咨询与建议

限定检索结果

文献类型

  • 738,757 篇 会议
  • 16,285 篇 期刊文献
  • 4,375 册 图书
  • 27 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 759,439 篇 电子文献
  • 17 种 纸本馆藏

日期分布

学科分类号

  • 465,904 篇 工学
    • 343,575 篇 计算机科学与技术...
    • 249,085 篇 软件工程
    • 119,663 篇 信息与通信工程
    • 63,357 篇 控制科学与工程
    • 58,985 篇 电气工程
    • 44,044 篇 生物工程
    • 39,818 篇 电子科学与技术(可...
    • 35,897 篇 机械工程
    • 31,667 篇 生物医学工程(可授...
    • 25,093 篇 光学工程
    • 24,274 篇 仪器科学与技术
    • 21,119 篇 动力工程及工程热...
    • 19,490 篇 化学工程与技术
    • 16,646 篇 安全科学与工程
    • 16,220 篇 交通运输工程
    • 13,694 篇 网络空间安全
  • 190,166 篇 理学
    • 102,464 篇 数学
    • 48,010 篇 生物学
    • 45,818 篇 物理学
    • 30,840 篇 统计学(可授理学、...
    • 20,804 篇 系统科学
    • 19,505 篇 化学
  • 118,250 篇 管理学
    • 74,436 篇 管理科学与工程(可...
    • 49,571 篇 图书情报与档案管...
    • 33,808 篇 工商管理
  • 28,832 篇 医学
    • 24,410 篇 临床医学
    • 21,160 篇 基础医学(可授医学...
  • 20,031 篇 法学
    • 15,905 篇 社会学
  • 16,072 篇 教育学
    • 15,316 篇 教育学
  • 13,879 篇 经济学
    • 13,675 篇 应用经济学
  • 9,307 篇 农学
  • 5,332 篇 文学
  • 2,048 篇 军事学
  • 1,736 篇 艺术学
  • 73 篇 哲学
  • 72 篇 历史学

主题

  • 26,895 篇 computer science
  • 20,729 篇 feature extracti...
  • 19,572 篇 computational mo...
  • 18,355 篇 training
  • 17,815 篇 accuracy
  • 17,131 篇 neural networks
  • 15,918 篇 deep learning
  • 14,228 篇 computer archite...
  • 11,773 篇 wireless sensor ...
  • 10,999 篇 data mining
  • 10,888 篇 convolutional ne...
  • 10,814 篇 predictive model...
  • 10,802 篇 machine learning
  • 10,357 篇 protocols
  • 9,848 篇 computer network...
  • 9,792 篇 data models
  • 8,893 篇 support vector m...
  • 8,596 篇 real-time system...
  • 8,592 篇 routing
  • 8,546 篇 educational inst...

机构

  • 2,406 篇 department of co...
  • 2,115 篇 chitkara univers...
  • 1,425 篇 school of comput...
  • 1,326 篇 university of sc...
  • 1,307 篇 university of ch...
  • 1,300 篇 school of comput...
  • 1,203 篇 university of el...
  • 1,127 篇 college of compu...
  • 796 篇 school of comput...
  • 688 篇 huazhong univers...
  • 646 篇 school of comput...
  • 637 篇 college of compu...
  • 629 篇 school of comput...
  • 579 篇 school of comput...
  • 561 篇 lovely professio...
  • 543 篇 maharishi school...
  • 527 篇 college of compu...
  • 497 篇 state key labora...
  • 497 篇 school of comput...
  • 476 篇 school of comput...

