咨询与建议

限定检索结果

文献类型

  • 14,974 篇 会议
  • 2,216 篇 期刊文献
  • 120 册 图书

馆藏范围

  • 17,310 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,262 篇 工学
    • 6,856 篇 计算机科学与技术...
    • 5,737 篇 软件工程
    • 2,975 篇 信息与通信工程
    • 1,728 篇 控制科学与工程
    • 1,613 篇 电子科学与技术(可...
    • 1,592 篇 电气工程
    • 1,049 篇 生物工程
    • 903 篇 生物医学工程(可授...
    • 800 篇 光学工程
    • 710 篇 机械工程
    • 663 篇 动力工程及工程热...
    • 639 篇 仪器科学与技术
    • 536 篇 化学工程与技术
    • 446 篇 安全科学与工程
    • 393 篇 交通运输工程
    • 354 篇 材料科学与工程(可...
  • 5,264 篇 理学
    • 2,713 篇 数学
    • 1,657 篇 物理学
    • 1,159 篇 生物学
    • 897 篇 统计学(可授理学、...
    • 588 篇 系统科学
    • 536 篇 化学
  • 2,485 篇 管理学
    • 1,555 篇 管理科学与工程(可...
    • 1,069 篇 图书情报与档案管...
    • 816 篇 工商管理
  • 783 篇 医学
    • 682 篇 临床医学
    • 635 篇 基础医学(可授医学...
    • 399 篇 药学(可授医学、理...
    • 339 篇 公共卫生与预防医...
  • 461 篇 法学
    • 366 篇 社会学
  • 300 篇 经济学
  • 216 篇 农学
  • 182 篇 教育学
  • 73 篇 文学
  • 41 篇 军事学
  • 11 篇 艺术学
  • 1 篇 历史学

主题

  • 541 篇 accuracy
  • 400 篇 deep learning
  • 388 篇 feature extracti...
  • 378 篇 computational mo...
  • 296 篇 real-time system...
  • 282 篇 support vector m...
  • 258 篇 training
  • 247 篇 internet of thin...
  • 228 篇 machine learning
  • 222 篇 optimization
  • 221 篇 predictive model...
  • 182 篇 computer archite...
  • 180 篇 computer science
  • 175 篇 neural networks
  • 174 篇 reliability
  • 174 篇 wireless communi...
  • 165 篇 data mining
  • 159 篇 wireless sensor ...
  • 158 篇 convolutional ne...
  • 157 篇 monitoring

机构

  • 84 篇 institut univers...
  • 82 篇 north-west unive...
  • 82 篇 national centre ...
  • 82 篇 tno technical sc...
  • 81 篇 nikhef national ...
  • 80 篇 university würzb...
  • 79 篇 infn sezione di ...
  • 77 篇 university of jo...
  • 76 篇 infn sezione di ...
  • 75 篇 université de st...
  • 70 篇 ncsr demokritos ...
  • 66 篇 università di ca...
  • 65 篇 university moham...
  • 52 篇 leiden universit...
  • 51 篇 dept. of compute...
  • 51 篇 university moham...
  • 50 篇 school of automa...
  • 44 篇 infn sezione di ...
  • 43 篇 in2p3 lpc campus...
  • 42 篇 infn lnf via enr...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 84 篇 calvo d.
  • 84 篇 gal t.
  • 84 篇 bozza c.
  • 83 篇 díaz a.f.
  • 82 篇 kalekin o.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 82 篇 gozzini s.r.
  • 81 篇 chen a.
  • 81 篇 dallier r.
  • 78 篇 enzenhöfer a.
  • 77 篇 anguita m.
  • 77 篇 celli s.
  • 75 篇 boettcher m.
  • 74 篇 dornic d.
  • 72 篇 huang f.
  • 72 篇 aly z.
  • 70 篇 carretero v.

