咨询与建议

限定检索结果

文献类型

  • 86,088 篇 会议
  • 41,179 篇 期刊文献
  • 1,374 册 图书

馆藏范围

  • 128,640 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 73,991 篇 工学
    • 50,046 篇 计算机科学与技术...
    • 39,919 篇 软件工程
    • 17,974 篇 信息与通信工程
    • 11,386 篇 控制科学与工程
    • 10,357 篇 电气工程
    • 9,568 篇 电子科学与技术(可...
    • 8,499 篇 生物工程
    • 6,868 篇 生物医学工程(可授...
    • 6,205 篇 光学工程
    • 4,716 篇 机械工程
    • 4,365 篇 化学工程与技术
    • 3,986 篇 动力工程及工程热...
    • 3,981 篇 仪器科学与技术
    • 3,898 篇 材料科学与工程(可...
    • 3,255 篇 网络空间安全
    • 2,928 篇 安全科学与工程
  • 44,877 篇 理学
    • 21,509 篇 数学
    • 15,914 篇 物理学
    • 9,843 篇 生物学
    • 6,924 篇 统计学(可授理学、...
    • 4,995 篇 化学
    • 4,502 篇 系统科学
  • 18,882 篇 管理学
    • 11,542 篇 管理科学与工程(可...
    • 8,160 篇 图书情报与档案管...
    • 5,585 篇 工商管理
  • 6,965 篇 医学
    • 5,790 篇 临床医学
    • 5,213 篇 基础医学(可授医学...
    • 3,180 篇 药学(可授医学、理...
    • 3,009 篇 公共卫生与预防医...
  • 3,648 篇 法学
    • 3,026 篇 社会学
  • 2,241 篇 经济学
  • 1,954 篇 农学
  • 1,283 篇 教育学
  • 593 篇 文学
  • 279 篇 军事学
  • 141 篇 艺术学
  • 42 篇 哲学
  • 25 篇 历史学

主题

  • 5,626 篇 computer science
  • 3,851 篇 accuracy
  • 3,098 篇 deep learning
  • 2,880 篇 feature extracti...
  • 2,756 篇 machine learning
  • 2,753 篇 computational mo...
  • 2,232 篇 training
  • 1,897 篇 support vector m...
  • 1,888 篇 real-time system...
  • 1,779 篇 convolutional ne...
  • 1,760 篇 internet of thin...
  • 1,747 篇 predictive model...
  • 1,717 篇 artificial intel...
  • 1,477 篇 data mining
  • 1,428 篇 optimization
  • 1,348 篇 wireless sensor ...
  • 1,277 篇 neural networks
  • 1,248 篇 computer archite...
  • 1,235 篇 security
  • 1,209 篇 data models

机构

  • 1,095 篇 cavendish labora...
  • 1,018 篇 department of ph...
  • 951 篇 oliver lodge lab...
  • 945 篇 physikalisches i...
  • 915 篇 department of co...
  • 870 篇 university of ch...
  • 598 篇 infn sezione di ...
  • 582 篇 infn laboratori ...
  • 579 篇 infn sezione di ...
  • 568 篇 chitkara univers...
  • 545 篇 department of ph...
  • 545 篇 infn sezione di ...
  • 544 篇 school of physic...
  • 539 篇 fakultät physik ...
  • 533 篇 horia hulubei na...
  • 517 篇 school of physic...
  • 509 篇 h.h. wills physi...
  • 508 篇 imperial college...
  • 492 篇 nikhef national ...
  • 488 篇 stfc rutherford ...

作者

  • 255 篇 barter w.
  • 241 篇 a. gomes
  • 236 篇 j. wang
  • 233 篇 s. chen
  • 232 篇 blake t.
  • 230 篇 c. alexa
  • 227 篇 bellee v.
  • 226 篇 j. m. izen
  • 225 篇 beiter a.
  • 224 篇 bowcock t.j.v.
  • 223 篇 c. amelung
  • 221 篇 g. bella
  • 221 篇 j. strandberg
  • 221 篇 d. calvet
  • 221 篇 amato s.
  • 219 篇 betancourt c.
  • 219 篇 boettcher t.
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 212 篇 bencivenni g.

