咨询与建议

限定检索结果

文献类型

  • 284 篇 会议
  • 150 篇 期刊文献

馆藏范围

  • 434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 222 篇 工学
    • 158 篇 计算机科学与技术...
    • 126 篇 软件工程
    • 56 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 光学工程
    • 32 篇 电气工程
    • 32 篇 控制科学与工程
    • 28 篇 生物医学工程(可授...
    • 26 篇 电子科学与技术(可...
    • 24 篇 化学工程与技术
    • 17 篇 动力工程及工程热...
    • 15 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 15 篇 网络空间安全
    • 14 篇 交通运输工程
    • 12 篇 机械工程
  • 138 篇 理学
    • 54 篇 物理学
    • 52 篇 数学
    • 38 篇 生物学
    • 26 篇 化学
    • 17 篇 统计学(可授理学、...
  • 56 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 21 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 34 篇 医学
    • 27 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 17 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 15 篇 法学
    • 14 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 9 篇 农学
  • 3 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 53 篇 accuracy
  • 32 篇 convolutional ne...
  • 31 篇 real-time system...
  • 29 篇 deep learning
  • 25 篇 feature extracti...
  • 22 篇 machine learning
  • 19 篇 internet of thin...
  • 19 篇 training
  • 16 篇 data models
  • 15 篇 security
  • 14 篇 magnetic resonan...
  • 14 篇 adaptation model...
  • 13 篇 computational mo...
  • 13 篇 predictive model...
  • 11 篇 reliability
  • 11 篇 optimization
  • 11 篇 artificial intel...
  • 11 篇 blockchains
  • 10 篇 machine learning...
  • 9 篇 support vector m...

机构

  • 12 篇 department of co...
  • 11 篇 south china univ...
  • 10 篇 key laboratory o...
  • 9 篇 information tech...
  • 9 篇 department of co...
  • 8 篇 school of comput...
  • 8 篇 department of bi...
  • 7 篇 department of cs...
  • 7 篇 department of ec...
  • 7 篇 china mobile gro...
  • 6 篇 infn sezione di ...
  • 6 篇 department of el...
  • 6 篇 institute for as...
  • 6 篇 jodrell bank cen...
  • 6 篇 icsc - centro na...
  • 6 篇 inaf-osservatori...
  • 6 篇 vel tech rangara...
  • 6 篇 peking universit...
  • 6 篇 department of co...
  • 6 篇 inaf-osservatori...

作者

  • 15 篇 guo di
  • 15 篇 qu xiaobo
  • 11 篇 wang zi
  • 7 篇 qian chen
  • 7 篇 zhou yirong
  • 6 篇 keihänen e.
  • 6 篇 da silva a.
  • 6 篇 carbone c.
  • 6 篇 renzi a.
  • 6 篇 stanco l.
  • 6 篇 meneghetti m.
  • 6 篇 brescia m.
  • 6 篇 shanmugasundaram...
  • 6 篇 kurki-suonio h.
  • 6 篇 moscardini l.
  • 6 篇 mansutti o.
  • 6 篇 farina m.
  • 6 篇 gillis b.
  • 6 篇 polenta g.
  • 6 篇 courbin f.

