咨询与建议

限定检索结果

文献类型

  • 1,899 篇 期刊文献
  • 767 篇 会议
  • 4 册 图书

馆藏范围

  • 2,670 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,759 篇 工学
    • 1,131 篇 计算机科学与技术...
    • 897 篇 软件工程
    • 539 篇 信息与通信工程
    • 354 篇 电子科学与技术(可...
    • 282 篇 电气工程
    • 235 篇 控制科学与工程
    • 189 篇 光学工程
    • 169 篇 生物工程
    • 126 篇 动力工程及工程热...
    • 115 篇 生物医学工程(可授...
    • 97 篇 机械工程
    • 91 篇 仪器科学与技术
    • 81 篇 材料科学与工程(可...
    • 67 篇 化学工程与技术
    • 55 篇 交通运输工程
    • 46 篇 航空宇航科学与技...
    • 45 篇 力学(可授工学、理...
  • 1,674 篇 理学
    • 946 篇 物理学
    • 626 篇 数学
    • 206 篇 统计学(可授理学、...
    • 194 篇 生物学
    • 111 篇 系统科学
    • 92 篇 化学
  • 397 篇 管理学
    • 285 篇 管理科学与工程(可...
    • 178 篇 工商管理
    • 125 篇 图书情报与档案管...
  • 110 篇 医学
    • 94 篇 临床医学
    • 79 篇 基础医学(可授医学...
  • 68 篇 法学
    • 54 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 30 篇 教育学
  • 26 篇 农学
  • 4 篇 文学
  • 3 篇 军事学
  • 2 篇 哲学
  • 1 篇 艺术学

主题

  • 26 篇 deep learning
  • 21 篇 machine learning
  • 20 篇 wireless network...
  • 19 篇 quantum cryptogr...
  • 16 篇 proton-proton in...
  • 14 篇 resource allocat...
  • 14 篇 blockchain
  • 14 篇 students
  • 14 篇 beamforming
  • 13 篇 internet of thin...
  • 13 篇 data mining
  • 13 篇 semantics
  • 12 篇 quantum entangle...
  • 12 篇 mobile edge comp...
  • 12 篇 nuclear counters
  • 12 篇 artificial intel...
  • 12 篇 quantum optics
  • 12 篇 energy efficienc...
  • 11 篇 quality of servi...
  • 11 篇 authentication

机构

  • 48 篇 department of el...
  • 36 篇 faculté des scie...
  • 36 篇 department of ph...
  • 36 篇 yerevan physics ...
  • 36 篇 department of ph...
  • 35 篇 department of ph...
  • 35 篇 department of ph...
  • 35 篇 faculty of scien...
  • 35 篇 departamento de ...
  • 35 篇 department of ph...
  • 35 篇 department for p...
  • 35 篇 kirchhoff-instit...
  • 35 篇 fakultät für phy...
  • 35 篇 institut für ast...
  • 35 篇 institute of phy...
  • 34 篇 department of ph...
  • 34 篇 physics division...
  • 34 篇 department of ph...
  • 34 篇 division of phys...
  • 34 篇 department of ph...

作者

  • 56 篇 shen xuemin
  • 40 篇 c. alexa
  • 40 篇 j. m. izen
  • 40 篇 k. bos
  • 40 篇 g. bella
  • 40 篇 j. strandberg
  • 40 篇 d. calvet
  • 40 篇 c. amelung
  • 40 篇 f. pastore
  • 40 篇 h. a. gordon
  • 40 篇 g. spigo
  • 40 篇 e. hines
  • 40 篇 a. c. könig
  • 40 篇 s. h. kim
  • 39 篇 a. harvey
  • 39 篇 c. hensel
  • 39 篇 s. michal
  • 39 篇 b. toggerson
  • 39 篇 g. m. kolachev
  • 39 篇 c. geweniger

