咨询与建议

限定检索结果

文献类型

  • 16,204 篇 会议
  • 2,513 篇 期刊文献
  • 147 册 图书

馆藏范围

  • 18,864 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,292 篇 工学
    • 7,620 篇 计算机科学与技术...
    • 6,363 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 1,888 篇 控制科学与工程
    • 1,718 篇 电子科学与技术(可...
    • 1,705 篇 电气工程
    • 1,167 篇 生物工程
    • 1,033 篇 生物医学工程(可授...
    • 885 篇 光学工程
    • 757 篇 机械工程
    • 701 篇 动力工程及工程热...
    • 691 篇 仪器科学与技术
    • 575 篇 化学工程与技术
    • 477 篇 安全科学与工程
    • 421 篇 交通运输工程
    • 377 篇 材料科学与工程(可...
  • 5,819 篇 理学
    • 3,033 篇 数学
    • 1,787 篇 物理学
    • 1,280 篇 生物学
    • 995 篇 统计学(可授理学、...
    • 669 篇 系统科学
    • 579 篇 化学
  • 2,756 篇 管理学
    • 1,699 篇 管理科学与工程(可...
    • 1,212 篇 图书情报与档案管...
    • 891 篇 工商管理
  • 870 篇 医学
    • 764 篇 临床医学
    • 712 篇 基础医学(可授医学...
    • 451 篇 药学(可授医学、理...
    • 367 篇 公共卫生与预防医...
  • 501 篇 法学
    • 399 篇 社会学
  • 328 篇 经济学
  • 239 篇 农学
  • 208 篇 教育学
  • 78 篇 文学
  • 44 篇 军事学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 558 篇 accuracy
  • 410 篇 deep learning
  • 401 篇 feature extracti...
  • 393 篇 computational mo...
  • 292 篇 support vector m...
  • 285 篇 training
  • 279 篇 real-time system...
  • 262 篇 internet of thin...
  • 227 篇 machine learning
  • 220 篇 optimization
  • 219 篇 predictive model...
  • 197 篇 computer science
  • 196 篇 computer archite...
  • 181 篇 reliability
  • 179 篇 convolutional ne...
  • 177 篇 neural networks
  • 176 篇 wireless communi...
  • 170 篇 data mining
  • 162 篇 routing
  • 158 篇 throughput

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 82 篇 national centre ...
  • 82 篇 tno technical sc...
  • 79 篇 infn sezione di ...
  • 79 篇 nikhef national ...
  • 78 篇 university würzb...
  • 78 篇 university of jo...
  • 76 篇 infn sezione di ...
  • 76 篇 université de st...
  • 66 篇 università di ca...
  • 65 篇 ncsr demokritos ...
  • 64 篇 university moham...
  • 54 篇 university moham...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 41 篇 university of gr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 82 篇 kalekin o.
  • 82 篇 díaz a.f.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 81 篇 chen a.
  • 81 篇 gozzini s.r.
  • 81 篇 dallier r.
  • 78 篇 anguita m.
  • 78 篇 enzenhöfer a.
  • 76 篇 boettcher m.
  • 75 篇 celli s.
  • 73 篇 aly z.
  • 72 篇 dornic d.
  • 70 篇 huang f.
  • 69 篇 carretero v.

