咨询与建议

限定检索结果

文献类型

  • 2,954 篇 会议
  • 944 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 3,922 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,304 篇 工学
    • 1,919 篇 计算机科学与技术...
    • 1,652 篇 软件工程
    • 677 篇 信息与通信工程
    • 425 篇 控制科学与工程
    • 424 篇 生物工程
    • 305 篇 生物医学工程(可授...
    • 277 篇 电气工程
    • 226 篇 光学工程
    • 206 篇 电子科学与技术(可...
    • 181 篇 安全科学与工程
    • 179 篇 网络空间安全
    • 165 篇 机械工程
    • 146 篇 动力工程及工程热...
    • 134 篇 化学工程与技术
    • 128 篇 交通运输工程
    • 120 篇 仪器科学与技术
  • 1,334 篇 理学
    • 602 篇 数学
    • 464 篇 生物学
    • 360 篇 物理学
    • 233 篇 统计学(可授理学、...
    • 163 篇 系统科学
    • 151 篇 化学
  • 763 篇 管理学
    • 442 篇 管理科学与工程(可...
    • 365 篇 图书情报与档案管...
    • 235 篇 工商管理
  • 388 篇 医学
    • 330 篇 临床医学
    • 309 篇 基础医学(可授医学...
    • 210 篇 公共卫生与预防医...
    • 172 篇 药学(可授医学、理...
  • 163 篇 法学
    • 135 篇 社会学
  • 118 篇 农学
  • 104 篇 经济学
  • 44 篇 教育学
  • 23 篇 文学
  • 2 篇 军事学

主题

  • 263 篇 accuracy
  • 246 篇 deep learning
  • 164 篇 machine learning
  • 151 篇 convolutional ne...
  • 140 篇 feature extracti...
  • 121 篇 support vector m...
  • 119 篇 real-time system...
  • 117 篇 predictive model...
  • 116 篇 training
  • 115 篇 computational mo...
  • 108 篇 internet of thin...
  • 96 篇 machine learning...
  • 78 篇 data models
  • 75 篇 security
  • 68 篇 artificial intel...
  • 64 篇 technological in...
  • 61 篇 medical services
  • 60 篇 prediction algor...
  • 59 篇 sentiment analys...
  • 58 篇 analytical model...

机构

  • 680 篇 school of comput...
  • 492 篇 school of comput...
  • 166 篇 vellore institut...
  • 113 篇 vellore institut...
  • 107 篇 school of comput...
  • 106 篇 school of comput...
  • 101 篇 school of comput...
  • 93 篇 school of inform...
  • 63 篇 school of comput...
  • 57 篇 school of comput...
  • 54 篇 school of electr...
  • 49 篇 school of comput...
  • 42 篇 school of electr...
  • 34 篇 school of comput...
  • 30 篇 school of comput...
  • 30 篇 school of comput...
  • 29 篇 vellore institut...
  • 28 篇 school of comput...
  • 26 篇 school of comput...
  • 26 篇 computer science...

作者

  • 39 篇 tyagi amit kumar
  • 31 篇 gadekallu thippa...
  • 21 篇 trilok nath pand...
  • 20 篇 pandey trilok na...
  • 17 篇 kathiravan srini...
  • 17 篇 thippa reddy gad...
  • 16 篇 harshith john
  • 16 篇 maddikunta prave...
  • 16 篇 dutta anurag
  • 16 篇 sudhansu shekhar...
  • 15 篇 bibhuti bhusan d...
  • 15 篇 amit kumar tyagi
  • 15 篇 sengan sudhakar
  • 14 篇 pandiyaraju v.
  • 14 篇 kannan a.
  • 14 篇 dhanalakshmi r.
  • 14 篇 patra sudhansu s...
  • 13 篇 kumaran k
  • 13 篇 bhattacharya swe...
  • 13 篇 vijayarajan v.

