咨询与建议

限定检索结果

文献类型

  • 16,368 篇 会议
  • 2,511 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 19,028 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,411 篇 工学
    • 7,724 篇 计算机科学与技术...
    • 6,407 篇 软件工程
    • 3,289 篇 信息与通信工程
    • 1,967 篇 控制科学与工程
    • 1,740 篇 电子科学与技术(可...
    • 1,729 篇 电气工程
    • 1,170 篇 生物工程
    • 1,044 篇 生物医学工程(可授...
    • 893 篇 光学工程
    • 770 篇 机械工程
    • 724 篇 动力工程及工程热...
    • 705 篇 仪器科学与技术
    • 581 篇 化学工程与技术
    • 505 篇 安全科学与工程
    • 450 篇 交通运输工程
    • 382 篇 材料科学与工程(可...
  • 5,864 篇 理学
    • 3,057 篇 数学
    • 1,794 篇 物理学
    • 1,281 篇 生物学
    • 1,007 篇 统计学(可授理学、...
    • 669 篇 系统科学
    • 591 篇 化学
  • 2,836 篇 管理学
    • 1,765 篇 管理科学与工程(可...
    • 1,243 篇 图书情报与档案管...
    • 896 篇 工商管理
  • 904 篇 医学
    • 771 篇 临床医学
    • 719 篇 基础医学(可授医学...
    • 451 篇 药学(可授医学、理...
    • 401 篇 公共卫生与预防医...
  • 520 篇 法学
    • 418 篇 社会学
  • 331 篇 经济学
  • 240 篇 农学
  • 210 篇 教育学
  • 95 篇 文学
  • 44 篇 军事学
  • 15 篇 艺术学
  • 1 篇 历史学

主题

  • 570 篇 accuracy
  • 438 篇 deep learning
  • 411 篇 feature extracti...
  • 394 篇 computational mo...
  • 297 篇 support vector m...
  • 292 篇 real-time system...
  • 292 篇 training
  • 267 篇 internet of thin...
  • 234 篇 machine learning
  • 220 篇 optimization
  • 217 篇 predictive model...
  • 201 篇 computer archite...
  • 197 篇 computer science
  • 183 篇 reliability
  • 182 篇 convolutional ne...
  • 177 篇 neural networks
  • 176 篇 wireless communi...
  • 168 篇 data mining
  • 162 篇 routing
  • 160 篇 throughput

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 82 篇 national centre ...
  • 82 篇 tno technical sc...
  • 79 篇 infn sezione di ...
  • 79 篇 nikhef national ...
  • 77 篇 university würzb...
  • 77 篇 university of jo...
  • 76 篇 infn sezione di ...
  • 76 篇 université de st...
  • 66 篇 università di ca...
  • 63 篇 university moham...
  • 63 篇 ncsr demokritos ...
  • 54 篇 university moham...
  • 53 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 50 篇 school of automa...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...
  • 41 篇 university of gr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 82 篇 kalekin o.
  • 82 篇 díaz a.f.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 81 篇 chen a.
  • 81 篇 gozzini s.r.
  • 81 篇 dallier r.
  • 78 篇 anguita m.
  • 76 篇 boettcher m.
  • 76 篇 enzenhöfer a.
  • 74 篇 celli s.
  • 72 篇 aly z.
  • 71 篇 dornic d.
  • 70 篇 huang f.
  • 69 篇 carretero v.

