咨询与建议

限定检索结果

文献类型

  • 13,988 篇 会议
  • 7,805 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 22,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,686 篇 工学
    • 10,615 篇 计算机科学与技术...
    • 8,789 篇 软件工程
    • 3,543 篇 信息与通信工程
    • 2,296 篇 控制科学与工程
    • 1,910 篇 生物工程
    • 1,692 篇 电气工程
    • 1,416 篇 生物医学工程(可授...
    • 1,190 篇 电子科学与技术(可...
    • 1,189 篇 光学工程
    • 891 篇 网络空间安全
    • 805 篇 机械工程
    • 713 篇 安全科学与工程
    • 651 篇 动力工程及工程热...
    • 628 篇 交通运输工程
    • 600 篇 仪器科学与技术
    • 561 篇 化学工程与技术
  • 6,957 篇 理学
    • 3,534 篇 数学
    • 2,101 篇 生物学
    • 1,812 篇 物理学
    • 1,233 篇 统计学(可授理学、...
    • 745 篇 系统科学
    • 674 篇 化学
  • 4,128 篇 管理学
    • 2,520 篇 管理科学与工程(可...
    • 1,821 篇 图书情报与档案管...
    • 1,084 篇 工商管理
  • 1,600 篇 医学
    • 1,238 篇 临床医学
    • 1,127 篇 基础医学(可授医学...
    • 844 篇 公共卫生与预防医...
    • 656 篇 药学(可授医学、理...
  • 866 篇 法学
    • 717 篇 社会学
  • 384 篇 经济学
  • 339 篇 农学
  • 245 篇 教育学
  • 192 篇 文学
  • 33 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 961 篇 deep learning
  • 875 篇 accuracy
  • 542 篇 computational mo...
  • 516 篇 machine learning
  • 472 篇 feature extracti...
  • 451 篇 training
  • 404 篇 real-time system...
  • 385 篇 predictive model...
  • 378 篇 internet of thin...
  • 323 篇 support vector m...
  • 321 篇 convolutional ne...
  • 285 篇 computer science
  • 278 篇 data models
  • 269 篇 semantics
  • 259 篇 optimization
  • 230 篇 neural networks
  • 223 篇 computer archite...
  • 220 篇 reliability
  • 219 篇 scalability
  • 209 篇 image segmentati...

机构

  • 267 篇 department of co...
  • 169 篇 school of comput...
  • 137 篇 school of comput...
  • 137 篇 school of comput...
  • 124 篇 department of co...
  • 118 篇 school of comput...
  • 114 篇 school of comput...
  • 112 篇 department of co...
  • 107 篇 department of co...
  • 103 篇 college of compu...
  • 103 篇 school of comput...
  • 101 篇 school of comput...
  • 101 篇 national enginee...
  • 100 篇 department of co...
  • 96 篇 north-west unive...
  • 95 篇 institut univers...
  • 93 篇 department of co...
  • 90 篇 infn sezione di ...
  • 87 篇 national centre ...
  • 85 篇 tno technical sc...

作者

  • 125 篇 niyato dusit
  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 calvo d.
  • 95 篇 chen a.
  • 91 篇 gal t.
  • 91 篇 bozza c.
  • 91 篇 díaz a.f.
  • 91 篇 boumaaza j.
  • 89 篇 coleiro a.
  • 87 篇 gozzini s.r.
  • 84 篇 zheng wei-shi
  • 83 篇 anjali t.
  • 83 篇 dallier r.
  • 71 篇 kalekin o.
  • 63 篇 anguita m.
  • 63 篇 boettcher m.
  • 59 篇 kulikovskiy v.
  • 59 篇 huang f.
  • 55 篇 benoit d.m.

