咨询与建议

限定检索结果

文献类型

  • 16,204 篇 会议
  • 2,513 篇 期刊文献
  • 147 册 图书

馆藏范围

  • 18,864 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,292 篇 工学
    • 7,620 篇 计算机科学与技术...
    • 6,363 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 1,888 篇 控制科学与工程
    • 1,718 篇 电子科学与技术(可...
    • 1,705 篇 电气工程
    • 1,167 篇 生物工程
    • 1,033 篇 生物医学工程(可授...
    • 885 篇 光学工程
    • 757 篇 机械工程
    • 701 篇 动力工程及工程热...
    • 691 篇 仪器科学与技术
    • 575 篇 化学工程与技术
    • 477 篇 安全科学与工程
    • 421 篇 交通运输工程
    • 377 篇 材料科学与工程(可...
  • 5,819 篇 理学
    • 3,033 篇 数学
    • 1,787 篇 物理学
    • 1,280 篇 生物学
    • 995 篇 统计学(可授理学、...
    • 669 篇 系统科学
    • 579 篇 化学
  • 2,756 篇 管理学
    • 1,699 篇 管理科学与工程(可...
    • 1,212 篇 图书情报与档案管...
    • 891 篇 工商管理
  • 870 篇 医学
    • 764 篇 临床医学
    • 712 篇 基础医学(可授医学...
    • 451 篇 药学(可授医学、理...
    • 367 篇 公共卫生与预防医...
  • 501 篇 法学
    • 399 篇 社会学
  • 328 篇 经济学
  • 239 篇 农学
  • 208 篇 教育学
  • 78 篇 文学
  • 44 篇 军事学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 558 篇 accuracy
  • 410 篇 deep learning
  • 401 篇 feature extracti...
  • 393 篇 computational mo...
  • 292 篇 support vector m...
  • 285 篇 training
  • 279 篇 real-time system...
  • 262 篇 internet of thin...
  • 227 篇 machine learning
  • 220 篇 optimization
  • 219 篇 predictive model...
  • 197 篇 computer science
  • 196 篇 computer archite...
  • 181 篇 reliability
  • 179 篇 convolutional ne...
  • 177 篇 neural networks
  • 176 篇 wireless communi...
  • 170 篇 data mining
  • 162 篇 routing
  • 158 篇 throughput

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 82 篇 national centre ...
  • 82 篇 tno technical sc...
  • 79 篇 infn sezione di ...
  • 79 篇 nikhef national ...
  • 78 篇 university würzb...
  • 78 篇 university of jo...
  • 76 篇 infn sezione di ...
  • 76 篇 université de st...
  • 66 篇 università di ca...
  • 65 篇 ncsr demokritos ...
  • 64 篇 university moham...
  • 54 篇 university moham...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 41 篇 university of gr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 82 篇 kalekin o.
  • 82 篇 díaz a.f.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 81 篇 chen a.
  • 81 篇 gozzini s.r.
  • 81 篇 dallier r.
  • 78 篇 anguita m.
  • 78 篇 enzenhöfer a.
  • 76 篇 boettcher m.
  • 75 篇 celli s.
  • 73 篇 aly z.
  • 72 篇 dornic d.
  • 70 篇 huang f.
  • 69 篇 carretero v.

