咨询与建议

限定检索结果

文献类型

  • 735,506 篇 会议
  • 16,401 篇 期刊文献
  • 4,343 册 图书
  • 27 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 756,272 篇 电子文献
  • 16 种 纸本馆藏

日期分布

学科分类号

  • 464,149 篇 工学
    • 342,271 篇 计算机科学与技术...
    • 248,113 篇 软件工程
    • 118,897 篇 信息与通信工程
    • 62,572 篇 控制科学与工程
    • 58,303 篇 电气工程
    • 44,022 篇 生物工程
    • 39,232 篇 电子科学与技术(可...
    • 35,815 篇 机械工程
    • 31,599 篇 生物医学工程(可授...
    • 24,964 篇 光学工程
    • 24,213 篇 仪器科学与技术
    • 21,041 篇 动力工程及工程热...
    • 19,449 篇 化学工程与技术
    • 16,542 篇 安全科学与工程
    • 16,137 篇 交通运输工程
    • 13,610 篇 网络空间安全
  • 189,662 篇 理学
    • 102,105 篇 数学
    • 47,970 篇 生物学
    • 45,691 篇 物理学
    • 30,747 篇 统计学(可授理学、...
    • 20,800 篇 系统科学
    • 19,451 篇 化学
  • 117,892 篇 管理学
    • 74,196 篇 管理科学与工程(可...
    • 49,439 篇 图书情报与档案管...
    • 33,679 篇 工商管理
  • 28,677 篇 医学
    • 24,301 篇 临床医学
    • 21,076 篇 基础医学(可授医学...
  • 19,970 篇 法学
    • 15,857 篇 社会学
  • 15,990 篇 教育学
    • 15,236 篇 教育学
  • 13,846 篇 经济学
    • 13,641 篇 应用经济学
  • 9,261 篇 农学
  • 5,329 篇 文学
  • 2,046 篇 军事学
  • 1,731 篇 艺术学
  • 74 篇 哲学
  • 73 篇 历史学

主题

  • 26,885 篇 computer science
  • 20,464 篇 feature extracti...
  • 19,273 篇 computational mo...
  • 18,128 篇 training
  • 17,086 篇 accuracy
  • 17,046 篇 neural networks
  • 15,498 篇 deep learning
  • 14,113 篇 computer archite...
  • 11,746 篇 wireless sensor ...
  • 10,980 篇 data mining
  • 10,670 篇 machine learning
  • 10,589 篇 convolutional ne...
  • 10,578 篇 predictive model...
  • 10,321 篇 protocols
  • 9,852 篇 computer network...
  • 9,607 篇 data models
  • 8,742 篇 support vector m...
  • 8,585 篇 routing
  • 8,548 篇 educational inst...
  • 8,242 篇 real-time system...

机构

  • 2,409 篇 department of co...
  • 2,083 篇 chitkara univers...
  • 1,425 篇 school of comput...
  • 1,323 篇 university of sc...
  • 1,301 篇 university of ch...
  • 1,296 篇 school of comput...
  • 1,197 篇 university of el...
  • 1,122 篇 college of compu...
  • 798 篇 school of comput...
  • 685 篇 huazhong univers...
  • 643 篇 school of comput...
  • 633 篇 college of compu...
  • 631 篇 school of comput...
  • 581 篇 school of comput...
  • 553 篇 lovely professio...
  • 543 篇 maharishi school...
  • 527 篇 college of compu...
  • 498 篇 state key labora...
  • 493 篇 school of comput...
  • 479 篇 school of comput...

作者

  • 743 篇 wang wei
  • 642 篇 yang yang
  • 589 篇 liu yang
  • 559 篇 wang lei
  • 479 篇 li li
  • 451 篇 zhang lei
  • 410 篇 li yang
  • 363 篇 wei li
  • 345 篇 li wei
  • 312 篇 china
  • 301 篇 zhang wei
  • 297 篇 lei wang
  • 293 篇 wei wang
  • 292 篇 li bo
  • 275 篇 wang jing
  • 274 篇 zhang yan
  • 267 篇 wang jian
  • 254 篇 li xin
  • 253 篇 wei liu
  • 239 篇 kukreja vinay

