咨询与建议

限定检索结果

文献类型

  • 22,336 篇 会议
  • 13,388 篇 期刊文献
  • 210 册 图书

馆藏范围

  • 35,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,766 篇 工学
    • 16,247 篇 计算机科学与技术...
    • 13,142 篇 软件工程
    • 6,173 篇 信息与通信工程
    • 3,747 篇 控制科学与工程
    • 2,754 篇 电气工程
    • 2,668 篇 生物工程
    • 2,546 篇 电子科学与技术(可...
    • 2,010 篇 生物医学工程(可授...
    • 1,737 篇 机械工程
    • 1,603 篇 光学工程
    • 1,249 篇 仪器科学与技术
    • 1,198 篇 网络空间安全
    • 1,135 篇 动力工程及工程热...
    • 1,026 篇 化学工程与技术
    • 980 篇 安全科学与工程
    • 840 篇 交通运输工程
  • 12,159 篇 理学
    • 6,494 篇 数学
    • 3,302 篇 物理学
    • 3,054 篇 生物学
    • 1,962 篇 统计学(可授理学、...
    • 1,375 篇 系统科学
    • 1,171 篇 化学
  • 6,831 篇 管理学
    • 4,303 篇 管理科学与工程(可...
    • 2,794 篇 图书情报与档案管...
    • 1,713 篇 工商管理
  • 2,321 篇 医学
    • 1,912 篇 临床医学
    • 1,636 篇 基础医学(可授医学...
    • 988 篇 公共卫生与预防医...
    • 974 篇 药学(可授医学、理...
  • 1,111 篇 法学
    • 873 篇 社会学
  • 654 篇 经济学
  • 623 篇 农学
  • 400 篇 教育学
  • 192 篇 文学
  • 115 篇 军事学
  • 101 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 1,157 篇 deep learning
  • 947 篇 feature extracti...
  • 932 篇 accuracy
  • 817 篇 educational inst...
  • 801 篇 machine learning
  • 659 篇 training
  • 655 篇 computer science
  • 631 篇 internet of thin...
  • 600 篇 computational mo...
  • 550 篇 support vector m...
  • 419 篇 convolutional ne...
  • 414 篇 predictive model...
  • 390 篇 data mining
  • 383 篇 optimization
  • 344 篇 real-time system...
  • 333 篇 artificial intel...
  • 317 篇 security
  • 301 篇 cloud computing
  • 291 篇 image segmentati...
  • 276 篇 semantics

机构

  • 283 篇 faculty of scien...
  • 275 篇 department of ph...
  • 274 篇 departamento de ...
  • 272 篇 department of ph...
  • 270 篇 department for p...
  • 264 篇 department of ph...
  • 264 篇 department of ph...
  • 262 篇 college of compu...
  • 258 篇 faculté des scie...
  • 222 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 198 篇 department of ph...
  • 186 篇 college of infor...
  • 178 篇 yerevan physics ...
  • 177 篇 department of ph...
  • 170 篇 college of compu...
  • 169 篇 kirchhoff-instit...
  • 167 篇 centre de calcul...
  • 162 篇 college of compu...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 261 篇 g. gaudio
  • 258 篇 s. mohapatra
  • 251 篇 d. guest
  • 248 篇 y. nagasaka
  • 244 篇 y. tayalati