语言

  • 15,935 篇 英文
  • 6,011 篇 其他
  • 179 篇 中文
  • 3 篇 法文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
22050 条 记 录,以下是4611-4620 订阅
Applications of Chaos Theory in Securing Nonlinear Signal Communication Networks
Applications of Chaos Theory in Securing Nonlinear Signal Co...
收藏 引用
2024 International Conference on Information science and Communications Technologies, ICISCT 2024
作者: Al-Samalek, Ahmed Saleh Kumar, Raman Alkhayyat, Ahmed Pareek, Shashank Kumar, Jatinder Dey, Protyay Al-Zahrawi University College Department of Medical Laboratory Technics Karbala Iraq School of Mechanical Engineering Rayat Bahra University Mohali India College of Technical Engineering The Islamic University Najaf Iraq Chandigarh University Department of Computer Science and Engineering Mohali India Chandigarh Engineering College Chandigarh Group of Colleges Department of Computer Science Engineering Punjab Mohali 140307 India Nims School of Computing Science and Artificial Intelligence Nims University Rajasthan Jaipur India
This paper examines the use of chaos theory towards the ensuring the securitoy of nonlinear signal communication networks. Chaos encryption is based on the given properties of the chaos: the minimized differences betw... 详细信息
来源: 评论
Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第2期4卷 268-281页
作者: Tian, Ye Pan, Jingwen Yang, Shangshang Zhang, Xingyi He, Shuping Jin, Yaochu Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230088 China Anhui University School of Computer Science and Technology Hefei230601 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s... 详细信息
来源: 评论
An Intelligent Approach for Intrusion Detection in Industrial Control System
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2049-2078页
作者: Adel Alkhalil Abdulaziz Aljaloud Diaa Uliyan Mohammed Altameemi Magdy Abdelrhman Yaser Altameemi Aakash Ahmad Romany Fouad Mansour Department of Information and Computer Science College of Computer Science and EngineeringUniversity of Ha’ilHa’il81481Saudi Arabia Applied College University of Ha’ilHa’il81481Saudi Arabia College of Education New Valley UniversityEl-Kharga72511Egypt College of Art University of Ha’ilHa’il81481Saudi Arabia School of Computing and Communications Lancaster UniversityLeipzig04109Germany College of Science New Valley UniversityEl-Kharga72511Egypt
Supervisory control and data acquisition(SCADA)systems are computer systems that gather and analyze real-time data,distributed control systems are specially designed automated control system that consists of geographi... 详细信息
来源: 评论
Machine Learning for Malware Detection: A Comprehensive Review of Visual, Textual and Network Traffic Features
Machine Learning for Malware Detection: A Comprehensive Revi...
收藏 引用
computing and Intelligent Reality Technologies (ICCIRT), International Conference on
作者: Jasmine Jolly V Ananthanarayanan Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Campus India Coimbatore India Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India
IoT devices, constrained by limited resources and weak security measures, are highly vulnerable to malware at- tacks. This review examines malware detection methods using textual, visual, and network traffic features,... 详细信息
来源: 评论
A Comparative Study of Clustering Algorithms in Mental Health Data Classification
A Comparative Study of Clustering Algorithms in Mental Healt...
收藏 引用
Innovative Trends in Information Technology (ICITIIT), International Conference on
作者: M Diviya K.B. Vaisshnavi Shashini V Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
In this research, we analyze the implementation of three different clustering algorithms to sort individuals over five common mental health conditions: Schizophrenia, Depression, Anxiety, Bipolar Disorder and Eating D... 详细信息
来源: 评论
Optimizing Urban Waste Collection Routes: Comparative Study of Shortest Path Algorithms
Optimizing Urban Waste Collection Routes: Comparative Study ...
收藏 引用
computing for Sustainability and Intelligent Future (COMP-SIF), International Conference on
作者: Chimakurthy Mounika Begum Kamalapuram Vigneswara Reddy Neeraja Sreebha Bhaskaran Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
Collection of waste is one of the important goals of Waste Management Unit (WMU), where collecting waste decreases the amount of time, expenses, and the impact of waste collectors on the environment. The work is to cr... 详细信息
来源: 评论
Design and analysis of key scheduling algorithm for symmetric cipher security
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第6期16卷 3991-3997页
作者: Tiwari, Vikas Kameswari, U. Surya Singh, Ajeet Saxena, Ashutosh Acharya Nagarjuna University Andhra Pradesh Guntur 522510 India C.R. Rao Advanced Institute of Mathematics Statistics and Computer Science University of Hyderabad Campus Telangana Hyderabad 500046 India Dept of Computer Science and Engineering Acharya Nagarjuna University Andhra Pradesh Guntur 522510 India School of Computing Science and Engineering Vellore Institute of Technology VIT Bhopal University Bhopal-Indore Highway Madhya Pradesh Bhopal 466114 India CMR Technical Campus Telangana Hyderabad 501401 India
The success and safety of block cipher systems heavily depend on how efficient and secure their Key Schedule Algorithms (KSAs) are, especially when fighting against cryptanalytic attacks. This paper proposes a novel K... 详细信息
来源: 评论
Decentralized Health: Federated Deep Learning for Cervical Cytology Image Segmentation  3rd
Decentralized Health: Federated Deep Learning for Cervical ...
收藏 引用
3rd International Conference on computing, Communication and Learning, CoCoLe 2024
作者: Rayvanth, N. Shreya Shree, S. Challa, Venkata Hemant Kumar Reddy Sharma, Vishwash Singh, Rimjhim Padam Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham Bengaluru India
Cervical cytology image segmentation is a crucial component in the automated analysis of cervical cytology screening. This research investigates the efficacy of federated learning against traditional learning methods ... 详细信息
来源: 评论
Classification of Structures and Monuments based on Indian Architectural Styles
Classification of Structures and Monuments based on Indian A...
收藏 引用
International Symposium on Advanced computing and Communication (ISACC)
作者: Ananya Ganapathi Deivanai Saravanan Sneha T Raghavan Jyotsna C Aiswariya Milan K Dept. of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
Recognizing architectural styles is essential for preserving & understanding cultural heritage, as it helps categorize & document diverse structures, highlighting their historical, cultural & artistic valu... 详细信息
来源: 评论
Enhanced Image Captioning Using CNN and BLIP Models
Enhanced Image Captioning Using CNN and BLIP Models
收藏 引用
Multi-Agent Systems for Collaborative Intelligence (ICMSCI), International Conference on
作者: Vambara Tejesh Supriya M. Dept. of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham India
This research focuses on generating image captions using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) models. As deep learning advances, the availability of large datasets and increased comput... 详细信息
来源: 评论