语言

  • 736,892 篇 英文
  • 12,611 篇 其他
  • 8,454 篇 中文
  • 41 篇 法文
  • 41 篇 俄文
  • 32 篇 西班牙文
  • 21 篇 土耳其文
  • 15 篇 德文
  • 9 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 2 篇 阿拉伯文
  • 1 篇 日文
检索条件"任意字段=International Conference on Computer Science and Network Technology"
756281 条 记 录,以下是111-120 订阅
排序:
The Application of Style Transfer Algorithm in Han Embroidery Design  24
The Application of Style Transfer Algorithm in Han Embroider...
收藏 引用
5th international conference on computer science and Management technology, ICCSMT 2024
作者: Yang, Ronghai Yi, Jun College of Art and Design Hubei University of Technology Hubei Wuhan China
Objective To explore the method of intelligent image generation in order to solve the problem of image style diversity in intelligent *** order to solve the problems of less innovation and limited automatic generation... 详细信息
来源: 评论
Construction of PCOS Prediction Model based on BP Neural network  6
Construction of PCOS Prediction Model based on BP Neural Net...
收藏 引用
6th international conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Hu, Xianqing Yadav, Amit Khan, Asif Sah, Abhishek Pratap Azam, Sami School of Computer and Software Chengdu Neusoft University Chengdu China Faculty of Science and Technology Charles Darwin University NT Australia Department of Computer Application Integral University Lucknow India School of Management Science and Engineering University of Electronic Science and Technology of China Chengdu China
Polycystic ovary syndrome (PCOS), a common endocrine-metabolic disorder affecting about 10-13% of women during reproductive age worldwide, often leads to irregular menstruation, infertility, obesity, and long-term hea... 详细信息
来源: 评论
Energy Communication Conservation of Methods for 6G and 5G for Future Performance and Training  1
Energy Communication Conservation of Methods for 6G and 5G f...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Yadav, Dhananjay Kumar Nagappan, Beemkumar Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Mechanical Engineering Ramnagar District Karnataka India
The majority of wireless sensor network (WSN) sensor nodes are powered by energy-constrained motors, which is one of the primary issues with WSNs. This has a substantial impact on the system's longevity, reliabili... 详细信息
来源: 评论
Attack Detection technology for the Typical Communication Protocol AET in the Application Layer  24
Attack Detection Technology for the Typical Communication Pr...
收藏 引用
3rd international conference on Signal Processing, computer networks and Communications, SPCNC 2024
作者: Zhu, Yingjie Chen, Yu Xu, Xin Song, Yuejia Chen, Qiwei Power Science Research Institute State Grid Jilin Electric Power Co. Jilin Changchun China
In order to make up for the shortcomings of intrusion detection/defense systems (NIDS/IPS) in advanced evasion technique detection, this paper proposes an attack detection technique for application layer advanced evas... 详细信息
来源: 评论
Application and Practice of Web Data Mining in Ecommerce Based on BP Neural network Algorithm  1
Application and Practice of Web Data Mining in Ecommerce Bas...
收藏 引用
1st international conference on Intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Yu, Cuiyuan Zhang, Xiuling Zhu, Yuye Duan, Xuexia Zhang, Guanzhu Su, Shan College of Computer Science Binzhou Vocational College Binzhou China
With the development of computer network technology and database technology, the ecommerce industry has also experienced rapid growth, generating massive amounts of transaction data every day. Web data mining technolo... 详细信息
来源: 评论
A distributed machine learning dynamic remote proof scheme that resists collusion attacks  4
A distributed machine learning dynamic remote proof scheme t...
收藏 引用
4th international conference on network Communication and Information Security, ICNCIS 2024
作者: Wang, Ke Wu, Qiuxin Qin, Yu School of Applied Science Beijing Information Science and Technology University Beijing100192 China Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Science Beijing100190 China
Based on the security of distributed machine learning data and model based on remote proof, a cross-domain dynamic remote proof scheme based on ring signature improves the efficiency of computer cluster proof, the app... 详细信息
来源: 评论
Human intrusion detection by optimize dragon deep belief network  4th
Human intrusion detection by optimize dragon deep belief net...
收藏 引用
4th international conference on Computational Methods in science and technology, ICCMST 2024
作者: Bohra, Garima Jha, C.K. Sharma, Neelam Department of Computer Science Banasthali Vidyapith Rajasthan India
Optimal weight selection in a novel model of Deep Belief Neural network (DBBN) is employed in this study to try to identify individuals in the video using a Dragonfly Algorithm (DA). With a learning rate of 0.001, the... 详细信息
来源: 评论
Investigation of a Novel Approach to Facial Emotion Detection Using an Attention-Enhanced Residual network
Investigation of a Novel Approach to Facial Emotion Detectio...
收藏 引用
2024 international conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Liu, Jingran Peng, Cheng College of Computer Science and Technology Xinjiang Normal University Xinjiang Urumqi830054 China
This paper introduces a facial expression recognition method based on a residual network that incorporates a channel-space attention mechanism module. The method enhances the ResNet50 architecture and integrates label... 详细信息
来源: 评论
Study on Digital Protection Path of Archaeological Ruins of Liangzhu City  24
Study on Digital Protection Path of Archaeological Ruins of ...
收藏 引用
5th international conference on computer science and Management technology, ICCSMT 2024
作者: Zhou, Bo Yan, Min Xia, Guofang School of Culture and Tourism Zhejiang International Studies University Zhejiang Hangzhou China School of Hotel and Tourism Management The Hong Kong Polytechnic University Hong Kong China Cultural Heritage Information and Consulting Center Beijing China
Archaeological Ruins of Liangzhu City, as a holy land and a world cultural heritage that demonstrates the history of Chinese civilization for 5, 000 years, has been widely concerned by the international community. How... 详细信息
来源: 评论
A Robust Protocol Design to Perform Data Communication over Wireless Sensor networks with Enhanced Privacy Preserving Principles  4
A Robust Protocol Design to Perform Data Communication over ...
收藏 引用
4th international conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Sathyavani, Bandela Kumar Yadav, Rakesh John Shiny, J. Revathi, R. Bulakh, Ashish Kumar Jain, Shilpa School of Engineering Sr University Department of Eee Telangana Warangal India Amity School of Engineering and Technology Amity University Bihar Patna India Velammal College of Engineering and Technology Madurai India Psgr Krishnammal College for Women Department of Computer Science-Information Technology Coimbatore India Cdgi Department of Computer Science and Engineering Indore India Ies College of Technology Department of Computer Science and Engineering Bhopal India
the growth of wireless sensor networks has transformed all automation and industrial systems. Nonetheless, guaranteeing safe and privacy-preserving connectivity in sensor networks continues to be a difficult task. Cur... 详细信息
来源: 评论