咨询与建议

限定检索结果

文献类型

  • 10,889 篇 会议
  • 2,085 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 13,041 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,031 篇 工学
    • 4,825 篇 计算机科学与技术...
    • 4,057 篇 软件工程
    • 2,160 篇 信息与通信工程
    • 1,733 篇 控制科学与工程
    • 1,395 篇 电气工程
    • 1,394 篇 电子科学与技术(可...
    • 741 篇 机械工程
    • 737 篇 生物工程
    • 669 篇 生物医学工程(可授...
    • 614 篇 光学工程
    • 608 篇 仪器科学与技术
    • 526 篇 动力工程及工程热...
    • 465 篇 化学工程与技术
    • 351 篇 交通运输工程
    • 314 篇 安全科学与工程
    • 304 篇 建筑学
    • 282 篇 材料科学与工程(可...
    • 275 篇 土木工程
  • 4,307 篇 理学
    • 2,282 篇 数学
    • 1,417 篇 物理学
    • 784 篇 生物学
    • 699 篇 统计学(可授理学、...
    • 603 篇 系统科学
    • 441 篇 化学
  • 1,778 篇 管理学
    • 1,215 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 577 篇 工商管理
  • 540 篇 医学
    • 458 篇 临床医学
    • 423 篇 基础医学(可授医学...
    • 278 篇 药学(可授医学、理...
  • 280 篇 法学
  • 214 篇 农学
  • 212 篇 经济学
  • 126 篇 教育学
  • 53 篇 文学
  • 32 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 262 篇 feature extracti...
  • 254 篇 accuracy
  • 205 篇 deep learning
  • 202 篇 computational mo...
  • 179 篇 predictive model...
  • 179 篇 real-time system...
  • 157 篇 support vector m...
  • 154 篇 optimization
  • 145 篇 neural networks
  • 137 篇 machine learning
  • 130 篇 wireless communi...
  • 127 篇 internet of thin...
  • 127 篇 monitoring
  • 117 篇 training
  • 116 篇 reliability
  • 110 篇 wireless sensor ...
  • 105 篇 visualization
  • 103 篇 quality of servi...
  • 102 篇 data mining
  • 98 篇 vectors

机构

  • 70 篇 dept. of informa...
  • 52 篇 dept. of compute...
  • 51 篇 dept. of electri...
  • 51 篇 dept. of electro...
  • 47 篇 dept. of informa...
  • 39 篇 university of th...
  • 36 篇 dept. of electri...
  • 31 篇 dept. of informa...
  • 27 篇 dept. of control...
  • 26 篇 lovely professio...
  • 25 篇 dept. of electri...
  • 25 篇 dept. of informa...
  • 24 篇 school of automa...
  • 22 篇 institute of inf...
  • 21 篇 ieee
  • 20 篇 delft center for...
  • 18 篇 chitkara univers...
  • 18 篇 dept. of control...
  • 17 篇 dept. of materia...
  • 17 篇 dept. of compute...

作者

  • 26 篇 nasmin jiwani
  • 26 篇 ketan gupta
  • 26 篇 magno michele
  • 26 篇 fotiadis dimitri...
  • 25 篇 jiwani nasmin
  • 21 篇 bin zou
  • 19 篇 logeshwaran j.
  • 18 篇 ye zhang
  • 17 篇 chen yen-lin
  • 17 篇 widyawan
  • 16 篇 lo hoi-kwong
  • 16 篇 tom oomen
  • 15 篇 balázs benyó
  • 15 篇 oomen tom
  • 14 篇 hongyi yu
  • 13 篇 zhang ye
  • 13 篇 loeliger hans-an...
  • 12 篇 horng shi-jinn
  • 12 篇 han ji-hoon
  • 12 篇 masaki yamakita