作者

  • 742 篇 wang wei
  • 645 篇 yang yang
  • 583 篇 liu yang
  • 560 篇 wang lei
  • 480 篇 li li
  • 451 篇 zhang lei
  • 407 篇 li yang
  • 369 篇 wei li
  • 341 篇 li wei
  • 314 篇 china
  • 299 篇 lei wang
  • 297 篇 wei wang
  • 293 篇 zhang wei
  • 292 篇 li bo
  • 275 篇 wang jing
  • 271 篇 zhang yan
  • 262 篇 wang jian
  • 253 篇 li xin
  • 253 篇 wei liu
  • 239 篇 kukreja vinay

语言

  • 739,050 篇 英文
  • 13,609 篇 其他
  • 8,411 篇 中文
  • 40 篇 俄文
  • 38 篇 法文
  • 32 篇 西班牙文
  • 21 篇 土耳其文
  • 15 篇 德文
  • 9 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 2 篇 阿拉伯文
  • 1 篇 日文
检索条件"任意字段=International Conference on Computer Science and Network Technology"
759448 条 记 录,以下是471-480 订阅
排序:
Improving Voronoi scoping with Ant Colony Optimization Algorithm for efficient energy consumption in Multi-hop Wireless Sensor network of Tin Mining  24
Improving Voronoi scoping with Ant Colony Optimization Algor...
收藏 引用
13th international conference on Software and computer Applications, ICSCA 2024
作者: Ndorimana, Philbert Mukanyirigira, Didacienne Tuyishimire, Emmanuel Munezero, Alphonse University Of Rwanda College Of Science And Technology African Center For Excellence-in The Internet Of Things Rwanda African Center For Excellence-in The Internet Of Things University Of Rwanda Kigali Rwanda University Of Rwanda College Of Science And Technology Kigali Rwanda
Based on the complexities of the tin mining tunnels and on the variety of activities carried out in these mines, it is necessary to improve the existing tunnel monitoring system. This study proposes an Energy Efficien... 详细信息
来源: 评论
Lightweight Attention network Based on Fuzzy Logic for Person Re-Identification
Lightweight Attention Network Based on Fuzzy Logic for Perso...
收藏 引用
2024 international conference on Fuzzy Theory and Its Applications, iFUZZY 2024
作者: Yuan, Changmei Liu, Xuanxuan Guo, Li Chen, Long Chen, C.L. Philip College of Computer Science & Technology Qingdao University Qingdao China University of Macau Faculty of Science and Technology Macau China South University of Technology China
Person re-identification (Re-ID) is an important research field in computer vision and pedestrian detection. However, there are many complex and highly uncertain factors in the real world, such as occlusion, appearanc... 详细信息
来源: 评论
Adaptive Grasshopper Optimization Algorithm based Dynamic Cluster Head Selection and Energy Efficient Routing for Wireless Sensor network (WSN)  3
Adaptive Grasshopper Optimization Algorithm based Dynamic Cl...
收藏 引用
3rd international conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Kanimozhi, T. Belina, S. Sara, V.J. Srm Institute of Science and Technology Faculty of Science and Humanities Department of Computer Science Tamil Nadu Chennai India Srm Institute of Science and Technology Faculty of Science and Humanities Department of Computer Applications Tamil Nadu Chennai India
Wireless Sensor network (WSN) clustering is useful for developing routing algorithms that improves the scalability and longevity of the network. Cluster Head (CH) is essential for data transmission in the clustered WS... 详细信息
来源: 评论
Enhancing Efficiency in the IOTA Tangle: A POMDP-Based Tip Selection Approach
Enhancing Efficiency in the IOTA Tangle: A POMDP-Based Tip S...
收藏 引用
2024 international conference on computer and Applications, ICCA 2024
作者: Alshaikhli, Mays Al-Maadeed, Somaya Saleh, Moutaz Qatar university Dept. Computer Science and Engineering Doha Qatar
The IOTA Tangle represents a promising alternative to blockchain technology, particularly for the Internet of Things (IoT) environment. However, ensuring efficiency and fairness in transaction processing remains a sig... 详细信息
来源: 评论
UAV Communication and Localization network Deployment for Content Distribution in Emergency Scenarios  6
UAV Communication and Localization Network Deployment for Co...
收藏 引用
6th international conference on Electronics and Communication, network and computer technology, ECNCT 2024
