咨询与建议

限定检索结果

文献类型

  • 85,845 篇 会议
  • 41,263 篇 期刊文献
  • 1,383 册 图书

馆藏范围

  • 128,490 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 73,628 篇 工学
    • 50,125 篇 计算机科学与技术...
    • 40,057 篇 软件工程
    • 18,000 篇 信息与通信工程
    • 11,425 篇 控制科学与工程
    • 10,185 篇 电气工程
    • 9,408 篇 电子科学与技术(可...
    • 8,503 篇 生物工程
    • 6,885 篇 生物医学工程(可授...
    • 6,363 篇 光学工程
    • 4,722 篇 机械工程
    • 4,367 篇 化学工程与技术
    • 4,001 篇 仪器科学与技术
    • 3,988 篇 动力工程及工程热...
    • 3,543 篇 材料科学与工程(可...
    • 3,250 篇 网络空间安全
    • 2,934 篇 安全科学与工程
  • 44,967 篇 理学
    • 21,498 篇 数学
    • 15,920 篇 物理学
    • 9,847 篇 生物学
    • 6,842 篇 统计学(可授理学、...
    • 4,986 篇 化学
    • 4,507 篇 系统科学
  • 18,919 篇 管理学
    • 11,557 篇 管理科学与工程(可...
    • 8,171 篇 图书情报与档案管...
    • 5,600 篇 工商管理
  • 7,012 篇 医学
    • 5,832 篇 临床医学
    • 5,238 篇 基础医学(可授医学...
    • 3,181 篇 药学(可授医学、理...
    • 3,036 篇 公共卫生与预防医...
  • 3,655 篇 法学
    • 3,029 篇 社会学
  • 2,251 篇 经济学
  • 1,969 篇 农学
  • 1,284 篇 教育学
  • 595 篇 文学
  • 279 篇 军事学
  • 141 篇 艺术学
  • 42 篇 哲学
  • 25 篇 历史学

主题

  • 5,626 篇 computer science
  • 3,738 篇 accuracy
  • 3,045 篇 deep learning
  • 2,827 篇 feature extracti...
  • 2,750 篇 machine learning
  • 2,705 篇 computational mo...
  • 2,205 篇 training
  • 1,865 篇 support vector m...
  • 1,792 篇 real-time system...
  • 1,738 篇 convolutional ne...
  • 1,736 篇 internet of thin...
  • 1,725 篇 artificial intel...
  • 1,705 篇 predictive model...
  • 1,475 篇 data mining
  • 1,374 篇 optimization
  • 1,332 篇 wireless sensor ...
  • 1,261 篇 neural networks
  • 1,224 篇 computer archite...
  • 1,210 篇 security
  • 1,180 篇 data models

机构

  • 1,098 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 960 篇 oliver lodge lab...
  • 950 篇 physikalisches i...
  • 901 篇 department of co...
  • 881 篇 university of ch...
  • 596 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 580 篇 infn sezione di ...
  • 565 篇 chitkara univers...
  • 550 篇 department of ph...
  • 542 篇 horia hulubei na...
  • 542 篇 infn sezione di ...
  • 540 篇 fakultät physik ...
  • 538 篇 school of physic...
  • 522 篇 school of physic...
  • 515 篇 h.h. wills physi...
  • 512 篇 imperial college...
  • 498 篇 nikhef national ...
  • 488 篇 stfc rutherford ...