语言

  • 12,168 篇 英文
  • 502 篇 其他
  • 216 篇 中文
  • 82 篇 朝鲜文
  • 81 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Control Engineering and Information Technology"
13041 条 记 录,以下是541-550 订阅
排序:
ADMT: ACO-based Data Management Technique for IoT  3
ADMT: ACO-based Data Management Technique for IoT
收藏 引用
3rd International Conference on Trends in Electrical, Electronics and Computer engineering, TEECCON 2024
作者: Pruthvi, C.N. Sandhya, K. Shreyas, J. Arpitha, T. Amutha, S. Babu, D R Ramesh Dayananda Sagar College of Engineering Dept. of Cse Bengaluru India Manipal Academy of Higher Education Dept. of Information Technology Manipal Bengaluru India Uvce Dept. of Cse Bangalore Bengaluru India
Context: ICN (information Centric Network) is a content-centric network that enables communication in the network by using content names. Each content is retrieved and cached inside the network using the content name ... 详细信息
来源: 评论
Steganographic Encryption and Decryption Using Duality Preserving GANs  22
Steganographic Encryption and Decryption Using Duality Prese...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Shah, Aaryak Kamal, Alok Kumar Neeraj Dept. of Information Technology ABV-IIITM Gwalior Gwalior India Dept. of Electrical/Electronics ABV-IIITM Gwalior Gwalior India Dept. of Computer Science and Engineering Mahindra University Hyderabad India
Image steganography has been a significant research area in the security sphere. The core idea revolves around embedding secret messages in existing images (covers) such that the resultant image displays no noticeable... 详细信息
来源: 评论
Automated Bengali Sign Language Character Classification with Deep Learning Techniques  15
Automated Bengali Sign Language Character Classification wit...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Akter, Tahmina Mahmud, Tanjim Barua, Tikle Naher, Sultana Rokeya Hossain, Mohammad Shahadat Andersson, Karl Port City International University Dept. of Computer Science and Engineering Chittagong Bangladesh Rangamati Science and Technology University Dept. of Computer Science and Engineering Rangamati4500 Bangladesh University of Information Technology and Sciences Dept. of Computer Science and Engineering Dhaka Bangladesh University of Chittagong Dept. of Computer Science and Engineering Chittagong4331 Bangladesh Luleå University of Technology Cybersecurity Laboratory Luleå97187 Sweden
Recognition of Bengali sign language characters is crucial for facilitating communication for the deaf and hard-of-hearing population in Bengali-speaking regions, which encompass approximately 430 million people world... 详细信息
来源: 评论
A Low Noise Bandgap Reference Voltage Source for CMOS Temperature Sensors  3
A Low Noise Bandgap Reference Voltage Source for CMOS Temper...
收藏 引用
3rd International Conference on Electronic information engineering and Computer Science, EIECS 2023
作者: Jin, Ao Wei, Qi Zhang, Jing Liang, Jiaxuan North China University of Technology Dept. Information Beijing China Tsinghua University Dept. Precision Instrument Beijing China Shandong Agricultural University Dept. Information Science and Engineering China
This design is based on the SMIC180nm CMOS process, with a power supply voltage of 1.8V, a sampling frequency of 800kHz, a temperature measurement range of -45 to 125 , an ADC with 12 significant bits, and a chip core... 详细信息
来源: 评论
An Overview of Protocols-Based Security Threats and Countermeasures in WLAN  4
An Overview of Protocols-Based Security Threats and Counterm...
收藏 引用
4th International Conference for Emerging technology, INCET 2023
作者: Ojha, Nitish Kumar Baray, Elyas Indian Institute of Information Technology Dept. of Information Technology Allahabad211012 India Sharda University Knowledge Park - III Dept. of Computer Science and Engineering Greater Noida201310 India
WLAN security protocols are the most important section for wireless networks which controls all the security-related issues by securing the network with some pre-defined rules made by wireless-protected access organiz... 详细信息
