咨询与建议

限定检索结果

文献类型

  • 85,845 篇 会议
  • 41,263 篇 期刊文献
  • 1,383 册 图书

馆藏范围

  • 128,490 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 73,628 篇 工学
    • 50,125 篇 计算机科学与技术...
    • 40,057 篇 软件工程
    • 18,000 篇 信息与通信工程
    • 11,425 篇 控制科学与工程
    • 10,185 篇 电气工程
    • 9,408 篇 电子科学与技术(可...
    • 8,503 篇 生物工程
    • 6,885 篇 生物医学工程(可授...
    • 6,363 篇 光学工程
    • 4,722 篇 机械工程
    • 4,367 篇 化学工程与技术
    • 4,001 篇 仪器科学与技术
    • 3,988 篇 动力工程及工程热...
    • 3,543 篇 材料科学与工程(可...
    • 3,250 篇 网络空间安全
    • 2,934 篇 安全科学与工程
  • 44,967 篇 理学
    • 21,498 篇 数学
    • 15,920 篇 物理学
    • 9,847 篇 生物学
    • 6,842 篇 统计学(可授理学、...
    • 4,986 篇 化学
    • 4,507 篇 系统科学
  • 18,919 篇 管理学
    • 11,557 篇 管理科学与工程(可...
    • 8,171 篇 图书情报与档案管...
    • 5,600 篇 工商管理
  • 7,012 篇 医学
    • 5,832 篇 临床医学
    • 5,238 篇 基础医学(可授医学...
    • 3,181 篇 药学(可授医学、理...
    • 3,036 篇 公共卫生与预防医...
  • 3,655 篇 法学
    • 3,029 篇 社会学
  • 2,251 篇 经济学
  • 1,969 篇 农学
  • 1,284 篇 教育学
  • 595 篇 文学
  • 279 篇 军事学
  • 141 篇 艺术学
  • 42 篇 哲学
  • 25 篇 历史学

主题

  • 5,626 篇 computer science
  • 3,738 篇 accuracy
  • 3,045 篇 deep learning
  • 2,827 篇 feature extracti...
  • 2,750 篇 machine learning
  • 2,705 篇 computational mo...
  • 2,205 篇 training
  • 1,865 篇 support vector m...
  • 1,792 篇 real-time system...
  • 1,738 篇 convolutional ne...
  • 1,736 篇 internet of thin...
  • 1,725 篇 artificial intel...
  • 1,705 篇 predictive model...
  • 1,475 篇 data mining
  • 1,374 篇 optimization
  • 1,332 篇 wireless sensor ...
  • 1,261 篇 neural networks
  • 1,224 篇 computer archite...
  • 1,210 篇 security
  • 1,180 篇 data models

机构

  • 1,098 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 960 篇 oliver lodge lab...
  • 950 篇 physikalisches i...
  • 901 篇 department of co...
  • 881 篇 university of ch...
  • 596 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 580 篇 infn sezione di ...
  • 565 篇 chitkara univers...
  • 550 篇 department of ph...
  • 542 篇 horia hulubei na...
  • 542 篇 infn sezione di ...
  • 540 篇 fakultät physik ...
  • 538 篇 school of physic...
  • 522 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 512 篇 imperial college...
  • 498 篇 nikhef national ...
  • 488 篇 stfc rutherford ...

