咨询与建议

限定检索结果

文献类型

  • 1,020 篇 会议
  • 37 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 1,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 673 篇 工学
    • 441 篇 计算机科学与技术...
    • 236 篇 软件工程
    • 194 篇 电气工程
    • 191 篇 信息与通信工程
    • 98 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 51 篇 仪器科学与技术
    • 39 篇 光学工程
    • 39 篇 生物医学工程(可授...
    • 34 篇 动力工程及工程热...
    • 31 篇 机械工程
    • 30 篇 材料科学与工程(可...
    • 20 篇 化学工程与技术
    • 20 篇 安全科学与工程
    • 18 篇 交通运输工程
    • 16 篇 网络空间安全
  • 308 篇 理学
    • 185 篇 物理学
    • 80 篇 数学
    • 54 篇 生物学
    • 27 篇 系统科学
    • 26 篇 化学
    • 26 篇 统计学(可授理学、...
  • 79 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 54 篇 医学
    • 47 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 22 篇 公共卫生与预防医...
  • 22 篇 法学
    • 15 篇 社会学
  • 11 篇 农学
  • 7 篇 经济学
  • 3 篇 文学
  • 1 篇 教育学

主题

  • 71 篇 internet of thin...
  • 63 篇 cloud computing
  • 44 篇 machine learning
  • 42 篇 computational mo...
  • 40 篇 machine learning...
  • 38 篇 edge computing
  • 35 篇 real-time system...
  • 30 篇 performance eval...
  • 28 篇 quantum computin...
  • 27 篇 security
  • 26 篇 heuristic algori...
  • 25 篇 prediction algor...
  • 25 篇 accuracy
  • 22 篇 computer archite...
  • 22 篇 wireless sensor ...
  • 21 篇 sensors
  • 20 篇 deep learning
  • 20 篇 photonic band ga...
  • 20 篇 photonics
  • 20 篇 mobile computing

机构

  • 9 篇 lovely professio...
  • 8 篇 institute of aer...
  • 4 篇 chitkara univers...
  • 4 篇 the islamic univ...
  • 4 篇 bauman moscow st...
  • 4 篇 department of bi...
  • 4 篇 acad sinica shan...
  • 4 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 centre of resear...
  • 3 篇 natl res tomsk s...
  • 3 篇 moscow
  • 3 篇 ire nas of ukrai...
  • 3 篇 department of el...
  • 3 篇 national researc...
  • 3 篇 department of ec...
  • 3 篇 department of cs...
  • 3 篇 department of ap...
  • 3 篇 department of co...
  • 3 篇 mirea – russian ...

作者

  • 5 篇 krishnamoorthy a...
  • 5 篇 alam ms
  • 5 篇 qian f
  • 5 篇 zheng xuezhe
  • 4 篇 tsao shyh-lin
  • 4 篇 li guoliang
  • 4 篇 feng dazeng
  • 4 篇 pronin c.b.
  • 4 篇 chiang chia-chin
  • 4 篇 lexau jon
  • 4 篇 asghari mehdi
  • 4 篇 li gq
  • 4 篇 ho ron
  • 4 篇 yao jin
  • 4 篇 luo ying
  • 4 篇 ostroukh a.v.
  • 4 篇 raj kannan
  • 4 篇 lindenstruth v.
  • 3 篇 ploskon m.
  • 3 篇 patil dinesh