作者: Wang, Kailiang Yu, Ran Zhang, Donghui Zhang, Yuhao Lu, Jie Yu, Xinyu Men, Baoxia Zhang, Yi Ji, Yutong State Grid Jibei Information & Telecommunication Company Beijing China School of Computer Science National Pilot Software Engineering School Bupt Beijing China
Unmanned Aerial Vehicles (UAVs) are increasingly recognized for their potential to revolutionize emergency response communications and localization, especially when traditional infrastructure is damaged or non-existen... 详细信息
来源: 评论
Bearing fault diagnosis based on three-path parallel multi-scale convolution networks  7
Bearing fault diagnosis based on three-path parallel multi-s...
收藏 引用
7th international conference on computer Information science and Application technology, CISAT 2024
作者: Chen, Shuya Huo, Hua Zhao, Yifan Pei, Yulong Li, Dongfang Zhang, Chen Henan University of Science and Technology Luoyang China
Aiming at the complicated calculation and low time efficiency, a rolling bearing fault diagnosis method based on three-path parallel multi-scale convolution network is proposed. Firstly, continuous wavelet transform i... 详细信息
来源: 评论
Attention mechanism-based vulnerability detection method for graph neural network source code  3
Attention mechanism-based vulnerability detection method for...
收藏 引用
3rd international conference on Electronic Information Engineering, Big Data, and computer technology, EIBDCT 2024
作者: Cheng, Zekai Li, Xiaoke Hu, Jiahao Guo, Yongkang School of Computer Science and Technology Anhui University of Technology Anhui Ma'anshan China
With the development of artificial intelligence and machine learning, automatic code vulnerability detection methods based on machine learning and deep learning have been gradually applied. However, the false alarm ra... 详细信息
来源: 评论
Internet of Things data intrusion detection under GRU-LSTM algorithm  4
Internet of Things data intrusion detection under GRU-LSTM a...
收藏 引用
4th international conference on Telecommunications, Optics, and computer science, TOCS 2023
作者: He, Chao Fushun Vocational Technology Institute Liaoning Fushun113122 China
At present, the technology of the Internet of Things is not yet perfect. Due to the limited resources of nodes in the network, it is vulnerable to attacks and various possible attack methods, which pose great challeng... 详细信息
来源: 评论
A Dual Polarization Antenna on Perpendicular Strip Line with Fractal Narrow Slit for GPS, 4G LTE, and 5G network Applications  21
A Dual Polarization Antenna on Perpendicular Strip Line with...
收藏 引用
21st international conference on Electrical Engineering/Electronics, computer, Telecommunications and Information technology (ECTI-CON)
作者: Santos, Ian Jerome Q. Wongsin, Norakamon Rakluea, Paitoon Jangjing, Thinnawat Nantapanich, Nutyada Chudpooti, Nonchanutt Mahatthanajatuphat, Chatree Akkaraekthalin, Prayoot Rajamangala Univ Technol Thanyaburi Fac Engn Dept Elect & Telecommun Engn 39 Moo 1Rangsit Nakhonnayok RdKlong6 Pathum Thani 12110 Thailand King Mongkuts Univ Technol North Bangkok Fac Coll Ind Technol Dept Thai German Preengn Sch 1518 Pracharat 1 Rd Bangkok 10800 Thailand King Mongkuts Univ Technol North Bangkok Fac Appl Sci Dept Ind Phys & Med Instrumentat 1518 Pracharat 1 Rd Bangkok 10800 Thailand King Mongkuts Univ Technol North Bangkok Dept Elect & Comp Engn Fac Engn 1518 Pracharat 1 Rd Bangkok 10800 Thailand
This article discusses the utilization of a dual polarization antenna on a perpendicular strip line, including a fractal narrow slit, for a global positioning system (GPS), 4G Long Term Evolution (LTE), and a 5G commu... 详细信息
来源: 评论
Characterisation of Typical Disturbances in Electrical Fire Monitoring Systems in Heritage Buildings  6
Characterisation of Typical Disturbances in Electrical Fire ...
收藏 引用
6th international conference on Electronics and Communication, network and computer technology, ECNCT 2024
作者: Li, Xiaobai Sun, Chao Ding, Hongjun Shao, Yu Shenyang Fire Science and Technology Research Institute of Mem ShenYang China
Electrical fires have become the primary cause of fires in heritage buildings, and the electrical fire monitoring system can monitor electrical fire hazards in the power distribution system, which plays an important r... 详细信息
来源: 评论