语言

  • 17,740 篇 英文
  • 861 篇 其他
  • 190 篇 中文
  • 51 篇 日文
  • 21 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Engineering and Informatics and Computer Technology"
18864 条 记 录,以下是661-670 订阅
排序:
Comparative Analysis of Extractive Summarization Using NLP
Comparative Analysis of Extractive Summarization Using NLP
收藏 引用
2024 IEEE International Conference on Intelligent Computing and Emerging Communication Technologies, ICEC 2024
作者: Ray, Ashutosh Mishra, Anjana Sahoo, Bisal Tripathy, Hrudaya Kumar C.V. Raman Global University Dept. of Computer Science and Engineering Odisha Bhubaneswar India Kalinga Institute of Industrial Technology School of Computer Engineering Bhubaneswar India
The step-by-step method of constructing a short, easy-to-read, understandable, and contextual summary of an extensive text document is called text summarization. The principal role is to acquire the correct amount of ... 详细信息
来源: 评论
A Satisfibility based Watermarking Approach for Hardware Security in High Level Synthesis  20
A Satisfibility based Watermarking Approach for Hardware Sec...
收藏 引用
20th IEEE India Council International Conference, INDICON 2023
作者: Cs, Ashwin Poddar, Vipul Roy, Suchismita National Institute of Technology Dept. of Computer Science & Engineering Durgapur India National Institute of Technology Dept. of Electrical Engineering Durgapur India
In today's world Time-To-Market (TTM) plays a very important role in the success of any given chip. To reduce the TTM, many manufacturers rely on reusable IP cores. These reusable Intellectual Property(IP) cores m... 详细信息
来源: 评论
Windmill Pitch Prediction And Error Correction With Adaptive Control And Current Generation Analysis Using Data Analysis
Windmill Pitch Prediction And Error Correction With Adaptive...
收藏 引用
2023 International Conference on Energy, Materials and Communication engineering, ICEMCE 2023
作者: Minu, M.S. Rohit Suryaa, S. Jovan Titus, J. Sharan, S. Srm Institute of Science and Technology Dept. of Computer Science Engineering Chennai India Srm Institute of Science and Technology Dept. Computer Science Engineering Specialization with Big Data Analytics Chennai India
The growing prominence of wind energy as an eco-friendly power alternative amplifies the need for optimal turbine performance. Central to this is the ability to accurately predict and modulate the wind turbine pitch. ... 详细信息
来源: 评论
IoT Attack Detection Method based on Synthetic Minority Over-Sampling with Random Forest Technique  10
IoT Attack Detection Method based on Synthetic Minority Over...
收藏 引用
17th INDIACom;2023 10th International Conference on Computing for Sustainable Global Development, INDIACom 2023
作者: Tripathi, Neha Mishra, Amit Kumar Bagla, Piyush Pandey, Neeraj Kumar Mittal, Saksham Dept. of Computer Science and Engineering Dehradun India National Institute of Technology Dept. of Computer Science and Engineering Jalandhar India School of Computing Dit University Dehradun India
The primary objective of this study is to create a self-protection system for the Internet of Things (IoT) that relies on machine learning. One such resampling approach is the proposed IoT Attack Detection Method base... 详细信息
来源: 评论
Augmented Memory Replay-based Continual Learning Approaches for Network Intrusion Detection  37
Augmented Memory Replay-based Continual Learning Approaches ...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Amalapuram, Suresh Kumar Channappayya, Sumohana S. Tamma, Bheemarjuna Reddy Dept. of Computer Science and Engineering Indian Institute of Technology Hyderabad India Dept. of Electrical Engineering Indian Institute of Technology Hyderabad India
Intrusion detection is a form of anomalous activity detection in communication network traffic. Continual learning (CL) approaches to the intrusion detection task accumulate old knowledge while adapting to the latest ... 详细信息
来源: 评论
Fine Tuning GANs for Image Colorization: Effects of Training Data and Epochs  7
Fine Tuning GANs for Image Colorization: Effects of Training...
收藏 引用
2023 7th International Conference On Computing, Communication, Control And Automation, ICCUBEA 2023
作者: Patil, Rahul Patil, Pramod Joshi, Rohit Joshi, Atharv Hastak, Ninad Joshi, Akshay Pimpri Chinchwad College of Engineering Dept. of Computer Engineering Pune India Dr. D. Y. Patil Institute of Technology Dept. of Computer Engineering Pune India
Ever since the advent of Deep Learning, there has been a lot of experimentation and research being carried out in image processing. This gave rise to the conversion of black and white i.e. grayscale images into colori... 详细信息
来源: 评论
Deep Reinforcement Learning Based Grid-Forming Inverter
Deep Reinforcement Learning Based Grid-Forming Inverter
收藏 引用
2023 IEEE Industry Applications Society Annual Meeting, IAS 2023
作者: Balouji, Ebrahim Backstrom, Karl McKelvey, Tomas Chalmers University of Technology Dept. of Electrical Engineering Gothenburg Sweden Chalmers University of Technology Dept. of Computer Science and Engineering Gothenburg Sweden
This research work introduces Deep Deterministic Policy Gradient (DDPG), a type of Reinforcement Learning (RL), for grid modeling, estimating voltage and phase angle, and control method for grid-forming inverters. The... 详细信息
来源: 评论
Analysis of optimization Techniques for Dynamic Neural Networks  3
Analysis of optimization Techniques for Dynamic Neural Netwo...
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Mallegowda, M. Nair, Saanvi Khirwal, Sahil Animesh, Manik Mishra, Vasuman Kanavalli, Anita Ms Ramaiah Institute of Technology Department of Computer Science and Engineering Bengaluru India Ramaiah Institute of Technology Dept. of Cse Bengaluru India
Models based on dynamic neural networks such as DeBERTa and Vision Transformers ViT have disrupted the two fields. However, there is one complication - their performance requires so much computation which limits its r... 详细信息
来源: 评论
Malware Detection across Clusters
Malware Detection across Clusters
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Manjushree, C.V. Nandakumar, A.N. Vemana Institute of Technology Dept. of Information Science & Engineering India City Engineering College Dept. of Computer Science & Engineering India
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba... 详细信息
来源: 评论
Hybrid Nature-Inspired Based Oversampling and Feature Selection Approach for Imbalance Data Streams Classification
Hybrid Nature-Inspired Based Oversampling and Feature Select...
收藏 引用
2022 OPJU International technology Conference on Emerging Technologies for Sustainable Development, OTCON 2022
作者: Arya, Monika Dewangan, Bhupesh Kumar Verma, Monika Rohini, M. Motwani, Anand Sar, Sumit Kumar Bhilai Institute of Technology Dept. of Computer Science & Engineering CG Durg India Op Jindal University Dept. of Computer Science Engineering Raigarh India Sri Krishna College of Engineering and Technology Dept. of Computer Science & Engineering Coimbatore India Vit Bhopal University School of Computing Science & Engineering MP Sehore India
A big data stream is described using 5 mathrm{V}primes (Volume, Variety, Velocity, Variability, and Veracity). These characteristics impose various challenges. In many cases, data streams are unbalanced, making tradit... 详细信息
来源: 评论