咨询与建议

限定检索结果

文献类型

  • 1,020 篇 会议
  • 37 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 1,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 673 篇 工学
    • 441 篇 计算机科学与技术...
    • 236 篇 软件工程
    • 194 篇 电气工程
    • 191 篇 信息与通信工程
    • 98 篇 控制科学与工程
    • 60 篇 电子科学与技术(可...
    • 52 篇 生物工程
    • 51 篇 仪器科学与技术
    • 39 篇 光学工程
    • 39 篇 生物医学工程(可授...
    • 34 篇 动力工程及工程热...
    • 31 篇 机械工程
    • 30 篇 材料科学与工程(可...
    • 20 篇 化学工程与技术
    • 20 篇 安全科学与工程
    • 18 篇 交通运输工程
    • 16 篇 网络空间安全
  • 308 篇 理学
    • 185 篇 物理学
    • 80 篇 数学
    • 54 篇 生物学
    • 27 篇 系统科学
    • 26 篇 化学
    • 26 篇 统计学(可授理学、...
  • 79 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 54 篇 医学
    • 47 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 22 篇 公共卫生与预防医...
  • 22 篇 法学
    • 15 篇 社会学
  • 11 篇 农学
  • 7 篇 经济学
  • 3 篇 文学
  • 1 篇 教育学

主题

  • 71 篇 internet of thin...
  • 63 篇 cloud computing
  • 44 篇 machine learning
  • 42 篇 computational mo...
  • 40 篇 machine learning...
  • 38 篇 edge computing
  • 35 篇 real-time system...
  • 30 篇 performance eval...
  • 28 篇 quantum computin...
  • 27 篇 security
  • 26 篇 heuristic algori...
  • 25 篇 prediction algor...
  • 25 篇 accuracy
  • 22 篇 computer archite...
  • 22 篇 wireless sensor ...
  • 21 篇 sensors
  • 20 篇 deep learning
  • 20 篇 photonic band ga...
  • 20 篇 photonics
  • 20 篇 mobile computing

机构

  • 9 篇 lovely professio...
  • 8 篇 institute of aer...
  • 4 篇 chitkara univers...
  • 4 篇 the islamic univ...
  • 4 篇 bauman moscow st...
  • 4 篇 department of bi...
  • 4 篇 acad sinica shan...
  • 4 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 centre of resear...
  • 3 篇 natl res tomsk s...
  • 3 篇 moscow
  • 3 篇 ire nas of ukrai...
  • 3 篇 department of el...
  • 3 篇 national researc...
  • 3 篇 department of ec...
  • 3 篇 department of cs...
  • 3 篇 department of ap...
  • 3 篇 department of co...
  • 3 篇 mirea – russian ...

作者

  • 5 篇 krishnamoorthy a...
  • 5 篇 alam ms
  • 5 篇 qian f
  • 5 篇 zheng xuezhe
  • 4 篇 tsao shyh-lin
  • 4 篇 li guoliang
  • 4 篇 feng dazeng
  • 4 篇 pronin c.b.
  • 4 篇 chiang chia-chin
  • 4 篇 lexau jon
  • 4 篇 asghari mehdi
  • 4 篇 li gq
  • 4 篇 ho ron
  • 4 篇 yao jin
  • 4 篇 luo ying
  • 4 篇 ostroukh a.v.
  • 4 篇 raj kannan
  • 4 篇 lindenstruth v.
  • 3 篇 ploskon m.
  • 3 篇 patil dinesh

