咨询与建议

限定检索结果

文献类型

  • 13,794 篇 会议
  • 7,684 篇 期刊文献
  • 257 册 图书

馆藏范围

  • 21,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,436 篇 工学
    • 10,390 篇 计算机科学与技术...
    • 8,665 篇 软件工程
    • 3,411 篇 信息与通信工程
    • 2,162 篇 控制科学与工程
    • 1,904 篇 生物工程
    • 1,594 篇 电气工程
    • 1,407 篇 生物医学工程(可授...
    • 1,175 篇 光学工程
    • 1,170 篇 电子科学与技术(可...
    • 834 篇 网络空间安全
    • 791 篇 机械工程
    • 677 篇 安全科学与工程
    • 633 篇 动力工程及工程热...
    • 592 篇 交通运输工程
    • 584 篇 仪器科学与技术
    • 556 篇 化学工程与技术
  • 6,839 篇 理学
    • 3,489 篇 数学
    • 2,090 篇 生物学
    • 1,772 篇 物理学
    • 1,216 篇 统计学(可授理学、...
    • 742 篇 系统科学
    • 653 篇 化学
  • 4,015 篇 管理学
    • 2,427 篇 管理科学与工程(可...
    • 1,769 篇 图书情报与档案管...
    • 1,067 篇 工商管理
  • 1,565 篇 医学
    • 1,223 篇 临床医学
    • 1,120 篇 基础医学(可授医学...
    • 820 篇 公共卫生与预防医...
    • 655 篇 药学(可授医学、理...
  • 849 篇 法学
    • 701 篇 社会学
  • 373 篇 经济学
  • 334 篇 农学
  • 236 篇 教育学
  • 183 篇 文学
  • 32 篇 军事学
  • 28 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 922 篇 deep learning
  • 848 篇 accuracy
  • 539 篇 computational mo...
  • 491 篇 machine learning
  • 459 篇 feature extracti...
  • 443 篇 training
  • 394 篇 real-time system...
  • 382 篇 predictive model...
  • 371 篇 internet of thin...
  • 321 篇 convolutional ne...
  • 316 篇 support vector m...
  • 285 篇 computer science
  • 269 篇 data models
  • 264 篇 semantics
  • 259 篇 optimization
  • 231 篇 neural networks
  • 220 篇 computer archite...
  • 214 篇 reliability
  • 214 篇 scalability
  • 204 篇 image segmentati...

机构

  • 261 篇 department of co...
  • 166 篇 school of comput...
  • 138 篇 school of comput...
  • 136 篇 school of comput...
  • 122 篇 department of co...
  • 118 篇 school of comput...
  • 112 篇 school of comput...
  • 106 篇 department of co...
  • 105 篇 department of co...
  • 103 篇 school of comput...
  • 101 篇 college of compu...
  • 101 篇 national enginee...
  • 99 篇 department of co...
  • 98 篇 school of comput...
  • 94 篇 department of co...
  • 93 篇 north-west unive...
  • 93 篇 institut univers...
  • 87 篇 infn sezione di ...
  • 87 篇 national centre ...
  • 82 篇 tno technical sc...

作者

  • 122 篇 niyato dusit
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 calvo d.
  • 92 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 86 篇 coleiro a.
  • 85 篇 gozzini s.r.
  • 84 篇 zheng wei-shi
  • 82 篇 anjali t.
  • 81 篇 dallier r.
  • 73 篇 kalekin o.
  • 65 篇 anguita m.
  • 64 篇 boettcher m.
  • 61 篇 huang f.
  • 56 篇 kulikovskiy v.
  • 53 篇 benoit d.m.