语言

  • 2,491 篇 英文
  • 148 篇 其他
  • 17 篇 日文
  • 16 篇 中文
检索条件"机构=1Department of Computer Engineering and Information Technology"
2670 条 记 录,以下是661-670 订阅
排序:
Parametric heart activity condensed photoacoustic stimulation from MRI images
收藏 引用
AIP Conference Proceedings 2023年 第1期2523卷
作者: T. Senthil Kumar Maram Ashok M. Suresh Anand Karthikeyan Palaniappan 1Department of Electronics and Communication Engineering GRT Institute of Engineering and Technology Tiruttani Tamil Nadu India. 2Department of Computer Science and Engineering Malla Reddy Institute of Engineering and Technology Secunderabad Telangana India. 3Department of Computer Science and Engineering Sri Sairam Engineering College Chennai Tamil Nadu India. 4Department of Centre for System Design Computer Science and Engineering Chennai Institute of Technology Chennai Tamil Nadu India.
In this article, we propose a computer research approach that uses only a few tomographic optoacoustic projections to analyze main components for high-frame volumetric heart imagery is seen herein in the non-invasive ...
来源: 评论
Solving multi-armed bandit problems using a chaotic microresonator comb
arXiv
收藏 引用
arXiv 2023年
作者: Cuevas, Jonathan Iwami, Ryugo Uchida, Atsushi Minoshima, Kaoru Kuse, Naoya Graduate School of Sciences and Technology for Innovation Tokushima University 2-1 Minami-Josanjima Tokushima Tokushima770-8506 Japan Department of Information and Computer Sciences Saitama University 255 Shimo-okubo Sakura-ku Saitama Saitama City338-8570 Japan Graduate School of Informatics and Engineering The University of Electro-Communications 1-5-1 Chofugaoka Chofu Tokyo182-8585 Japan Institute of Post-LED Photonics Tokushima University 2-1 Minami-Josanjima Tokushima Tokushima770-8506 Japan
—The Multi-Armed Bandit (MAB) problem, foundational to reinforcement learning-based decision-making, addresses the challenge of maximizing rewards amidst multiple uncertain choices. While algorithmic solutions are ef... 详细信息
来源: 评论
A Comparison Study of Constriction and Random Inertia Weight Router Replacement Methods for WMNs Using WMN-PSODGA Hybrid Intelligent System
A Comparison Study of Constriction and Random Inertia Weight...
收藏 引用
Workshops of the 34th International Conference on Advanced information Networking and Applications, WAINA 2020
作者: Ohara, Seiji Barolli, Admir Ampririt, Phudit Sakamoto, Shinji Barolli, Leonard Takizawa, Makoto Graduate School of Engineering Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-KuFukuoka811-0295 Japan Department of Information Technology Aleksander Moisiu University of Durres L.1 Rruga e Currilave Durres Albania Department of Computer and Information Science Seikei University 3-3-1 Kichijoji-Kitamachi Musashino-shiTokyo180-8633 Japan Department of Information and Communication Engineering Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-KuFukuoka811-0295 Japan Department of Advanced Sciences Faculty of Science and Engineering Hosei University Kajino-Machi Koganei-ShiTokyo184-8584 Japan
Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure because they have many advantages such as low cost and increased high-speed wireless Internet connectivity. In our previous work, we im... 详细信息
来源: 评论
Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement Methods  34th
Performance Evaluation of WMNs Using WMN-PSOHC-DGA Consideri...
收藏 引用
34th International Conference on Advanced information Networking and Applications, AINA 2020
作者: Barolli, Admir Ohara, Seiji Sakamoto, Shinji Takizawa, Makoto Barolli, Leonard Department of Information Technology Aleksander Moisiu University of Durres L.1 Rruga e Currilave Durres Albania Graduate School of Engineering Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-Ku Fukuoka811-0295 Japan Department of Computer and Information Science Seikei University 3-3-1 Kichijoji-Kitamachi Tokyo Musashino-shi180-8633 Japan Department of Advanced Sciences Faculty of Science and Engineering Hosei University Kajino-Machi Tokyo Koganei-Shi184-8584 Japan Department of Information and Communication Engineering Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-Ku Fukuoka811-0295 Japan
The Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure because they have many advantages such as low cost and increased high speed wireless Internet connectivity. In our previous work, w... 详细信息
来源: 评论
A novel fuzzy trust-based secure routing scheme in flying ad hoc networks
收藏 引用
Vehicular Communications 2023年 44卷
