咨询与建议

限定检索结果

文献类型

  • 4,336 篇 会议
  • 3,181 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 7,556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,591 篇 工学
    • 3,201 篇 计算机科学与技术...
    • 2,659 篇 软件工程
    • 1,134 篇 信息与通信工程
    • 757 篇 控制科学与工程
    • 680 篇 电气工程
    • 635 篇 生物工程
    • 529 篇 生物医学工程(可授...
    • 482 篇 电子科学与技术(可...
    • 413 篇 光学工程
    • 326 篇 机械工程
    • 281 篇 化学工程与技术
    • 272 篇 动力工程及工程热...
    • 259 篇 仪器科学与技术
    • 252 篇 网络空间安全
    • 240 篇 安全科学与工程
    • 215 篇 交通运输工程
  • 2,700 篇 理学
    • 1,214 篇 数学
    • 938 篇 物理学
    • 722 篇 生物学
    • 404 篇 统计学(可授理学、...
    • 297 篇 化学
    • 241 篇 系统科学
  • 1,339 篇 管理学
    • 864 篇 管理科学与工程(可...
    • 529 篇 图书情报与档案管...
    • 390 篇 工商管理
  • 649 篇 医学
    • 545 篇 临床医学
    • 480 篇 基础医学(可授医学...
    • 320 篇 公共卫生与预防医...
    • 255 篇 药学(可授医学、理...
  • 250 篇 法学
    • 196 篇 社会学
  • 155 篇 经济学
  • 154 篇 农学
  • 90 篇 教育学
  • 26 篇 文学
  • 15 篇 艺术学
  • 10 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 314 篇 accuracy
  • 313 篇 deep learning
  • 221 篇 machine learning
  • 201 篇 feature extracti...
  • 199 篇 real-time system...
  • 193 篇 internet of thin...
  • 173 篇 training
  • 168 篇 predictive model...
  • 154 篇 computational mo...
  • 153 篇 convolutional ne...
  • 116 篇 optimization
  • 113 篇 support vector m...
  • 112 篇 security
  • 112 篇 data models
  • 94 篇 cloud computing
  • 89 篇 artificial intel...
  • 89 篇 machine learning...
  • 82 篇 reliability
  • 78 篇 prediction algor...
  • 77 篇 medical services

机构

  • 111 篇 university of sc...
  • 101 篇 college of intel...
  • 95 篇 tianfu cosmic ra...
  • 90 篇 hebei normal uni...
  • 90 篇 college of compu...
  • 89 篇 state key labora...
  • 88 篇 department of ph...
  • 85 篇 yunnan observato...
  • 73 篇 university of ch...
  • 72 篇 key laboratory f...
  • 65 篇 school of physic...
  • 61 篇 college of compu...
  • 57 篇 national astrono...
  • 56 篇 nanyang technolo...
  • 51 篇 institute for nu...
  • 49 篇 center for astro...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...

作者

  • 126 篇 niyato dusit
  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 bastieri d.
  • 74 篇 jiang k.
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 67 篇 li cheng
  • 66 篇 li xin
  • 66 篇 guo y.q.
  • 63 篇 min z.
  • 61 篇 liu b.
  • 60 篇 bao y.w.
  • 59 篇 qin j.j.
  • 59 篇 hu h.b.

