咨询与建议

限定检索结果

文献类型

  • 901 篇 会议
  • 176 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 1,092 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 624 篇 工学
    • 457 篇 计算机科学与技术...
    • 366 篇 软件工程
    • 174 篇 信息与通信工程
    • 97 篇 电子科学与技术(可...
    • 84 篇 控制科学与工程
    • 67 篇 电气工程
    • 59 篇 生物工程
    • 46 篇 机械工程
    • 41 篇 生物医学工程(可授...
    • 40 篇 光学工程
    • 39 篇 动力工程及工程热...
    • 39 篇 安全科学与工程
    • 29 篇 仪器科学与技术
    • 27 篇 化学工程与技术
    • 26 篇 网络空间安全
    • 23 篇 交通运输工程
  • 291 篇 理学
    • 173 篇 数学
    • 69 篇 物理学
    • 68 篇 生物学
    • 52 篇 统计学(可授理学、...
    • 31 篇 系统科学
    • 25 篇 化学
  • 162 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 38 篇 工商管理
  • 37 篇 医学
    • 33 篇 临床医学
    • 31 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 22 篇 法学
    • 19 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 16 篇 农学
  • 5 篇 文学
  • 3 篇 教育学
  • 1 篇 军事学

主题

  • 36 篇 feature extracti...
  • 30 篇 computer science
  • 26 篇 accuracy
  • 25 篇 computational mo...
  • 23 篇 training
  • 21 篇 deep learning
  • 20 篇 real-time system...
  • 20 篇 data models
  • 17 篇 routing
  • 16 篇 internet of thin...
  • 16 篇 computer archite...
  • 16 篇 machine learning
  • 16 篇 artificial intel...
  • 15 篇 support vector m...
  • 15 篇 authentication
  • 15 篇 hardware
  • 15 篇 testing
  • 14 篇 forecasting
  • 14 篇 robustness
  • 13 篇 logic gates

机构

  • 39 篇 dept. of compute...
  • 33 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 dept. of comput....
  • 9 篇 dept. of compute...
  • 9 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of electri...
  • 8 篇 school of comput...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 8 篇 dept. of compute...
  • 7 篇 dept. of compute...
  • 7 篇 dept. of electro...
  • 7 篇 dept. of compute...
  • 7 篇 department of co...

作者

  • 24 篇 bhattacharya arn...
  • 15 篇 saxena sanjeev
  • 12 篇 nandi sukumar
  • 10 篇 bhargab b. bhatt...
  • 9 篇 sudip misra
  • 8 篇 p. venkata krish...
  • 8 篇 mohammad s. obai...
  • 8 篇 shantaram vasika...
  • 8 篇 surajeet ghosh
  • 7 篇 goyal pawan
  • 7 篇 hemangee k. kapo...
  • 6 篇 murthy hema a.
  • 6 篇 venu nookala
  • 6 篇 jayanta mukhopad...
  • 6 篇 ravindran balara...
  • 6 篇 mukhopadhyay deb...
  • 6 篇 nookala venu
  • 6 篇 hafizur rahaman
  • 6 篇 ghosh uttam
  • 6 篇 basu deborsi

