咨询与建议

限定检索结果

文献类型

  • 739,696 篇 会议
  • 16,325 篇 期刊文献
  • 4,375 册 图书
  • 27 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 760,418 篇 电子文献
  • 17 种 纸本馆藏

日期分布

学科分类号

  • 465,943 篇 工学
    • 343,600 篇 计算机科学与技术...
    • 249,103 篇 软件工程
    • 119,667 篇 信息与通信工程
    • 63,375 篇 控制科学与工程
    • 58,993 篇 电气工程
    • 44,044 篇 生物工程
    • 39,822 篇 电子科学与技术(可...
    • 35,903 篇 机械工程
    • 31,667 篇 生物医学工程(可授...
    • 25,094 篇 光学工程
    • 24,276 篇 仪器科学与技术
    • 21,119 篇 动力工程及工程热...
    • 19,490 篇 化学工程与技术
    • 16,646 篇 安全科学与工程
    • 16,220 篇 交通运输工程
    • 13,694 篇 网络空间安全
  • 190,193 篇 理学
    • 102,468 篇 数学
    • 48,009 篇 生物学
    • 45,820 篇 物理学
    • 30,841 篇 统计学(可授理学、...
    • 20,804 篇 系统科学
    • 19,506 篇 化学
  • 118,265 篇 管理学
    • 74,451 篇 管理科学与工程(可...
    • 49,572 篇 图书情报与档案管...
    • 33,809 篇 工商管理
  • 28,846 篇 医学
    • 24,424 篇 临床医学
    • 21,160 篇 基础医学(可授医学...
  • 20,031 篇 法学
    • 15,905 篇 社会学
  • 16,074 篇 教育学
    • 15,318 篇 教育学
  • 13,878 篇 经济学
    • 13,674 篇 应用经济学
  • 9,308 篇 农学
  • 5,333 篇 文学
  • 2,048 篇 军事学
  • 1,736 篇 艺术学
  • 73 篇 哲学
  • 72 篇 历史学

主题

  • 26,896 篇 computer science
  • 20,813 篇 feature extracti...
  • 19,627 篇 computational mo...
  • 18,406 篇 training
  • 17,959 篇 accuracy
  • 17,147 篇 neural networks
  • 15,974 篇 deep learning
  • 14,253 篇 computer archite...
  • 11,776 篇 wireless sensor ...
  • 11,006 篇 data mining
  • 10,927 篇 convolutional ne...
  • 10,861 篇 predictive model...
  • 10,824 篇 machine learning
  • 10,363 篇 protocols
  • 9,847 篇 computer network...
  • 9,834 篇 data models
  • 8,918 篇 support vector m...
  • 8,653 篇 real-time system...
  • 8,592 篇 routing
  • 8,546 篇 educational inst...

机构

  • 2,416 篇 department of co...
  • 2,117 篇 chitkara univers...
  • 1,434 篇 school of comput...
  • 1,338 篇 university of sc...
  • 1,318 篇 school of comput...
  • 1,307 篇 university of ch...
  • 1,208 篇 university of el...
  • 1,130 篇 college of compu...
  • 803 篇 school of comput...
  • 693 篇 huazhong univers...
  • 649 篇 school of comput...
  • 648 篇 college of compu...
  • 627 篇 school of comput...
  • 586 篇 school of comput...
  • 581 篇 lovely professio...
  • 543 篇 maharishi school...
  • 527 篇 college of compu...
  • 506 篇 school of comput...
  • 497 篇 state key labora...
  • 483 篇 school of comput...

作者

  • 742 篇 wang wei
  • 648 篇 yang yang
  • 583 篇 liu yang
  • 560 篇 wang lei
  • 480 篇 li li
  • 451 篇 zhang lei
  • 407 篇 li yang
  • 377 篇 wei li
  • 341 篇 li wei
  • 310 篇 china
  • 299 篇 lei wang
  • 297 篇 wei wang
  • 293 篇 zhang wei
  • 290 篇 li bo
  • 275 篇 wang jing
  • 271 篇 zhang yan
  • 262 篇 wang jian
  • 257 篇 wei liu
  • 253 篇 li xin
  • 239 篇 kukreja vinay

