咨询与建议

限定检索结果

文献类型

  • 92,076 篇 会议
  • 40,678 篇 期刊文献
  • 1,195 册 图书

馆藏范围

  • 133,949 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 77,198 篇 工学
    • 50,762 篇 计算机科学与技术...
    • 41,276 篇 软件工程
    • 19,481 篇 信息与通信工程
    • 12,721 篇 控制科学与工程
    • 11,508 篇 电气工程
    • 10,671 篇 电子科学与技术(可...
    • 9,516 篇 生物工程
    • 7,631 篇 生物医学工程(可授...
    • 7,098 篇 光学工程
    • 5,539 篇 机械工程
    • 5,319 篇 化学工程与技术
    • 4,838 篇 材料科学与工程(可...
    • 4,760 篇 动力工程及工程热...
    • 4,476 篇 仪器科学与技术
    • 3,801 篇 网络空间安全
    • 3,387 篇 安全科学与工程
  • 45,919 篇 理学
    • 20,596 篇 数学
    • 17,031 篇 物理学
    • 10,817 篇 生物学
    • 6,882 篇 统计学(可授理学、...
    • 5,821 篇 化学
    • 4,637 篇 系统科学
  • 19,895 篇 管理学
    • 12,554 篇 管理科学与工程(可...
    • 8,294 篇 图书情报与档案管...
    • 5,884 篇 工商管理
  • 7,624 篇 医学
    • 6,284 篇 临床医学
    • 5,796 篇 基础医学(可授医学...
    • 3,615 篇 药学(可授医学、理...
    • 3,398 篇 公共卫生与预防医...
  • 3,769 篇 法学
    • 3,070 篇 社会学
  • 2,440 篇 经济学
  • 2,306 篇 农学
  • 1,144 篇 教育学
  • 560 篇 文学
  • 308 篇 军事学
  • 140 篇 艺术学
  • 12 篇 哲学
  • 9 篇 历史学

主题

  • 5,003 篇 accuracy
  • 4,043 篇 deep learning
  • 3,573 篇 feature extracti...
  • 3,363 篇 computer science
  • 3,159 篇 computational mo...
  • 3,113 篇 machine learning
  • 2,975 篇 training
  • 2,603 篇 convolutional ne...
  • 2,491 篇 real-time system...
  • 2,238 篇 predictive model...
  • 2,212 篇 support vector m...
  • 2,105 篇 internet of thin...
  • 1,644 篇 artificial intel...
  • 1,639 篇 data models
  • 1,617 篇 optimization
  • 1,497 篇 security
  • 1,474 篇 neural networks
  • 1,271 篇 data mining
  • 1,247 篇 wireless sensor ...
  • 1,154 篇 computer archite...

机构

  • 2,180 篇 chitkara univers...
  • 1,083 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 954 篇 physikalisches i...
  • 950 篇 oliver lodge lab...
  • 928 篇 university of ch...
  • 599 篇 infn sezione di ...
  • 596 篇 infn laboratori ...
  • 577 篇 infn sezione di ...
  • 549 篇 infn sezione di ...
  • 543 篇 school of physic...
  • 542 篇 fakultät physik ...
  • 533 篇 horia hulubei na...
  • 525 篇 department of ph...
  • 523 篇 school of physic...
  • 519 篇 school of comput...
  • 514 篇 imperial college...
  • 510 篇 h.h. wills physi...
  • 498 篇 stfc rutherford ...
  • 492 篇 nikhef national ...

作者

  • 255 篇 barter w.
  • 253 篇 a. gomes
  • 242 篇 c. alexa
  • 239 篇 j. m. izen
  • 234 篇 j. wang
  • 233 篇 c. amelung
  • 232 篇 g. bella
  • 232 篇 j. strandberg
  • 232 篇 d. calvet
  • 232 篇 blake t.
  • 231 篇 s. chen
  • 230 篇 beiter a.
  • 227 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 213 篇 g. spigo