语言

  • 383 篇 英文
  • 48 篇 其他
  • 1 篇 中文
检索条件"机构=Big Data Technology R&D Department"
434 条 记 录,以下是231-240 订阅
排序:
AI Governance in the Context of the EU AI Act: A Bibliometric and Literature review Approach
arXiv
收藏 引用
arXiv 2025年
作者: Kim, Byeong-Je Jeong, Seunghoo Cho, Bong-Kyung Chung, Ji-Bum The Institute of Social Data Science Pohang University of Science and Technology Pohang Korea Republic of Division of Advanced Nuclear Engineering Pohang University of Science and Technology Pohang Korea Republic of R&D Planning Strategy Division Korea Railroad Research Institute Uiwang Korea Republic of Strategy Group INTERX Seoul Korea Republic of Department of Civil Urban Earth and Environmental Engineering Ulsan National Institute of Science and Technology Ulsan Korea Republic of
The rapid advancement of artificial intelligence (AI) has brought about significant societal changes, necessitating robust AI governance frameworks. This study analyzed the research trends in AI governance within the ...
来源: 评论
Intrusion detection based on phishing detection with machine learning
收藏 引用
Measurement: Sensors 2024年 31卷
作者: Jayaraj, r. Pushpalatha, A. Sangeetha, K. Kamaleshwar, T. Udhaya Shree, S. damodaran, deepa Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur TN Chennai India M.Tech Computer Science and Engineering Sri Krishna College of Engineering and Technology TN Coimbatore India Department of Computer Science and Engineering Panimalar Engineering College Tamil Nadu Chennai India Department of Computer Science and Engineering Vel Tech Dr. Rangarajan Dr.Sagunthala R&D Institute of Science and Technology TN Chennai India Department of Computer Science and Engineering Alpha College of Engineering and Technology Puducherry India VITBS Vellore Institute of Technology Chennai Campus TN India
Machine learning technique which uses artificial neural networks to learn representations. Phishing is a form of fraud in which the attacker tries to learn credential information from the websites. Web phishing is to ... 详细信息
来源: 评论
Cryptographic Protocols for Securing Internet of Things (IoT)
Cryptographic Protocols for Securing Internet of Things (IoT...
收藏 引用
International Conference on Computing and Networking technology (ICCNT)
作者: B. Manimekala T. Aravind T. Sounderrajan V. rajakumareswaran Krishnaveni Kondreddi K. Mohanambal Department of Computer Science Christ University Yeshwanthpur Bengaluru Department of CSE School of Computing Vel TecRangarajanDr.Sagunthala R&D Institute of Science and Technology Department of AI and Data Science Erode Sengunthar Engineering College Thuduppathi Tamil Nadu India Department of Computer Science and Design Erode Sengunthar Engineering College Thuduppathi Tamil Nadu India Electrical and Electronics Engineering Chaitanya Bharathi Institute of Technology Gandipet Ranga Reddy Telangana India Department of Computer Science and Engineering Bannariamman Institute of Technology Sathyamangalam
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic sta... 详细信息
来源: 评论
UQSA - an r-package for uncertainty quantification and sensitivity analysis for biochemical reaction network models
arXiv
收藏 引用
arXiv 2023年
作者: Kramer, Andrei Milinanni, Federica Nyquist, Pierre Jauhiainen, Alexandra Eriksson, Olivia Science for Life Laboratory Department of Neuroscience Karolinska Institute Solna Sweden Department of Mathematics KTH Royal Institute of Technology Stockholm Sweden Early Biometrics and Statistical Innovation Data Science & AI BioPharmaceuticals R&D AstraZeneca Gothenburg Sweden Science for Life Laboratory School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Sweden
We present an r-package developed for modeling of biochemical reaction networks that especially includes tools for uncertainty quantification and sensitivity analysis. Estimating parameters and quantifying their uncer... 详细信息
来源: 评论
Spectrum Aware Unequal Clustering with route Selection Protocol for Energy Efficient Cognitive radio Wireless Sensor Networks
Spectrum Aware Unequal Clustering with Route Selection Proto...
收藏 引用
Augmented Intelligence and Sustainable Systems (ICAISS), International Conference on
作者: Arthi. A Chinmaya Kumar Nayak Arunmurugan Subbaiyan M. Muthalakshmi Srimathi S Venkatesh p Department of Artificial Intelligence and Data Science Rajalakshmi Institute of Technology Chennai Faculty of Emerging Technologies Sri Sri University Sri Sri Vihar Odisha ECE Periyar Maniammai Institute of Science & Technology Thanjavur Tamilnadu India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Bio Technology Saveetha School of Engineering SIMATS Chennai Tamilnadu India Department of ECE Ramco Institute of Technology Rajapalayam
Spectrum awareness with energy conservation is a main prerequisite in Cognitive radio Sensor Networks (CrSN) as the sensor nodes (SNs) operate in physically unattended areas and are energy constrained. Cluster based r...
