咨询与建议

限定检索结果

文献类型

  • 85,845 篇 会议
  • 41,263 篇 期刊文献
  • 1,383 册 图书

馆藏范围

  • 128,490 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 73,628 篇 工学
    • 50,125 篇 计算机科学与技术...
    • 40,057 篇 软件工程
    • 18,000 篇 信息与通信工程
    • 11,425 篇 控制科学与工程
    • 10,185 篇 电气工程
    • 9,408 篇 电子科学与技术(可...
    • 8,503 篇 生物工程
    • 6,885 篇 生物医学工程(可授...
    • 6,363 篇 光学工程
    • 4,722 篇 机械工程
    • 4,367 篇 化学工程与技术
    • 4,001 篇 仪器科学与技术
    • 3,988 篇 动力工程及工程热...
    • 3,543 篇 材料科学与工程(可...
    • 3,250 篇 网络空间安全
    • 2,934 篇 安全科学与工程
  • 44,967 篇 理学
    • 21,498 篇 数学
    • 15,920 篇 物理学
    • 9,847 篇 生物学
    • 6,842 篇 统计学(可授理学、...
    • 4,986 篇 化学
    • 4,507 篇 系统科学
  • 18,919 篇 管理学
    • 11,557 篇 管理科学与工程(可...
    • 8,171 篇 图书情报与档案管...
    • 5,600 篇 工商管理
  • 7,012 篇 医学
    • 5,832 篇 临床医学
    • 5,238 篇 基础医学(可授医学...
    • 3,181 篇 药学(可授医学、理...
    • 3,036 篇 公共卫生与预防医...
  • 3,655 篇 法学
    • 3,029 篇 社会学
  • 2,251 篇 经济学
  • 1,969 篇 农学
  • 1,284 篇 教育学
  • 595 篇 文学
  • 279 篇 军事学
  • 141 篇 艺术学
  • 42 篇 哲学
  • 25 篇 历史学

主题

  • 5,626 篇 computer science
  • 3,738 篇 accuracy
  • 3,045 篇 deep learning
  • 2,827 篇 feature extracti...
  • 2,750 篇 machine learning
  • 2,705 篇 computational mo...
  • 2,205 篇 training
  • 1,865 篇 support vector m...
  • 1,792 篇 real-time system...
  • 1,738 篇 convolutional ne...
  • 1,736 篇 internet of thin...
  • 1,725 篇 artificial intel...
  • 1,705 篇 predictive model...
  • 1,475 篇 data mining
  • 1,374 篇 optimization
  • 1,332 篇 wireless sensor ...
  • 1,261 篇 neural networks
  • 1,224 篇 computer archite...
  • 1,210 篇 security
  • 1,180 篇 data models

机构

  • 1,098 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 960 篇 oliver lodge lab...
  • 950 篇 physikalisches i...
  • 901 篇 department of co...
  • 881 篇 university of ch...
  • 596 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 580 篇 infn sezione di ...
  • 565 篇 chitkara univers...
  • 550 篇 department of ph...
  • 542 篇 horia hulubei na...
  • 542 篇 infn sezione di ...
  • 540 篇 fakultät physik ...
  • 538 篇 school of physic...
  • 522 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 512 篇 imperial college...
  • 498 篇 nikhef national ...
  • 488 篇 stfc rutherford ...

