咨询与建议

限定检索结果

文献类型

  • 17,168 篇 会议
  • 2,555 篇 期刊文献
  • 141 册 图书

馆藏范围

  • 19,864 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,635 篇 工学
    • 7,838 篇 计算机科学与技术...
    • 6,564 篇 软件工程
    • 3,354 篇 信息与通信工程
    • 1,984 篇 控制科学与工程
    • 1,795 篇 电子科学与技术(可...
    • 1,758 篇 电气工程
    • 1,230 篇 生物工程
    • 1,060 篇 生物医学工程(可授...
    • 897 篇 光学工程
    • 808 篇 机械工程
    • 767 篇 动力工程及工程热...
    • 732 篇 仪器科学与技术
    • 596 篇 化学工程与技术
    • 522 篇 安全科学与工程
    • 455 篇 交通运输工程
    • 393 篇 材料科学与工程(可...
  • 5,935 篇 理学
    • 3,007 篇 数学
    • 1,841 篇 物理学
    • 1,357 篇 生物学
    • 998 篇 统计学(可授理学、...
    • 703 篇 系统科学
    • 599 篇 化学
  • 2,903 篇 管理学
    • 1,826 篇 管理科学与工程(可...
    • 1,241 篇 图书情报与档案管...
    • 938 篇 工商管理
  • 943 篇 医学
    • 810 篇 临床医学
    • 756 篇 基础医学(可授医学...
    • 464 篇 药学(可授医学、理...
    • 428 篇 公共卫生与预防医...
  • 569 篇 法学
    • 461 篇 社会学
  • 354 篇 经济学
  • 259 篇 农学
  • 208 篇 教育学
  • 88 篇 文学
  • 48 篇 军事学
  • 12 篇 艺术学
  • 1 篇 历史学

主题

  • 693 篇 accuracy
  • 501 篇 deep learning
  • 453 篇 feature extracti...
  • 413 篇 computational mo...
  • 354 篇 support vector m...
  • 352 篇 real-time system...
  • 310 篇 training
  • 305 篇 internet of thin...
  • 273 篇 machine learning
  • 245 篇 predictive model...
  • 240 篇 convolutional ne...
  • 219 篇 reliability
  • 215 篇 optimization
  • 209 篇 computer science
  • 208 篇 computer archite...
  • 193 篇 neural networks
  • 185 篇 wireless communi...
  • 176 篇 routing
  • 172 篇 throughput
  • 163 篇 data mining

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 82 篇 national centre ...
  • 81 篇 tno technical sc...
  • 80 篇 nikhef national ...
  • 79 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 75 篇 université de st...
  • 73 篇 university würzb...
  • 70 篇 university of jo...
  • 66 篇 università di ca...
  • 58 篇 university moham...
  • 57 篇 ncsr demokritos ...
  • 52 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 50 篇 university moham...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 41 篇 université de ha...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 81 篇 chen a.
  • 81 篇 kalekin o.
  • 81 篇 díaz a.f.
  • 81 篇 boumaaza j.
  • 80 篇 coleiro a.
  • 80 篇 gozzini s.r.
  • 80 篇 dallier r.
  • 77 篇 anguita m.
  • 75 篇 boettcher m.
  • 72 篇 aly z.
  • 72 篇 enzenhöfer a.
  • 71 篇 huang f.
  • 67 篇 celli s.
  • 60 篇 dornic d.
  • 55 篇 carretero v.

