fusion Network Model for Cervical Cancer Prediction
An Enhanced Feature Fusion Network Model for Cervical Cancer...
收藏 引用
2024 IEEE Silchar Subsection Annual Conference, SILCON 2024
作者: Pragatheeswari, B. Mary, Jameela Priya, S. Roshni Dhivyaa, C.R. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Healthcare providers and researchers that work with patients who have cervical cancer face a significant challenge because it is one of the world's most common causes of death. Worldwide, cervical cancer is one of... 详细信息
来源: 评论
Pipeline Leak Detection System Using Machine Learning
Pipeline Leak Detection System Using Machine Learning
收藏 引用
2024 IEEE International Conference on Information technology, Electronics and Intelligent Communication Systems, ICITEICS 2024
作者: Jaswanth, Chitrada Shiva, Golla Pavan Raj, Grandhi Naga Sai Rishi Thirunavukkarasan, M. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Leak detection is a critical concern across various sectors due to its potential environmental, economic, and safety implications. This paper presents a machine learning-based approach aimed at enhancing leak detectio... 详细信息
来源: 评论
X-Ray Based Lung Disease Classification Using Fine-Tuned VGG16 Model  2
X-Ray Based Lung Disease Classification Using Fine-Tuned VGG...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Gehani, Ronit Victor, Akila Vellore Institute of Technology Department of Computer Science and Engineering Vellore India
The COVID-19 pandemic was a global outbreak of a viral that caused widespread to people's well-being. COVID-19 primarily affects the respiratory system, leading to various lung diseases and complications. During t... 详细信息
来源: 评论
Secure Messaging using Blockchain technology  15
Secure Messaging using Blockchain Technology
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Ruby, D. Magadum, Hrishikesh Vellore Institute of Technology School of Computer Science and Engineering Vellore India
All messaging platforms rely on a centralized server which has the vulnerability of getting hacked by outside agencies and posing risk to private data. Authentication between users is an important asset in electronic ... 详细信息
来源: 评论
Measurement of Body Vitals using Photoplethysmography (PPG) and Smartphone Sensors  2
Measurement of Body Vitals using Photoplethysmography (PPG) ...
收藏 引用
2nd International Conference on Emerging Trends in Information technology and engineering, ic-ETITE 2024
作者: Furniturewala, Mahera Sivaraman, Arjun Anand, Anmol Kannuchamy, Tarun Sasikala, R. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Every day, millions of people use portable health gadgets to monitor body vitals such as heart rate, blood oxygen level, blood pressure, etc. However, this can also be facilitated just by using normal smartphones whic... 详细信息
来源: 评论
From Code to Conundrum: Machine Learning's Role in Modern Malware Detection  2
From Code to Conundrum: Machine Learning's Role in Modern Ma...
收藏 引用
2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Jha, Vaibhavi Saxena, Akshat School of Computer Science & Engineering Vellore Institute of Technology Vellore India
In this research paper, we'll be diving into the combination of malware analysis and machine learning to stepup security. Right now, our digital world is like an anthill: connected in every possible way. In this s... 详细信息
来源: 评论