语言

  • 1,015 篇 英文
  • 46 篇 其他
  • 7 篇 中文
检索条件"任意字段=Conference on Photonic Devices and Algorithms for Computing V"
1067 条 记 录,以下是111-120 订阅
排序:
Quantum and quantum-inspired optimization for solving the minimum bin packing problem  12
Quantum and quantum-inspired optimization for solving the mi...
收藏 引用
12th International conference on Mathematical Modeling in Physical Sciences, IC-MSQUARE 2023
作者: Bozhedarov, A.A. Usmanov, S.R. Salakhov, G.v. Boev, A.S. Kiktenko, E.O. Fedorov, A.K. Russian Quantum Center Skolkovo Moscow Russia
Quantum computing devices are believed to be powerful in solving hard computational tasks, in particular, combinatorial optimization problems. In the present work, we consider a particular type of the minimum bin pack... 详细信息
来源: 评论
The FPGA Implementation of Pseudorandom Word Generation algorithms  12
The FPGA Implementation of Pseudorandom Word Generation Algo...
收藏 引用
12th IEEE International conference on Intelligent Data Acquisition and Advanced computing Systems: Technology and Applications, IDAACS 2023
作者: Opanasenko, volodymyr Zavyalov, Stanislav V.M. Glushkov Institute of Cybernetics of Nas of Ukraine Department of Microprocessor Devices Kyiv03187 Ukraine Radionix Limited Company Kyiv03187 Ukraine
This paper introduces a novel FPGA-based hardware implementation of a pseudorandom word (PSW) generator. Using the FPGA reconfiguration property, the proposed approach allows you to change the algorithms and replace t... 详细信息
来源: 评论
Data scientific approach to detect the DoS attack, Probe attack, R2L attack and U2R attack  2
Data scientific approach to detect the DoS attack, Probe att...
收藏 引用
2nd IEEE International conference on Advances in computing, Communication and Applied Informatics, ACCAI 2023
作者: Sakthiprabha, R. Sivasundarapandian, S. Aranganathan, A. vedanarayanan, v. Rajinikanth, E. Gomathi, T. Sathyabama Institute of Science and Technology Department of ECE Chennai India Aurora's Technological and Research Institute Department of ECE Hyderabad India
Data reliability is compromised by various cyber-attacks. Computational infrastructure is completely disturbed, broken or guided by these attacks. The current status of cyberspace foretells uncertainty for the future ... 详细信息
来源: 评论
Secure federated machine learning for distributed spectrum sensing in communication networks  5
Secure federated machine learning for distributed spectrum s...
收藏 引用
conference on Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications v
作者: Searle, Richard Gururaj, Prabhanjan Gaikwad, Shreyas Kannur, Kiran Fortanix Inc 3910 Freedom CircleSuite 104 Santa Clara CA 95054 USA
Federated machine learning (FML) has proved a useful technique for training of artificial intelligence and machine learning (AI/ML) models, using data that is distributed among different constituents of a network whic... 详细信息
来源: 评论
A Robust and Efficient Computational Offloading and Task Scheduling Model in Mobile Cloud computing
A Robust and Efficient Computational Offloading and Task Sch...
收藏 引用
2023 International conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering, ICECONF 2023
作者: Chandra, I. Karthikeyan, K.v. Revathi, v. Shankar, K. Tamilselvi, M. Arunkumar, J.R. Department of Computer and Communication Engineering Rajalakshmi Institute of Technology Chennai India Department of Electronics and Communication Engineering Sathyabama Institute of Science and Technology Chennai India Department of Information Technology Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College Chennai India Department of Computer Science and Engineering Easwari Engineering College Chennai India Department of Electronics and Communication Engineering Srm Institute of Technology Ramapuram Campus Chennai India Department of Computer Science and Engineering Modern Institute of Technology and Research Centre Rajasthan Alwar India
Mobile cloud computing (MCC) has the potential to greatly enhance the computational capabilities of smart mobile devices (SMDs) and reduce their energy consumption by offloading compute-intensive workloads from SMDs o... 详细信息
来源: 评论
Using AI and IoT at the Edge of the network  8
Using AI and IoT at the Edge of the network
收藏 引用
8th International conference on Optimization and Applications, ICOA 2022
作者: Lakrouni, Sanaa Sebgui, Marouane Bah, Slimane Mohamedia School of Engineers University Mohammed v in Rabat Smart Communication Research Team Morocco
In recent years, IoT devices have been widely used in a variety of sectors such as industry, smart farming, and smart homes. Its application requires performing high computational analysis in real-time. The research e... 详细信息
来源: 评论
Exploring State-of-the-Art Cryptography: A Systematic Exploration of Advanced Approaches for IoT Device Authentication  2
Exploring State-of-the-Art Cryptography: A Systematic Explor...
收藏 引用
2nd International conference on Ambient Intelligence in Health Care, ICAIHC 2023
作者: Archana, v. Kwatra, Chetna vaid School of Computer Science and Engineering Lovely professional university Phagwara India
Security of IoT devices has become a major issue since it started expanding. Authentication is the key component for the security of IOT devices. But using the traditional cryptographic security methods can be a way m... 详细信息
来源: 评论
Development and Evaluation of a Speech-Recognized voice Bot
Development and Evaluation of a Speech-Recognized Voice Bot
收藏 引用
2023 International conference on Innovative computing, Intelligent Communication and Smart Electrical Systems, ICSES 2023
作者: Babu, K. Roobini, M.S. Gopirajan, P.v. Sadagopan, S. Anand, Rishi Rohit, B.S. SRM Institute of Science & Technology Dept of Computational Intelligence India Sathyabama Institute of Science & Technology Dept of Computer Science & Engineering India
In recent years, there have been significant advancements in speech recognition technology, which have opened up new possibilities for voice-controlled applications and devices. This report presents the design, develo... 详细信息
来源: 评论
Efficient Hierarchical State vector Simulation of Quantum Circuits via Acyclic Graph Partitioning
Efficient Hierarchical State Vector Simulation of Quantum Ci...
收藏 引用
IEEE International conference on Cluster computing (CLUSTER)
作者: Fang, Bo Ozkaya, M. Yusuf Li, Ang Catalyurek, Umit v. Krishnamoorthy, Sriram Pacific Northwest Natl Lab Richland WA 99352 USA Amazon Web Serv Seattle WA USA Georgia Inst Technol Sch Computat Sci & Engn Atlanta GA 30332 USA
Early but promising results in quantum computing have been enabled by the concurrent development of quantum algorithms, devices, and materials. Classical simulation of quantum programs has enabled the design and analy... 详细信息
来源: 评论
Secure Smart Home Data by Using Blockchain Technology with Hash Algorithm  13
Secure Smart Home Data by Using Blockchain Technology with H...
收藏 引用
13th IEEE International conference on Communication Systems and Network Technologies, CSNT 2024
作者: Lukesh, S. Jagadesh, J. Pandimurugan, v. School of Computing Department of Networking and Communications Chennai India
The project 'Secure Smart Home Data by Using Blockchain Technology with Hash Algorithm' focuses on incorporating two timeless technological concepts that is, blockchain and secure hash algorithms. Smart home i... 详细信息
来源: 评论