语言

  • 1,045 篇 英文
  • 46 篇 其他
  • 1 篇 日文
检索条件"机构=Dept.of Computer Science and Engineering Indian Institute of Technology"
1092 条 记 录,以下是241-250 订阅
排序:
A Novel Technique to Parameterize Congestion Control in 6TiSCH IIoT Networks
arXiv
收藏 引用
arXiv 2024年
作者: Chakraborty, Kushal Dutta, Aritra Kumar Hussain, Mohammad Avesh Mohiuddin, Syed Raafay Choudhury, Nikumani Matam, Rakesh Mukherjee, Mithun Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Hyderabad Pilani India Dept. of Computer Science & Engineering Indian Institute of Information Technology Guwahati India Nanjing University of Information Science and Technology Nanjing China
The Industrial Internet of Things (IIoT) refers to the use of interconnected smart devices, sensors, and other technologies to create a network of intelligent systems that can monitor and manage industrial processes. ... 详细信息
来源: 评论
PUFBind: PUF-Enabled Lightweight Program Binary Authentication for FPGA-based Embedded Systems
arXiv
收藏 引用
arXiv 2025年
作者: Swaroopa, Sneha Balijabudda, Venkata Sreekanth Chakraborty, Rajat Subhra Chakrabarti, Indrajit Dept. of Computer Science and Engineering Indian Institute of Technology Kharagpur West Bengal Kharagpur721302 India Dept. of Electronics and Electrical Communication Engineering Indian Institute of Technology Kharagpur West Bengal Kharagpur721302 India
Field Programmable Gate Array (FPGA)-based embedded systems have become mainstream in the last decade, often in security-sensitive applications. However, even with an authenticated hardware platform, compromised softw... 详细信息
来源: 评论
Optimization of Imprecise Multiplier Circuits by using Binary Decision Diagram  9
Optimization of Imprecise Multiplier Circuits by using Binar...
收藏 引用
9th IEEE International Symposium on Smart Electronic Systems, iSES 2023
作者: Choudhary, Pooja Bhargava, Lava Vinod, G.U. Suhag, Ashok Kumar Fujita, Mashahiro Singh, Virendra Swami Keshvanand Institute of Technology Management and Gramothan Dept. of Electronics and Communication Engineering Jaipur India Malaviya National Institute of Technology Jaipur India Malaviya National Institute of Technology Dept. of Electronics and Communication Engineering Jaipur India Qualcomm Bangalore India Bml Munjal University Dept. of Electronics and Communication Engineering Haryana India Vlsi Design and Education Center University of Tokyo Japan Indian Institute of Technology Dept. of Electrical Engineering Dept. of Computer Science Engineering Bombay India
Imprecise multipliers are employed to enhance the efficiency and reduce the power consumption of arithmetic circuits while tolerating acceptable levels of inaccuracy in the outcomes. The multiplier circuit has a broad... 详细信息
来源: 评论
Prediction of COVID-19 Through Chest X-Ray Images Employing Various Machine Learning Techniques  1
Prediction of COVID-19 Through Chest X-Ray Images Employing ...
收藏 引用
1st International Conference on Intelligent Controller and Computing for Smart Power, ICICCSP 2022
作者: Saheb, Shaik Khasim Narayanan, B. Rao, Thota Venkat Narayana Annamalai University Dept.of Cse Tamilnadu Chidambaram India Sreenidhi Institute of Science and Technology Department of Cse Hyderabad India Annamalai Univeristy Computer Science and Engineering Wing D.D.E Annamalai Nagar Tamilnadu Chidambaram India Sreenidhi Institute of Science and Technology Department of Computer Science and Engineering and HoD-CSE Iot Telangana Hyderabad India
The COVID-19 is the most infectious disease which is recently discovered. The COVID-19 pandemic has led to excruciating loss to human life and it also caused mild to severe respiratory illness, including death. Detect... 详细信息
来源: 评论
RSZero-CSAT: Zero-Shot Scene Classification in Remote Sensing Imagery using a Cross Semantic Attribute-guided Transformer
RSZero-CSAT: Zero-Shot Scene Classification in Remote Sensin...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Damalla Rambabu Swetha G Rajeshreddy Datla Vishnu Chalavadi C Krishna Mohan Department of Computer Science and Engineering Indian Institute of Technology Hyderabad Dept. of Space Advanced Data Processing Research Institute (ADRIN) Secunderabad India Indian Institute of Technology Tirupati India
Zero-shot learning (ZSL) based scene classification aims to recognize unseen classes by transferring semantic information from seen classes. The applicability of ZSL for scene classification in remote sensing images b... 详细信息
来源: 评论
A Multistage Cascaded Neural Network Model to Identify the Severity of Epileptic Attack
A Multistage Cascaded Neural Network Model to Identify the S...
收藏 引用
IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES)
作者: Martha Simon Lidiya Lilly Thampi Dept. of Computer Science College of Engineering Trivandrum (CET) Trivandrum India Dept. of Computer Science Indian Institute of Information Technology Kottayam Kottayam India
Epilepsy is a neurological disorder characterized by recurrent seizures, impacting the quality of life for millions of individuals worldwide. Timely and accurate detection of epileptic seizures is crucial for proper d... 详细信息
来源: 评论
QuAKE: Speeding up Model Inference Using Quick and Approximate Kernels for Exponential Non-Linearities
arXiv
收藏 引用
arXiv 2024年
作者: Narayanaswami, Sai Kiran Srinivasan, Gopalakrishnan Ravindran, Balaraman Centre for Responsible AI Indian Institute of Technology Madras India Robert Bosch Centre for Data Science and AI Dept. of Computer Science and Engineering Indian Institute of Technology Madras India Wadhwani School of Data Science and AI Indian Institute of Technology Madras India
As machine learning gets deployed more and more widely, and model sizes continue to grow, improving computational efficiency during model inference has become a key challenge. In many commonly used model architectures... 详细信息
来源: 评论
Analysis and Modeling of Flicker Noise in Ferroelectric FinFETs
Analysis and Modeling of Flicker Noise in Ferroelectric FinF...
收藏 引用
2022 IEEE International Conference on Emerging Electronics, ICEE 2022
作者: Kumar, Abhishek Pahwa, Girish Behera, Amit Kumar Bulusu, Anand Mehrotra, Shruti Dasgupta, Avirup Indian Institute of Technology Roorkee Dept. of Electronics and Communication Roorkee India Electrical Engg. and Computer Science University of California Berkeley United States Indian Institute of Technology Kanpur Dept. of Electrical Engineering Kanpur India
This paper presents an in-depth analysis of the flicker noise (1/f noise) in Field Effect Transistors (FETs) with ferroelectric gate stack. The analysis is valid for all ferroelectric FETs (FeFETs). We have also propo... 详细信息
来源: 评论
Physical-Design Aware Scan Cell Reordering for Low Power Testing
Physical-Design Aware Scan Cell Reordering for Low Power Tes...
收藏 引用
East-West Design & Test Symposium (EWDTS)
作者: Rohit Badjatya Vinay Rahul Kumar Jaynarayan T Tudu Masahiro Fujita Virendra Singh Dept. of Electrical Engineering Indian Institute of Technology Bombay Mumbai India Dept. of Computer Science Engineering Indian Institute of Technology Tirupati India Tirupati India Dept. of Electrical Engineering University of Tokyo Tokyo Japan
Scan chain architecture is widely employed in modern VLSI design for test applications. However, it often leads to high power consumption during testing. The architecture experiences elevated simultaneous switching ac... 详细信息
来源: 评论
Steganalysis on Dual-Layer Security of Messages Using Steganography and Cryptography
Steganalysis on Dual-Layer Security of Messages Using Stegan...
收藏 引用
International Conference on Information technology and Electrical engineering (ICITEE)
作者: Zeba Shamsi Anish Kumar Saha Ripon Patgiri Khoirom Motilal Singh Laiphrakpam Dolendro Singh Dept. of Computer Science and Engineering National Institute of Technology Silchar Assam India Dept. of Computer Science and Engineering Indian Institute of Information Technology Senapati Manipur India
Recently, Bansal et al. proposed a dual-layer message security technique using steganography and cryptography. An index table maps each text data to an index point and an elliptic curve point. The text data are encryp...
来源: 评论