咨询与建议

限定检索结果

文献类型

  • 1,110 篇 会议
  • 249 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 605 篇 工学
    • 416 篇 计算机科学与技术...
    • 320 篇 软件工程
    • 132 篇 信息与通信工程
    • 103 篇 电气工程
    • 103 篇 电子科学与技术(可...
    • 83 篇 控制科学与工程
    • 58 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 48 篇 生物工程
    • 46 篇 机械工程
    • 35 篇 光学工程
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
    • 28 篇 化学工程与技术
    • 26 篇 环境科学与工程(可...
    • 21 篇 材料科学与工程(可...
    • 20 篇 力学(可授工学、理...
    • 19 篇 核科学与技术
  • 336 篇 理学
    • 149 篇 物理学
    • 121 篇 数学
    • 66 篇 生物学
    • 43 篇 化学
    • 28 篇 统计学(可授理学、...
    • 27 篇 系统科学
  • 145 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 34 篇 工商管理
  • 49 篇 医学
    • 44 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 19 篇 法学
  • 18 篇 农学
  • 15 篇 经济学
  • 13 篇 教育学
  • 7 篇 文学
  • 2 篇 军事学

主题

  • 46 篇 feature extracti...
  • 45 篇 computer archite...
  • 44 篇 databases
  • 44 篇 protocols
  • 42 篇 servers
  • 39 篇 monitoring
  • 39 篇 hardware
  • 37 篇 computational mo...
  • 37 篇 training
  • 32 篇 accuracy
  • 31 篇 field programmab...
  • 30 篇 standards
  • 28 篇 software
  • 26 篇 security
  • 25 篇 wireless sensor ...
  • 25 篇 cloud computing
  • 22 篇 conferences
  • 22 篇 logic gates
  • 22 篇 internet
  • 21 篇 support vector m...

机构

  • 70 篇 centre for devel...
  • 67 篇 centre for devel...
  • 51 篇 centre for devel...
  • 48 篇 centre for devel...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 39 篇 dipartimento di ...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 37 篇 faculté des scie...
  • 37 篇 department of mo...
  • 37 篇 department of ph...
  • 37 篇 department of ph...
  • 37 篇 department of ph...
  • 37 篇 research center ...
  • 37 篇 kirchhoff-instit...

作者

  • 35 篇 nabarun bhattach...
  • 31 篇 a. t. law
  • 31 篇 c. alexa
  • 31 篇 j. m. izen
  • 31 篇 s. veneziano
  • 31 篇 d. di valentino
  • 31 篇 g. bella
  • 31 篇 j. strandberg
  • 31 篇 d. calvet
  • 31 篇 c. amelung
  • 31 篇 n. orlando
  • 31 篇 c. gumpert
  • 31 篇 h. a. gordon
  • 31 篇 y. tayalati
  • 31 篇 g. spigo
  • 31 篇 v. chiarella
  • 31 篇 f. siegert
  • 31 篇 a. c. könig
  • 31 篇 a. dimitrievska
  • 31 篇 f. deliot