语言

  • 113,648 篇 英文
  • 18,872 篇 其他
  • 1,553 篇 中文
  • 142 篇 日文
  • 48 篇 德文
  • 48 篇 法文
  • 16 篇 斯洛文尼亚文
  • 15 篇 朝鲜文
  • 4 篇 阿拉伯文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering SRM Institute of Science And Technology"
133949 条 记 录,以下是31-40 订阅
排序:
Block chain-based trusted smart contract for secure mobile user payment gateway in e-health systems
收藏 引用
Soft Computing 2024年 第17-18期28卷 10139-10151页
作者: Saranya, A. Naresh, R. Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamil Nadu Chennai603203 India Department of Networking and Communications SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamil Nadu Chennai603203 India
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal ... 详细信息
来源: 评论
Combinatorial Properties of Involutive Fibonacci Arrays
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第5期51卷 553-561页
作者: Blasiyus, Hannah Christy, D. K. Sheena Department of Mathematics Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur603203 India Department of Mathematics Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur603203 India
Various scholars have investigated Fibonacci arrays to uncover its combinatorial features and applications. As an extension of Involutive Fibonacci words, Involutive Fibonacci arrays were introduced. We will look at s... 详细信息
来源: 评论
An energy-efficient task and virtual machine placement in virtualised cloud server using FY-SFLA and RMMS-DLVQ
收藏 引用
International Journal of Networking and Virtual Organisations 2023年 第2期29卷 144-167页
作者: Sudhakar, E.P. Saravanan, M. Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chennai603203 India Department of Networking and Communications College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai603203 India
Creating infrastructures, virtual servers, computing resources, along with devices is termed virtualisation. In this methodology, to augment resource usage along with to mitigate the total power consumption, mapping o... 详细信息
来源: 评论
Holt-Winters Algorithm to Predict the Stock Value Using Recurrent Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 1151-1163页
作者: M.Mohan P.C.Kishore Raja P.Velmurugan A.Kulothungan Department of Computer Science&Engineering SRM UniversitySonepatHaryanaIndia Department of Electronics&Communication Engineering SRM UniversitySonepatHaryanaIndia Department of Computing Technologies SRM Institute of Science and TechnologyChennaiIndia Department of Computer Science&Engineering SRM Institute of Science and TechnologyModinagarGhaziabadIndia
Prediction of stock market value is highly risky because it is based on the concept of Time Series forecasting system that can be used for investments in a safe environment with minimized chances of *** proposed model... 详细信息
来源: 评论
Bone Fracture Detection using YOLOv8 and OpenCV  2
Bone Fracture Detection using YOLOv8 and OpenCV
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Brikila, J. Praneeth Varma, I.V.S. Anand, Abhilakshay SRM Institute of Science and Technology Computer Science and Engineering Chennai India
This study introduces a deep learning method for automatically detecting bone fractures with the YOLOv8 object detection model, developed to aid radiologists in accurately and efficiently interpreting X-ray images. Th... 详细信息
来源: 评论
Feature Selection with Deep Reinforcement Learning for Intrusion Detection System
收藏 引用
computer Systems science & engineering 2023年 第9期46卷 3339-3353页
作者: S.Priya K.Pradeep Mohan Kumar Department of Computer Science and Engineering SRM Institute of Science and TechnologyRamapuramChennai600089India Department of Computing Technologies SRM Institute of Science and TechnologyKattankulathurChennai603203India
An intrusion detection system(IDS)becomes an important tool for ensuring security in the *** recent times,machine learning(ML)and deep learning(DL)models can be applied for the identification of intrusions over the ne... 详细信息
来源: 评论
Hyperspectral image restoration using noise gradient and dual priors under mixed noise conditions
收藏 引用
CAAI Transactions on Intelligence technology 2025年 第1期10卷 72-93页
作者: Hazique Aetesam Suman Kumar Maji V.B.Surya Prasath Computer Science and Engineering Birla Institute of Technology MesraBiharIndia Computer Science and Engineering Indian Institute of Technology PatnaBiharIndia Department of Computer Science University of CincinnatiCincinnatiOhioUSA
Images obtained from hyperspectral sensors provide information about the target area that extends beyond the visible portions of the electromagnetic ***,due to sensor limitations and imperfections during the image acq... 详细信息
来源: 评论
Pattern recognition of grooves in human lips for improved authentication in cyber-physical systems using U-Net architecture
收藏 引用
Journal of Intelligent and Fuzzy Systems 2023年 第1期45卷 1683-1693页
作者: Vasavi, J. Abirami, M.S. Department of Computer Science and Engineering Srm Institute of Science and Technology Tamil Nadu Kattankulathur India Department of Computational Intelligence Srm Institute of Science and Technology Tamil Nadu Kattankulathur India
Latent Lip groove application is been a notable topic in forensic applications like crime and other investigations. The detection of lip movement is been a challenging task since it is a smaller integral part of the h... 详细信息
来源: 评论
Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 14273-14304页
作者: Anoop, M. Mary, L. William Wilson, Allan J. Kiran, W.S. Department of Computer Science and Application SRM Institute of Science and Technology Ramapuram campus Chennai600089 India Department of Electronics and Communication Engineering Amrita College of Engineering and Technology Nagercoil India
In today's rapidly evolving network landscape, cybersecurity has become increasingly crucial. However, wireless sensor networks face unique challenges due to their limited resources and diverse composition, high c... 详细信息
来源: 评论
Fuzzy-GEC an Energy-Aware Hybrid Task Scheduling on the Cloud  2nd
Fuzzy-GEC an Energy-Aware Hybrid Task Scheduling on the Clou...
收藏 引用
2nd International Conference on Advances in Data-driven Computing and Intelligent Systems, ADCIS 2023
作者: Lalitha Devi, K. Deepa Thilak, K. Shanmuganathan, C. Kalaiselvi, K. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
In an infrastructure cloud environment, task scheduling should focus on optimizing execution time and saving energy. The data center consumes a large amount of energy during the execution of the task. Energy-saving te... 详细信息
来源: 评论