咨询与建议

限定检索结果

文献类型

  • 161 篇 会议
  • 106 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 268 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 171 篇 工学
    • 126 篇 计算机科学与技术...
    • 103 篇 软件工程
    • 41 篇 信息与通信工程
    • 31 篇 控制科学与工程
    • 23 篇 生物工程
    • 21 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 15 篇 生物医学工程(可授...
    • 14 篇 动力工程及工程热...
    • 13 篇 机械工程
    • 12 篇 安全科学与工程
    • 9 篇 仪器科学与技术
    • 9 篇 交通运输工程
    • 8 篇 建筑学
    • 8 篇 网络空间安全
    • 7 篇 光学工程
  • 88 篇 理学
    • 41 篇 数学
    • 26 篇 生物学
    • 20 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 11 篇 系统科学
    • 7 篇 大气科学
  • 46 篇 管理学
    • 31 篇 管理科学与工程(可...
    • 18 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 15 篇 医学
    • 12 篇 基础医学(可授医学...
    • 12 篇 临床医学
    • 9 篇 公共卫生与预防医...
  • 10 篇 法学
    • 8 篇 社会学
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 9 篇 农学
  • 5 篇 教育学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 12 篇 machine learning
  • 10 篇 deep learning
  • 9 篇 convolutional ne...
  • 8 篇 internet of thin...
  • 7 篇 computational mo...
  • 7 篇 artificial intel...
  • 6 篇 optimization
  • 6 篇 predictive model...
  • 6 篇 real-time system...
  • 6 篇 feature extracti...
  • 6 篇 accuracy
  • 5 篇 support vector m...
  • 5 篇 blockchain
  • 5 篇 adaptation model...
  • 4 篇 routing
  • 4 篇 smart cities
  • 4 篇 protocols
  • 4 篇 diseases
  • 4 篇 cloud computing
  • 3 篇 smart homes

机构

  • 19 篇 faculty of infor...
  • 15 篇 school of comput...
  • 9 篇 yunnan key labor...
  • 8 篇 school of comput...
  • 8 篇 department of in...
  • 8 篇 kiit deemed to b...
  • 7 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 yunnan key labor...
  • 5 篇 fujian provincia...
  • 4 篇 yunnan provincia...
  • 4 篇 college of mecha...
  • 4 篇 czech technical ...
  • 4 篇 department of in...
  • 4 篇 king abdul aziz ...
  • 4 篇 department of co...
  • 3 篇 department of cy...
  • 3 篇 department of co...
  • 3 篇 department of lo...
  • 3 篇 school of comput...

作者

  • 14 篇 barik lalbihari
  • 13 篇 patra sudhansu s...
  • 11 篇 lalbihari barik
  • 11 篇 sudhansu shekhar...
  • 6 篇 bibhuti bhusan d...
  • 6 篇 liu li
  • 6 篇 qian qian
  • 5 篇 fu xiaodong
  • 5 篇 feng yong
  • 5 篇 li chuan
  • 5 篇 nguyen trong-the
  • 5 篇 alsarhan ayoub
  • 5 篇 ngo truong-giang
  • 5 篇 dao thi-kien
  • 5 篇 barik rabindra k...
  • 4 篇 zhao zhengang
  • 4 篇 yu jie
  • 4 篇 fu yunfa
  • 4 篇 pissis solon p.
  • 4 篇 li yingna

