咨询与建议

限定检索结果

文献类型

  • 1,110 篇 会议
  • 249 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 605 篇 工学
    • 416 篇 计算机科学与技术...
    • 320 篇 软件工程
    • 132 篇 信息与通信工程
    • 103 篇 电气工程
    • 103 篇 电子科学与技术(可...
    • 83 篇 控制科学与工程
    • 58 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 48 篇 生物工程
    • 46 篇 机械工程
    • 35 篇 光学工程
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
    • 28 篇 化学工程与技术
    • 26 篇 环境科学与工程(可...
    • 21 篇 材料科学与工程(可...
    • 20 篇 力学(可授工学、理...
    • 19 篇 核科学与技术
  • 336 篇 理学
    • 149 篇 物理学
    • 121 篇 数学
    • 66 篇 生物学
    • 43 篇 化学
    • 28 篇 统计学(可授理学、...
    • 27 篇 系统科学
  • 145 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 49 篇 医学
    • 44 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 19 篇 法学
  • 18 篇 农学
  • 15 篇 经济学
  • 13 篇 教育学
  • 7 篇 文学
  • 2 篇 军事学

主题

  • 46 篇 feature extracti...
  • 45 篇 computer archite...
  • 44 篇 databases
  • 44 篇 protocols
  • 42 篇 servers
  • 39 篇 monitoring
  • 39 篇 hardware
  • 37 篇 computational mo...
  • 37 篇 training
  • 32 篇 accuracy
  • 31 篇 field programmab...
  • 30 篇 standards
  • 28 篇 software
  • 26 篇 security
  • 25 篇 wireless sensor ...
  • 25 篇 cloud computing
  • 22 篇 conferences
  • 22 篇 logic gates
  • 22 篇 internet
  • 21 篇 support vector m...

机构

  • 70 篇 centre for devel...
  • 67 篇 centre for devel...
  • 51 篇 centre for devel...
  • 48 篇 centre for devel...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 39 篇 dipartimento di ...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 37 篇 faculté des scie...
  • 37 篇 department of mo...
  • 37 篇 department of ph...
  • 37 篇 department of ph...
  • 37 篇 department of ph...
  • 37 篇 research center ...
  • 37 篇 kirchhoff-instit...

作者

  • 35 篇 nabarun bhattach...
  • 31 篇 a. t. law
  • 31 篇 c. alexa
  • 31 篇 j. m. izen
  • 31 篇 s. veneziano
  • 31 篇 d. di valentino
  • 31 篇 g. bella
  • 31 篇 j. strandberg
  • 31 篇 d. calvet
  • 31 篇 c. amelung
  • 31 篇 n. orlando
  • 31 篇 c. gumpert
  • 31 篇 h. a. gordon
  • 31 篇 y. tayalati
  • 31 篇 g. spigo
  • 31 篇 v. chiarella
  • 31 篇 f. siegert
  • 31 篇 a. c. könig
  • 31 篇 a. dimitrievska
  • 31 篇 f. deliot

