咨询与建议

限定检索结果

文献类型

  • 5,146 篇 会议
  • 821 篇 期刊文献
  • 46 册 图书

馆藏范围

  • 6,013 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,701 篇 工学
    • 2,307 篇 计算机科学与技术...
    • 1,909 篇 软件工程
    • 1,087 篇 信息与通信工程
    • 765 篇 电子科学与技术(可...
    • 745 篇 电气工程
    • 590 篇 控制科学与工程
    • 342 篇 生物工程
    • 341 篇 生物医学工程(可授...
    • 323 篇 光学工程
    • 285 篇 动力工程及工程热...
    • 233 篇 仪器科学与技术
    • 232 篇 机械工程
    • 205 篇 化学工程与技术
    • 137 篇 交通运输工程
    • 135 篇 材料科学与工程(可...
    • 127 篇 安全科学与工程
    • 99 篇 建筑学
  • 1,939 篇 理学
    • 952 篇 数学
    • 707 篇 物理学
    • 385 篇 生物学
    • 300 篇 统计学(可授理学、...
    • 207 篇 系统科学
    • 206 篇 化学
  • 800 篇 管理学
    • 493 篇 管理科学与工程(可...
    • 342 篇 图书情报与档案管...
    • 255 篇 工商管理
  • 289 篇 医学
    • 254 篇 临床医学
    • 234 篇 基础医学(可授医学...
    • 158 篇 药学(可授医学、理...
  • 127 篇 法学
    • 104 篇 社会学
  • 91 篇 经济学
  • 63 篇 农学
  • 57 篇 教育学
  • 20 篇 文学
  • 12 篇 军事学
  • 5 篇 艺术学

主题

  • 150 篇 accuracy
  • 139 篇 feature extracti...
  • 119 篇 real-time system...
  • 110 篇 computational mo...
  • 106 篇 deep learning
  • 105 篇 training
  • 84 篇 predictive model...
  • 78 篇 machine learning
  • 75 篇 support vector m...
  • 74 篇 optimization
  • 72 篇 internet of thin...
  • 64 篇 computer archite...
  • 62 篇 bandwidth
  • 61 篇 reliability
  • 61 篇 monitoring
  • 61 篇 data models
  • 60 篇 switches
  • 58 篇 quality of servi...
  • 58 篇 wireless sensor ...
  • 57 篇 resource managem...

机构

  • 41 篇 dept. of electro...
  • 37 篇 dept. of compute...
  • 35 篇 dept. of electro...
  • 32 篇 dept. of compute...
  • 26 篇 graphic era hill...
  • 25 篇 graphic era deem...
  • 22 篇 graphic era deem...
  • 19 篇 dept. of compute...
  • 19 篇 computer enginee...
  • 16 篇 ieee
  • 14 篇 dept. of compute...
  • 13 篇 computer enginee...
  • 13 篇 lovely professio...
  • 12 篇 politeknik elekt...
  • 11 篇 national institu...
  • 11 篇 dept. of compute...
  • 10 篇 dept. of informa...
  • 10 篇 dept. of electro...
  • 10 篇 dept. of electro...
  • 9 篇 school of comput...

作者

  • 32 篇 deepak upadhyay
  • 31 篇 mridul gupta
  • 28 篇 upadhyay deepak
  • 26 篇 kim sang-wook
  • 24 篇 abhay upadhyay
  • 22 篇 upadhyay abhay
  • 22 篇 kunj bihari shar...
  • 22 篇 gupta mridul
  • 22 篇 bouras christos
  • 19 篇 christos bouras
  • 18 篇 sharma kunj biha...
  • 17 篇 kostas berberidi...
  • 17 篇 an beongku
  • 16 篇 mesaritakis char...
  • 15 篇 amit konar
  • 12 篇 bogris adonis
  • 11 篇 sarigiannidis pa...
  • 11 篇 choo hyunseung
  • 11 篇 dewantara bima s...
  • 10 篇 bona m.

