咨询与建议

限定检索结果

文献类型

  • 6,430 篇 会议
  • 1,021 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 7,510 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,670 篇 工学
    • 3,540 篇 计算机科学与技术...
    • 2,994 篇 软件工程
    • 1,223 篇 信息与通信工程
    • 690 篇 控制科学与工程
    • 509 篇 电气工程
    • 499 篇 生物工程
    • 491 篇 电子科学与技术(可...
    • 401 篇 生物医学工程(可授...
    • 326 篇 光学工程
    • 276 篇 机械工程
    • 273 篇 仪器科学与技术
    • 229 篇 动力工程及工程热...
    • 199 篇 化学工程与技术
    • 195 篇 安全科学与工程
    • 179 篇 交通运输工程
    • 162 篇 建筑学
  • 2,352 篇 理学
    • 1,250 篇 数学
    • 631 篇 物理学
    • 537 篇 生物学
    • 399 篇 统计学(可授理学、...
    • 293 篇 系统科学
    • 221 篇 化学
  • 1,271 篇 管理学
    • 774 篇 管理科学与工程(可...
    • 562 篇 图书情报与档案管...
    • 407 篇 工商管理
  • 345 篇 医学
    • 303 篇 临床医学
    • 286 篇 基础医学(可授医学...
    • 181 篇 药学(可授医学、理...
    • 164 篇 公共卫生与预防医...
  • 213 篇 法学
    • 155 篇 社会学
  • 137 篇 教育学
  • 136 篇 经济学
  • 120 篇 农学
  • 32 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学

主题

  • 246 篇 accuracy
  • 205 篇 feature extracti...
  • 158 篇 deep learning
  • 152 篇 computational mo...
  • 140 篇 machine learning
  • 128 篇 training
  • 119 篇 predictive model...
  • 117 篇 internet of thin...
  • 117 篇 support vector m...
  • 116 篇 real-time system...
  • 106 篇 cloud computing
  • 95 篇 visualization
  • 92 篇 security
  • 89 篇 data mining
  • 88 篇 software
  • 87 篇 optimization
  • 85 篇 computer archite...
  • 85 篇 artificial intel...
  • 84 篇 semantics
  • 83 篇 monitoring

机构

  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 83 篇 infn sezione di ...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 81 篇 infn sezione di ...
  • 80 篇 university moham...
  • 80 篇 infn sezione di ...
  • 76 篇 infn sezione di ...
  • 69 篇 western sydney u...
  • 66 篇 università di ca...
  • 62 篇 university of am...
  • 58 篇 university moham...
  • 58 篇 università la sa...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 90 篇 brunner j.
  • 89 篇 calvo d.
  • 88 篇 di palma i.
  • 87 篇 bendahman m.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 83 篇 gozzini s.r.
  • 83 篇 carretero v.
  • 82 篇 dallier r.
  • 81 篇 chen a.
  • 80 篇 anguita m.