语言

  • 17,458 篇 英文
  • 4,166 篇 其他
  • 168 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=MTech Computer Science and Engineering School of Computing Science and Engineering"
21735 条 记 录,以下是4231-4240 订阅
排序:
Prognostics of rolling element bearing based on combined SSA-VMD and CNN-BiGRU models
Prognostics of rolling element bearing based on combined SSA...
收藏 引用
2023 CAA Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS 2023
作者: Zhang, Bangcheng Song, Jingyuan Li, Bo Gao, Zhi Changchun Institute of Engineering Changchun University of Technology School of Mechatronics Changchun China Jilin Emergency Management Institute Changchun Institute of Engineering Changchun China Changchun Institute of Engineering School of Computer Science and Computing Changchun China Changchun University of Technology School of Applied Technology Changchun China
In industrial production, rolling element bearings are key rotating components in a wide range of applications. By predicting rolling element bearings, the failure of bearings as well as problems can be detected in ti... 详细信息
来源: 评论
IOT Network Feature Based Intrusion Detection Techniques- Review
IOT Network Feature Based Intrusion Detection Techniques- Re...
收藏 引用
2022 IEEE International Conference on Current Development in engineering and Technology, CCET 2022
作者: Chaudhary, Diwakar Kumar Yadav, Pritaj Gupta, Sanjeev Jha, Kanchan Ravindranath Tagore University Computer Science and Engineering Bhopal India School of Advance Computing Sage University Bhopal India
Communication networks become mobile and dynamic with the usage of portable wireless devices. The Internet of Things network's flexibility creates a risky environment for a variety of applications. Therefore, ther... 详细信息
来源: 评论
Sentiment Analysis using VADER: Unveiling Customer Sentiment and Predicting Buying Behavior in the Airline Industry
Sentiment Analysis using VADER: Unveiling Customer Sentiment...
收藏 引用
Women in Innovation, Technology & Entrepreneurship (ICWITE), IEEE International Conference for
作者: R Annamalai Shaik Atheeq Rasool Deena S K Venkatraman Soundaram Y Computer Science and Engineering Amrita Vishwa Vidyapeetham School of Computing Chennai India Department of CSE Annamalai University Chidambaram Chennai India Computer Science and Engineering Amrita Vishwa Vidyapeetham School of Computing Chennai Computer Science and Engineering St.Peter’s Institute of Higher Education and Research
This study focuses on leveraging sentiment analysis using VADER (Valence Aware Dictionary and Sentiment Reasoner) to analyze customer reviews and predict buying behavior in the airline industry, with a specific focus ...
来源: 评论
Exploring the Cut-Off Between Energy Balance and Delay in In-Network Data Aggregation (I-NDA) for Wireless Sensor Networks
Exploring the Cut-Off Between Energy Balance and Delay in In...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Anuj Kumar Krishna Kant Agrawal School of Computing Science & Engineering Galgotias University Greater Noida India Department of Computer Science Engineering Ajay Kumar Garg Engineering College Ghaziabad School of Computing Science & Engineering Galgotias University Greater Noida Yamuna Expressway Gautam buddh Nagar India
In WSN, data aggregation is an important part of the data collection process. It is used to reduce network traffic and reduce energy consumption. However, this process comes with a cut-off between energy balance and d...
来源: 评论
Enhancing Telecommunications Customer Retention: A Deep Learning Approach Using LSTM for Predictive Churn Analysis
Enhancing Telecommunications Customer Retention: A Deep Lear...
收藏 引用
Data science and Network Security (ICDSNS), International Conference on
作者: M Ranjith Kumar Priyanga S Janani Srinivasan Anusha Veda Chatiyode Jerome Santiago Dharminder Chaudhary School of Computer Science and Engineering Vellore Institute of Technology Chennai India Dept. of Computer Science & Engg Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Dept. of Computer Science & Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India
The telecommunications industry has a significant challenge in customer churn, especially for companies aiming for sustainable growth in a competitive market. To overcome this issue, we suggested a method utilizing Lo... 详细信息
来源: 评论
YOLO: Redefining Real-Time Object Detection Accuracy and Efficiency  3
YOLO: Redefining Real-Time Object Detection Accuracy and Eff...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and computing, AIC 2024
作者: Verma, Shivam Gopikishan Maurya, Sudhanshu Pant, Himanshu Yadav, Ajay Kumar Thomas Varghese, Sneha Garg, Rachit Symbiosis Institute of Technology Nagpur Campus Pune India Graphic Era Hill University School of Computing Uttarakhand India United Institute of Management Department of Computer Application Uttar Pradesh Prayagraj India Lovely Professional University School of Computer Science and Engineering Phagwara India
Image classification, also known as object detection, is an advanced form of computer vision in which a network can predict objects in an image and point them out as bounding boxes. Classifying and recognizing objects... 详细信息
来源: 评论
AI-Enhanced Cloud Security Framework for IoT Networks Using a Predictive Analytics Approach  3
AI-Enhanced Cloud Security Framework for IoT Networks Using ...
收藏 引用
3rd International Conference for Advancement in Technology, ICONAT 2024
作者: Ramesh Naidu, P. Dankan Gowda, V. Gujar, Shantanu Sudhir Shaikh, Salman Firoz Shandilya, Saurabh Sudhakar Reddy, N. Nitte Meenakshi Institute of Technology Department of Computer Science and Engineering Karnataka Bangalore560064 India BMS Institute of Technology and Management Department of Electronics and Communication Engineering Karnataka Bangalore India Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of CyberSecurity RochesterNY14623 United States Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Computer Science RochesterNY14623 United States Poornima College of Engineering Department of Advance Computing Rajasthan Jaipur India Mohan Babu University School of Engineering Department of ECE Tirupati India
The use of IoT with cloud computing has seen a massive improvement when it comes to data processing as well as connectivity. However, this has its own set of security problems like violation of access, leakage of info... 详细信息
来源: 评论
Distributed time-varying formation control with uncertainties based on an event-triggered mechanism
收藏 引用
science China(Information sciences) 2021年 第3期64卷 167-176页
作者: Xiaoduo LI Yumeng BAI Xiwang DONG Qingdong LI Zhang REN Science and Technology on Aircraft Control Laboratory School of Automation Science and Electrical EngineeringBeihang University Department of Electrical and Computer Engineering University of Wisconsin-Madison Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University
This paper investigates the distributed time-varying formation(TVF) problems for general linear multi-agent systems(MASs) subject to matched bounded uncertainties based on an adaptive event-triggered mechanism. A TVF ... 详细信息
来源: 评论
5G-SRNG: 5G Spectrogram-based Random Number Generation for Devices with Low Entropy Sources
5G-SRNG: 5G Spectrogram-based Random Number Generation for D...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023
作者: Catak, Ferhat Ozgur Catak, Evren Elezaj, Ogerta University of Stavanger Electrical Engineering and Computer Science Stavanger Norway Independent Researcher Stavanger Norway School of Computing and Digital Technology Birmingham City University Birmingham United Kingdom
Random number generation (RNG) is a crucial element in security protocols, and its performance and reliability are critical for the safety and integrity of digital systems. This is especially true in 5G networks with ... 详细信息
来源: 评论
Enhancing Intrusion Prevention with Explainable Convolutional Neural Networks: Recent Developments and Promising Applications  8
Enhancing Intrusion Prevention with Explainable Convolutiona...
收藏 引用
8th International Conference on Communication and Electronics Systems, ICCES 2023
作者: Chitnis, Ajay Chandre, Pankaj Pathan, Shafi DevOps Architect Hcl Technologies Uk Limited Pune India Mit Art Design & Technology University Mit School of Computing Department of Computer Science & Engineering Pune India
The proliferation of cyberattacks in recent years has led to an increased demand for effective intrusion prevention systems (IPS). Convolutional Neural Networks (CNNs) have shown promise in improving the accuracy of I... 详细信息
来源: 评论