语言

  • 5,370 篇 英文
  • 540 篇 其他
  • 80 篇 中文
  • 20 篇 朝鲜文
  • 7 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Informatics and Computer Engineering Electronics Engineering"
6013 条 记 录,以下是291-300 订阅
排序:
Power and Area Optimized Memristor-Based Majority Identifier for Digital Applications  3
Power and Area Optimized Memristor-Based Majority Identifier...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Raj, P. Michael Preetam Vittapu, Sravan K. Chinnasamy, P. Gupta, Manu Samatha, K. Sasivijaya, K. Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India Nalla Narasimha Reddy Education Society's Group of Institutions Department of Electronics and Communication Engineering Hyderabad India Kalasalingam Academy of Research and Education Dept. of Computer Science and Engineering Tamil Nadu India Sreenidhi Institute of Science and Technology Department of Electronics and Computer Engineering Hyderabad India
In earlier developments, CMOS technology played a great role in realizing majority identifiers. There are huge drawbacks that affect the circuit's performance. To overcome the drawbacks of CMOS-based majority Iden... 详细信息
来源: 评论
Performance Evaluation of CNN Models in Urban Acoustic Event Recognition Through MFCC Hyperparameter Search
Performance Evaluation of CNN Models in Urban Acoustic Event...
收藏 引用
2023 Congress in computer Science, computer engineering, and Applied Computing, CSCE 2023
作者: Tangarife, Ricardo Velásquez, Ricardo A. Rivera, Fredy University of Antioquia Dept. Electronics Engineering Medellín Colombia University of Antioquia Dept. Computer Science Medellín Colombia
This paper focuses on acoustic event recognition, a significant research area in various fields, including security, medicine, and entertainment. The study explores the design space of combining convolutional neural n... 详细信息
来源: 评论
Steganographic Encryption and Decryption Using Duality Preserving GANs  22
Steganographic Encryption and Decryption Using Duality Prese...
收藏 引用
22nd IEEE International Conference on Industrial informatics, INDIN 2024
作者: Shah, Aaryak Kamal, Alok Kumar Neeraj Dept. of Information Technology ABV-IIITM Gwalior Gwalior India Dept. of Electrical/Electronics ABV-IIITM Gwalior Gwalior India Dept. of Computer Science and Engineering Mahindra University Hyderabad India
Image steganography has been a significant research area in the security sphere. The core idea revolves around embedding secret messages in existing images (covers) such that the resultant image displays no noticeable... 详细信息
来源: 评论
Generating Automated Assistance Mechanism in Android Programming Self-learning System Using Automatic Testing Tools
Generating Automated Assistance Mechanism in Android Program...
收藏 引用
2023 International Conference on Innovation and Intelligence for informatics, Computing, and Technologies, 3ICT 2023
作者: Syaifudin, Yan Watequlis Liliana, Dewi Yanti Kaswar, Andi Baso Fatmawati, Triana Funabiki, Nobuo Siradjuddin, Indrazno State Polytechnic of Malang Dept. of Information Technology Malang Indonesia State Polytechnic of Jakarta Dept. of Informatics Engineering Jakarta Indonesia State University of Makassar Dept. of Computer Engineering Makassar Indonesia Okayama University Dept. of Elec. and Comm. Engineering Okayama Japan State Polytechnic of Malang Dept. of Electrical Engineering Malang Indonesia
Nowadays, computer-assisted learning (CAL) has experienced a significant increase in demand for self-learning purposes with the mechanism of automated assistance to facilitate assessments and provide instant feedback ... 详细信息
来源: 评论
Privacy-Preserving Network Intrusion Detection using Federated Learning  14
Privacy-Preserving Network Intrusion Detection using Federat...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Abhijit, Chunduru Sri Himmatramka, Rishav Bishoyi, Aum Shiva Rama Prasath, Lallith Subbulakshmi, T. Vellore Institute of Technology Dept. of Computer Science Chennai India Vellore Institute of Technology Dept. of Electronics Engineering Chennai India
Internet of Things (IoT) devices are more vulnerable to viruses, assaults, and harmful activities as they are developed in tandem with the rise in cybercrime. Network Intrusion Detection Systems (NIDS) are generally u... 详细信息