语言

  • 17,740 篇 英文
  • 861 篇 其他
  • 190 篇 中文
  • 51 篇 日文
  • 21 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Engineering and Informatics and Computer Technology"
18864 条 记 录,以下是651-660 订阅
排序:
Robust decentralized plug and play voltage tracker of islanded microgrids under loads and lines uncertainties by the invariant ellipsoids
收藏 引用
Journal of King Saud University - engineering Sciences 2024年 第6期36卷 409-419页
作者: Bayoumi, Ehab H.E. Soliman, Hisham M. El-Sheikhi, Farag Ali Shafiq, M. Awad, Hilmy Energy and Renewable Energy Department Egyptian Chinese University Cairo Egypt Dept. of Electrical Power Eng. Faculty of Eng Cairo University Cairo Egypt Dept. of Electrical and Electronics Engineering Istanbul Esenyurt University Istanbul Turkey Dept. of Electrical and Computer Engineering Sultan Qaboos University Muscat Oman Dept. of Electrical Technology Faculty of Technology and Education Helwan University Egypt
Microgrids (MGs) comprising of distributed generation units (DGs) are subjected to plug-and-play operation (PnP), lines (connecting the DGs) parameters uncertainty, and load changes. Robust stability and an authentic ... 详细信息
来源: 评论
Credit Card Fraud Detection Using Machine Learning- A Comprehensive Review  3
Credit Card Fraud Detection Using Machine Learning- A Compre...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Jaswant, T. Venkata Manoj, G. Sai Vamisdhar, V. Aravind, A. Reddy, S. Vasudeva Patni, Jagdish Chandra Bahadure, Nilesh Kumar, Rohit Alliance School of Advanced Computing Alliance University Dept. of Computer Science Engineering Bengaluru India School of Technology Gsfc University Department of Computer Science and Engineering Gujarat India
Credit card fraud is an omnipresent threat in the digital era that cannot be effectively managed without complex detection and prevention strategies. Machine learning has become instrumental for the industry, principa... 详细信息
来源: 评论
Classification of Musical Genres Using Audio Spectrograms  5
Classification of Musical Genres Using Audio Spectrograms
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Abbas, Mohammad Kazim Gupta, Kunal Mudassir, Mohammad Jain, Rishabh Galgotias College Of Engineering And Technology Dept. Of Computer Science And Engineering Greater Noida India Kiet Group Of Institutions Dept. Of Computer Science Delhi-NCR Ghaziabad India
The classification of music into distinct genres is a valuable undertaking in the realm of multimedia study, as it enables artists, albums, and songs to be categorized based on shared musical characteristics. This stu... 详细信息
来源: 评论
Youth Unemployment Mitigation: Leveraging Machine Learning and Exploratory Data Analysis for Evidence-Driven Strategies
Youth Unemployment Mitigation: Leveraging Machine Learning a...
收藏 引用
2023 IEEE Conference on engineering informatics, EI 2023
作者: Aarthi, S. Dharmita, A. Pragathi, G. Elakkiya, S. Srm Institute of Science and Technology Dept. of Computer Science Engineering Chennai India Srm Institute of Science and Technology Dept. Computer Science Engineering Specialization with Big Data Analytics Chennai India
Youth unemployment represents an urgent global socioeconomic challenge. This study combines machine learning and exploratory data analysis to understand and solve this problem comprehensively. Traditional approaches o... 详细信息
来源: 评论
A Comprehensive Analysis of Music Genre Classification with Audio Spectrograms using Deep Learning Techniques  5
A Comprehensive Analysis of Music Genre Classification with ...
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Abbas, Mohammad Kazim Gupta, Kunal Mudassir, Mohammad Jain, Rishabh Galgotias College Of Engineering And Technology Dept. Of Computer Science And Engineering Greater Noida India Kiet Group Of Institutions Dept. Of Computer Science Delhi-NCR Ghaziabad India
This review paper investigates the application of audio spectrograms for categorization of musical genres. The use of feature extraction technique in convolutional neural networks (CNNs) for music genre analysis is hi... 详细信息
来源: 评论
Identity Authentication Techniques for Unmanned Ships Communication Based on MITRE ATT&CK Framework
Identity Authentication Techniques for Unmanned Ships Commun...
收藏 引用
2023 IET International Conference on engineering Technologies and Applications, ICETA 2023
作者: Chang, Shih-Hao He, Junxian Dept. of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Dept. of Computer Science and Information Engineering Tamkang University New Taipei Taiwan
With the development of the smart ship industry, unmanned ship technology is rapidly evolving. In this paper, our objective is to analyze potential risks associated with identity authentication technology in unmanned ... 详细信息
来源: 评论
Unified Mechanism-Specific Amplification by Subsampling and Group Privacy Amplification  38
Unified Mechanism-Specific Amplification by Subsampling and ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Schuchardt, Jan Stoian, Mihail Kosmala, Arthur Günnemann, Stephan Dept. of Computer Science Munich Data Science Institute Technical University of Munich Germany Dept. of Engineering University of Technology Nuremberg Germany
Amplification by subsampling is one of the main primitives in machine learning with differential privacy (DP): Training a model on random batches instead of complete datasets results in stronger privacy. This is tradi...
来源: 评论
Cost-aware and Time-Varying Request Rate-based Dynamic Cache Provisioning over CCDN  17
Cost-aware and Time-Varying Request Rate-based Dynamic Cache...
收藏 引用
17th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023
作者: Gupta, Rohit Kumar Mazumdar, Arka Prokash Malaviya National Institute of Technology Jaipur Manipal University Jaipur Dept. of Computer Science & Engineering India Malaviya National Institute of Technology Jaipur Dept. of Computer Science & Engineering Jaipur India
Today's Internet users depend on Cloud-based Content Delivery Network (CCDN) providers to efficiently use resources and minimize content delivery latency. However, time-varying request rates make incoming requests... 详细信息
来源: 评论
Leveraging Information and Communication technology (ICT) To Combat Corruption: A Systematic Review
Leveraging Information and Communication Technology (ICT) To...
收藏 引用
2024 International Conference on Science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Oluwambo Tolulope, Olowe Ariyo Adebiyi, Ayodele Akindeji, Kayode Landmark University Dept. of Computer Science Omuaran Nigeria Durban University of Technology Dept. of Electrical Power Engineering Durban South Africa
Corruption, a global phenomenon disproportionately affecting developing nations, undermines governance and economic development. This systematic literature review examines the role of Information and Communications Te... 详细信息
来源: 评论
Designing Blockchain Based Consensus Mechanism for Smart Healthcare IoT
Designing Blockchain Based Consensus Mechanism for Smart Hea...
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Kumari, Trishla Kumar, Rakesh Dwivedi, Rajendra Kumar Madan Mohan Malviya University of Technology Dept. of Computer Science and Engineering Gorakhpur India Madan Mohan Malviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
In today's world, healthcare system is improving day by day by using smart IoT based system. Blockchain based system is totally a decentralized system due to which attackers are unable to access the confidential r... 详细信息
来源: 评论