来源: 评论
A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants  5
A Systematic Study on Ransomware Attack: Types, Phases and R...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Krishna Prasad, D.S. Prasanna Kumar, H.R. Dept. of Computer & Communication Engineering. Karnataka574110 India Visvesvaraya Technological University Belagavi590018 India Pes Institute of Technology and Management Dept. of Information Science and Engineering Shivamogga India
The rise of ransomware attacks presents a major cybersecurity threat, leading to considerable financial losses and disrupting crucial operations across diverse sectors. In-dept. research on the field of ransomware ass... 详细信息
来源: 评论
Leveraging Cross Lingual Speech Representations To Build ASR For Under-resourced Languages  26
Leveraging Cross Lingual Speech Representations To Build ASR...
收藏 引用
26th Conference of the Oriental COCOSDA International Committee for the Co-ordination and Standardization of Speech Databases and Assessment Techniques, O-COCOSDA 2023
作者: Mukherjee, Sougata Bannulmath, Prashant Deepak, K.T. Prasanna, S. R. Mahadeva Indian Institute of Technology Dharwad Dept. of Electrical Electronics and Communication Engineering Dharwad India Indian Institute of Information Technology Dept. of Electronics and Communication Engineering Dharwad India Indian Institute of Technology Dept. of Electrical Electronics and Communication Engineering Dharwad India
Automatic speech recognition (ASR) technology can help document and preserve under-resourced tribal languages by converting spoken words into text. But building robust Automatic Speech Recognition(ASR) models for trib... 详细信息
来源: 评论
Real Time Human Assisted Path Planning for Autonomous Agent using VR  2
Real Time Human Assisted Path Planning for Autonomous Agent ...
收藏 引用
2nd Edition of IEEE Delhi Section Owned Conference, DELCON 2023
作者: Khemchandani, Vineeta Khan, Mohd Anas Barkaa, Mohd Usman Chandra, Sushil Wadalkar, Nachiket Milind Jss Academy of Technical Education Dept. of Information Technology Noida India Inmas Drdo Dept. of Biomedical Engineering Delhi India Inmas Drdo Cognitive Control and Machin Learning Division Delhi India
Path Planning is a term used in robotics that comprises motion planning approaches that can acclimate to real-time changes in the environment. Many problems in various fields are solved by proposing path planning whic... 详细信息
来源: 评论
Revealing the Potential of Hotel Improvements in Bali Based on Sentiment Analysis and Tourist Characteristics  11
Revealing the Potential of Hotel Improvements in Bali Based ...
收藏 引用
11th International Conference on Electrical engineering, Computer Science and Informatics, EECSI 2024
作者: Sumartini Saraswati, Ni Wayan Gede Darma Putra, I Ketut Sudarma, Made Sukarsa, I Made Yanti, Christina Purnama Tri Juniartini, Ni Komang Institute Bisnis Dan Teknologi Indonesia Faculty of Technology and Informatics Denpasar Indonesia Udayana University Dept. of Information Technology Denpasar Indonesia Udayana University Dept. of Engineering Science Denpasar Indonesia
Bali is a tourist destination with the largest market share in Indonesia. So the progress of Bali tourism has a major contribution to the country's foreign exchange earnings. This of course cannot be separated fro... 详细信息
来源: 评论
Predictive Analysis of Jordan Road Accidents Severity Using Machine Learning
Predictive Analysis of Jordan Road Accidents Severity Using ...
收藏 引用
2023 International Symposium on Networks, Computers and Communications, ISNCC 2023
作者: Mustafa, Dheya Sawaged, Layan Khabour, Safaa M. The Hashemite University Faculty of Engineering Dept. of Computer Engineering Zarqa13133 Jordan Yarmouk University Faculty of Information Technology and Computer Sciences Dept. of Information Systems Irbid21163 Jordan
Jordan has a high and growing level of traffic accidents reaching 160,600) accidents in 2021, (11,241) of them had human injuries, (589) deaths, and (320) million JOD losses. Road traffic accidents are currently the 8... 详细信息
来源: 评论