语言

  • 17,320 篇 英文
  • 2,286 篇 其他
  • 193 篇 中文
  • 45 篇 日文
  • 21 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept Computer Engineering and Technology"
19864 条 记 录,以下是751-760 订阅
排序:
Gesture Recognition for ISL-Question Signs in Videos using DCDW-LSTM Attention  5
Gesture Recognition for ISL-Question Signs in Videos using D...
收藏 引用
5th IEEE PhD Colloquium on Emerging Domain Innovation and technology for Society, PhD EDITS 2023
作者: Dey, Arnab Biswas, Samit Indian Institute of Engineering Science and Technology Dept. of Computer Science and Technology Shibpur Howrah711103 India
Gesture recognition, specifically the identification of question signs, plays a pivotal role in advancing communication for the hearing-impaired population. However, this aspect of sign language classification has rec... 详细信息
来源: 评论
An Efficient Deep Learning Technique for Intrusion Detection in Wireless Sensor Network  3
An Efficient Deep Learning Technique for Intrusion Detection...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Kumari, Prity Tiwari, Rakesh Kumar Technocrats Institute of Technology and Science Dept. of Computer Science Engineering Bhopal India
Predicting intrusion detection in a wireless sensor network (WSN) involves using machine learning algorithms to analyze network traffic data and predict whether an intrusion or security breach will occur. The goal of ... 详细信息
来源: 评论
Artificial Neural Network Technique for DDOS Attack Prediction in Cyber-IOT System  3
Artificial Neural Network Technique for DDOS Attack Predicti...
收藏 引用
3rd International Conference on Technological Advancements in Computational Sciences, ICTACS 2023
作者: Asad, Md Tiwari, Rakesh Kumar Technocrats Institute of Technology & Science Dept. of Computer Science Engineering Bhopal India
An intrusion-detection IoT framework is designed to analyze unauthorized access or security breaches in IoT networks. These systems typically use a combination of hardware and software to analyze network traffic, iden... 详细信息
来源: 评论
Note on 'RAKS: robust authentication and key agreement scheme for satellite infrastructure'
Note on 'RAKS: robust authentication and key agreement schem...
收藏 引用
2023 International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023
作者: Tsai, Chun-Chieh Sun, Chin-Yu Yang, Shih-Hsuan National Taipei University of Technology Dept. of Computer Science and Information Engineering Taiwan
Low Earth orbit (LEO) satellites play an important role in modern communication systems. Recently, Khan et al. [1] designed a robust authentication and key agreement scheme (RAKS) for LEO satellite communication. They... 详细信息
来源: 评论
A Design of Low Voltage Spacer Detector Circuits for Asynchronous Ternary Logic System  38
A Design of Low Voltage Spacer Detector Circuits for Asynchr...
收藏 引用
38th IEEE Region 10 Conference, TENCON 2023
作者: Srikram, Pitchayapatchaya Bunnam, Thanasin Rajamangala University of Technology Thanyaburi Dept. Computer Engineering Pathum thani Thailand
The ternary logic approach was proposed in an asynchronous digital system to eliminate overhead wires for communication signals in preference to the binary logic approach. Spacer detectors (SDs) are crucial in ternary... 详细信息
来源: 评论
Performance Analysis of Machine Learning Algorithms to Predict Water Potability  1
Performance Analysis of Machine Learning Algorithms to Predi...
收藏 引用
1st International Conference on Computational Intelligence for Information, Security and Communication Applications, CIISCA 2023
作者: Parnika, J. Devamane, Shridhar B Ramya, C.N. Swarna Laxmi, M.G. Global Academy of Technology Dept. of Computer Science and Engineering Karnataka Bengaluru India
The survival of all living organisms, industry and agriculture is dependent on freshwater availability. A crucial step in the management of freshwater is the examination of the water's quality. According to the an... 详细信息
来源: 评论
Low Power SRAM using an Optimal Number of Split Bit Lines and Single-Ended Sensing  31
Low Power SRAM using an Optimal Number of Split Bit Lines an...
收藏 引用
31st International Conference on Electrical engineering, ICEE 2023
作者: Nazemian, Mahdie Sayedi, Sayed Masoud Isfahan University of Technology Dept of Electrical & Computer Engineering Isfahan84156-83111 Iran
In the proposed SRAM architecture in this work, the power is reduced by partitioning the structure into different blocks and also applying some power reduction techniques on the cells. The structure not only reduces p... 详细信息
来源: 评论
Hate Speech Detection in Indian Languages: A Brief Survey  2
Hate Speech Detection in Indian Languages: A Brief Survey
收藏 引用
2nd IEEE International Conference on Data, Decision and Systems, ICDDS 2023
作者: Rameez Mohammed, A. Madhukumar, S.D. National Institute of Technology Dept. of Computer Science and Engineering Kerala Calicut India
Social media has revolutionized communication and content publishing. Anonymity and mobility afforded by social media is also an effective medium for dissemination of hate messages, which can lead to undesired outcome... 详细信息
来源: 评论
Optimizing mmWave UAV Networks: Mobility-Aware Deployment and Resource Allocation  100
Optimizing mmWave UAV Networks: Mobility-Aware Deployment an...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Li, Sicong Yoshii, Kazutoshi Shimamoto, Shigeru Ho, Tu Dac Waseda University Dept. of Communications and Computer Engineering Tokyo Japan Norwegian University of Science and Technology Dept. of Information Security and Communication Technology Trondheim Norway
Application of Unmanned Aerial Vehicles (UAVs) as small airborne base stations is gradually becoming a research hotspot in the field of wireless communications. With the flexible deployment, wide coverage and low cost... 详细信息
来源: 评论
The Popular Matching Problem in a (3, 3)-Hypergraph with One-sided Preferences  11
The Popular Matching Problem in a (3, 3)-Hypergraph with One...
收藏 引用
11th International Symposium on Computing and Networking Workshops, CANDARW 2023
作者: Singh, Yashdeep Karmakar, Sushanta Indian Institute of Technology Guwahati Dept. of Computer Science & Engineering Guwahati India
In this work we investigate the problem of popular matching in a 3-uniform 3-partite hypergraph, where the first set contains a set of agents and the second and the third set contain different class of items respectiv... 详细信息
来源: 评论