语言

  • 15,183 篇 英文
  • 1,889 篇 其他
  • 174 篇 中文
  • 45 篇 日文
  • 20 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=dept. of Computer Technology Engineering"
17310 条 记 录,以下是421-430 订阅
排序:
Blockchain Based Secure and Decentralized Smart Licensing of Charging Vehicles for Rajshahi City Corporation  2
Blockchain Based Secure and Decentralized Smart Licensing of...
收藏 引用
2nd International Conference on Information and Communication technology for Sustainable Development, ICICT4SD 2023
作者: Haque, Momenul Paul, Subrata Kumer Islam, Kamrul Della, Mursheda Nusrat Paul, Rakhi Rani Fahim, Sultan Bangladesh Army University of Engineering and Technology Dept. of Computer Science and Engineering 6431 Bangladesh University of Rajshahi Dept. of Computer Science and Engineering Rajshahi6205 Bangladesh Rabindra Maitree University Dept. of Computer Science and Engineering Kushtia7000 Bangladesh Bangladesh Army University of Engineering and Technology Dept. of Information and Communication Engineering Bangladesh
The adoption of charging vehicles in Rajshahi has emerged as a significant step towards reducing air pollution and promoting a healthy, green city. However, the current centralized licensing system poses challenges su... 详细信息
来源: 评论
Optimizing Privacy-Accuracy Trade-Off in IoT Intrusion Detection: An Analysis of FedAvg and FedProx with Differential Privacy
Optimizing Privacy-Accuracy Trade-Off in IoT Intrusion Detec...
收藏 引用
2024 IEEE International Women in engineering (WIE) Conference on Electrical and computer engineering, WIECON-ECE 2024
作者: Anwar, Sayeda Suaiba Hoque, Mohammed Moshiul Chittagong University of Engineering & Technology Dept. of Computer Science and Engineering Bangladesh East Delta University Chattagram Bangladesh
Ensuring the privacy and accuracy of interconnected network devices is crucial in the Internet of Things (IoT) landscape, especially when deploying Intrusion Detection Systems (IDS) on devices with constrained resourc... 详细信息
来源: 评论
Advancement in Image Plagiarism Detection using Feature Extraction and Deep Learning Approaches  5
Advancement in Image Plagiarism Detection using Feature Extr...
收藏 引用
5th International Conference on Image Processing and Capsule Networks, ICIPCN 2024
作者: Bhandari, Sonam Chaudhary, Sumit Malhotra, Sonal Joshi, Kapil Kirola, Madhu Rajkumar Uttaranchal Institute Of Technology Uttaranchal University Dept. of Computer Science and Engineering Dehradun India Graphic Era Hill University Graphic Era Deemed to be University Dept. of Computer Science and Engineering Dehradun India Dev Bhoomi Uttarakhand University Dept. of Computer Science and Engineering Dehradun India
With the widespread use of digital media, amount of visual content on the internet and the incidence of image plagiarism has also increased. In various domains including academia, journalism and creative industries, u... 详细信息
来源: 评论
SroX: Accelerating Hidden Weight Creation in Neural Networks via Spectral Relaxation and X-Iteration  2
SroX: Accelerating Hidden Weight Creation in Neural Networks...
收藏 引用
2nd International Conference on Advanced Computing and Communication Technologies, ICACCTech 2024
作者: Agarwal, Harshit Middha, Parth Thakur, Ayush Singh, Sofia Saraswat, Shipra Bhatia, Neha Amity University Dept. of Computer Science & Engineering Noida India Amity Institute of Information Technology Amity university Noida India Panipat Institute of Engineering & Technology Dept. of Information Technology Panipat India
This paper proposes SroX, a novel approach for accelerating Hidden Weight creation in neural networks, which is a critical component of neural network training that can significantly impact the overall efficiency of t... 详细信息
来源: 评论
Early Discovery of Emerging Entities in Persian Twitter with Semantic Similarity  9
Early Discovery of Emerging Entities in Persian Twitter with...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Yousefi, Shahin Hooshmand, Mohsen Afsharchi, Mohsen Dept. of Computer Science and Information Technology Zanjan Iran University of Zanjan Dept. of Electrical & Computer Engineering Zanjan Iran
