咨询与建议

限定检索结果

文献类型

  • 901 篇 会议
  • 176 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 1,092 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 624 篇 工学
    • 457 篇 计算机科学与技术...
    • 366 篇 软件工程
    • 174 篇 信息与通信工程
    • 97 篇 电子科学与技术(可...
    • 84 篇 控制科学与工程
    • 67 篇 电气工程
    • 59 篇 生物工程
    • 46 篇 机械工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 安全科学与工程
    • 29 篇 仪器科学与技术
    • 27 篇 化学工程与技术
    • 26 篇 网络空间安全
    • 23 篇 交通运输工程
  • 291 篇 理学
    • 173 篇 数学
    • 69 篇 物理学
    • 68 篇 生物学
    • 52 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 25 篇 化学
  • 162 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 37 篇 医学
    • 33 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 22 篇 法学
    • 19 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 16 篇 农学
  • 5 篇 文学
  • 3 篇 教育学
  • 1 篇 军事学

主题

  • 36 篇 feature extracti...
  • 30 篇 computer science
  • 26 篇 accuracy
  • 25 篇 computational mo...
  • 23 篇 training
  • 21 篇 deep learning
  • 20 篇 real-time system...
  • 20 篇 data models
  • 17 篇 routing
  • 16 篇 internet of thin...
  • 16 篇 computer archite...
  • 16 篇 machine learning
  • 16 篇 artificial intel...
  • 15 篇 support vector m...
  • 15 篇 authentication
  • 15 篇 hardware
  • 15 篇 testing
  • 14 篇 forecasting
  • 14 篇 robustness
  • 13 篇 logic gates

机构

  • 39 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 dept. of comput....
  • 9 篇 dept. of compute...
  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of electri...
  • 8 篇 school of comput...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 7 篇 dept. of compute...
  • 7 篇 dept. of electro...
  • 7 篇 dept. of compute...
  • 7 篇 department of co...

作者

  • 24 篇 bhattacharya arn...
  • 15 篇 saxena sanjeev
  • 12 篇 nandi sukumar
  • 10 篇 bhargab b. bhatt...
  • 9 篇 sudip misra
  • 8 篇 p. venkata krish...
  • 8 篇 mohammad s. obai...
  • 8 篇 shantaram vasika...
  • 8 篇 surajeet ghosh
  • 7 篇 goyal pawan
  • 7 篇 hemangee k. kapo...
  • 6 篇 murthy hema a.
  • 6 篇 venu nookala
  • 6 篇 jayanta mukhopad...
  • 6 篇 ravindran balara...
  • 6 篇 mukhopadhyay deb...
  • 6 篇 nookala venu
  • 6 篇 hafizur rahaman
  • 6 篇 ghosh uttam
  • 6 篇 basu deborsi