语言

  • 3,641 篇 英文
  • 280 篇 其他
  • 23 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Shool of Computer Science and Engineering Vellore Institute of Technology"
3922 条 记 录,以下是61-70 订阅
排序:
Sign Language Recognition Using Convolutional Neural Network Based on VGG-16 Deep Learning Approach  5th
Sign Language Recognition Using Convolutional Neural Network...
收藏 引用
5th International Conference on Advances in Information Communication technology and Computing, AICTC 2024
作者: Athish, M.J. Sowmya, S. Lakshaya, E. Preetha, S. Rishiya Shankar, S.U. Sendhil Kumar, K.S. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Communication is a significant part of our lives, as it facilitates interaction among individuals. Language serves as a mode of communication for all individuals for expressing their thoughts and interpretations. Howe... 详细信息
来源: 评论
Stereotactic Needle Path Planning for Brain Biopsy Based on Volumetric Segmentation of MRI and Heuristic Approach  5th
Stereotactic Needle Path Planning for Brain Biopsy Based on ...
收藏 引用
5th International Conference on Advances in Information Communication technology and Computing, AICTC 2024
作者: Krishnan, Sushil Bhogale, Atharva Gawande, Aarya Jaisankar, N. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Any abnormal growth in brain cells refers to brain tumor. With large variety of tumors reported, accurate diagnosis is very essential for appropriate intervention. Traditionally, biopsies are preferred diagnostic tool... 详细信息
来源: 评论
Predicting Genetic Disorders: A Link Mining Approach  2
Predicting Genetic Disorders: A Link Mining Approach
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Sen, Madhura Rajasekaran, Rajkumar Jayaram Reddy, A. Govinda, K. Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Genetic diseases are conditions caused by a spontaneous alteration or mutation in an individual's DNA. People can inherit genetic disorders from parents, which means they are born with them, even if they are not i... 详细信息
来源: 评论
Deep Learning Based Face Detection and Identification of Criminal Suspects
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2331-2343页
作者: S.Sandhya A.Balasundaram Ayesha Shaik School of Computer Science and Engineering Vellore Institute of Technology(VIT)Chennai600127India School of Computer Science and Engineering Center for Cyber Physical SystemsVellore Institute of Technology(VIT)Chennai600127India
Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past *** of the most tedious tasks is to track a suspect once a crime is *** most ... 详细信息
来源: 评论
Feature Extraction using Hybridized Transfer Learning Approach for Oral Cancer Diagnosis  5
Feature Extraction using Hybridized Transfer Learning Approa...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Bharanidharan, N. Abhinav, Kalluri Karthikeyagopala Lathvik, Cherukuri Krishna Chethan, Muppavarapu Reddy, Metta Manikanta Karthikeya Deepak, K. Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India Vellore Institute of Technology School of Computer Science and Engineering Vellore India
Oral cancer diagnosis at earlier stage is very crucial to decide the treatment procedure and to avoid mortality due to this malignant disease. Histopathological imaging is one among modalities widely used by the clini... 详细信息
来源: 评论
Secure File Sharing System Using Hybrid Authentication and Secured Key Management Algorithm  4th
Secure File Sharing System Using Hybrid Authentication and S...
收藏 引用
4th International Conference on Smart IoT Systems: Innovations and Computing, SSIC 2023
作者: Dokania, Aryan Bamb, Anshul Dheeba, J. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
When web file sharing is used, users can safely receive and share any files or documents over the web using any of their preferred web browsers. Though the existing cryptographic algorithms perform well in end-to-end ... 详细信息
来源: 评论
Parallelization of the Smith-Waterman Algorithm to Accelerate DNA Sequence Alignment  3
Parallelization of the Smith-Waterman Algorithm to Accelerat...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Dhar, Akanksha Chauhan, Ishita Azad, Hiteshwar Kumar Bamzai, Anusha Yadav, Takshu Vellore Institute of Technology Vellore Computer Science and Engineering India
The genome is a rapidly evolving topic that constantly offers researchers with new biological and computational application challenges. One of the biggest challenges is biological sequence comparison, which involves i... 详细信息
来源: 评论
An Intelligent Intrusion Detection using Rule-based CNN with PSO Optimizer  3
An Intelligent Intrusion Detection using Rule-based CNN with...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Karpurasundharapondian, P. Selvi, M. Thangaramya, K. Santhosh Kumar, S.V.N. Kannan, A. Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Security and secure routing are important design issues in the design of Wireless Sensor Networks (WSNs). Intrusion Detection Systems (IDSs) are useful for securing the communication in WSNs. An IDS can be developed b... 详细信息
来源: 评论
Design of a Scoring System for National Fitness Volunteer Services under Deep Learning  4
Design of a Scoring System for National Fitness Volunteer Se...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Singh, Abhimeet Singla, Raghav Sodhi, Pulkit Pandian, M. Thurai School of Computer Science and Engineering Vellore Institute of Technology Vellore India
This work is developed to establish a comprehensive, scientific, and reasonable national fitness volunteer service scoring system under a long short-term memory (LSTM) recurrent neural network (RNN) algorithm. The LST... 详细信息
来源: 评论
Comparative Prediction Analysis for Credit Scoring System  3
Comparative Prediction Analysis for Credit Scoring System
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Rai, Anjali Mehfooza, M. Department of Computer Science and Engineering Vellore Institute of Technology Vellore India
The importance of predictive modelling for green selection-making in a variety of fields has expanded because of the fast development of information-driven technologies. The basic and primary goal of this research is ... 详细信息
来源: 评论