语言

  • 6,751 篇 英文
  • 746 篇 其他
  • 55 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=School of Computing College of Engineering and Technology"
7556 条 记 录,以下是481-490 订阅
排序:
The Past, Present, and Future of Storage Technologies (Part 1 of 2)
收藏 引用
ACM TRANSACTIONS ON STORAGE 2025年 第1期21卷 1-3页
作者: Kuenning, Geoff Won, Youjip Zhao, Ming Computer Science Harvey Mudd College Claremont United States Electrical Engineering Korea Advanced Institute of Science and Technology Daejeon Korea (the Republic of) School of Computing and Information Sciences Arizona State University Tempe United States Computer Science Stony Brook University Stony Brook United States
来源: 评论
Mitigation for cloud computing security risks and governance
收藏 引用
International Journal of Cloud computing 2022年 第5-6期11卷 560-567页
作者: Jabez, J. Narmadha, R. Porkodi, S. Devi, L. School of Computing Sathyabama Institute of Science and Technology Chennai India School of Electrical and Electronics Engineering Sathyabama Institute of Science and Technology Chennai India College of Engineering and Computer Science Lebanese French University Erbil Iraq PGCS Department Muthayammal College of Arts and Science Rasipuram India
The recent prosperous of cloud computing has become the biggest revenue for originalities with the issues of intricate servers that need regular maintenance, security, power and cooling systems throughout. Hence, it i... 详细信息
来源: 评论
A Novel Method of Evaluating the Harmonic Power Analyzer's Performance for PC-Based Testing and Measurement Applications Related to Electromagnetic Compatibility  2
A Novel Method of Evaluating the Harmonic Power Analyzer's P...
收藏 引用
2nd International Conference on computing and Data Analytics, ICCDA 2024
作者: Adeline Sneha, J. Wilfred Blessing, N.R. Palarimath, Suresh Poorana Senthilkumar, S. Manigandansekar Sutherlin Subitha, G. School of Computing Asia Pacific University of Technology & Innovation Kuala Lumpur Malaysia College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Oman College of Computing and Information Sciences-Salalah University of Technology and Applied Sciences Oman Dr. N. G. P Arts and Science College Department of Computer Applications Tamil Nadu Coimbatore India Newyork University Abudhabi United Arab Emirates Stella Mary's College of Engineering Department of Computer Science and Engineering Tamil Nadu Kanyakumari India
This paper discusses the methods for performance analysis of a PC-based harmonic power analyzer used in EMC testing and measuring applications. According to IEC 61000-3-2, this is an easy-to-use, reasonably priced way... 详细信息
来源: 评论
Interior Angle Computation for detecting Adversary Sensor in Wireless Sensor Networks
Interior Angle Computation for detecting Adversary Sensor in...
收藏 引用
2023 IEEE International Conference on Intelligent and Innovative Technologies in computing, Electrical and Electronics, ICIITCEE 2023
作者: Saranya, R. Anitha, K. Khan, A. Ayub Sivakumar, M. Arthi, R. RMK College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computing SRM Institute of Science and Technology Kattankulathur Department of Computing Technologies Tamil Nadu Chennai India Sona College of Technology Department of Electronics and Communication Engineering Tamil Nadu Salem India Sri Krishna College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India Tamil Nadu Namakkal India
After being distributed over a wireless sensor network (WSN), the sensor nodes in the network normally remain in the same place permanently. An attacker who compromises a subset of the nodes is not essential to stand ... 详细信息
来源: 评论
AI-Enhanced Cloud Security Framework for IoT Networks Using a Predictive Analytics Approach  3
AI-Enhanced Cloud Security Framework for IoT Networks Using ...
收藏 引用
3rd International Conference for Advancement in technology, ICONAT 2024
作者: Ramesh Naidu, P. Dankan Gowda, V. Gujar, Shantanu Sudhir Shaikh, Salman Firoz Shandilya, Saurabh Sudhakar Reddy, N. Nitte Meenakshi Institute of Technology Department of Computer Science and Engineering Karnataka Bangalore560064 India BMS Institute of Technology and Management Department of Electronics and Communication Engineering Karnataka Bangalore India Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of CyberSecurity RochesterNY14623 United States Rochester Institute of Technology Golisano College of Computing and Information Sciences Department of Computer Science RochesterNY14623 United States Poornima College of Engineering Department of Advance Computing Rajasthan Jaipur India Mohan Babu University School of Engineering Department of ECE Tirupati India
