咨询与建议

限定检索结果

文献类型

  • 1,891 篇 期刊文献
  • 764 篇 会议
  • 4 册 图书

馆藏范围

  • 2,659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,748 篇 工学
    • 1,128 篇 计算机科学与技术...
    • 894 篇 软件工程
    • 535 篇 信息与通信工程
    • 351 篇 电子科学与技术(可...
    • 283 篇 电气工程
    • 234 篇 控制科学与工程
    • 187 篇 光学工程
    • 167 篇 生物工程
    • 126 篇 动力工程及工程热...
    • 113 篇 生物医学工程(可授...
    • 98 篇 机械工程
    • 91 篇 仪器科学与技术
    • 79 篇 材料科学与工程(可...
    • 65 篇 化学工程与技术
    • 55 篇 交通运输工程
    • 45 篇 力学(可授工学、理...
  • 1,667 篇 理学
    • 942 篇 物理学
    • 624 篇 数学
    • 209 篇 统计学(可授理学、...
    • 192 篇 生物学
    • 111 篇 系统科学
    • 91 篇 化学
  • 399 篇 管理学
    • 286 篇 管理科学与工程(可...
    • 180 篇 工商管理
    • 126 篇 图书情报与档案管...
  • 109 篇 医学
    • 93 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 44 篇 药学(可授医学、理...
  • 68 篇 法学
    • 53 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 30 篇 教育学
  • 26 篇 农学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 哲学
  • 1 篇 艺术学

主题

  • 24 篇 deep learning
  • 21 篇 machine learning
  • 20 篇 wireless network...
  • 19 篇 quantum cryptogr...
  • 16 篇 proton-proton in...
  • 14 篇 semantics
  • 14 篇 resource allocat...
  • 14 篇 students
  • 13 篇 internet of thin...
  • 13 篇 data mining
  • 13 篇 blockchain
  • 13 篇 beamforming
  • 13 篇 energy efficienc...
  • 12 篇 quantum entangle...
  • 12 篇 mobile edge comp...
  • 12 篇 nuclear counters
  • 12 篇 artificial intel...
  • 12 篇 quantum optics
  • 11 篇 quality of servi...
  • 11 篇 authentication

机构

  • 48 篇 department of el...
  • 36 篇 faculté des scie...
  • 36 篇 department of ph...
  • 36 篇 yerevan physics ...
  • 36 篇 department of ph...
  • 35 篇 department of ph...
  • 35 篇 department of ph...
  • 35 篇 faculty of scien...
  • 35 篇 departamento de ...
  • 35 篇 department of ph...
  • 35 篇 department for p...
  • 35 篇 kirchhoff-instit...
  • 35 篇 fakultät für phy...
  • 35 篇 institut für ast...
  • 35 篇 institute of phy...
  • 34 篇 department of ph...
  • 34 篇 physics division...
  • 34 篇 department of ph...
  • 34 篇 division of phys...
  • 34 篇 department of ph...

作者

  • 56 篇 shen xuemin
  • 40 篇 c. alexa
  • 40 篇 j. m. izen
  • 40 篇 k. bos
  • 40 篇 g. bella
  • 40 篇 j. strandberg
  • 40 篇 d. calvet
  • 40 篇 c. amelung
  • 40 篇 f. pastore
  • 40 篇 h. a. gordon
  • 40 篇 g. spigo
  • 40 篇 e. hines
  • 40 篇 a. c. könig
  • 40 篇 s. h. kim
  • 39 篇 a. harvey
  • 39 篇 c. hensel
  • 39 篇 s. michal
  • 39 篇 b. toggerson
  • 39 篇 g. m. kolachev
  • 39 篇 c. geweniger