语言

  • 34,010 篇 英文
  • 1,372 篇 其他
  • 573 篇 中文
  • 14 篇 日文
  • 7 篇 法文
  • 5 篇 德文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=College of Computer Science and Information Engineering"
35934 条 记 录,以下是4991-5000 订阅
排序:
A new density-based method for reducing the amount of training data in K-NN text classification
A new density-based method for reducing the amount of traini...
收藏 引用
6th International Conference on Machine Learning and Cybernetics, ICMLC 2007
作者: Fang, Yuan Liu, Yang Ge, Yu College of Mathematics and Computer Science Hebei University Baoding Hebei 071002 China College of Information Science and Engineering Northeastern University Shenyang 110004 China
With the rapid development of WWW, text classification has become the key technology in organizing and processing large amount of text data. As a simple, effective and nonparametric classification method, k-NN method ... 详细信息
来源: 评论
A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Applications  13
A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Appli...
收藏 引用
13th International Conference on Communication and Network Security, ICCNS 2023
作者: Gu, Wenzhe Feng, Botao Luo, Yiyuan Zheng, Jianchao Lu, Yun School of Computer Science and Engineering Huizhou University Huizhou China College of Electronics and Information Engineering Shenzhen University Shenzhen China
A miniaturized dual U-shaped patch antenna for WiFi-6E applications is designed and fabricated, with a size of 21.5×10×1.0 mm3. The antenna adopts a pair of U-shaped patches to minimize the length of the osc... 详细信息
来源: 评论
Improved-Equalized Cluster Head Election Routing Protocol for Wireless Sensor Networks
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 845-858页
作者: Muhammad Shahzeb Ali Ali Alqahtani Ansar Munir Shah Adel Rajab Mahmood Ul Hassan Asadullah Shaikh Khairan Rajab Basit Shahzad Department of Computer Science Institute of Southern PunjabMultan5932Pakistan College of Computer Science and Information Systems Najran UniversityNajran61441Saudi Arabia Department of Computer Skills Deanship of Preparatory YearNajran UniversityNajran61441Saudi Arabia Department of Engineering National University of Modern LanguagesIslamabad44000Pakistan
Throughout the use of the small battery-operated sensor nodes encou-rage us to develop an energy-efficient routing protocol for wireless sensor networks(WSNs).The development of an energy-efficient routing protocol is... 详细信息
来源: 评论
BERT-Based Detection of Sexual Harassment in Dialogues  5
BERT-Based Detection of Sexual Harassment in Dialogues
收藏 引用
5th International Conference on computer science and Artificial Intelligence, CSAI 2021
作者: Yan, Mingrui Luo, Xudong Luo, Xudong Guangxi Key Laboratory of Multi-Source Information Mining and Security College of Computer Science and Information Engineering Guangxi Normal University China
It tends to become a trend of booking transportation through network equipment with the further integration of the Internet into people's life, and online car-hailing platforms have sprung up. However, a new socia...
来源: 评论
Electric Vehicles Charging Scheduling Optimization for Total Elapsed Time Minimization  91
Electric Vehicles Charging Scheduling Optimization for Total...
收藏 引用
91st IEEE Vehicular Technology Conference, VTC Spring 2020
作者: Qian, Li Ping Zhou, Xinyue Yu, Ningning Wu, Yuan Zhejiang University of Technology Hangzhou College of Information Engineering Zhejiang China University of Macau Macao Department of Computer and Information Science China
With the rapid advancement of electric vehicle (EV) technology, EV has been emerging as a promising transportation due to the low carbon emission. However, the frequent and long time charging is indispensable to conti... 详细信息
来源: 评论
AI-Based Intelligent Model to Predict Epidemics Using Machine Learning Technique
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 1095-1104页
作者: Liaqat Ali Saif E.A.Alnawayseh Mohammed Salahat Taher M.Ghazal Mohsen A.A.Tomh Beenu Mago College of Engineering and Technology University of Science and Technology of FujairahFujairahUAE Electrical Engineering Department Faculty of EngineeringMutah UniversityJordan School of Information Technology Skyline University CollegeUniversity City Sharjah1797UAE Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia43600Malaysia Faculty of Computer Science NCBA&ELahore54660Pakistan School of Information Technology Skyline University CollegeUniversity City Sharjah1797SharjahUAE
The immediate international spread of severe acute respiratory syn-drome revealed the potential threat of infectious diseases in a closely integrated and interdependent *** an outbreak occurs,each country must have a ... 详细信息
来源: 评论
Selection of Metaheuristic Algorithm to Design Wireless Sensor Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第7期37卷 985-1000页
作者: Rakhshan Zulfiqar Tariq Javed Zain Anwar Ali Eman H.Alkhammash Myriam Hadjouni Hamdard University Karachi75270Pakistan Electronic Engineering Department Sir Syed University of Engineering&TechnologyKarachiPakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Computer Sciences College of Computer and Information SciencePrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
The deployment of sensor nodes is an important aspect in mobile wireless sensor networks for increasing network *** longevity of the networks is mostly determined by the proportion of energy consumed and the sensor no... 详细信息
来源: 评论
A User-friendly Model for Ransomware Analysis Using Sandboxing
收藏 引用
computers, Materials & Continua 2021年 第6期67卷 3833-3846页
作者: Akhtar Kamal Morched Derbali Sadeeq Jan Javed Iqbal Bangash Fazal Qudus Khan Houssem Jerbi Rabeh Abbassi Gulzar Ahmad Department of Computer Science&Information Technology National Center for Cyber SecurityUniversity of Engineering&TechnologyPeshawar25120Pakistan Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Institute of Computer Sciences and Information Technology(ICS/IT) University of AgriculturePeshawar25130Pakistan Department of Industrial/Electrical Engineering College of EngineeringUniversity of Ha’ilHail1234Saudi Arabia Department of Electrical Engineering University of Engineering&TechnologyPeshawar25120Pakistan
Ransomware is a type of malicious software that blocks access to a computer by encrypting user’s files until a ransom is paid to the *** have been several reported high-profile ransomware attacks including WannaCry,P... 详细信息
来源: 评论
On the wireless network curriculum teaching
收藏 引用
2013 International Conference on Applied Mechanics, Materials, and Manufacturing, AMMM 2013
作者: Ma, Jin Jin Jin, Guang Jiang, Xian Liang Huang, Lu Juan He, Xian Mang College of Information Science and Engineering Ningbo University Ningbo China School of Computer Science and Technology Zhejiang University Hangzhou China
Wireless network technology has developed rapidly and been widely used in different forms, such as Wireless LAN (WLAN), Wireless Sensor Network (WSN) and the 3G Mobile Communications. As one core curriculum of IT majo... 详细信息
来源: 评论
Data Secure Storage Mechanism of Sensor Networks Based on Blockchain
收藏 引用
computers, Materials & Continua 2020年 第12期65卷 2365-2384页
作者: Jin Wang Wencheng Chen Lei Wang R.Simon Sherratt Osama Alfarraj Amr Tolba School of Information Science and Engineering Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Civil Engineering Changsha University of Science&TechnologyChangsha410000China Department Biomedical Engineering University of ReadingReadingRG66AYUK Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Mathematics and Computer Science Department Faculty of ScienceMenoufia UniversityShebin-El-Kom32511Egypt
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industr... 详细信息
来源: 评论