语言

  • 253 篇 英文
  • 14 篇 其他
  • 2 篇 中文
检索条件"机构=Faculty of Computer Applications and Information Technology"
268 条 记 录,以下是181-190 订阅
排序:
OpenLS-DGF: An Adaptive Open-Source Dataset Generation Framework for Machine Learning Tasks in Logic Synthesis
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Ni, Liwei Wang, Rui Liu, Miao Meng, Xingyu Lin, Xiaoze Liu, Junfeng Luo, Guojie Chu, Zhufei Qian, Weikang Yang, Xiaoyan Xie, Biwei Li, Xingquan Li, Huawei Chinese Academy of Sciences State Key Lab of Processors Institute of Computing Technology Beijing100190 China Pengcheng Laboratory Shenzhen518055 China University of Chinese Academy of Sciences Beijing101408 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China University of Chinese Academy of Sciences School of Computer Science and Technology Beijing100049 China Peking University School of Computer Science Center for Energy-Efficient Computing and Applications Beijing100871 China Ninbo University Faculty of Electrical Engineering and Computer Science Ninbo315211 China Shanghai Jiao Tong University University of Michigan-Shanghai Jiao Tong University Joint Institute MoE Key Laboratory of Artificial Intelligence Shanghai200240 China Hangzhou Dianzi University School of Electronics and Information Engineering Hangzhou311121 China
This paper introduces OpenLS-DGF, an adaptive logic synthesis dataset generation framework, to enhance machine learning (ML) applications within the logic synthesis process. Previous dataset generation flows were tail... 详细信息
来源: 评论
A WiVi Based IoT Framework for Detection of Human Trafficking Victims Kept in Hideouts  1
收藏 引用
5th International Conference on Internet of Things, ICIOT 2020, held as part of the Services Conference Federation, SCF 2020
作者: Samanta, Sidharth Singhar, Sunil Samanta Gandomi, A.H. Ramasubbareddy, Somula Sankar, S. Department of Computer Science and Applications Utkal University BhubaneswarOdisha India Department of Computer Science and Engineering IIIT Bhubaneswar BhubaneswarOdisha India Faculty of Engineering and Information Technology University of Technology Sydney Ultimo Australia Department of Information Technology VNRVJIET HyderabadTelangana500090 India Department of Computer Science Engineering Sona College of Technology SalemTamilnadu636005 India
Human trafficking is the trade of humans for the purpose of forced labor, sexual slavery, or commercial sexual exploitation for the trafficker or others. The traffickers often trick, defraud, or physically force victi... 详细信息
来源: 评论
A Hybrid GRU-Transformer Model for Financial Forecasting and Risk Management
A Hybrid GRU-Transformer Model for Financial Forecasting and...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Rahul Pradhan Malik Bader Alazzam Sarika Keswani Narinder Kumar Bhasin Nadhema Ahmed Jaff S Muthuperumal Department of Computer Engineering & Applications GLA University Mathura India Faculty of Information Technology Jadara University Irbid Jordan Symbiosis Centre for Management Studies Nagpur (SCMS Nagpur) Symbiosis International (Deemed University) Pune India Indian Institute of Banking and Finance Mumbai India Department of Business Administration College of Administrative and Financial Sciences Knowledge University Erbil Iraq Department of Mathematics K.Ramakrishnan College of Engineering Trichy India
Financial sector demands precise forecasting models to mitigate risk and optimize asset management. This study presents a novel Hybrid GRU-Transformer Model that integrates Gated Recurrent Units (GRUs) for capturing l... 详细信息
来源: 评论
An Analysis of Different Cryptocraphy Techniques and the Role of Coding and information Theories in Overcoming Security Threats
An Analysis of Different Cryptocraphy Techniques and the Rol...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Mohammed Shakeel A. Sirisha Ankita Joshi R. Ushasree M. Vaishnavi Devvret Verma Faculty of Computer Applications Invertis University Bareilly Rajau Paraspur Uttar Pradesh Department of Information technology Vignan’s Institute of information technology (Autonomous) Visakhapatnam Andra Pradesh Uttaranchal University Dehradun Uttarakhand India Department of MCA Dayananda Sagar Academy of Technology & Management VTU CSE Bannari Amman Institute of Technology Erode Tamil Nadu India Department of Biotechnology Graphic Era Deemed to be University Dehradun Uttarakhand India
In order to maintain the privacy and secrecy of information, security is essential. There are numerous encryption techniques available to safeguard data while it is being transmitted or stored. Communication security ... 详细信息
来源: 评论
A Lightweight Feature Selection Method Based on Rankability
SSRN
收藏 引用
SSRN 2024年
作者: Kong, Lingping Velasquez, Juan D. Perfilieva, Irina Pant, Millie Pan, Jeng-Shyang Snášel, Václav Department of Computer Science VSB-Technical University of Ostrava Ostrava Czech Republic Department of Industrial Engineering University of Chile Santiago Chile Santiago Chile Institute for Research and Applications of Fuzzy Modeling Centre of Excellence IT4Innovations division of The University of Ostrava Ostrava Czech Republic Department of Applied Mathematics and Scientific Computing Indian Institute of Technology Uttarakhand Roorkee247667 India School of Artificial Intelligence Nanjing University of Information Science and Technology China Instituto Sistemas Complejos de Ingeniería Santiago Chile Santiago Chile Faculty of Computer Science and Telecommunications Cracow University of Technology Kraków Poland Mehta Family School of Data Science and Artificial Intelligence Indian Institute of Technology Uttarakhand Roorkee247667 India College of Computer Science and Engineering Shandong University of Science and Technology China
