咨询与建议

限定检索结果

文献类型

  • 12,159 篇 会议
  • 9,023 篇 期刊文献
  • 210 册 图书

馆藏范围

  • 21,392 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,135 篇 工学
    • 8,590 篇 计算机科学与技术...
    • 6,950 篇 软件工程
    • 2,967 篇 信息与通信工程
    • 2,195 篇 控制科学与工程
    • 1,798 篇 电气工程
    • 1,650 篇 生物工程
    • 1,583 篇 电子科学与技术(可...
    • 1,347 篇 生物医学工程(可授...
    • 1,218 篇 光学工程
    • 993 篇 机械工程
    • 932 篇 化学工程与技术
    • 826 篇 动力工程及工程热...
    • 803 篇 仪器科学与技术
    • 712 篇 材料科学与工程(可...
    • 592 篇 网络空间安全
    • 567 篇 安全科学与工程
    • 537 篇 交通运输工程
  • 8,145 篇 理学
    • 3,636 篇 数学
    • 3,172 篇 物理学
    • 1,885 篇 生物学
    • 1,252 篇 统计学(可授理学、...
    • 1,008 篇 化学
    • 840 篇 系统科学
  • 3,396 篇 管理学
    • 2,244 篇 管理科学与工程(可...
    • 1,284 篇 图书情报与档案管...
    • 1,035 篇 工商管理
  • 1,458 篇 医学
    • 1,221 篇 临床医学
    • 1,075 篇 基础医学(可授医学...
    • 648 篇 公共卫生与预防医...
    • 640 篇 药学(可授医学、理...
  • 635 篇 法学
  • 435 篇 经济学
  • 344 篇 农学
  • 274 篇 教育学
  • 65 篇 文学
  • 44 篇 军事学
  • 35 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 638 篇 deep learning
  • 520 篇 accuracy
  • 444 篇 machine learning
  • 396 篇 internet of thin...
  • 366 篇 computational mo...
  • 305 篇 feature extracti...
  • 270 篇 real-time system...
  • 253 篇 training
  • 247 篇 computer science
  • 245 篇 support vector m...
  • 224 篇 predictive model...
  • 202 篇 optimization
  • 190 篇 neural networks
  • 185 篇 convolutional ne...
  • 177 篇 artificial intel...
  • 165 篇 computer archite...
  • 160 篇 image segmentati...
  • 157 篇 reliability
  • 142 篇 scalability
  • 139 篇 wireless communi...

机构

  • 150 篇 department of co...
  • 135 篇 department of co...
  • 128 篇 university of sc...
  • 99 篇 institute of com...
  • 92 篇 tianfu cosmic ra...
  • 91 篇 university of ch...
  • 88 篇 department of ph...
  • 86 篇 north-west unive...
  • 82 篇 institut univers...
  • 80 篇 infn sezione di ...
  • 79 篇 infn sezione di ...
  • 79 篇 hebei normal uni...
  • 76 篇 national centre ...
  • 76 篇 state key labora...
  • 75 篇 yunnan observato...
  • 66 篇 college of compu...
  • 66 篇 università di ca...
  • 63 篇 tno technical sc...
  • 61 篇 center for quant...
  • 58 篇 karnataka bangal...

作者

  • 108 篇 bastieri d.
  • 107 篇 niyato dusit
  • 88 篇 ferrara g.
  • 88 篇 ardid m.
  • 87 篇 calvo d.
  • 86 篇 chen a.
  • 80 篇 li xin
  • 76 篇 gal t.
  • 76 篇 bozza c.
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 73 篇 díaz a.f.
  • 72 篇 boumaaza j.
  • 69 篇 jiang k.
  • 68 篇 kalekin o.
  • 68 篇 coleiro a.
  • 67 篇 kuleshov d.
  • 65 篇 li cheng
  • 65 篇 liu d.
  • 64 篇 chen m.j.