来源: 评论
AI-Powered Advertisement Design: A PIL-Based Approach for Quality and Performance Analysis  3
AI-Powered Advertisement Design: A PIL-Based Approach for Qu...
收藏 引用
3rd International Conference on Intelligent and Innovative Technologies in Computing, Electrical and electronics, IITCEE 2025
作者: Chilupuri, Harshitha Ramesh, G. Praveen, J. Gude, Venkataramaiah Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Artificial Intelligence and Machine Learning Hyderabad India Gokaraju Rangaraju Institute of Engineering and Technology Dept. of Computer Science and Engineering Hyderabad500090 India Gokaraju Rangaraju Institute of Engineering and Technology Department of Electrical and Electronics Engineering Telangana Hyderabad500 090 India Gp Technologies Llc United States
The paper presents the development of a Data Science solution that applies generative AI models in order to create high-quality images to be used in visual marketing and advertising. Using the Python library PIL (Pill... 详细信息
来源: 评论
Offensive Message Spam Detection in Social Media Using Long Short-Term Memory  3
Offensive Message Spam Detection in Social Media Using Long ...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Sivakumar, M. Abishek, S.A. Karthik, N. Vanitha, J. National Institute of Technology Dept. of Electrical and Electronics Engineering Puducherry India National Institute of Technology Dept. of Computer Science Engineering Puducherry India National Institute of Technology Puducherry India E.G.S.Pillay Engineering College Nagapattinam India
In this world, online communication has become an essential part in our daily lives. Almost everyone uses social media platforms to communicate with the whole world. But this also leads to a major problem: cyberbullyi... 详细信息
来源: 评论
Enhancement of Electronic Medical Record (EMR) Security in Private Networks with Blockchains  3
Enhancement of Electronic Medical Record (EMR) Security in P...
收藏 引用
3rd IEEE International Conference on Electronic engineering, ICEEM 2023
作者: El-Hamed, Osama M. Abd El-Samie, Fathi E. Abd El-Atty, Saied M. Abd El-Din Hemdan, Ezz Badawy, Wael Menoufia University Faculty of Electronic Engineering Dept. of Electronics and Electrical Communications Menouf Egypt Menoufia University Faculty of Electronic Engineering Dept. of Computer Ecience and Engineering Menouf Egypt University of Hertfordshire Hosted by Gaf School of Physics Engineering and Computer Science United Kingdom
In this paper, we propose a system for improving the security of Electronic Medical Records (EMRs) in private networks using Blockchain technology. There are currently problems with data integrity in database systems ... 详细信息
来源: 评论
Generalization Evaluation of Seq2seq based Fog Computing Application Placement Algorithm on Limited Dataset  3
Generalization Evaluation of Seq2seq based Fog Computing App...
收藏 引用
3rd International Conference on Intelligent Cybernetics Technology and Applications, ICICyTA 2023
作者: Pakpahan, Michael S. M. Nugroho, Lukito Edi Widyawan, Widyawan Wardhana, Ajie Kusuma Muhammad Ardian, R.A. Astagenta, Rangga Satria Universitas Gadjah Mada Dept. of Electrical and Information Engineering Yogyakarta Indonesia Universitas Amikom Yogyakarta Faculty of Computer Science Dept. Informatics Yogyakarta Indonesia
Addressing its growing number and vital role, decentralization of cloud computing becoming a necessity. Fog computing aims to bring application closer to the data source-typically at the network's edge by leveragi... 详细信息
来源: 评论
Sentiment Analysis for Curriculum of Independent Learning Based on Naïve Bayes with Laplace Estimator  2
Sentiment Analysis for Curriculum of Independent Learning Ba...
收藏 引用
2nd International Conference on Information Technology Research and Innovation, ICITRI 2023
作者: Ariefah, Amelia Widodo Nugraheni, Murien State University of Jakarta Dept. of Informatics and Computer Engineering Education Jakarta Indonesia State University of Jakarta Dept. of Information System and Technology Jakarta Indonesia
Curriculum changes have a significant impact on the field of education in Indonesia, especially in universities. This is because the curriculum is used as a means to achieve the goals of educational success as well as... 详细信息
来源: 评论