作者: Hosseinzadeh, Mehdi Mohammed, Adil Hussein Alenizi, Farhan A. Malik, Mazhar Hussain Yousefpoor, Efat Yousefpoor, Mohammad Sadegh Ahmed, Omed Hassan Rahmani, Amir Masoud Tightiz, Lilia Institute of Research and Development Duy Tan University Da Nang Viet Nam School of Medicine and Pharmacy Duy Tan University Da Nang Viet Nam Department of Communication and Computer Engineering Faculty of Engineering Cihan University-Erbil Kurdistan Region Iraq Electrical Engineering Department College of Engineering Prince Sattam Bin Abdulaziz University Al-Kharj 11942 Saudi Arabia School of Computing and Creative Technologies College of Arts Technology and Environment (CATE) University of the West of England Frenchay Campus Coldharbour Lane Bristol BS16 1QY United Kingdom Department of Computer Engineering Dezful Branch Islamic Azad University Dezful Iran Department of Information Technology University of Human Development Sulaymaniyah Iraq Future Technology Research Center National Yunlin University of Science and Technology Yunlin Taiwan School of Computing Gachon University 1342 Seongnamdaero Seongnam 13120 South Korea
Today, many studies assess vulnerabilities, threats, and attacks in flying ad hoc networks (FANETs) to provide solutions for countermeasures. Protecting FANETs against attackers and coordinating connections are challe... 详细信息
来源: 评论
Theoretical analysis of medical healthcare chatbot system
收藏 引用
AIP Conference Proceedings 2022年 第1期2446卷
作者: M. Suguna D. Prakash A. Amritha M. Saumiya A. Devi Prabha 1Department of Information Science and Engineering Kumaraguru College of Technology Coimbatore Tamilnadu India 2Electrical Engineer ThinkAside Technology Coimbatore Tamilnadu India 3Department of Computer Science and Engineering Kumaraguru College of Technology Coimbatore Tamilnadu India
A Chatbot is a computer program which enables us to make communication through our text or voice and get reply through Artificial Intelligence (AI) technology. A chatbot can be used in different applications like gami...
来源: 评论
Compressive Sensing-Based Grant-Free Massive Access for 6G Massive Communication
arXiv
收藏 引用
arXiv 2023年
作者: Gao, Zhen Ke, Malong Mei, Yikun Qiao, Li Chen, Sheng Ng, Derrick Wing Kwan Poor, H. Vincent The MIIT Key Laboratory of Complex-Field Intelligent Sensing Beijing Institute of Technology Beijing100081 China Jiaxing314019 China The Advanced Technology Research Institute Beijing Institute of Technology Jinan250307 China The Wireless Product Division Ruijie Network Co. Ltd. Fuzhou350108 China The School of Information and Electronics Beijing Institute of Technology Beijing100081 China The School of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom The School of Electrical Engineering and Telecommunications University of New South Wales Sydney2052 Australia The Department of Electrical and Computer Engineering Princeton University PrincetonNJ08542 United States
The advent of the sixth-generation (6G) of wireless communications has given rise to the necessity to connect vast quantities of heterogeneous wireless devices, which requires advanced system capabilities far beyond e... 详细信息
来源: 评论
A survey on solving dilemmas of adapting blockchain in different applications
收藏 引用
AIP Conference Proceedings 2022年 第1期2460卷
作者: C. Vijayalakshmi S. Metilda Florence S. Suthir 1Department of Computer Science and Engineering SRM Institute of Technology and Science Kattankulathur Tamilnadu India 2Department of Computer Science and Engineering Panimalar Engineering College Chennai Tamilnadu India 3Department of Information Technology SRM Institute of Technology and Science Kattankulathur Tamilnadu India 4Department of Computer science and engineering VIT Bhopal University Madhya Pradesh India
This work is going to address the dilemmas and challenges that researchers face when selecting blockchain to solve a problem in a particular domain. Since blockchain is an emerging technology and it is intended to sol...
来源: 评论
Design of an IoT approach for security surveillance system for industrial process monitoring using Raspberry-Pi
收藏 引用
AIP Conference Proceedings 2022年 第1期2519卷
作者: G. Manikandan D. Karunkuzhali D. Geetha V. Kavitha 1Department of Computer Science and Engineering Kings Engineering College Sriperumbudur Tamil Nadu India 2Department of Information Technology Panimalar Engineering College Chennai Tamil Nadu India 3Department of Information Science and Engineering BNM Institute of Technology Bengaluru Karnataka India 4Department of Computer Science and Engineering Sri Sairam Engineering College Chennai Tamil Nadu India
The Internet of Things (IoT) is a new development for several applications, including intelligent cities, physical security, intelligent grids, asset management and logistics, e-health, etc. Security issues now face i...
来源: 评论
Improving the security of asymmetric secret sharing scheme and its new applications
收藏 引用
Journal of information Security and Applications 2025年 93卷
作者: Keiichi Iwamura Ahmad Akmal Aminuddin Mohd Kamal Department of Electrical Engineering Tokyo University of Science 6-3-1 Niijuku Katsushika 125-8585 Tokyo Japan Department of Information and Computer Technology Tokyo University of Science 6-3-1 Niijuku Katsushika 125-8585 Tokyo Japan
In conventional ( k , n ) threshold secret sharing, secret information or input can be recovered by collecting k shares from n servers, regardless of the honesty of the player. However, in asymmetric secret sharing, t... 详细信息
来源: 评论