语言

  • 1,045 篇 英文
  • 46 篇 其他
  • 1 篇 日文
检索条件"机构=Dept.of Computer Science and Engineering Indian Institute of Technology"
1092 条 记 录,以下是81-90 订阅
排序:
Unforgettable Password Generation Using LoRA Fine-Tuned Large Language Model
Unforgettable Password Generation Using LoRA Fine-Tuned Larg...
收藏 引用
Advances in Data engineering and Intelligent Computing Systems (ADICS), International Conference on
作者: Mohammed Sameer K Sudharsan A Benazir Begum Dept.of Computer Science & Engineering Hindustan Institute of Technology and Science Chennai India
In response to the challenges posed by complex and hard-to-remember passwords in traditional authentication systems, this research introduces an innovative approach leveraging Low Rank Adaption (LoRA) fine-tuned Large... 详细信息
来源: 评论
A Comprehensive Review of Leap Motion Controller-Based Hand Gesture Datasets
A Comprehensive Review of Leap Motion Controller-Based Hand ...
收藏 引用
2023 IEEE International Conference on Next Generation Electronics, NEleX 2023
作者: Chakravarthi, Bharatesh Prabhu Prasad, B.M. Imandi, Raju Pavan Kumar, B.N. School of Computing and Augmented Intelligence Arizona State University TempeAZ United States Indian Institute of Information Technology Dept. of Computer Science and Engineering Dharwad India Indian Institute of Information Technology Sri City Dept. of Computer Science and Engineering Chittoor India
This paper comprehensively reviews hand gesture datasets based on Ultraleap's leap motion controller, a popular device for capturing and tracking hand gestures in real-time. The aim is to offer researchers and pra... 详细信息
来源: 评论
Design and Characterization of a Ka-Band Parasitic Patch Antenna for 5G Applications  9
Design and Characterization of a Ka-Band Parasitic Patch Ant...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Kouser, Kahkashan Hannan, Mohammad Shafi, Faizan Aknan, Mohammad Dept. of Computer Science & Engineering Bihar Motihari India Rajiv Gandhi Institute of Petroleum Technology Dept. of Electrical and Electronics Engineering Uttar Pradesh Amethi India Indian Institute of Technology Dept. of Electrical Electronics and Communication Engineering Dharwad India
He design of parasitic patch antennas for high-frequency applications, such as 5G millimeter-wave (mm-wave) communication, presents several challenges, including achieving high gain, wide bandwidth, and efficient impe... 详细信息
来源: 评论
Attention-Based AdaptSepCX Network for Effective Student Action Recognition in Online Learning
收藏 引用
Procedia computer science 2024年 233卷 164-174页
作者: Arnab Dey Anubhav Anand Subhajit Samanta Bijay Kumar Sah Samit Biswas Dept. of Computer Science and Technology Indian Institute of Engineering Science and Technology Shibpur Howrah 711103 India
In the realm of online learning and distance education, the issue of inadequate supervision looms large, posing a significant obstacle. This paper delves into the challenges posed by the lack of supervision in online ... 详细信息
来源: 评论
Block-Hash Signature (BHS) for Transaction Validation in Smart Contracts for Security and Privacy using Blockchain
收藏 引用
Journal of Mobile Multimedia 2023年 第4期19卷 935-962页
作者: Bhatnagar, Sonika Dayal, Mohit Singh, Deepti Upreti, Shitiz Upreti, Kamal Kumar, Jitender Dept. of Computer Science & Engineering Government Polytechnic Baheri Bareilly India Dept. of Applied Science Bharati Vidyapeeth’s College of Engineering New Delhi India Dept. of Information Technology ABES Institute of Technology Ghaziabad India Dept.of Information Technology Asian Education Group (AEG) Noida India Dept. of Computer Science & Engineering Dr. Akhilesh Das Gupta Institute of Technology and Management New Delhi India Dept. of Computer Science & Engineering J.C Bose University of Science & Technology YMCA Haryana Faridabad India
Some of the well-known signature techniques like Winternitz and Lamport are not considered to be very appropriate for the usage of hashing or smart contracts in Blockchains security because of their size O(n2), which ... 详细信息
来源: 评论
Comparative Study of ML Algorithms for Load Redistribution Attack Detection  1
Comparative Study of ML Algorithms for Load Redistribution A...
收藏 引用
1st IEEE Industrial Electronics Society Annual On-Line Conference, ONCON 2022
作者: Verma, Praveen Dasgupta, Pallab Chakraborty, Chandan School of Energy Science & Engineering Indian Institute of Technology Kharagpur India Indian Institute of Technology Dept. of Computer Science & Engineering Kharagpur India Indian Institute of Technology Dept. of Electrical Engineering Kharagpur India
A Load Redistribution (LR) attack is a special type of False Data Injection (FDI) attack on the power grid in which the attacker manipulates the load request. This manipulation results in false dispatch decisions by t... 详细信息
来源: 评论
Critical Load Identification for Load Redistribution Attacks  11
Critical Load Identification for Load Redistribution Attacks
收藏 引用
11th International Conference on Innovative Smart Grid Technologies - Asia, ISGT-Asia 2022
作者: Verma, Praveen Gupta, Sagar Dasgupta, Pallab Chakraborty, Chandan School of Energy Science & Engineering Indian Institute of Technology Kharagpur India Indian Institute of Technology Dept. of Computer Science & Engineering Kharagpur India Indian Institute of Technology Dept. of Electrical Engineering Kharagpur India
The smart integration of communication and information technology into electrical power grids has significantly benefited the monitoring and operations of the grid, but it has also made it vulnerable to cyber attacks.... 详细信息
来源: 评论
IoT: Communication protocols and security threats
收藏 引用
Internet of Things and Cyber-Physical Systems 2023年 第1期3卷 1-13页
作者: Gerodimos, Apostolos Maglaras, Leandros Ferrag, Mohamed Amine Ayres, Nick Kantzavelou, Ioanna School of Computer Science and Informatics University of Thessaly Lamia Greece School of Computing at Edinburgh Napier University Edinburgh United Kingdom Technology Innovation Institute Abu Dhabi United Arab Emirates School of Computer Science and Informatics De Montfort University Leicester United Kingdom School of Engineering Dept.of Informatics and Computer Engineering University of West Attica Athens Greece
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and gen... 详细信息
来源: 评论
Creation of a Digital Rig Vedic Index (Anukramani) for Computational Linguistic Tasks  18
Creation of a Digital Rig Vedic Index (Anukramani) for Compu...
收藏 引用
18th World Sanskrit Conference
作者: Mahesh, A.V.S.D.S. Bhattacharya, Arnab Dept. of Computer Science and Engineering Indian Institute of Technology Kanpur India
Rig Veda, the oldest text in Vedic Sanskrit, is a collection of hymns addressed to various devatas. We present an index of Rig Vedic verses along with the respective devata, rsi and chandas which is, in short, a digit... 详细信息
来源: 评论
A technique for optimum distribution of watermark in a document image  4
A technique for optimum distribution of watermark in a docum...
收藏 引用
4th IEEE International Conference on Advances in Electronics, computers and Communications, ICAECC 2022
作者: Das, Nandini Pal, Tamal Indian Institute of Engineering Science and Technology Dept. of Computer Science and Technology Shibpur Howrah India
Watermarking is a very useful technique to ensure the integrity of a document image. But when too many bits are embedded into image, it reduces quality of the document. When limited number of watermark bits are used, ... 详细信息
来源: 评论