Within the realm of data mining and machine learning, feature selection stands out as an essential technique for dimensionality reduction, presenting both popularity and complexity. Feature selection involves a nuance... 详细信息
来源: 评论
Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data
收藏 引用
computers, Materials & Continua 2020年 第10期65卷 87-107页
作者: Bao Le Nguyen E.Laxmi Lydia Mohamed Elhoseny Irina V.Pustokhina Denis A.Pustokhin Mahmoud Mohamed Selim Gia Nhu Nguyen K.Shankar Faculty of Information Technology Duy Tan UniversityDa Nang550000Vietnam Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Faculty of Computers and Information Mansoura UniversityMansoura35516Egypt Department of Entrepreneurship and Logistics Plekhanov Russian University of EconomicsMoscow115093Russia Department of Logistics State University of ManagementMoscow109542Russia Department of Mathematics College of Science&Humanities in AlaflajPrince Sattam bin Abdulaziz UniversityAlaflaj16278Saudi Arabia Graduate School Duy Tan UniversityDa Nang550000Vietnam Department of Computer Applications Alagappa UniversityKaraikudi630003India
In present digital era,an exponential increase in Internet of Things(IoT)devices poses several design issues for business concerning security and *** studies indicate that the blockchain technology is found to be a si... 详细信息
来源: 评论
Brain computer Interaction Framework for Speech and Motor Impairment Using Deep Learning
Brain Computer Interaction Framework for Speech and Motor Im...
收藏 引用
International Conference on Power Energy, Environment and Intelligent Control (PEEIC)
作者: Abhijit T. Somnathe Iftikhar Aslam Tayubi Pundru Chandra Shaker Reddy Nipun Sharma Vikas Sharma Mannava Yesubabu Electronics and Telecommunication Engineering Smt. Kashibai Navale College of Engineering Pune India Faculty of Computing and Information Technology Rabigh King Abdulaziz University Jeddah Saudi Arabia School of Computer Sicence and Engineering Manipal University Jaipur Jaipur Rajasthan India Electronics and Communication Engineering Presidency University Bangalore Karnataka India School of Computer Science & Applications IIMT University Meerut Uttar Pradesh India Computing Science and Engineering Vardhaman College of Engineering Hyderabad Telangana India
Some people may have trouble communicating with others because of motor and speech difficulties brought on by accidents, strokes, or diseases. Paralyzed people often struggle to communicate their demands, which can ma...
来源: 评论
Module Placement Scheme Using MPC4.5 with Markov Chain Process for Mobile Fog Computing Environment
Module Placement Scheme Using MPC4.5 with Markov Chain Proce...
收藏 引用
International Conference on Computing, Communication, and Intelligent Systems (ICCCIS)
作者: Rasmita Patro Sudhansu Shekhar Patra Lalbihari Barik Ajaya Dev Prusty Rabindra K. Barik School of Computer Engineering KIIT Deemed to be University Bhubaneswar India School of Computer Applications KIIT Deemed to be University Bhubaneswar India Faculty of Computing and Information Technology in Rabigh King Abdul Aziz University Kingdom of Saudi Arabia
Mobile Fog computing (MFC) is an elongation to cloud computing in which the processing is performed near the IoT devices. It reduces latency and energy consumption in the system and the idle choice for healthcare appl... 详细信息
来源: 评论
A New-fangled Classification Algorithm for Medical Heart Diseases Analysis using Wavelet Transforms
收藏 引用
Open Public Health Journal 2024年 17卷
作者: Nayak, Soumya Ranjan Selvarasu, Sivakumar Sripathy, B. Singh, Prabhishek Diwakar, Manoj Gupta, Indrajeet Ravi, Vinayakumar Mazroa, Alanoud Al School of Computer Engineering KIIT Deemed to be University Odisha Bhubaneswar 751024 India Department of Computer Applications Faculty of Science and Humanities SRM Institute of Science and Technology Kattankulathur Chennai 603203 India Department of Mathematics School of Advanced Sciences Vellore Institute of Technology (VIT) Vellore 632 014 India School of Computer Science Engineering & Technology Bennett University Greater Noida India CSE Department Graphic Era deemed to be University Uttarakhand Dehradun India Graphic Era Hill University Uttarakhand Dehradun India School of Computer Science & AI SR University Telangana Warangal 506371 India Center for Artificial Intelligence Prince Mohammad Bin Fahd University Khobar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University (PNU) P.O. Box 84428 Riyadh 11671 Saudi Arabia
Background: In this article, the Mixed Mode Database Miner (MMDBM) algorithm is introduced for the classification of data. This algorithm depends on the decision tree classifier, which handles the numerical and catego... 详细信息
来源: 评论
An Effective Evaluation of SONARS using Arduino and Display on Processing IDE
An Effective Evaluation of SONARS using Arduino and Display ...
收藏 引用
computer, Power and Communications (ICCPC), International Conference on
作者: R.G. Vidhya B Kezia Rani Kamlesh Singh D. Kalpanadevi Jyothi Prasad Patra T. Aditya Sai Srinivas Department of ECE HKBK College of Engineering Bangalore India Department of information Technology Vasavi College of Engineering Hyderabad India Department of Computer Science and Engineering GraphicbEra Hill University Dehradun India Department of Computer Applications Kalasalingam Academy of Research and Education Krishnan koil Tamilnadu India Faculty of Electrical Odisha university of Technology and Research OUTR Bhubaneswar odisha India Department of Computer Science and Engineering G. Pulla Reddy Engineering college Kurnool Andhra pradesh India
Sonars are used by SAR teams to identify and retrieve submerged objects like cars and planes. In the event of extensive searches, where sonar operators may become fatigued and overlook the possible item, strategies fo... 详细信息
来源: 评论