咨询与建议

限定检索结果

文献类型

  • 148,104 篇 会议
  • 70,349 篇 期刊文献
  • 2,035 册 图书
  • 7 篇 专利

馆藏范围

  • 220,494 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 128,083 篇 工学
    • 88,223 篇 计算机科学与技术...
    • 71,049 篇 软件工程
    • 29,734 篇 信息与通信工程
    • 19,340 篇 控制科学与工程
    • 16,040 篇 电气工程
    • 14,949 篇 电子科学与技术(可...
    • 14,651 篇 生物工程
    • 10,900 篇 生物医学工程(可授...
    • 10,142 篇 光学工程
    • 8,748 篇 机械工程
    • 7,319 篇 化学工程与技术
    • 6,632 篇 仪器科学与技术
    • 6,215 篇 动力工程及工程热...
    • 5,897 篇 材料科学与工程(可...
    • 5,122 篇 网络空间安全
    • 4,720 篇 安全科学与工程
  • 75,310 篇 理学
    • 37,169 篇 数学
    • 25,574 篇 物理学
    • 16,603 篇 生物学
    • 11,969 篇 统计学(可授理学、...
    • 8,134 篇 化学
    • 7,588 篇 系统科学
  • 33,509 篇 管理学
    • 20,219 篇 管理科学与工程(可...
    • 14,768 篇 图书情报与档案管...
    • 9,178 篇 工商管理
  • 10,515 篇 医学
    • 8,778 篇 临床医学
    • 7,896 篇 基础医学(可授医学...
    • 4,880 篇 药学(可授医学、理...
    • 4,411 篇 公共卫生与预防医...
  • 5,959 篇 法学
    • 4,897 篇 社会学
  • 3,575 篇 经济学
  • 3,253 篇 农学
  • 2,251 篇 教育学
  • 952 篇 文学
  • 503 篇 军事学
  • 316 篇 艺术学
  • 72 篇 哲学
  • 39 篇 历史学

主题

  • 8,081 篇 computer science
  • 6,455 篇 accuracy
  • 5,388 篇 feature extracti...
  • 5,348 篇 deep learning
  • 5,197 篇 computational mo...
  • 4,522 篇 training
  • 4,475 篇 machine learning
  • 3,212 篇 predictive model...
  • 3,149 篇 convolutional ne...
  • 3,043 篇 real-time system...
  • 2,981 篇 support vector m...
  • 2,766 篇 artificial intel...
  • 2,760 篇 data mining
  • 2,721 篇 data models
  • 2,568 篇 optimization
  • 2,544 篇 internet of thin...
  • 2,455 篇 neural networks
  • 2,382 篇 semantics
  • 2,295 篇 computer archite...
  • 2,165 篇 security

机构

  • 2,873 篇 school of comput...
  • 2,269 篇 university of ch...
  • 2,180 篇 chitkara univers...
  • 1,366 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,036 篇 department of co...
  • 986 篇 department of ph...
  • 973 篇 institute of com...
  • 918 篇 physikalisches i...
  • 915 篇 oliver lodge lab...
  • 569 篇 infn sezione di ...
  • 553 篇 infn laboratori ...
  • 542 篇 infn sezione di ...
  • 524 篇 horia hulubei na...
  • 512 篇 department of ph...
  • 511 篇 infn sezione di ...
  • 506 篇 h.h. wills physi...
  • 503 篇 school of physic...
  • 501 篇 fakultät physik ...
  • 498 篇 school of physic...

作者

  • 258 篇 barter w.
  • 256 篇 j. wang
  • 243 篇 s. chen
  • 236 篇 a. gomes
  • 233 篇 blake t.
  • 225 篇 c. alexa
  • 224 篇 amato s.
  • 223 篇 j. m. izen
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 218 篇 brundu d.
  • 218 篇 boettcher t.
  • 215 篇 beiter a.
  • 213 篇 d. calvet
  • 211 篇 bencivenni g.
  • 205 篇 g. bella
  • 205 篇 j. strandberg
  • 205 篇 c. amelung