作者

  • 251 篇 barter w.
  • 242 篇 a. gomes
  • 238 篇 j. wang
  • 233 篇 s. chen
  • 232 篇 c. alexa
  • 230 篇 j. m. izen
  • 227 篇 blake t.
  • 223 篇 c. amelung
  • 223 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 g. bella
  • 222 篇 j. strandberg
  • 221 篇 d. calvet
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 119,478 篇 英文
  • 7,737 篇 其他
  • 1,323 篇 中文
  • 116 篇 日文
  • 15 篇 法文
  • 14 篇 德文
  • 10 篇 斯洛文尼亚文
  • 7 篇 朝鲜文
  • 7 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Networking Department of Computer Science and Technology"
128491 条 记 录,以下是21-30 订阅
排序:
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
AI-based small arms firing skill evaluation system in the military domain
收藏 引用
Defence technology(防务技术) 2023年 第11期29卷 164-180页
作者: Rezoanul Hafiz Chandan Nusrat Sharmin Muhaimin Bin Munir Abdur Razzak Tanvir Ahamad Naim Tasneem Mubashshira Mokhlesur Rahman Department of Computer Science and Engineering Military Institute of Science and TechnologyDhakaBangladesh
Evaluation system of small arms firing has an important effect in the context of military domain. A partially automated evaluation system has been conducted and performed at the ground level. Automation of such system... 详细信息
来源: 评论
DeepGAN: Utilizing generative adversarial networks for improved deep learning
收藏 引用
International Journal of Knowledge-Based and Intelligent Engineering Systems 2024年 第4期28卷 732-748页
作者: V, Edward Naveen A, Jenefa T.M, Thiyagu A, Lincy Taurshia, Antony Department of Computer Science and Engineering Sri Shakthi Institute of Engineering and Technology India Department of Computer Science and Engineering Karunya Institute of Technology and Sciences India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences India Department of Computer Science and Engineering National Engineering College India
In the realm of deep learning, Generative Adversarial Networks (GANs) have emerged as a topic of significant interest for their potential to enhance model performance and enable effective data augmentation. This paper... 详细信息
来源: 评论
Adaptive pelican optimization with optimized mask RCNN for automatic lung cancer detection
收藏 引用
Multimedia Tools and Applications 2025年 1-21页
作者: Sudha, R. Maheswari, K.M. Uma Department of Computer Science and Engineering SRM Institute of Science and Technology Chengalpattu India Department of Computing Technologies SRM Institute of Science and Technology Chengalpattu India
Lung cancer is a prevalent and deadly disease worldwide, necessitating accurate and timely detection methods for effective treatment. Deep learning-based approaches have emerged as promising solutions for automated me... 详细信息
来源: 评论
Neuro-facial Fusion for Emotion AI: Improved Federated Learning GAN for Collaborative Multimodal Emotion Recognition
收藏 引用
IEIE Transactions on Smart Processing and Computing 2024年 第1期13卷 61-68页
作者: Saisanthiya, D. Supraja, P. Department of Networking and Communications Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India
In the context of artificial intelligence technology, an emotion recognition (ER) has numerous roles in human lives. On the other hand, the emotion recognition techniques most currently used perform poorly in recogniz... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
Informal settlement mapping from very high-resolution satellite data using a hybrid deep learning framework
收藏 引用
Neural Computing and Applications 2024年 第4期37卷 2877-2889页
作者: Prabhu, Ravi Department of Networking and Communications School of Computing SRM Institute of Science and Technology Tamilnadu Kattankulathur Chennai India
Informal settlements are becoming increasingly common in the global south, and their locations are often inaccurately represented in government statistics and maps. In remote sensing (RS), classifying informal settlem... 详细信息
来源: 评论
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 989-1000页
作者: Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita Department of Computer Science and Engineering Manipal Institute of Technology BengaluruManipal Academy of Higher EducationManipal576104KarnatakaIndia Department of Computer Science&Engineering ICFAI UniversityAgartala799210India Department of Computer Science&Engineering Central Institute of TechnologyKokrajhar783370India
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the... 详细信息
来源: 评论
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3331-3345页
作者: Das, Sangjukta Singh, Maheshwari Prasad Namasudra, Suyel Department of Computer Science and Engineering National Institute of Technology Patna Bihar India Department of Computer Science and Engineering National Institute of Technology Agartala Tripura India
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In... 详细信息
来源: 评论
An efficient optimal load balancing algorithm for distributed file systems in cloud environment
收藏 引用
International Journal of networking and Virtual Organisations 2024年 第2期30卷 134-151页
作者: Nebagiri, Manjula H. Latha, P.H. Department of Computer Science Atria Institute of Technology Bengaluru India Department of Information Science Sambhram Institute of Technology Bengaluru India
Efficient operations in distributed environments can be obtained by load balancing (LB). LB has turned out to be a vital and interesting research area with respect to the cloud owing to the swift augmentation of cloud... 详细信息
来源: 评论