语言

  • 740,023 篇 英文
  • 13,609 篇 其他
  • 8,417 篇 中文
  • 40 篇 俄文
  • 38 篇 法文
  • 32 篇 西班牙文
  • 21 篇 土耳其文
  • 15 篇 德文
  • 9 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 2 篇 阿拉伯文
  • 1 篇 日文
检索条件"任意字段=International Conference on Computer Science and Network Technology"
760427 条 记 录,以下是291-300 订阅
排序:
Optimizing of 6G network Performance Through Machine Learning by Allocating Resources  1
Optimizing of 6G Network Performance Through Machine Learnin...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Agarwal, Ankita Thulasiram, Ramachandran Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Mechanical Engineering Ramnagar District Karnataka India
The impediments with 6G network construction have encouraged the activity of Machine Learning Resource Allocation Algorithms (MLRA). In terms of flexibility and ability utilisation., MLRA outperforms more normal algor... 详细信息
来源: 评论
Identifying wear types based on Faster R-CNN network model  5
Identifying wear types based on Faster R-CNN network model
收藏 引用
5th international conference on computer Vision, Image and Deep Learning, CVIDL 2024
作者: Zhao, Dehao Jiangsu University of Science and Technology Jiangsu Zhenjiang212100 China
With the continuous development of deep learning and computer vision, various object detection algorithms have been developed. To meet the requirements of current carrying wear image morphology features and detection ... 详细信息
来源: 评论
Multi-Stage Progressive Generative Adversarial network for Low-Dose CT Denoising  6
Multi-Stage Progressive Generative Adversarial Network for L...
收藏 引用
6th international conference on Communications, Information System and computer Engineering, CISCE 2024
作者: Wang, Lifang Li, Jinjin Zhang, Rongguo Guo, Xiaodong College of Computer Science and Technology Taiyuan University of Science and Technology Taiyuan China College of Electronic Information Engineering Taiyuan University of Science and Technology Taiyuan China
To address the balance between spatial details and high-level contextual information in low-dose CT image denoising tasks, a multi-stage progressive generative adversarial network is introduced. This network learns fe... 详细信息
来源: 评论
Application research of artificial intelligence in computer network technology  6
Application research of artificial intelligence in computer ...
收藏 引用
6th international conference on Intelligent Computing, Communication, and Devices, ICCD 2023
作者: Zebo, Huang Guangdong University of Science and Technology Guangdong523083 China
In the era of big data, artificial intelligence is widely used in computer network technology, which makes the functional and structural layers of computer network system comprehensively optimized. The use of natural ... 详细信息
来源: 评论
NIDR: network Interference Detection and Rectification  4
NIDR: Network Interference Detection and Rectification
收藏 引用
4th international conference on Innovative Practices in technology and Management, ICIPTM 2024
作者: Rose Mary, K.A. Joy, Celestine Devis, Denin Fransisco, Irene Devassy, Deepa George, Livya Sahrdaya College of Engineering and Technology Department of Computer Science and Engineering Thrissur India
In the contemporary digital landscape, ensuring the continuous functionality of computer networks is vital for business and critical infrastructure success. This research project utilizes cutting-edge technologies lik... 详细信息
来源: 评论
Research on computer Information System Based on Ant Colony Intelligent Neural network  3
Research on Computer Information System Based on Ant Colony ...
收藏 引用
3rd IEEE international conference on Electrical Engineering, Big Data and Algorithms, EEBDA 2024
作者: Zhang, Xinxin College of Energy and Mining Engineering Shandong University of Science and Technology Qingdao China
In this project, ant algorithm and neural network technology are organically integrated to study a new fault diagnosis method. Then the ant algorithm is used to optimize the weight of the neural network, and the optim... 详细信息
来源: 评论
Exploring A Two-Phase Deep Learning Framework For network Intrusion Detection
Exploring A Two-Phase Deep Learning Framework For Network In...
收藏 引用
2024 IEEE international Students' conference on Electrical, Electronics and computer science, SCEECS 2024
作者: Padmaja, Ragam Challagundla, Papa Rao Gvr&s College of Engineering & Technology Department of Computer Science and Engineering Andhra Pradesh Guntur India
Intrusion detection systems (IDS) often use machine learning and deep learning to identify and categorize cyber-attacks swiftly. However, as these attacks expand, a robust response becomes crucial. Despite the availab... 详细信息
来源: 评论
Classification of network Security Attack using KNN (K-Nearest Neighbour) and Comparison of different Attacks through different Machine Learning Techniques  3
Classification of Network Security Attack using KNN (K-Neare...
收藏 引用
3rd international conference for Innovation in technology, INOCON 2024
作者: Agarwal, Muskan Gill, Kanwarpartap Singh Chauhan, Rahul Kapruwan, Akanksha Banerjee, Deepak Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Graphic Era Hill University Computer Science & Engineering Uttarakhand Dehradun248002 India Graphic Era Deemed to Be University Computer Science & Engineering Uttarakhand Dehradun248002 India
network security refers to the systematic measures used to safeguard computer networks and the sensitive information they transmit against potential harm, unauthorised entry, and breaches. The concept encompasses a ra... 详细信息
来源: 评论
Enhancing Ground network in UAV Assisted Wireless Communication  1
Enhancing Ground Network in UAV Assisted Wireless Communicat...
收藏 引用
1st international conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Jebaraj, Solomon Yadav, Dhananjay Kumar Department of Computer Science and Information Technology Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
The development of wireless technology for ground communications is being aided by the use of unmanned aerial vehicles (UAVs). It is believed that these technologies will continue to advance in the next years. Traditi... 详细信息
来源: 评论
Transaction Latency in Blockchain networks: Insights from Queuing Theory  4
Transaction Latency in Blockchain Networks: Insights from Qu...
收藏 引用
4th international conference on computer science and Blockchain, CCSB 2024
作者: Xie, Guoli Chen, Yungui Fang, Jialun Tian, Liwei School of Computer Science Guangdong University of Science and Technology Dongguan China
With the widespread application of blockchain technology, ensuring that its network can efficiently process a large volume of transactions has become crucial. This paper employs the M/M/1 model from queuing theory to ... 详细信息
来源: 评论