语言

  • 6,632 篇 英文
  • 761 篇 其他
  • 67 篇 中文
  • 42 篇 日文
  • 7 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Architecture and Information Technology"
7510 条 记 录,以下是41-50 订阅
排序:
Enhanced Machine Learning Approach for Detecting Spammers in Industrial Mobile Cloud Computing Environment  5
Enhanced Machine Learning Approach for Detecting Spammers in...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Bhavana, K. Sai Abhinandu, B. Sriyesh, P. Sai Rama, K. Satheesh Kumar, S. Institute of Aeronautical Engineering Dept. Computer Science & Information Technology Hyderabad India
This research study proposes an innovative machine learning algorithm, Spammer Identification Novel K-Means Extension (SINKEX), to fortify IoT mobile networks against commands and potential disruptions in industrial p... 详细信息
来源: 评论
Improving Time Series Forecasting Accuracy with Transformers: A Comprehensive Analysis with Explainability  3
Improving Time Series Forecasting Accuracy with Transformers...
收藏 引用
3rd International Conference on Electrical, Electronics, information and Communication Technologies, ICEEICT 2024
作者: Joseph, Susmera Jo, Ashly Ann Raj, Ebin Deni Indian Institute of Information Technology Dept. of Computer Science Engineering Kottayam India
Time series forecasting is crucial in numerous sectors, including healthcare, energy, and finance. Transformer models, initially designed for natural language processing applications, demonstrate potential in capturin... 详细信息
来源: 评论
Security Enabled Supply-Chain System Implementation Using Blockchain Integration with Hyperledger and IPFS Techniques  5
Security Enabled Supply-Chain System Implementation Using Bl...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Gupta, Amritesh Kumar Dwivedi, Rajendra Kumar Madan Mohan Malaviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
One of the important areas that needs attention is supply chain in this fast expansion of globalization. There are numerous tiny parts that are summed up to obtain an end and furnished product be it agricultural goods... 详细信息
来源: 评论
Notes Application using Android Studio and Cloud-based Data Management  7
Notes Application using Android Studio and Cloud-based Data ...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Dodda, Ratnam Yanala, Maneesh Reddy Pavishetti, Srija Cvr College of Engineering Dept. of Computer Science And Information Technology Hyderabad India
In today's rapidly advancing technological land-scape, the widespread adoption of mobile applications has become a defining feature of our digital age. This research study presents a on the development of a mobile... 详细信息
来源: 评论
Security Enhancement in Tea Supply Chain using Blockchain with Hyperledger  2
Security Enhancement in Tea Supply Chain using Blockchain wi...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Gupta, Amritesh Kumar Dwivedi, Rajendra Kumar Madan Mohan Malaviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
With the advancement of technology and emergence of blockchain, it has become quite a popular tool which is often integrated with systems and processes that require decentralization, traceability, consistency etc. One... 详细信息
来源: 评论
Reconnaissance Detection in Decentralised IoT System using Model-Contrastive Federated Learning  18
Reconnaissance Detection in Decentralised IoT System using M...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Dutta, Rajdeep Kumar Chhetry, Bishal Matam, Rakesh Barbhuiya, Ferdous Ahmed Indian Institute of Information Technology Dept. of Computer Science and Engineering Guwahati India
The detection of reconnaissance attacks is crucial for safeguarding Internet of Things (IoT) environments, which are inherently more vulnerable and resource-constrained compared to traditional computing systems. Tradi... 详细信息
来源: 评论
Designing A Secure Large Scale E -Voting System Leveraging Sharding Blockchain with Interoperability Protocol and Consensus Mechanism  2
Designing A Secure Large Scale E -Voting System Leveraging S...
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Maurya, Alka Dwivedi, Rajendra Kumar Madan Mohan Malaviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
The advent of electronic voting (e-voting) systems has promised greater accessibility, efficiency, and transparency in the process of electoral. However, by adopting e-voting systems, they bring forth significant chal... 详细信息
来源: 评论
Single- and Multi-Hop BERT Question Classifier for Open-Domain Question Answering (SiMQC)  31
Single- and Multi-Hop BERT Question Classifier for Open-Doma...
收藏 引用
31st International Conference on Electrical Engineering, ICEE 2023
作者: Sayyad, Faeze Zakaryapour Bohlouli, Mahdi Dept. Computer Science and Information Technology Zanjan Iran
Multi-hop Question Answering has recently received particular attention in research and practice, especially in the context of conversational systems and answering complex questions. Various architectures have been pr... 详细信息
来源: 评论
Formal Modeling and Verification of Justification and Finalization of Checkpoints in Ethereum 2.0 Beacon Chain  1
Formal Modeling and Verification of Justification and Finali...
收藏 引用
1st IEEE Karachi Section Humanitarian technology Conference, Khi-HTC 2024
作者: Rashid, Muhammad Rasool, Imran Zafar, Nazir Ahmad Afzaal, Hamra Comsats University Islamabad Dept. of Computer Science Sahiwal Campus Pakistan Information Technology University Dept. of Computer Science Lahore Pakistan
New to the Ethereum platform with version 2.0 is the Beacon chain. Validator status, attestation information, and many more are maintained via the proof-of-stake (PoS) consensus protocol, which is relied upon. The Eth... 详细信息
来源: 评论
A Multistage Cascaded Neural Network Model to Identify the Severity of Epileptic Attack
A Multistage Cascaded Neural Network Model to Identify the S...
收藏 引用
2024 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems, SPICES 2024
作者: Simon, Martha Thampi, Lidiya Lilly Dept. of Computer Science College of Engineering Trivandrum India Indian Institute of Information Technology Kottayam Dept. of Computer Science Kottayam India
Epilepsy is a neurological disorder characterized by recurrent seizures, impacting the quality of life for millions of individuals worldwide. Timely and accurate detection of epileptic seizures is crucial for proper d... 详细信息
来源: 评论