咨询与建议

限定检索结果

文献类型

  • 7,629 篇 会议
  • 3,566 篇 期刊文献
  • 249 册 图书

馆藏范围

  • 11,444 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,423 篇 工学
    • 4,638 篇 计算机科学与技术...
    • 3,511 篇 软件工程
    • 1,597 篇 信息与通信工程
    • 819 篇 控制科学与工程
    • 810 篇 电气工程
    • 737 篇 电子科学与技术(可...
    • 700 篇 生物工程
    • 505 篇 生物医学工程(可授...
    • 389 篇 光学工程
    • 371 篇 机械工程
    • 306 篇 化学工程与技术
    • 301 篇 动力工程及工程热...
    • 250 篇 安全科学与工程
    • 240 篇 核科学与技术
    • 223 篇 仪器科学与技术
    • 220 篇 网络空间安全
    • 190 篇 材料科学与工程(可...
  • 3,776 篇 理学
    • 2,008 篇 数学
    • 1,210 篇 物理学
    • 786 篇 生物学
    • 542 篇 统计学(可授理学、...
    • 371 篇 系统科学
    • 316 篇 化学
  • 1,508 篇 管理学
    • 817 篇 管理科学与工程(可...
    • 755 篇 图书情报与档案管...
    • 412 篇 工商管理
  • 417 篇 医学
    • 364 篇 临床医学
    • 344 篇 基础医学(可授医学...
    • 217 篇 药学(可授医学、理...
  • 311 篇 法学
    • 254 篇 社会学
  • 171 篇 经济学
  • 142 篇 农学
  • 56 篇 教育学
  • 49 篇 文学
  • 14 篇 军事学
  • 5 篇 艺术学

主题

  • 672 篇 computer science
  • 265 篇 feature extracti...
  • 213 篇 computational mo...
  • 180 篇 computer archite...
  • 171 篇 support vector m...
  • 166 篇 deep learning
  • 155 篇 machine learning
  • 152 篇 optimization
  • 150 篇 costs
  • 147 篇 bandwidth
  • 143 篇 protocols
  • 141 篇 routing
  • 137 篇 accuracy
  • 126 篇 neural networks
  • 125 篇 hardware
  • 124 篇 quality of servi...
  • 122 篇 application soft...
  • 122 篇 algorithm design...
  • 121 篇 wireless sensor ...
  • 120 篇 throughput

机构

  • 424 篇 department of co...
  • 279 篇 warsaw universit...
  • 196 篇 department of co...
  • 163 篇 wayne state univ...
  • 156 篇 yerevan physics ...
  • 153 篇 university of sc...
  • 148 篇 department of ph...
  • 143 篇 centro brasileir...
  • 142 篇 universidad iber...
  • 142 篇 national and kap...
  • 141 篇 istanbul technic...
  • 140 篇 university of sp...
  • 139 篇 wigner research ...
  • 138 篇 indian institute...
  • 138 篇 brunel universit...
  • 138 篇 institut für ker...
  • 134 篇 academy of scien...
  • 133 篇 helsinki institu...
  • 131 篇 università di to...
  • 130 篇 indian institute...

作者

  • 161 篇 t. k. nayak
  • 154 篇 m. r. cosentino
  • 139 篇 a. k. bhati
  • 136 篇 l. valencia palo...
  • 135 篇 y. zhang
  • 131 篇 m. bombara
  • 127 篇 k. oyama
  • 126 篇 d. röhrich
  • 122 篇 o. karavichev
  • 121 篇 p. kurashvili
  • 121 篇 s. grigoryan
  • 121 篇 s. das
  • 119 篇 d. peresunko
  • 118 篇 r. bailhache
  • 115 篇 t. b. skaali
  • 114 篇 b. mohanty
  • 113 篇 i. pshenichnov
  • 112 篇 a. kisiel
  • 110 篇 z. vilakazi
  • 105 篇 y. wang