语言

  • 20,131 篇 英文
  • 1,111 篇 其他
  • 162 篇 中文
  • 8 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computing and Engineering Technology"
21392 条 记 录,以下是4851-4860 订阅
排序:
Wide and fault diameter in Kneser graphs for enhanced fault tolerance in parallel computing
收藏 引用
International Journal of Networking and Virtual Organisations 2024年 第3期31卷 169-190页
作者: Sundara Rajan, R. Kirithiga Nandini, G. Lin, Yuqing Reji, Remi Mariam Department of Mathematics Hindustan Institute of Technology and Science Chennai603 103 India Department of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai603 103 India School of Electrical Engineering and Computing The University of Newcastle CallaghanNSW2308 Australia Department of Mathematics Christian College Kerala Chengannur689 122 India
A system’s fault tolerance is its capacity to function even if one or more of its components fail. Implementing a fault-tolerant network becomes an important criterion for reliable computing. Reliability measures pla... 详细信息
来源: 评论
Zero-day Android botnet detection using neural networks
收藏 引用
Neural computing and Applications 2024年 1-11页
作者: Seraj, Saeed Pimenidis, Elias Trovati, Marcello Polatidis, Nikolaos Department of Computer Science Royal Holloway University EghamTW20 0EX United Kingdom School of Computing and Creative Technologies University of the West of England BristolBS16 1QY United Kingdom Department of Computer Science Edge Hill University OrmskirkL39 4QP United Kingdom School of Architecture Technology and Engineering University of Brighton BrightonBN2 4GJ United Kingdom
Android devices have evolved to offer a diverse array of services, spanning applications related to banking, business, health, and entertainment. The widespread adoption of Android devices, coupled with the open-sourc... 详细信息
来源: 评论
FLARE: A New Federated Learning Framework with Adjustable Learning Rates over Resource-Constrained Wireless Networks
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Xiao, Bingnan Zhang, Jingjing Ni, Wei Wang, Xin Fudan University School of Information Science and Technology Department of Communication Science and Engineering Shanghai200433 China CSIRO Data61 MarsfieldNSW2122 Australia School of Computing Science and Engineering KenningtonNSW2052 Australia
Wireless federated learning (WFL) suffers from heterogeneity prevailing in the data distributions, computing powers, and channel conditions of participating devices. This paper presents a new Federated Learning with A... 详细信息
来源: 评论
Chaotic Particle Swarm Optimization Empowered Deep Convolutional Neural Network for Prostate Cancer Diagnosis
Chaotic Particle Swarm Optimization Empowered Deep Convoluti...
收藏 引用
International Conference on Advances in Information technology (ICAIT)
作者: Gokulnath C N. Kalaiarasi Yeshaswini R P. Brinda Jeyakarthika K S.T. Gopukumar Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur Campus Kattankulathur Chengalpattu Department of ECE R.M.K college of engineering and technology Chennai Department of computer science Rajarajeshwari college of engineering Kumbalgodu Bangalore Department of Computer science and Engineering Veltech High tech Dr rangarajan Dr sakunthala engineering college Avadi Computer science and Engineering Ramco Institute of Technology Virudhunagar District Tamil Nadu Department of Research Activities and Biostatistics Sarada Krishna Homoeopathic Medical College Kanniyakumari District Tamilnadu India
Prostate cancer (PCa) Classification on magnetic resonance imaging (MRI) is an innovative use of medical imaging and machine learning (ML) models that objects to precisely recognize and classify PCa lesions in MRI sca... 详细信息
来源: 评论
Smart Signaling: A Smart Internet of Things Assisted Traffic Light Controlling and Monitoring System using Intelligent Sensors
Smart Signaling: A Smart Internet of Things Assisted Traffic...
收藏 引用
International Conference on Science technology engineering and Management (ICONSTEM)
作者: G. Saranya R. Ratheesh S. Vijayalakshmi B. Arunsundar M. Swarna Department of Electronics and Communication Engineering Sri Krishna College of Engineering and Technology Kuniyamuthur Coimbatore Department of ECE Agni College of Technology Chennai Department of ECE R.M.K. Engineering College Chennai Department of Data Science and Business Systems School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Department of ECE Dr. M.G.R. Educational and Research Institute University Chennai
In contemporary urban environments, efficient traffic management stands as a paramount challenge, necessitating innovative solutions to mitigate congestion, enhance safety, and reduce environmental impact. This paper ... 详细信息
来源: 评论
Gloss-Free Sign Language Translation using Sign2gpt-Next Technique