语言

  • 15,950 篇 英文
  • 2,826 篇 其他
  • 184 篇 中文
  • 51 篇 日文
  • 21 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Dept. of Computer Engineering and Informatics and Computer Technology"
19028 条 记 录,以下是721-730 订阅
排序:
Fine Tuning GANs for Image Colorization: Effects of Training Data and Epochs  7
Fine Tuning GANs for Image Colorization: Effects of Training...
收藏 引用
2023 7th International Conference On Computing, Communication, Control And Automation, ICCUBEA 2023
作者: Patil, Rahul Patil, Pramod Joshi, Rohit Joshi, Atharv Hastak, Ninad Joshi, Akshay Pimpri Chinchwad College of Engineering Dept. of Computer Engineering Pune India Dr. D. Y. Patil Institute of Technology Dept. of Computer Engineering Pune India
Ever since the advent of Deep Learning, there has been a lot of experimentation and research being carried out in image processing. This gave rise to the conversion of black and white i.e. grayscale images into colori... 详细信息
来源: 评论
Game-Theoretic-Based Resource Allocation Algorithm for SCMA Max-Min Problem to Maximize Fairness  7
Game-Theoretic-Based Resource Allocation Algorithm for SCMA ...
收藏 引用
7th IEEE International Conference on Electronics and Communication engineering, ICECE 2024
作者: Cheraghy, Maryam Soltanpour, Meysam Abuhaija, Belal Abdalla, Hemn Barzan Ehimwenma, Kennedy Wenzhou-Kean University dept. Computer Science and Technology Wenzhou China Shandong University dept. Control Science and Engineering Jinan China
This paper tackles a joint optimization problem in uplink sparse code multiple access (SCMA) networks to enhance network fairness, i.e., Jain's fairness index (JFI). We propose a novel game-theoretic approach, the... 详细信息
来源: 评论
Deep Reinforcement Learning Based Grid-Forming Inverter
Deep Reinforcement Learning Based Grid-Forming Inverter
收藏 引用
2023 IEEE Industry Applications Society Annual Meeting, IAS 2023
作者: Balouji, Ebrahim Backstrom, Karl McKelvey, Tomas Chalmers University of Technology Dept. of Electrical Engineering Gothenburg Sweden Chalmers University of Technology Dept. of Computer Science and Engineering Gothenburg Sweden
This research work introduces Deep Deterministic Policy Gradient (DDPG), a type of Reinforcement Learning (RL), for grid modeling, estimating voltage and phase angle, and control method for grid-forming inverters. The... 详细信息
来源: 评论
Analysis of optimization Techniques for Dynamic Neural Networks  3
Analysis of optimization Techniques for Dynamic Neural Netwo...
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, IITCEE 2025
作者: Mallegowda, M. Nair, Saanvi Khirwal, Sahil Animesh, Manik Mishra, Vasuman Kanavalli, Anita Ms Ramaiah Institute of Technology Department of Computer Science and Engineering Bengaluru India Ramaiah Institute of Technology Dept. of Cse Bengaluru India
Models based on dynamic neural networks such as DeBERTa and Vision Transformers ViT have disrupted the two fields. However, there is one complication - their performance requires so much computation which limits its r... 详细信息
来源: 评论
Hybrid Nature-Inspired Based Oversampling and Feature Selection Approach for Imbalance Data Streams Classification
Hybrid Nature-Inspired Based Oversampling and Feature Select...
收藏 引用
2022 OPJU International technology Conference on Emerging Technologies for Sustainable Development, OTCON 2022
作者: Arya, Monika Dewangan, Bhupesh Kumar Verma, Monika Rohini, M. Motwani, Anand Sar, Sumit Kumar Bhilai Institute of Technology Dept. of Computer Science & Engineering CG Durg India Op Jindal University Dept. of Computer Science Engineering Raigarh India Sri Krishna College of Engineering and Technology Dept. of Computer Science & Engineering Coimbatore India Vit Bhopal University School of Computing Science & Engineering MP Sehore India
A big data stream is described using 5 mathrm{V}primes (Volume, Variety, Velocity, Variability, and Veracity). These characteristics impose various challenges. In many cases, data streams are unbalanced, making tradit... 详细信息
来源: 评论
Malware Detection across Clusters
Malware Detection across Clusters
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2023
作者: Manjushree, C.V. Nandakumar, A.N. Vemana Institute of Technology Dept. of Information Science & Engineering India City Engineering College Dept. of Computer Science & Engineering India
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection ba... 详细信息
来源: 评论
Smart Roads: U-Turn Accident Prevention System  4
Smart Roads: U-Turn Accident Prevention System
收藏 引用
4th International Conference on Electronics and Sustainable Communication Systems, ICESC 2023
作者: Johnson, Neena Ancy Jenifer, J. Khan, Aanya Jyothi, Akhila Karunya Institute of Technology and Sciences Dept. of Computer Science and Engineering Coimbatore India
When discussing statistics of everyday road accidents in India, a very large contributing factor is accidents in hilly areas due to hairpin bends. These blind turns are highly dangerous and may more often than not res... 详细信息
来源: 评论
Deep Learning with Encoders for Intrusion Detection Systems (IDS)  10
Deep Learning with Encoders for Intrusion Detection Systems ...
收藏 引用
17th INDIACom;2023 10th International Conference on Computing for Sustainable Global Development, INDIACom 2023
作者: Budania, Vijay Ahmed, Mushtaq Verma, Anshita Malaviya National Institute of Technology Dept. of Computer Science and Engineering Jaipur India
An Intrusion Detection System (IDS) is often used to keep safe and efficiently utilise communication network. And generally this is achieved by monitoring the network regularly for possible intrusions. Nowadays in net... 详细信息
来源: 评论
Drug Authentication and Counterfeit Drug Detection Using Blockchain  7
Drug Authentication and Counterfeit Drug Detection Using Blo...
收藏 引用
2023 7th International Conference On Computing, Communication, Control And Automation, ICCUBEA 2023
作者: Chandras, Atharva Agrawal, Satyam Chaudhary, Mithil Deshmukh, Anushka Shinde, Shilpa Ramrao Adik Institute of Technology Dept. of Computer Engineering Navi Mumbai India
Drug counterfeiting is a worldwide phenomenon which affects practically every industry involved with the healthcare sector in both developed and developing countries. This widespread smuggling and usage of counterfeit... 详细信息
来源: 评论
An Incremental Algorithm for (2-ϵ)-Approximate Steiner Tree Requiring O(n) Update Time  11
An Incremental Algorithm for (2-ϵ)-Approximate Steiner Tree...
收藏 引用
11th International Symposium on Computing and Networking, CANDAR 2023
作者: Raikwar, Hemraj Karmakar, Sushanta Indian Institute of Technology Guwahati Dept. of Computer Science and Engineering Guwahati India
Given an undirected connected weighted graph with non-negative edge weights and a subset of vertices called terminals, the goal of the Steiner tree problem is to find a tree that spans the terminals such that the weig... 详细信息
来源: 评论