语言

  • 10,257 篇 英文
  • 1,142 篇 其他
  • 70 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Computer Science and Engineering Indian Institute of Technology Jammu"
11444 条 记 录,以下是11-20 订阅
排序:
Feedback-based trust module for IoT networks using machine learning
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第1期27卷 78-91页
作者: Iqbal, Sania Qureshi, Shaima Department of Computer Science and Engineering National Institute of Technology Jammu & Kashmir Srinagar India
The increasing emergence of IoT in healthcare, industrial automation, manufacturing, infrastructure, business and the home undoubtedly provides more conveniences in different aspects of human life. Any IoT security an... 详细信息
来源: 评论
An Experimental Study on Random Projection Based Biometric Security
An Experimental Study on Random Projection Based Biometric S...
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Shukla, Rishabh Kaur, Harkeerat Indian Institute of Technology Jammu Computer Science and Engineering Jammu India
The safeguarding of biometric data is a crucial aspect of biometric authentication systems, and biometric template protection serves as a means to ensure the confidentiality of such information. In recent times, the u... 详细信息
来源: 评论
An Integrated Approach to Point Labeling Problem  14
An Integrated Approach to Point Labeling Problem
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Singh, Simranjeet Kumar, Varun Bhattacharjee, Subhasis Indian Institute of Technology Jammu Computer Science & Engineering Jammu India
The point feature labeling problem is a very wellknown problem where a set P = {p1, p2, •••, pn} of point sites are given along with their labels. The objective is to maximize the number of labels for points on the ma... 详细信息
来源: 评论
Additive manufacturing of cordierite materials by digital light processing
收藏 引用
Ceramics International 2025年 第16期51卷 22683-22690页
作者: Tsai, Jung-Ting Gupta, Anant Kumar Muhtadin, Muhtadin Department of Mechanical Engineering National Taiwan University of Science and Technology Taipei106335 Taiwan Department of Materials Engineering Indian Institute of Technology Jammu Jammu and Kashmir 181221 India
Cordierite ceramic material is exceptionally resistant to chemical corrosion, low thermal expansion, and thermal shock, which would be a suitable candidate for thermal applications. Cordierite materials ((Mg, Fe)₂Al₄S... 详细信息
来源: 评论
Apple Leaf Disease Detection Using Transfer Learning
收藏 引用
Annals of Data science 2025年 第1期12卷 213-222页
作者: Wani, Ozair Ahmad Zahoor, Umer Shah, Syed Zubair Ahmad Khan, Rijwan Department of Computer Science & Engineering Islamic University of Science and Technology Jammu & Kashmir Awantipora India Department of Computer Science and Engineering ABES Institute of Technology Uttar Pradesh Ghaziabad India
Automated detection of plant diseases is crucial as it simplifies the task of monitoring large farms and identifies diseases at their early stages to mitigate further plant degradation. Besides the decline in plant he... 详细信息
来源: 评论
Tracking PII ex-filtration: Exploring decision tree and neural network with explainable AI  17
Tracking PII ex-filtration: Exploring decision tree and neur...
收藏 引用
17th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023
作者: Kohli, Rishika Chatterjee, Shreyas Gupta, Shaifu Singh Gaur, Manoj Indian Institute of Technology Jammu Computer Science and Engineering India
The swift evolution of digital technology has led to the creation of devices that have substantially simplified people's lives. Consequently, individuals are spending more and more time engaging with the internet.... 详细信息
来源: 评论
Dominance Maximization in Uncertain Graphs  9th
Dominance Maximization in Uncertain Graphs
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Tekawade, Atharva Banerjee, Suman Department of Computer Science and Engineering Indian Institute of Technology Jammu Jammu181221 India
An uncertain graph is defined as a collection of nodes with their interconnected edges, where each edge is assigned with its existence probability value. Motivated by many real-world scenarios, in this paper, we defin... 详细信息
来源: 评论
DNACDS:Cloud IoE big data security and accessing scheme based on DNA cryptography
收藏 引用
Frontiers of computer science 2024年 第1期18卷 157-170页
作者: Ashish SINGH Abhinav KUMAR Suyel NAMASUDRA School of Computer Engineering KIIT Deemed to be UniversityBhubaneshwar 751024India Department of Computer Science and Engineering Indian Institute of Information Technology SuratSurat 394190India Department of Computer Science and Engineering National Institute of Technology AgartalaAgartala 799046India
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service... 详细信息
来源: 评论
An integrated approach for prediction of magnitude using deep learning techniques
收藏 引用
Neural Computing and Applications 2024年 第27期36卷 16991-17006页
作者: Joshi, Anushka Raman, Balasubramanian Mohan, C. Krishna Department of Computer Science and Engineering Indian Institute of Technology Roorkee Uttarakhand Roorkee247667 India Department of Computer Science and Engineering Indian Institute of Technology Hyderabad Telangana Sangareddy502285 India
Timely estimation of earthquake magnitude plays a crucial role in the early warning systems for earthquakes. Despite the inherent danger associated with earthquake energy, earthquake research necessitates extensive pa... 详细信息
来源: 评论
Influence Maximization with Tag Revisited: Exploiting the Bi-submodularity of the Tag-Based Influence Function  9th
Influence Maximization with Tag Revisited: Exploiting the ...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Tekawade, Atharva Banerjee, Suman Department of Computer Science and Engineering Indian Institute of Technology Jammu Jammu181221 India
Given a Social Network how to select a small number of influential users to maximize the influence in the network has been studied extensively in the past two decades and formally referred to as the Influence Maximiza... 详细信息
来源: 评论