The use of IoT with cloud computing has seen a massive improvement when it comes to data processing as well as connectivity. However, this has its own set of security problems like violation of access, leakage of info... 详细信息
来源: 评论
Design of an Explainable AI-Assisted Arrhythmia Detection and Interpretation Model Using ECG Data
Design of an Explainable AI-Assisted Arrhythmia Detection an...
收藏 引用
International Conference on Business Intelligence and Information technology, BIIT 2023
作者: Banerjee, Sourav Tauro, Jacob Dasgupta, Kousik Barik, Sudip Debnath, Narayan C. Computer Science and Engineering Kalyani Government Engineering College Nadia Kalyani India School of Computing and Information Technology Eastern International University Binh Duong Viet Nam
Arrhythmia is a common cardiac condition characterized by irregular heartbeats that, if left untreated, can have major health effects. In this paper, we present a random forest-based binary classification method for i... 详细信息
来源: 评论
Monitoring and Evaluating ECU Communication Data for Vulnerabilities Detection  5th
Monitoring and Evaluating ECU Communication Data for Vulnera...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Samanta, Samadrita Biswas, Rahul Mishra, Sushruta Kumar, Anil Dheidan, Ali Hasan Kalinga Institute of Industrial Technology Patia Odisha Bhubaneswar751024 India School of Computing DIT University Dehradun India College of Technical Engineering National University of Science and Technology Dhi Qar 64001 Iraq
In today's automotive industry, Electronic Control Units (ECUs) control a large number of functions in vehicles. Increasing cyberattacks on ECUs pose a danger to vehicle safety and security due to the rising depen... 详细信息
来源: 评论
Tangles in IOTA to make crypto currency transactions free and secure
收藏 引用
International Journal of Cloud computing 2022年 第1期11卷 1-13页
作者: Anakath, A.S. Kannadasan, R. Prabakaran, N. Basha, M.S. Saleem Department of MCA EGS Pillai Engineering College Nagapattinam 611002 India School Computer Science and Engineering Vellore Institute of Technology Vellore632014 India Department of Computing and Informatics Mazoon College Muscat133 Oman
Blockchain introduction has made a revolutionary change in the crypto currency around the world but it has not delivered on its promises of free and faster transaction confirmation. Serguei Popov's proposal of usi... 详细信息
来源: 评论
Board 61: Work in Progress: Teaching Logic Design with Interactive Computer Games
Board 61: Work in Progress: Teaching Logic Design with Inter...
收藏 引用
2024 ASEE Annual Conference and Exposition
作者: Ketineni, Arnav Ketineni, Hrithik Liu, Kyle Perkowski, Marek Department of Electrical and Computer Engineering Portland State University United States Robbinsville High School United States Westview High School United States College of Computing Georgia Institute of Technology United States
Sum-of-Products (SOP) expressions are two-level representations of Boolean functions consisting of an OR sum of AND terms. There exist many methods of SOP synthesis, but the Karnaugh map method is the most frequently ... 详细信息
来源: 评论
Prediction of Kidney Disease Utilizing a Hybrid Deep Learning Methodology  2
Prediction of Kidney Disease Utilizing a Hybrid Deep Learnin...
收藏 引用
2nd International Conference on Computer, Communication and Control, IC4 2024
作者: Nallarasan, V. Ponnusamy, Vijayakumar Lakshminarayanan, R. Sona, K. Vigneshwari, S. Vinoth, R. Srm Institute of Science and Technology School of Computing Department of Networking and Communications Chengalpattu Kattankulathur India Srm Institute of Science and Technology Department of Electronics and Communications Chengalpattu Kattankulathur India Sri Ramakrishna Engineering College Department of Computer Science and Engineering India V.S.B College of Engineering Technical Campus India Gojan School of Business and Technology Department of Information Technology RedhillsTamilnadu Chennai600052 India
The kidney is an essential organ inside the human body, playing a crucial role in several physiological processes. One of its primary roles is the filtration of waste products and surplus fluids from the bloodstream, ... 详细信息
来源: 评论