作者

  • 251 篇 barter w.
  • 242 篇 a. gomes
  • 238 篇 j. wang
  • 233 篇 s. chen
  • 232 篇 c. alexa
  • 230 篇 j. m. izen
  • 227 篇 blake t.
  • 223 篇 c. amelung
  • 223 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 g. bella
  • 222 篇 j. strandberg
  • 221 篇 d. calvet
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 119,478 篇 英文
  • 7,737 篇 其他
  • 1,323 篇 中文
  • 116 篇 日文
  • 15 篇 法文
  • 14 篇 德文
  • 10 篇 斯洛文尼亚文
  • 7 篇 朝鲜文
  • 7 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Networking Department of Computer Science and Technology"
128491 条 记 录,以下是181-190 订阅
排序:
Smart Cloud Monitoring: Optimising Server Loads for Reducing Energy Consumption  8
Smart Cloud Monitoring: Optimising Server Loads for Reducing...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace technology, ICECA 2024
作者: Vignesh, R. Thenmalar, S. Srm Institute of Science and Technology Department of Networking and Communications Kattankulathur India
The recent proliferation of cloud computing services brings forth the focal issues of energy consumption in data centers from an environmental and financial standpoint. This paper describes a monitoring system focused... 详细信息
来源: 评论
Revolutionizing Global IT Supply Chains: A Decentralized Framework for Cost-Effective and Streamlined Operations in Critical Events  1
Revolutionizing Global IT Supply Chains: A Decentralized Fra...
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent Systems, ICC - ROBINS 2024
作者: Sai Haree Ram, S. Uppala Durga Samirth, S. Pandimurugan, V. Srm Institute of Science & Technology Department of Networking and Communications Chennai India
In the dynamic realm of global IT supply chains, businesses confront formidable challenges, particularly during critical junctures like product launches. Traditional Enterprise Resource Planning (ERP) systems, while e... 详细信息
来源: 评论
An Efficient AI Model for Classifier Tweets During Disaster Using Recurrent Neural Networks (RNN)  2nd
An Efficient AI Model for Classifier Tweets During Disaster ...
收藏 引用
2nd International Conference on Intelligent Computing Systems and Applications, ICICSA 2023
作者: Lakshmi Narayanan, K. Naresh, R. Department of Computer Science and Engineering SRM Institute of Science and Technology Kattankulathur Chennai603 203 India Department of Networking and Communications SRM Institute of Science and Technology Kattankulathur Chennai603 203 India
During any significant event, particularly during natural catastrophes, social media is an essential information source. It is claimed that data generated by social networking sites would enable regular people to beco... 详细信息
来源: 评论
DDoS Attack Detection System for IoT Enabled Smart City Applications with Correlation Analysis  4
DDoS Attack Detection System for IoT Enabled Smart City Appl...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Nirosha, Veeramachaneni Hemamalini, V. Srm Institute of Science and Technology Department of Networking and Communication Kattankulathur India
The topic of cybersecurity remains a significant concern for industries involved in digital operations, as seen by the recurring increase in security incidents. The increasing use of Internet of Things (IoT) devices i... 详细信息
来源: 评论
Machine Learning Techniques for Effective Content- Based Approach in the Detection of Fake News  4
Machine Learning Techniques for Effective Content- Based App...
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2024
作者: Jammula, Roshini Devi Srinivas, Nukala Bhargav Sandeep, K. Parimala, G. Srm Institute of Science and Technology Department of Networking and Communications Chennai India
All functionalities required in the process of fake news detection, from data preparation to model building, have been done within the project, smoothly integrated into Flask for user interaction. The first step of da... 详细信息
来源: 评论
Email Phishing Detection Using AI and ML  2nd
Email Phishing Detection Using AI and ML
收藏 引用
2nd International Conference on Deep sciences for Computing and Communications, IconDeepCom 2023
作者: Sarkar, Sohan Yadav, Ankit Balachander, T. Department of Networking and Communications SRM Institute of Science and Technology Chennai India
Phishing is the act of attackers sending malicious emails to receivers in an effort to trick them into falling for a con. Normally, the intention is to persuade users to provide private information, such as system log... 详细信息
来源: 评论
Forecasting sales data using time series models and LSTM model  2
Forecasting sales data using time series models and LSTM mod...
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Vishwanath, Anirudh Basheeruddin, Mohammed Saveetha, D. Department of Networking and Communications SRM Institute of Science and Technology Chennai India
In the framework of sales forecasting, the project investigates the field of time series forecasting, with a particular emphasis on analyzing and comparing the forecasting precision of ARIMA, SARIMA, and LSTM models. ... 详细信息
来源: 评论
Optimising Intrusion Detection Through Long Short-Term Memory Model
Optimising Intrusion Detection Through Long Short-Term Memor...
收藏 引用
2024 International Conference on Advances in Modern Age Technologies for Health and Engineering science, AMATHE 2024
作者: Tharun, Anjali Kondapalli, Amogh Srivathsa Prabakeran, S. Srm Institute Of Science And Technology Department Of Networking And Communication Chennai India
This research paper presents an innovative approach to enhancing Intrusion Detection Systems (IDS) using a Long Short-Term Memory (LSTM) model and transfer learning. The study begins with the loading of a pretrained L... 详细信息
来源: 评论
Anomaly-Based Intrusion Detection in Network Traffic using Machine Learning: A Comparative Study of Decision Trees and Random Forests  2
Anomaly-Based Intrusion Detection in Network Traffic using M...
收藏 引用
2nd IEEE International Conference on networking and Communications, ICNWC 2024
作者: Sah, Anil Kumar Venkatesh, K. SRM Institute of Science and Technology Department of Networking and Communications Chennai India
With advancements in information and virtualization technologies, the volume and growth of security threats from cyber attacks targeting networked systems are increasing. Protecting these networked systems is crucial ... 详细信息
来源: 评论
Video captioning – a survey
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 947-978页
作者: Vaishnavi, J. Narmatha, V. Department of Computer Applications SRM Institute of Science and Technology Trichy India Department of Computer and Information Science Annamalai University Annamalai Nagar Tamilnadu 608002 India
The explosion of the novel phenomenon of the combination of computer vision and Natural language processing is playing a vital role in converting the ordinary world into a more technological pool. Natural language pro... 详细信息
来源: 评论