作者

  • 251 篇 barter w.
  • 242 篇 a. gomes
  • 238 篇 j. wang
  • 233 篇 s. chen
  • 232 篇 c. alexa
  • 230 篇 j. m. izen
  • 227 篇 blake t.
  • 223 篇 c. amelung
  • 223 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 g. bella
  • 222 篇 j. strandberg
  • 221 篇 d. calvet
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 119,478 篇 英文
  • 7,737 篇 其他
  • 1,323 篇 中文
  • 116 篇 日文
  • 15 篇 法文
  • 14 篇 德文
  • 10 篇 斯洛文尼亚文
  • 7 篇 朝鲜文
  • 7 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Networking Department of Computer Science and Technology"
128491 条 记 录,以下是1-10 订阅
排序:
Detection and Prevention of Black Hole Attack using Tree Hierarchical Deep Convolutional Neural Network and Enhanced Identity-based Encryption in Vehicular Ad Hoc Network
收藏 引用
IEIE Transactions on Smart Processing and Computing 2024年 第1期13卷 41-50页
作者: Narayanan, K. Lakshmi Naresh, R. Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamilnadu Chennai603203 India Department of Networking and Communications SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamilnadu Chennai603203 India
A method for the recognition and prevention of a black hole attack is proposed using a tree hierarchical deep convolutional neural network (THDCNN)and enhanced identity based encryption in a vehicular ad hoc network (... 详细信息
来源: 评论
Classification of Conversational Sentences Using an Ensemble Pre-Trained Language Model with the Fine-Tuned Parameter
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1669-1686页
作者: R.Sujatha K.Nimala Department of Networking and Communications SRM Institute of Science and TechnologyKattankulathurChengalpattuTamilnadu603203India
Sentence classification is the process of categorizing a sentence based on the context of the *** categorization requires more semantic highlights than other tasks,such as dependence parsing,which requires more syntac... 详细信息
来源: 评论
Domain generalization with semi-supervised learning for people-centric activity recognition
收藏 引用
science China(Information sciences) 2025年 第1期68卷 171-188页
作者: Jing LIU Wei ZHU Di LI Xing HU Liang SONG Academy for Engineering & Technology Fudan University Shanghai East-bund Research Institute on Networking Systems of AI School of Optoelectronic Information and Computer Engineering University of Shanghai for Science & Technology
People-centric activity recognition is one of the most critical technologies in a wide range of real-world applications,including intelligent transportation systems, healthcare services, and brain-computer interfaces.... 详细信息
来源: 评论
Fake news detection on social media using Adaptive Optimization based Deep Learning Approach
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 6091-6111页
作者: Steni Mol, T.S. Sreeja, P.S. Department of Computer Science Hindustan Institute of Technology and Science Chennai India Department of Computer Applications Vellore Institute of Technology Chennai India
Various content-sharing platforms and social media are developed in recent times so that it is highly possible to spread fake news and misinformation. This kind of news may cause chaos and panic among people. The auto... 详细信息
来源: 评论
Hybrid Seagull and Whale Optimization Algorithm-Based Dynamic Clustering Protocol for Improving Network Longevity in Wireless Sensor Networks
收藏 引用
China Communications 2024年 第10期21卷 113-131页
作者: P.Vinoth Kumar K.Venkatesh Department of Networking and Communications School of ComputingCollege of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur 603203India
Energy efficiency is the prime concern in Wireless Sensor Networks(WSNs) as maximized energy consumption without essentially limits the energy stability and network lifetime. Clustering is the significant approach ess... 详细信息
来源: 评论
Mode Management of Peripherals Based on State Transition Model in FRP Language for Embedded Systems
Computer Software
收藏 引用
computer Software 2025年 第1期42卷 40-53页
作者: Takimoto, Satoshi Moriguchi, Sosuke Watanabe, Takuo Department of Computer Science Tokyo Institute of Technology Institute of Science Tokyo Japan
XStorm, an FRP language for small-scale embedded systems, allows us to concisely describe state-dependent behaviors based on the state transition model. However, when we use different sets of peripheral devices depend... 详细信息
来源: 评论
A new perspective exploration of machine learning algorithms for defending Side-Channel attacks
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 17021-17040页
作者: Ramakrishnan, Vedhavathy Thoguluva Seethapathy, Murugaanandam Sundar, Ramesh Dhandapani, Saveetha Munusamy, Sundarrajan Balasubrahmaniam, Lakshmi Dhevi Department of Networking and Communications School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur India
Machine learning algorithms are used in various real-time applications, where security is one of the major problems. Security is applied in various aspects of the application in cloud computing. One of the security is... 详细信息
来源: 评论
Block chain-based trusted smart contract for secure mobile user payment gateway in e-health systems
收藏 引用
Soft Computing 2024年 第17-18期28卷 10139-10151页
作者: Saranya, A. Naresh, R. Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamil Nadu Chennai603203 India Department of Networking and Communications SRM Institute of Science and Technology Kattankulathur Chengalpattu Tamil Nadu Chennai603203 India
In other instances, the cloud transfers payment information directly to the merchant’s server without first doing any fraud checks. Block authentication between the cloud and a healthcare merchant server is the goal ... 详细信息
来源: 评论
Using DTL-MD with GANs and ResNet for Malicious Code Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 63-78页
作者: Li, Yiming Xie, Tao Mei, Dongdong Department of Computer Science and Technology School of Computer Science and Engineering Ningxia Institute of Science and Technology Shizuishan753000 China
This study proposes a malicious code detection model DTL-MD based on deep transfer learning, which aims to improve the detection accuracy of existing methods in complex malicious code and data scarcity. In the feature... 详细信息
来源: 评论
Flameshift Protocol: Revolutionizing Interoperability with Dynamic Asset Recycling for Cross-Chain Communications
收藏 引用
SN computer science 2024年 第6期5卷 773页
作者: Vijayalakshmi, C. Florence, S. Metilda Department of Networking and Communications SRM Institute of Science and Technology
The burgeoning landscape of blockchain technology has ushered in an era of unprecedented innovation and opportunity. However, one of the most persistent challenges that emerge in this decentralized ecosystem is the la... 详细信息
来源: 评论