语言

  • 1,331 篇 英文
  • 30 篇 其他
  • 16 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Centre For Development of Advanced Computing"
1377 条 记 录,以下是261-270 订阅
排序:
Modified Phase Shift Control for Dual Active Bridge to achieve switching loss reduction in the High Voltage side active converter
Modified Phase Shift Control for Dual Active Bridge to achie...
收藏 引用
International Conference on Power Electronic Drives
作者: P Ganesan Manju R Kamalesh Hatua Centre for Development of Advanced Computing Thiruvananthapuram India Indian Institute of Technology Madras Chennai India
The Dual Active Bridge (DAB) is getting greater attention in the research area after the introduction of Wide Band Gap devices for high frequency power converters. The DAB is one of the bidirectional converters in the... 详细信息
来源: 评论
Detection Of Malignant Cancerous Nuclei Using Quantum Hadamard Edge Detection Algorithm
Detection Of Malignant Cancerous Nuclei Using Quantum Hadama...
收藏 引用
IEEE Punecon
作者: Arsheyee Shahapure Rajat Gupta Prathamesh Bhole Vethonulu Losu Madhura Kulkarni Anindita Banerjee Dept. of Computer Science MIT-WPU Pune India Centre for Development of Advanced Computing Pune Maharashtra India Centre for Translational Cancer Research Prashanti Cancer Care Mission & IISER Pune Maharashtra India
Cancer is a hazardous ailment, becoming even more ominous due to its capacity to remain unnoticed. The significance of cancer research lies in its role in enhancing both the detection and treatment of this disease, ul... 详细信息
来源: 评论
A Novel Forensic Methodology for SQLite Database Carving
A Novel Forensic Methodology for SQLite Database Carving
收藏 引用
IEEE India Conference (INDICON)
作者: Gargee Handique Satheesh Kumar S Jinu Kumar S V Priyanka V S Cyber Security Group(CSG) Centre for Development of Advanced Computing(C-DAC) Thiruvananthapuram India
The cellphones utilize SQLite to store communication as well as other data records. It is a type of small database software that is commonly found in embedded systems and application softwares. In recent years, there ... 详细信息
来源: 评论
A Forensic Methodology for the Analysis of Twitter Application in Android Devices
A Forensic Methodology for the Analysis of Twitter Applicati...
收藏 引用
IEEE Punecon
作者: Priyanka V S Satheesh Kumar S Cyber Security Group(CSG) Centre for Development of Advanced Computing(C-DAC) Thiruvananthapuram India
Twitter is one of the major social networking platforms used by millions of users every day. On every second, around 6000 tweets are sent through Twitter. The forensic analysis of Twitter application is of utmost impo... 详细信息
来源: 评论
Design and development of Industrial Vision Sensor (IVIS) for Next Generation Industrial Applications
Design and Development of Industrial Vision Sensor (IVIS) fo...
收藏 引用
IEEE India Conference (INDICON)
作者: Jerry Daniel J Lijo Thomas Lajitha C S Jacob T Mathew Jithin S Anju Mohan Kichu S Kumar Control & Instrumentation Group Centre for Development of Advanced Computing (C-DAC) Thiruvananthapuram Kerala India
Industrial automation is undergoing a tremendous change due to the proliferation of the concepts, the Internet of Things (IoT), Cyber-Physical Systems (CPS) and tactile internet, which enables the interconnections of ... 详细信息
来源: 评论
Identifying Sybil Attacks in Blockchain Networks through Behavioral Analysis and Zero Knowledge Proof implementations
Identifying Sybil Attacks in Blockchain Networks through Beh...
收藏 引用
Data, Computation and Communication (ICDCC), International Conference on
作者: R Giridhar Reddy Pushpinder Singh Pateja Adarsh Patel Gopinath Palaniappan Balaji Rajendran School of Computer Science and Engineering Vellore Institute of Technology Bhopal Bhopal India Centre for Development of Advanced Computing (C-DAC) Bangalore Resilient Information Systems Engineering Bengaluru India
Blockchain technology is significant because it makes data sharing between several parties safe, transparent, and effective. Multi-step transactions that require verification and traceability can benefit from Blockcha... 详细信息
来源: 评论
Machine Learning Based Framework for Cryptocurrency Price Prediction
Machine Learning Based Framework for Cryptocurrency Price Pr...
收藏 引用
International Conference on Secure Cyber computing and Communication (ICSCCC)
作者: Mrityunjay Singh Amit Kumar Jakhar Aashima Juneja Shivam Pandey School of Computing Indian Institute of Information Technology Una Una India Department of CS/IT Jaypee University of Information Technology Waknaghat Solan India Centre for Development of Advanced Computing Noida Noida India
Cryptocurrency, a digital currency, acts as a medium of exchange through the Internet. The main agenda behind cryptocurrency being so popular these days is the desire for reliable, long-term value without the involvem...
来源: 评论
Evaluation of automatic text visualization systems: a case study  5th
Evaluation of automatic text visualization systems: a case s...
收藏 引用
5th International Conference on advanced Machine Learning Technologies and Applications, AMLTA 2020
作者: Jain, Priyanka Bhavsar, R.P. Shaik, Karimullah Kumar, Ajai Pawar, B.V. Darbari, Hemant Bhavsar, Virendrakumar C. Centre for Development of Advanced Computing Pune India KBC-North Maharashtra University Jalgaon India University of New Brunswick FrederictonNB Canada
We have developed an automatic text visualization (ATV) system, named Preksha, that takes natural language text in Hindi as input and produces a run-time interactive 3D scene based on it. Preksha is the only ATV syste... 详细信息
来源: 评论
Accelerated Sorting of Apples Based on Machine Learning  4th
Accelerated Sorting of Apples Based on Machine Learning
收藏 引用
4th International Conference on Smart computing and Informatics, SCI 2020
作者: Deb, Kiron Basu, Shobhin Palakurthy, Vamshi Krishna Bhattacharyya, Nabarun Calcutta International School Kolkata India Fremont High School Sunnyvale CA United States Centre for Development of Advanced Computing Kolkata India
Accurate classification and grading are important for the quality assurance of apples since it is necessary to ensure that they retain their freshness and texture until they reach the end user following transportation... 详细信息
来源: 评论
Proposing ϵ-greedy Reinforcement Learning Technique to Self-Optimize Memory Controllers  2
Proposing ϵ-greedy Reinforcement Learning Technique to Self...
收藏 引用
2nd International Conference on Secure Cyber computing and Communications, ICSCCC 2021
作者: Ray, Aritra Ray, Hena University of Calcutta A. K. C. School of Information Technology Kolkata India Centre for Development of Advanced Computing Kolkata India
This paper proposes the novel algorithmic idea of ϵ-greedy based Reinforcement Learning (RL) technique to self-optimize memory controllers. It aims to overcome the limitations of the existing RL based self-optimizatio... 详细信息
来源: 评论