语言

  • 1,015 篇 英文
  • 46 篇 其他
  • 7 篇 中文
检索条件"任意字段=Conference on Photonic Devices and Algorithms for Computing V"
1067 条 记 录,以下是71-80 订阅
排序:
Automatic Creation of Ontologies and Rules from ML Models for Access Control in IoT  15
Automatic Creation of Ontologies and Rules from ML Models fo...
收藏 引用
15th International conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Tyagi, Surendra Jinwala, Devesh C. Bhattacharjee, Subhasis Computer Science & Engineering Indian Institute of Technology Jammu India Computer Science & Engineering S. V. National Institute of Technology Surat India
Ontologies have been increasingly used in designing access control policies in Internet of Things (IoT) systems. Machine Learning (ML) has been extensively used to identify patterns from existing data. Trained ML mode... 详细信息
来源: 评论
Optimizing Energy Efficiency in 5G Networks: Integrating Multi-Packet Reception with Reinforcement Learning and Genetic algorithms  8
Optimizing Energy Efficiency in 5G Networks: Integrating Mul...
收藏 引用
8th IEEE International conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Arun, v. Gowtham, A. Arul, U. Angeljulie, J. School of Computing Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Computing Technologies Tamil Nadu Kattankulathur India Madanapalle Andhra Pradesh Annamayya India Saveetha University Department of Computer Science and Engineering Tamil Nadu Chennai India Karpagam Academy of Higher Education Department of Cse Tamilnadu Coimbatore India
The rapidly expanding data demand and the explosion of connected devices require energy-efficient answers in 5G networks. This study proposes a three-pronged solution that integrates Multi-Packet Reception (MPR), Rein... 详细信息
来源: 评论
Preserving the Privacy in IoT Medical data in Edge computing using Modified AES Model with Discrete-Time Alternating Quantum Walk
Preserving the Privacy in IoT Medical data in Edge Computing...
收藏 引用
2023 International conference on Evolutionary algorithms and Soft computing Techniques, EASCT 2023
作者: Dileep, M.R. vineeth, L. Avula, Sashikanth Reddy Navaneeth, A.v. Nitte Meenakshi Institute of Technology Department of Master of Computer Applications Bengaluru India
The rapid growth of IoT edge devices has caused in an unprecedented explosion of data volume. Extremely often, the created data is gathered and disseminated via edge-based IoT structures. When hostile IoT devices make... 详细信息
来源: 评论
Advanced Encryption Techniques for Protecting Sensitive Data in Multi Cloud Architecture: A Security First Approach  1
Advanced Encryption Techniques for Protecting Sensitive Data...
收藏 引用
1st International conference on Advances in Computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Anand, v. Saravanan, N. Mahendiran, A. School of Computing SASTRA Deemed University Tamil Nadu Thanjavur India Srinivasa Ramanujam Centre SASTRA Deemed University Tamil Nadu Kumbakonam India Thanthai Hans Roever College Tamil Nadu Perambalur India
'Cloud computing' refers to a broad range of computer ideas that include several PCs linked by a real-time transmission network, such the internet. Cloud computing is a new paradigm that has drawn a lot of att... 详细信息
来源: 评论
GesturesSpeak: An IoT-Based Gesture to Speech Translator  4
GesturesSpeak: An IoT-Based Gesture to Speech Translator
收藏 引用
4th IEEE International conference on Emerging Techniques in Computational Intelligence, ICETCI 2024
作者: Chakravarthi, Sangapu Sreenivasa Manogna, S.v.S. Reddy, Shenagapally Aashish Sountharrajan, S. Amrita School of Computing Amrita Vishwa Vidyapeetham Dept. of Cse Chennai India
Hand gestures serve as a natural and intuitive means for humans to communicate ideas and intents. For people with speaking or hearing disabilities, sign languages based on visual hand gestures are indispensable for th... 详细信息
来源: 评论
Optimizing Traffic Flow Using Quantum Annealing
Optimizing Traffic Flow Using Quantum Annealing
收藏 引用
2024 Intelligent Technologies and Electronic devices in vehicle and Road Transport Complex, TIRvED 2024
作者: Bogatyrev, v.A. Moskvin, v.S. Saint Petersburg State University of Aerospace Instrumentation St. Petersburg Russia ITMO University St. Petersburg Russia
This paper investigates the use of quantum annealing for optimizing traffic flow, serving as a case study for broader applications in network optimization tasks. We start by modeling the traffic network as a quantum s... 详细信息
来源: 评论
Human Activity Recognition using EfficientNet for Wearable Sensor Data
Human Activity Recognition using EfficientNet for Wearable S...
收藏 引用
2024 International conference on Communication, computing and Internet of Things, IC3IoT 2024
作者: Rahul Chiranjeevi, v. Murugan, B.S. Dhanasekaran, S. Senthil Pandi, S. Rajalakshmi Engineering College Department of CSE Chennai India M Kumarasamy College Of Engneering Department of CSE Karur India Kalasalingam Academy Of Research And Education Department of IT Krishnankoil India
Human Activity Recognition (HAR) has attracted considerable attention from researchers due to its broad implications in healthcare, smart environments, and entertainment. HAR involves the usage of sensor devices and t... 详细信息
来源: 评论
Securing Edge computing Environments with a Novel Chaos Theory-Based Lightweight Encryption Algorithm for Real-Time Data Protection  2
Securing Edge Computing Environments with a Novel Chaos Theo...
收藏 引用
2nd IEEE International conference on Integrated Intelligence and Communication Systems, ICIICS 2024
作者: vanitha, v. Saritha, G. Hemalatha, K. Sathish, P. Devi, P. Gayathri Department of of Computer Science and Engineering Kumaraguru College of Technology Coimbatore India Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Information Technology Sona College of Technology Salem India Nandha Engineering College Erode India Department of Electronics and Communication Engineering Panimalar Engineering College Chennai India
In the era of edge computing, securing data transmission has become paramount, especially given the real-time requirements and limited computational resources of edge devices. This study introduces a novel Chaos Theor... 详细信息
来源: 评论
Open Source Compiling for v1Model RMT Switch: Making Data Center Networking Innovation Accessible  15
Open Source Compiling for V1Model RMT Switch: Making Data Ce...
收藏 引用
IEEE/ACM 15th International conference on Utility and Cloud computing (UCC) / 9th International conference on Big Data computing, Applications and Technologies (BDCAT)
作者: Das Robin, Debobroto Khan, Javed I. Kent State Univ Kent OH 44242 USA
very few of the innovations in deep networking have seen data center scale implementation. Because, the Data Center network's extreme scale performance requires hardware implementation, which is only accessible to... 详细信息
来源: 评论
Accelerators in Embedded Systems for Machine Learning: A RISCv view  38
Accelerators in Embedded Systems for Machine Learning: A RIS...
收藏 引用
38th conference on Design of Circuits and Integrated Systems (DCIS)
作者: Sanchez-Flores, Alejandra Alvarez, Lluc Alorda-Ladaria, Bartomeu Univ Illes Balears Ind & Construct Eng Dept Palma De Mallorca Spain Univ Politecn Cataluna Barcelona Supercomp Ctr Barcelona Spain Univ Illes Balears Inst Inv Sanitaria IB IdisBa Inst Agro & Eco Agua INAGEA Ind & Construct Eng Dept Palma De Mallorca Spain
Embedded systems, which are mobile systems with IoT and constrained processing capability, have mostly functioned as a depiction of ubiquitous computing throughout the previous ten years. On the other hand, innovative... 详细信息
来源: 评论