Gloss-Free Sign Language Translation using Sign2gpt-Next Tec...
收藏 引用
computing and Intelligent Reality Technologies (ICCIRT), International Conference on
作者: A. Babisha G. Umarani Srikanth D.R. Angel Kiruba R Sundar Department of Artificial Intelligence and Data Science Panimalar Engineering College Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering DMI College of Engineering Chennai India Department of Computer Science and Engineering School of Computing Sathyabama Institute of Science and Technology Chennai India
This work proposes a new approach to convert the data from sign language to spoken language without exposing the data to a gloss layer. Whenever gloss annotations are used which frequently are incomplete and act as an... 详细信息
来源: 评论
Federated Learning Approach for Tracking Malicious Activities in Cyber-Physical Systems
Federated Learning Approach for Tracking Malicious Activitie...
收藏 引用
2022 International Conference on Edge computing and Applications, ICECAA 2022
作者: Madala, Chandu Jagan Sekhar Yadav, G. Hemanth Kumar Sivakumar, S. Nithya, R. Manjunatha, K.M. Deivakani, M. Department of Computer Science & Engineering Lendi Institute of Engineering and Technology A ndhra Pradesh Vizianagaram535005 India Department of Computer Science Engineering Srinivasa Ramanujan Institute of Technology Andhra Pradesh Anantapur515701 India Department of Computer Science Engineering S.A. Engineering College Thiruverkadu Tamil Nadu 600077 India School of Computing Science KPR College of Arts Science and Research Tamil Nadu Coimbatore641048 India Department of Computer Science Government Polytechnic Karnataka Tumakuru572103 India Department of Electronics and Communication Engineering PSNA College of Engineering and Technology Tamil Nadu Dindigul624622 India
The fast rise of the Internet and advanced technologies causes an increase in network traffic, making network infrastructure increasingly complicated and varied. Mobile phones, wearable gadgets, and driverless cars ar... 详细信息
来源: 评论
A survey of Intel SGX and its applications
收藏 引用
Frontiers of Computer Science 2021年 第3期15卷 191-205页
作者: Wei ZHENG Ying WU Xiaoxue WU Chen FENG Yulei SUI Xiapu LUO Yajin ZHOU School of Software and Microelectronics Northwestern Polytechnical UniversityXi'an 710129China Faculty of Engineering and Information Technology University of Technology SydneySydney 2007Australia Department of Computing The Hong Kong Polytechnic UniversityHong Kong 999077China College of Computer Science and Technology Zhejiang UniversityHangzhou 310027China
This paper presents a comprehensive survey on the development of Intel SGX(software guard extensions)processors and its *** the advent of SGX in 2013 and its subsequent development,the corresponding research works are... 详细信息
来源: 评论
Agriculture Monitoring System with Efficient Resource Management using IoT
Agriculture Monitoring System with Efficient Resource Manage...
收藏 引用
Augmented Intelligence and Sustainable Systems (ICAISS), International Conference on
作者: T. Tholhappiyan S. Sankar V. Selvakumar P. Robert Department of Information Technology Sri Sai Ranganathan Engineering College Coimbatore Tamil Nadu India Department of Management Studies Sri Sairam Engineering College Chennai Tamil Nadu India Department of Management Studies Sri Sairam Institute of Technology Chennai Tamil Nadu India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai Tamil Nadu India
IoT-based agriculture monitoring systems have recently been developed for effective resource management to maximize agricultural output. To collect real-time data on numerous factors, including soil moisture, temperat...
来源: 评论
Evaluation and Implementation of Optimal Classification Algorithms for Credit Card Fraud Detection
Evaluation and Implementation of Optimal Classification Algo...
收藏 引用
International Conference on Computational and Characterization Techniques in engineering & Sciences (CCTES)
作者: Sampath Kini K Pushpakumar. R R. Senthamil Selvan Praveenkumar G D Basi Reddy. A Department of Computer Science and Engineering Nitte Deemed To be University Karkala India Department of Information Technology Vel Tech Rangarajan Dr .Sangunthala R&D Institute of Science and Technology Avadi India Department of Electronics and Communication Engineering Annamacharya Institute of Technology and Sciences Tirupati India Department of Computer Technology Kongu Engineering College Erode India Department of Computer Science and Engineering School of Computing Mohan Babu University Tirupati India
Nowadays, the credit card industry is more concerned about credit card fraud than any other problem. The main idea is to examine optional techniques used for fraud detection and to identify the different types of cred... 详细信息
来源: 评论