语言

  • 1,331 篇 英文
  • 30 篇 其他
  • 16 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Centre For Development of Advanced Computing"
1377 条 记 录,以下是301-310 订阅
排序:
Web Browser Forensics for Retrieving Searched Keywords on the Internet
Web Browser Forensics for Retrieving Searched Keywords on th...
收藏 引用
Advances in computing, Communication Control and Networking (ICAC3N), International Conference on
作者: S Dija J Ajana V Indu M Sabarinath C-DAC (Centre for Development of Advanced Computing) Thiruvananthapuram India
Nowadays, most of the reported cybercrimes use the Internet. It is seen that Web Browsers leave forensically sound footprints of Internet browsing activities on the computer’s storage media. The traces once retrieved... 详细信息
来源: 评论
Red Palm Weevil Detection System for Early Warning and Mitigation of Crop Loss
Red Palm Weevil Detection System for Early Warning and Mitig...
收藏 引用
Connected Systems & Intelligence (CSI), International Conference on
作者: Parvathy S.R. Deepak Jayan P. Nimmy Pathrose Rajesh K.R. Lekshmy Janardhanan R James Varghese Vishnu S. Nimmy Mathew Sujith B. Kallara Centre for Development of Advanced Computing A Scientific Society of the Ministry of Communication and Information Technology Govt. of India Thiruvananthapuram Kerala India
Red Palm Weevil infestation affecting palm trees is a major problem faced by coconut farmers, causing severe economic losses to palm cultivators worldwide. This infestation is fatal to the trees and can easily spread ... 详细信息
来源: 评论
Garbage Zero (Garb0): An IoT Framework for Effective Garbage Management in Smart Cities
Garbage Zero (Garb0): An IoT Framework for Effective Garbage...
收藏 引用
Artificial Intelligence and Smart Systems (ICAIS), International Conference on
作者: Sagar Chavan Umesh Patil Santosh Sam Koshy S.V. Srikanth Centre for Development of Advanced Computing (C-DAC) Hyderabad India
Today, there is a significant trend of blending optimized waste management strategies with low power, low-cost Internet of Things (IoT) solutions. This paper discusses and investigates Garbage Zero (Garb0), an indigen... 详细信息
来源: 评论
DNS Intrusion Detection (DID) — A SNORT-based solution to detect DNS Amplification and DNS Tunneling attacks
Franklin Open
收藏 引用
Franklin Open 2023年 2卷
作者: Adiwal, Sanjay Rajendran, Balaji D., Pushparaj Shetty Sudarsan, Sithu D. Centre for Development of Advanced Computing (C-DAC) Karnataka Bangalore India Department of Mathematical and Computational Sciences National Institute of Technology Karnataka Surathkal India
Domain Name System (DNS) plays a critical role in the Internet ecosystem, translating numerical IP addresses to memorable domain names and vice versa. The malicious user targets DNS by taking advantage of vulnerabilit... 详细信息
来源: 评论
P-FMA: A Novel Parameterized Posit Fused Multiply-Accumulate Arithmetic Processor
P-FMA: A Novel Parameterized Posit Fused Multiply-Accumulate...
收藏 引用
International Conference on VLSI Design
作者: Sandra Jean Aneesh Raveendran A. David Selvakumar Gagandeep Kaur Shankar G Dharani Shashikala Gunderao Pattanshetty Vivian Desalphine Centre for Development of Advanced Computing (C-DAC) Bangalore India
IEEE 754-2008 based Floating Point Unit (FPU) is computationally complex and consumes higher resources depending on precision and dynamic range viz. half/ single/double/quad precision. In order to optimize and balance... 详细信息
来源: 评论
Dynamic Stacked Ensemble with Entropy based Undersampling for the Detection of Fraudulent Transactions
Dynamic Stacked Ensemble with Entropy based Undersampling fo...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Ramesh Naidu Laveti Abhay Anand Mane Supriya N Pal Centre for Development of Advanced Computing (C-DAC) Bangalore India
Fraud detection in finance such as finding fraudulent credit card or debit card transactions is still an open research problem and the solutions are evolving. In a financial transactions database, the number of fraudu... 详细信息
来源: 评论
Security Analysis of MITM Attack on SCADA Network  2nd
Security Analysis of MITM Attack on SCADA Network
收藏 引用
2nd International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2020
作者: Deb, Debasish Chakraborty, Sagorika Raj Lagineni, Mahendra Singh, Kirani Centre for Development of Advanced Computing Silchar India Cachar College Silchar India
Cybersecurity is one of the major concerns in the Supervisory Control and Data Acquisition Technique (SCADA) systems. The main goal of this paper is to check how secure the power SCADA System is? In SCADA systems, att... 详细信息
来源: 评论
Secure Mobile ID Architecture on Android Devices based on Trust Zone
Secure Mobile ID Architecture on Android Devices based on Tr...
收藏 引用
International Conference on computing Methodologies and Communication (ICCMC)
作者: Kapil Kant Kamal Sunil Gupta Padmaja Joshi Monit Kapoor Centre for Development of Advanced Computing (C-DAC) Mumbai India University of Petroleum and Energy Studies (UPES) Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Owing to their mobility, persistent connectivity, and variety of applications, cell phones are now more often used as a primary computing platform than desktop computers and laptops. Users have widely adopted mobile p... 详细信息
来源: 评论
Comparative Analysis of Various Elliptic Curve Cryptography Algorithms for Handheld Devices
Comparative Analysis of Various Elliptic Curve Cryptography ...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: Kapil Kant Kamal Sunil Gupta Padmaja Joshi Monit Kapoor Centre for Development of Advanced Computing (C-DAC) Mumbai India University of Petroleum and Energy Studies (UPES) Dehradun India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Today, all functions like purchases, banking, payments, social media, games, etc. are carried out using mobile phones. While performing these functionalities data transmission and authentication through the mobile dev...
来源: 评论
Design, Simulation and Implementation of a Hybrid Micro Grid System
Design, Simulation and Implementation of a Hybrid Micro Grid...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: K.R. Lekshmi V.K. Ashraf Ali Ashish M Anoop P Power Electronics Group Centre for Development of Advanced Computing Kerala India
In this paper an integrated microgrid system is proposed, where a unidirectional DC-DC converter for solar power management, a bidirectional DC-DC converter for battery power management, and a single phase inverter, w... 详细信息
来源: 评论