语言

  • 111,115 篇 英文
  • 16,323 篇 其他
  • 1,332 篇 中文
  • 116 篇 日文
  • 21 篇 德文
  • 21 篇 法文
  • 17 篇 斯洛文尼亚文
  • 7 篇 朝鲜文
  • 7 篇 俄文
  • 3 篇 阿拉伯文
  • 3 篇 荷兰文
  • 1 篇 意大利文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Networking Department of Computer Science and Technology"
128641 条 记 录,以下是201-210 订阅
排序:
Intelligent Fortification of Agricultural Data Integrity  2
Intelligent Fortification of Agricultural Data Integrity
收藏 引用
2nd IEEE International Conference on networking and Communications, ICNWC 2024
作者: Vardhan, Rajya Kumar, Rohan Supraja, P. SRM Institute of Science and Technology Department of Networking and Communications Chennai India
The proliferation of the Internet of Things (loT) devices in agriculture has transformed data collecting, allowing for real-time monitoring and analysis, which is crucial for optimizing agricultural methods. However, ... 详细信息
来源: 评论
Contrastive Noise-Guided Invertible Network for Image Steganography
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 673-685页
作者: Zhang, Le Lu, Yao Lu, Guangming Harbin Institute of Technology at Shenzhen Department of Computer Science and Technology Shenzhen518057 China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Harbin Institute of Technology at Shenzhen Department of Computer Science and Technology Shenzhen518057 China
Image steganography aims to produce stego images through hiding secret images in the cover images to achieve covert communication. To simultaneously improve the invisibility and revealing quality of covert communicati... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论
Enhanced Cybercrime Detection on Twitter Using Aho-Corasick Algorithm and Machine Learning Techniques
收藏 引用
Informatica (Slovenia) 2024年 第18期48卷 97-108页
作者: Rawat, Romil Raj, A. Samson Arun Chakrawarti, Rajesh Kumar Sankaran, Krishnan Sakthidasan Sarangi, Sanjaya Kumar Rawat, Hitesh Rawat, Anjali Department of Computer Science Engineering Shri Vaishnav Institute of Information Technology Shri Vaishnav Vidyapeeth Vishwavidyalaya Indore India Division of Computer Science and Engineering School of Computer Science and Technology Karunya Institute of Technology and Sciences Tamil Nadu Coimbatore India MP Indore India Department od Electronics and Communication Engeneering Hindustan Institute of Technology and Science Chennai India Department of Computer Science and Engineering Utkal University Bhubaneswar India Department of Business Management and Economics University of Extremadura Spain Department of Computer and Communication Technology University of Extremadura Spain
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ... 详细信息
来源: 评论
Quadratic and Lagrange interpolation-based butterfly optimization algorithm for numerical optimization and engineering design problem
收藏 引用
Soft Computing 2025年 第1期29卷 157-194页
作者: Sharma, Sushmita Saha, Apu Kumar Chakraborty, Sanjoy Deb, Suman Sahoo, Saroj Kumar Department of Computer Science and Engineering Indian Institute of Information Technology Tripura Agartala India Department of Computer Science and Engineering National Institute of Technology Tripura Agartala India Department of Mathematics National Institute of Technology Agartala Tripura Agartala India Department of Information Technology Bir Bikram Memorial College Tripura Agartala India
This work proposes a novel and improved Butterfly Optimization Algorithm (BOA), known as LQBOA, to solve BOA’s inherent limitations. The LQBOA uses Lagrange interpolation and simple quadratic interpolation techniques... 详细信息
来源: 评论
Advanced Persistent Threat Detection and Mitigation Using Machine Learning Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3691-3707页
作者: U.Sakthivelu C.N.S.Vinoth Kumar Department of Networking and Communications College of Engineering and Technology(CET)SRM Institute of Science and TechnologyKattankulathurChennai603203India
The detection of cyber threats has recently been a crucial research domain as the internet and data drive people’s *** cyber-attacks lead to the compromise of data *** proposed system offers complete data protection ... 详细信息
来源: 评论
Hierarchical blockchain-based secure data storage in cloud using Merkle tree approach
收藏 引用
International Journal of Cloud Computing 2024年 第6期13卷 605-626页
作者: Bruno, Judy Flavia Chelliah, Balika J. Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai India
An authenticated manager must reinforce huge applications and operating systems, keeping information in the cloud while resisting potentially unreliable service providers. This article explores the presence of multipl... 详细信息
来源: 评论
Blockchain-based immunization against kleptographic attacks
收藏 引用
science China(Information sciences) 2024年 第7期67卷 172-183页
作者: Changsong JIANG Chunxiang XU Jie CHEN Kefei CHEN School of Computer Science and Engineering University of Electronic Science and Technology of China Yangtze Delta Region Institute (Huzhou) University of Electronic Science and Technology of China Department of Mathematics Hangzhou Normal University
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel attacks are one of the kleptographic attacks. In such attacks, backdoors... 详细信息
来源: 评论
Predictive Salary Modelling: Leveraging Data science Skills and Machine Learning for Accurate Forecasting  9
Predictive Salary Modelling: Leveraging Data Science Skills ...
收藏 引用
9th International Conference on Communication and Electronics Systems, ICCES 2024
作者: Haseeb, Mohammed Ayman Viswanathan, Rishi Iyer, Kaushik Hota, Anish Raj Prathaban, Banu Priya School of Computing Srm Institute of Science and Technology Department of Networking and Communications Kattankulathur Chennai India Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur Chennai India
In approaching predictive salary modeling, this article identified important job positions and skills in the data science business environment. They show the need for a model that would allow employers to calculate th... 详细信息
来源: 评论
Isomorphic Classification of First Degree Cellular Automata
收藏 引用
Complex Systems 2025年 第1期34卷 59-90页
作者: Vikrant, Vicky Bhattacharjee, Kamalika Mukherjee, Sukanya Department of Computer Science and Engineering National Institute of Technology Tamil Nadu Tiruchirappalli620015 India Department of Computer Science and Engineering Institute of Engineering and Management West Bengal Kolkata700091 India
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to... 详细信息
来源: 评论