语言

  • 2,510 篇 英文
  • 119 篇 其他
  • 17 篇 日文
  • 16 篇 中文
检索条件"机构=1Department of Computer Engineering and Information Technology"
2659 条 记 录,以下是91-100 订阅
排序:
A Comparison Study of FC-RDVM and RIWM Router Placement Methods for WMNs: Performance Evaluation Results by WMN-PSOHC Simulation System Considering Chi-Square Distribution and Different Instances  1
收藏 引用
37th International Conference on Advanced information Networking and Applications, AINA 2023
作者: Sakamoto, Shinji Barolli, Admir Liu, Yi Kulla, Elis Barolli, Leonard Takizawa, Makoto Department of Information and Computer Science Kanazawa Institute of Technology 7-1 Ohgigaoka Ishikawa Nonoichi921-8501 Japan Department of Information Technology Aleksander Moisiu University of Durres L.1 Rruga e Currilave Durres Albania Department of Computer Science National Institute of Technology Oita College 1666 Maki Oita870-0152 Japan Department of System Management Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-Ku Fukuoka811-0295 Japan Department of Information and Communication Engineering Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-Ku Fukuoka811-0295 Japan Department of Advanced Sciences Faculty of Science and Engineering Hosei University Tokyo Kajino-Machi Koganei-Shi184-8584 Japan
In this work, we deal with the node placement problem in Wireless Mesh Networks (WMNs). We present a hybrid intelligent simulation system called WMN-PSOHC, which combines Particle Swarm Optimization (PSO) and Hill Cli... 详细信息
来源: 评论
A systematic literature review to implement large language model in higher education: issues and solutions
收藏 引用
Discover Education 2025年 第1期4卷 1-25页
作者: Guizani, Sghaier Mazhar, Tehseen Shahzad, Tariq Ahmad, Wasim Bibi, Afsha Hamam, Habib College of Engineering Alfaisal University Riyadh 11533 Saudi Arabia School of Computer Science National College of Business Administration and Economics Lahore 54000 Pakistan Department of Computer Science and Information Technology School Education Department Government of Punjab Layyah 31200 Pakistan Department of Computer Engineering COMSATS University Islamabad Sahiwal Campus Sahiwal 57000 Pakistan Department of Computing School of Arts and Creative Technology University of Greater Manchester Manchester BL15AB United Kingdom Department of Computer and Software Technology University of Swat Swat 19200 Pakistan Faculty of Engineering Uni de Moncton Moncton E1A3E9 NB Canada School of Electrical Engineering University of Johannesburg Johannesburg 2006 South Africa International Institute of Technology and Management (IITG) Av. Grandes Ecoles Libreville BP 1989 Gabon Bridges for Academic Excellence - Spectrum Tunis Tunisia
Artificial intelligence-driven Chatbots, especially large language models (LLMs) like GPT-4, represent significant progress in digital education. These models excel in mimicking human-like text and transforming learni... 详细信息
来源: 评论
Efficient Joint Key Authentication Model in E-Healthcare
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2739-2753页
作者: Muhammad Sajjad Tauqeer Safdar Malik Shahzada Khurram Akber Abid Gardezi Fawaz Alassery Habib Hamam Omar Cheikhrouhou Muhammad Shafiq Department of Computer Science Air University Multan CampusMultan60000Pakistan Faculty of Computing The Islamia University of BahawalpurBahawalpur 63100Pakistan Department of Computer Science COMSATS University IslamabadIslamabadPakistan Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia Faculty of Engineering Moncton UniversityNBE1A3E9Canada CES Laboratory National School of Engineers of SfaxUniversity of SfaxSfax3038Tunisia Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Many patients have begun to use mobile applications to handle different health needs because they can better access high-speed Internet and *** devices and mobile applications are now increasingly used and integrated ... 详细信息
来源: 评论
A lightweight distillation CNN-transformer architecture for remote sensing image super-resolution
收藏 引用
International Journal of Digital Earth 2023年 第1期16卷 3560-3579页
作者: Yu Wang Zhenfeng Shao Tao Lu Lifeng Liu Xiao Huang Jiaming Wang Kui Jiang Kangli Zeng State Key Laboratory for Information Engineering in Surveying Mapping and Remote SensingWuhan UniversityWuhanPeople’s Republic of China School of General Aviation Jingchu University of TechnologyJingmenPeople’s Republic of China Hubei Key Laboratory of Intelligent Robot Wuhan Institute of TechnologyWuhanPeople’s Republic of China Department of Engineering University of DurhamDurhamUK Department of Environmental Sciences Emory UniversityAtlant1GAUSA School of Computer Science and Technology Harbin Institute of TechnologyHarbinPeople’s Republic of China NERCMS School of Computer ScienceWuhan UniversityWuhanPeople’s Republic of China
Remote sensing images exhibit rich texture features and strong *** the super-resolution(SR)method of remote sensing images based on convolutional neural networks(CNN)can capture rich local information,the limited perc... 详细信息
来源: 评论