语言

  • 190,845 篇 英文
  • 27,018 篇 其他
  • 2,803 篇 中文
  • 213 篇 日文
  • 34 篇 德文
  • 24 篇 法文
  • 21 篇 斯洛文尼亚文
  • 16 篇 朝鲜文
  • 15 篇 俄文
  • 5 篇 葡萄牙文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 意大利文
  • 2 篇 波兰文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
220495 条 记 录,以下是751-760 订阅
排序:
EFS-XGBoost: A robust framework for precision classification of COVID-19 cases
收藏 引用
Intelligent Data Analysis 2025年 第1期29卷 171-185页
作者: Abidi, Mustufa Haider Khare, Neelu D, Preethi Alkhalefah, Hisham Umer, Usama Advanced Manufacturing Institute King Saud University Riyadh Saudi Arabia School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Computer Science and Engineering Faculty of Engineering and Technology SRM Institute of Science and Technology Ramapuram Chennai India
The emergence of the novel COVID-19 virus has had a profound impact on global healthcare systems and economies, underscoring the imperative need for the development of precise and expeditious diagnostic tools. Machine... 详细信息
来源: 评论
Classification Model for IDS Using Auto Cryptographic Denoising Technique
收藏 引用
computer Systems science & Engineering 2023年 第4期45卷 671-685页
作者: N.Karthikeyan P.Sivaprakash S.Karthik Department of Computer Science&Engineering PPG Institute of TechnologyCoimbatoreTamilnaduIndia Department of Computer Science&Engineering SNS College of TechnologyCoimbatoreTamilnaduIndia
Intrusion detection systems(IDS)are one of the most promising ways for securing data and networks;In recent decades,IDS has used a variety of categorization *** classifiers,on the other hand,do not work effectively un... 详细信息
来源: 评论
GMS:A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2207-2220页
作者: Dawei Xu Fan Huang Jiaxin Zhang Yunfang Liang Baokun Zheng Jian Zhao School of Computer Science Changchun UniversityChangchun130012China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100081China School of InformationManagement for Law China University of Political Science and LawBeijing102249China
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly *** and smart contract technologies,with their decentralized nature,provide strong security g... 详细信息
来源: 评论
Integrated Blockchain-Based Agri-Food Traceability and Deep Learning for Profit-Optimized Supply Chain Management in Agri-Food Supply Chains  4
Integrated Blockchain-Based Agri-Food Traceability and Deep ...
收藏 引用
4th International Conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Musthafa Sheriff, I Mohammed John Aravindhar, D. Hindustan Institute of Technology and Science Department of Computer Science and Technology Chennai India
In agri-food supply chains (AFSC), ensuring both agri-food safety for consumers and increased profitability for farmers remains a complex challenge. The intricacies and dynamics of AFSC demand effective traceability a... 详细信息
来源: 评论
Transforming the electrical grid: the role of AI in advancing smart, sustainable, and secure energy systems
收藏 引用
Energy Informatics 2025年 第1期8卷 1-43页
作者: Rajaperumal, T.A. Columbus, C. Christopher School of Electrical Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India
The evolution of the electrical grid from its early centralized structure to today’s advanced "smart grid" reflects significant technological progress. Early grids, designed for simple power delivery from l... 详细信息
来源: 评论
Adaptive grouped balanced binary tree based multi user secure data transmission on cloud
收藏 引用
International Journal of Information technology (Singapore) 2025年 第2期17卷 941-949页
作者: Pavithra, P. Hariharan, B. Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Kattankulathur India
Secure multi-keyword search for outsourced cloud data has gained popularity, especially for scenarios involving multiple data owners. This work proposes a method for secure multi-keyword searches across encrypted clou... 详细信息
来源: 评论
Advanced Weather Monitoring and Disaster Mitigation System with Interactive Weather Visualizations, Flood Zone Detection, Unplanned Drainage Identification, and Emergency Shelter Mapping including Optional Drought Intensity Prediction Capabilities  7
Advanced Weather Monitoring and Disaster Mitigation System w...
收藏 引用
7th International Conference on Circuit Power and computing Technologies, ICCPCT 2024
作者: Ranjani, M. Devaraju, Perada Sreeharshitha, Yengalasetty Viswesh, Mekala Dubey, Siddhanth SRM Institute of Science and Technology Faculty of Engineering and Technology Chennai India SRM Institute of Science and Technology Department of Computing Technologies Chennai India
The Advanced Weather Monitoring and Disaster Mitigation System is an essential resource for enhanced preparedness and response to unexpected events. It applies modern methods to show us dynamic weather images, detect ... 详细信息
来源: 评论
Multi-receptive field interaction network for shape from polarization
收藏 引用
science China(Information sciences) 2025年 第1期68卷 394-395页
作者: Yini PENG Rui LIU Zhiyuan ZHANG Zhongyuan WANG Jiayi MA Xin TIAN Electronic Information School Wuhan University Computer Science School Wuhan University Wuhan Institute of Quantum Technology
Shape from polarization (SfP) method can use the polarization information in reflected light to estimate the surface normal of the target,which can further reconstruct the shape of the *** a simple image capture proce... 详细信息
来源: 评论
A review on 3D image reconstruction on specific and generic objects
收藏 引用
Materials Today: Proceedings 2023年 80卷 2400-2405页
作者: Shalma, H. Selvaraj, P. Dept. of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chennai India Dept. of Information Technology SRM Institute of Science and Technology Kattankulathur Chennai India
With the emergence of various techniques involved in deep learning the researchers of computer vision tends to focus on the strategies such as object recognition and segmentation of image. This has inclined to accompl... 详细信息
来源: 评论
SAND: semi-automated adaptive network defense via programmable rule generation and deployment
收藏 引用
science China(Information sciences) 2022年 第7期65卷 121-138页
作者: Haoyu CHEN Deqing ZOU Hai JIN Shouhuai XU Bin YUAN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabHubei Engineering Research Center on Big Data Security School of Cyber Science and EngineeringHuazhong University of Science and Technology Department of Computer Science University of Colorado at Colorado Springs
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t... 详细信息
来源: 评论