Discovering emerging entities (EEs) is the problem of finding entities before their establishment. These entities can be critical for individuals, companies, and governments. Many of these entities can be discovered o... 详细信息
来源: 评论
Global Asymptotic Stabilty Analysis of DC-DC Buck Converters  1
Global Asymptotic Stabilty Analysis of DC-DC Buck Converters
收藏 引用
1st International Conference on Innovative engineering Sciences and Technological Research, ICIESTR 2024
作者: Kannabiran, Kanimozhi Mohamed Rabi, B. Raja Jayapalan, Booma Krismadinata Lakshmanan, Thangapalani Rajalakshmi, K. Npr College of Engineering & Technology Dept. of Electrical and Electronics Engg. Natham India Dept. of Mechanical Engineering Rathinam Technical Campus Coimbatore India Psna College of Engineering and Technology Dept. of Electronics and Communication Engg. Dindigul India Universitas Negeri Centre for Energy and Power Electronics Research Pedang Indonesia Sri Sairam Institute of Technology Dept. of Computer Science and Engineering Chennai India Npr College of Engineering & Technology Dept. of Computer Science and Engineering Natham India
Stability of power electronic converters is one of the most important problems related to their dynamics. The problems related to global asymptotic stability is discussed here. The design example used is DC-DC buck co... 详细信息
来源: 评论
Enhanced Convolutional Neural Networks for Early Detection and Classification of Ophthalmic Diseases  2
Enhanced Convolutional Neural Networks for Early Detection a...
收藏 引用
2nd International Conference on Information and Communication technology for Sustainable Development, ICICT4SD 2023
作者: Shojol, Md. Shojeb Hossain Siddique, Md Abu Ismail Haque, Fariha Rajshahi University of Engineering & Technology Dept. of Electronics & Telecommunication Engineering Rajshahi Bangladesh Rajshahi University of Engineering & Technology Dept. of Electrical & Computer Engineering Rajshahi Bangladesh
Eye diseases are an important public health concern that affects millions of people around the world. The detection and diagnosis of these disorders at an early stage is crucial for timely intervention and treatment. ... 详细信息
来源: 评论
High-Performance Face Identification Using Randomly Selected Channels from Hyperspectral Images
High-Performance Face Identification Using Randomly Selected...
收藏 引用
2024 IEEE International Conference on Imaging Systems and Techniques, IST 2024
作者: Furusawa, Sota Premachandra, Chinthaka Graduate School of Engineering and Science Shibaura Institute of Technology Dept. of Electrical Engineering and Computer Science Tokyo Japan
With the recent development of information technology, the importance of protecting personal information has increased. Because of the vulnerability in passwords, biometric authentication is now being used as a method... 详细信息
来源: 评论
Augmented Memory Replay-based Continual Learning Approaches for Network Intrusion Detection  37
Augmented Memory Replay-based Continual Learning Approaches ...
收藏 引用
37th Conference on Neural Information Processing Systems, NeurIPS 2023
作者: Amalapuram, Suresh Kumar Channappayya, Sumohana S. Tamma, Bheemarjuna Reddy Dept. of Computer Science and Engineering Indian Institute of Technology Hyderabad India Dept. of Electrical Engineering Indian Institute of Technology Hyderabad India
Intrusion detection is a form of anomalous activity detection in communication network traffic. Continual learning (CL) approaches to the intrusion detection task accumulate old knowledge while adapting to the latest ... 详细信息
来源: 评论
Post Quantum Code-Based Cryptosystems with Dual Inverse Matrix  13
Post Quantum Code-Based Cryptosystems with Dual Inverse Matr...
收藏 引用
13th International Conference on Information technology in Asia, CITA 2023
作者: Makoui, Farshid Haidary Gulliver, T. Aaron Dakhilalian, Mohammad University of Victoria Dept. of Electrical & Computer Engineering VictoriaBC Canada Isfahan University of Technology Dept. of Electrical & Computer Engineering Isfahan Iran
The Shor algorithm demonstrates the significant risk that quantum attacks pose to the security of widely used cryptographic primitives. However, code-based cryptography has been shown to be resistant to these attacks.... 详细信息
来源: 评论