Visualization of Judicial Precedents on Power Harassment Issues Using Relationship Chart
Visualization of Judicial Precedents on Power Harassment Iss...
收藏 引用
Thematic area Human Interface and the Management of information, HIMI 2022 Part of the 24th HCI International Conference, HCII 2022
作者: Tanaka, Soichiro Kano, Toru Akakura, Takako Department of Information and Computer Technology Graduate School of Engineering Tokyo University of Science 6-3-1 Niijuku Katsushika-ku Tokyo125-8585 Japan Department of Information and Computer Technology Faculty of Engineering Tokyo University of Science 6-3-1 Niijuku Katsushika-ku Tokyo125-8585 Japan
Power harassment has become a problem in Japan recently. However, it has been found that reading judicial precedents is one of the ways to prevent it. In this paper, in order to promote the reading of judicial precede... 详细信息
来源: 评论
Expedited Block Transmission in Blockchain Network by using Clusters
Expedited Block Transmission in Blockchain Network by using ...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Hua, Xiaoqi Chen, Jian Zhang, Peiyun Fu, Zhangjie Zhu, Haibin Lu, Kezhong Ren, Jigang School of Software Nanjing University of Information Science and Technology Nanjing210044 China Engineering Research Center of Digital Forensics of Ministry of Education The School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China Nipissing University Department of Computer Science and Mathematics North BayONP1B 8L7 Canada School of Big Data and Artificial Intelligence Chizhou University Chizhou247000 China
Blockchain technology has garnered increasing attention from researchers. Because blockchain systems may contain malicious or spatially limited nodes that may delay block verification and reduce block transmission rat... 详细信息
来源: 评论
Gaze Analysis and Modeling of Cognitive Process During Debugging for Novice Programmers’ Learning
Gaze Analysis and Modeling of Cognitive Process During Debug...
收藏 引用
Thematic area Human Interface and the Management of information, HIMI 2022 Part of the 24th HCI International Conference, HCII 2022
作者: Yoshimori, Kohei Kano, Toru Akakura, Takako Graduate School of Engineering Department of Information and Computer Technology Tokyo University of Science 6-3-1 Niijuku Katsushika-ku Tokyo125-8585 Japan Faculty of Engineering Department of Information and Computer Technology Tokyo University of Science 6-3-1 Niijuku Katsushika-ku Tokyo125-8585 Japan
Recently, the demand for IT human resources has increased. Therefore, the expansion of programming education should be considered to strengthen the supply of it. This study aimed to propose debugging learning support ... 详细信息
来源: 评论
Vader protocol based sentiment analysis technique using LSTM for Stock Trend prediction  14
Vader protocol based sentiment analysis technique using LSTM...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Ticku, Amrita Tripathy, Niva Mishra, Pankaj Kumar Sinha, Anurag Jadon, Shivangi Raj, Aditya Kulshrestha, Harsh Rai, Vipin Shamim, Rejuwan Bharti Vidyapeeth's College of Engineering India Driems Autonomous Engineering College Cuttack India Rungta College of Engg. & Technology R1 Department of Electronics and Telecommunication Engg. CG Bhilai India Ignou School of Computing and Information Science New Delhi India Galgotias University Dept. of Computer Science and Engineering Noida India Galgotias University Department of Computer Science and Engineering Noida India Maharishi University of Information Technology Dept. of Computer Science and Engineering with Data Science Noida India
Stock prediction has always been a difficult task, and numerous strategies for predicting stock market behavior have been offered. Researchers have recently begun to investigate the use of sentimental analysis and dee... 详细信息
来源: 评论
Radio Map Based UAV Target Localization  48
Radio Map Based UAV Target Localization
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: He, Chen Gong, Weisheng Dong, Yangrui Xie, Xie Wang, Z. Jane Northwest University School of Information Science and Technology Xi'an China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T1Z4 Canada
Acting as the dynamic base stations, the unmanned aerial vehicles has a significant advantage over the conventional base station for target localization. When localizing a target, UAV can move toward the estimated tar... 详细信息
来源: 评论
Data hiding method for AMBTC compressed images
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第11期14卷 14785-14793页
作者: Chen, Yung-Yao Hsia, Chih-Hsien Jhong, Sin-Ye Lin, Hsin-Ju Graduate Institute of Automation Technology National Taipei University of Technology No. 1 Sec. 3 Zhongxiao E. Rd. Daan Dist. Taipei106 Taiwan Department of Computer Science and Information Engineering National Ilan University No. 1 Sec. 1 Shennong Rd. Yilan County Yilan City260 Taiwan
With the current growth of multimedia applications, a substantial amount of visual data, including images and videos, is transmitted daily, making information forensics and security essential. Thus, protecting secret ... 详细信息
来源: 评论