来源: 评论
Advancements in Cybersecurity Using deep Learning Techniques Attack detection for Trojan Horses
Advancements in Cybersecurity Using Deep Learning Techniques...
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Hosanna Princye P Ahila A A. Anna Lakshmi N. ragavendran K. E. Purushothaman G. Uma Maheswari r. Saravanakumar Department of Electronics and Communication Engineering Sri Sairam College of Engineering Bangalore Anekal India Department of Information Technology R.M.K. Engineering College Chennai Tamil Nadu India Department of Artificial Intelligence and Data Science Engineering RMK College of Engineering and Technology Chennai Tamil Nadu India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Tamil Nadu India Department of Computer Science and Engineering RMK College of Engineering and Technology Chennai Tamil Nadu India Software Analyst Iconix Software Solution Tirunelveli Tamil Nadu India
Today's computer networks are threatened by Trojan horse assaults and other cybersecurity dangers. We propose and evaluate deep learning methods using the Kaggle-hosted Trojan detection dataset to detect Trojan ho... 详细信息
来源: 评论
Masked Motion Encoding for Self-Supervised Video representation Learning
arXiv
收藏 引用
arXiv 2022年
作者: Sun, Xinyu Chen, Peihao Chen, Liangwei Li, Changhao Li, Thomas H. Tan, Mingkui Gan, Chuang South China University of Technology China Information Technology R&d Innovation Center Peking University China UMass Amherst United States MIT-IBM Watson Ai Lab United States Key Laboratory of Big Data and Intelligent Robot Ministry of Education Peking University Shenzhen Graduate School China
How to learn discriminative video representation from unlabeled videos is challenging but crucial for video analysis. The latest attempts seek to learn a representation model by predicting the appearance contents in t... 详细信息
来源: 评论
Weakly-Supervised Multi-Granularity Map Learning for Vision-and-Language Navigation
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Peihao Ji, dongyu Lin, Kunyang Zeng, runhao Li, Thomas H. Tan, Mingkui Gan, Chuang South China University of Technology China Pazhou Laboratory China MIT-IBM Watson Ai Lab United States UMass Amherst United States Shenzhen University China Information Technology R&d Innovation Center of Peking University China Key Laboratory of Big Data and Intelligent Robot Ministry of Education China
We address a practical yet challenging problem of training robot agents to navigate in an environment following a path described by some language instructions. The instructions often contain descriptions of objects in... 详细信息
来源: 评论
Sign Language recognition Using Improved Seagull Optimization Algorithm with deep Learning Model
Sign Language Recognition Using Improved Seagull Optimizatio...
收藏 引用
Intelligent Cyber Physical Systems and Internet of Things (ICoICI), International Conference on
作者: r. Sivaraman S Santiago K. Chinnathambi Swagata Sarkar Sangeethaa SN Srimathi S Department of Mathematics Dwaraka Doss Goverdhan Doss Vaishnav College Chennai Tamil Nadu India Department of Computer Science St. Joseph's College (Autonomous) Trichy Computing Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Artificial intelligence and Data Science Sri Sairam Engineering College Chennai Computer Science & Engineering Bannari Amman Institute of Technology Department of Bio Technology Saveetha School of Engineering SIMATS Chennai Tamilnadu India
Sign Language recognition (SLr) covers the ability to translate Sign Language (SL) signals into written or spoken languages. This technique is useful for hearing-impaired people by offering them an effective method to... 详细信息
来源: 评论
Enhancing Speech recognition for Hearing-Impaired Individuals Using deep Learning Models
Enhancing Speech Recognition for Hearing-Impaired Individual...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: K. Kalaiarasi Winson Medidhi Niresh Kumar S S. Thenappan r. Sathiyaseelan Mohana Sundaram K Department of ECE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Department of CSE(Data Science) Prasad V. Potluri Siddhartha Institute of Technology Kanuru Vijayawada Andhra Pradesh India Department of CSE St. Joseph's College of Engineering OMR Chennai Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai Department of Computer Science Engineering Arunai Engineering College Thiruvannamalai Tamil Nadu India Department of Computer Science and Engineering R.M.D. Engineering College Kavaraipettai Thiruvallur India
This study examines the constraints of current methodologies, specifically in diverse acoustic environments, to surmount the obstacles associated with speech recognition for individuals with hearing impairments. Conve... 详细信息
来源: 评论