咨询与建议

限定检索结果

文献类型

  • 7,728 篇 会议
  • 5,049 篇 期刊文献
  • 82 册 图书

馆藏范围

  • 12,859 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,211 篇 工学
    • 5,690 篇 计算机科学与技术...
    • 4,677 篇 软件工程
    • 1,725 篇 信息与通信工程
    • 1,480 篇 控制科学与工程
    • 1,042 篇 电气工程
    • 900 篇 生物工程
    • 746 篇 电子科学与技术(可...
    • 716 篇 机械工程
    • 647 篇 生物医学工程(可授...
    • 502 篇 光学工程
    • 379 篇 动力工程及工程热...
    • 378 篇 仪器科学与技术
    • 361 篇 化学工程与技术
    • 297 篇 安全科学与工程
    • 280 篇 网络空间安全
    • 279 篇 交通运输工程
  • 4,127 篇 理学
    • 2,275 篇 数学
    • 983 篇 生物学
    • 936 篇 物理学
    • 672 篇 统计学(可授理学、...
    • 550 篇 系统科学
    • 364 篇 化学
  • 2,305 篇 管理学
    • 1,416 篇 管理科学与工程(可...
    • 942 篇 图书情报与档案管...
    • 530 篇 工商管理
  • 683 篇 医学
    • 569 篇 临床医学
    • 472 篇 基础医学(可授医学...
    • 297 篇 药学(可授医学、理...
    • 250 篇 公共卫生与预防医...
  • 317 篇 法学
    • 259 篇 社会学
  • 197 篇 经济学
  • 161 篇 教育学
  • 137 篇 农学
  • 33 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 299 篇 deep learning
  • 297 篇 feature extracti...
  • 280 篇 educational inst...
  • 280 篇 computational mo...
  • 209 篇 training
  • 203 篇 optimization
  • 193 篇 semantics
  • 181 篇 machine learning
  • 161 篇 computer science
  • 160 篇 software enginee...
  • 160 篇 predictive model...
  • 156 篇 accuracy
  • 149 篇 neural networks
  • 148 篇 data mining
  • 141 篇 image segmentati...
  • 129 篇 internet of thin...
  • 121 篇 support vector m...
  • 113 篇 wireless sensor ...
  • 107 篇 visualization
  • 103 篇 reinforcement le...

机构

  • 1,278 篇 college of compu...
  • 237 篇 college of compu...
  • 173 篇 college of compu...
  • 119 篇 college of contr...
  • 111 篇 college of compu...
  • 108 篇 software college...
  • 108 篇 college of compu...
  • 107 篇 college of compu...
  • 86 篇 college of compu...
  • 81 篇 college of compu...
  • 77 篇 school of comput...
  • 77 篇 college of compu...
  • 70 篇 state key labora...
  • 64 篇 shenzhen univers...
  • 62 篇 college of compu...
  • 61 篇 college of softw...
  • 59 篇 the college of c...
  • 57 篇 school of inform...
  • 56 篇 college of infor...
  • 52 篇 fujian provincia...

作者

  • 40 篇 chen zengqiang
  • 38 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 niyato dusit
  • 33 篇 zhen ji
  • 33 篇 lin qiuzhen
  • 33 篇 zhong ming
  • 32 篇 victor c. m. leu...
  • 32 篇 zengqiang chen
  • 30 篇 zhou jie
  • 29 篇 kaishun wu
  • 26 篇 li xin
  • 25 篇 wang hui
  • 25 篇 liu yang
  • 25 篇 shen linlin
  • 24 篇 el-sayed m.el-ke...
  • 22 篇 wang jian
  • 22 篇 zuoyong li
  • 22 篇 yi wang
  • 22 篇 ismail leila

语言

  • 10,787 篇 英文
  • 1,834 篇 其他
  • 263 篇 中文
  • 18 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
检索条件"机构=College of Computer and Control Engineering College of Software"
12859 条 记 录,以下是691-700 订阅
排序:
Optimal Resource Allocation in Fog Computing for Healthcare Applications
收藏 引用
computers, Materials & Continua 2022年 第6期71卷 6147-6163页
作者: Salman Khan Ibrar Ali Shah Nasser Tairan Habib Shah Muhammad Faisal Nadeem Department of Computer Software Engineering University of Engineering and TechnologyMardan23200Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaK.S.A Informatics Complex H-8Islamabad44000Pakistan
In recent years,the significant growth in the Internet of Things(IoT)technology has brought a lot of attention to information and communication *** IoT paradigms like the Internet of Vehicle Things(IoVT)and the Intern... 详细信息
来源: 评论
Blockchain-Assisted Fine-Grained Deduplication and Integrity Auditing for Outsourced Large-Scale Data in Cloud Storage
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21662-21678页
作者: Liu, Bingyun Zhang, Xiaojun Yang, Xingchun Zhang, Yuan Xue, Jingting Zhou, Rang Southwest Petroleum University School of Computer Science and Software Engineering Engineering Research Center for Intelligent Oil and Gas Exploration Chengdu610500 China Sichuan Police College Intelligent Policing Key Laboratory of SichuanProvince Luzhou646000 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu610054 China Chengdu University of Technology School of Computer Science and Cyber Security Chengdu610059 China
Cloud computing has emerged as a promising mode for storaging vast quantities of big data, which is vulnerable to potential security threats, making it urgent to ensure data confidentiality and integrity auditing. In ... 详细信息
来源: 评论
Comparative Analysis of Differential Privacy Implementations on Synthetic Data  15
Comparative Analysis of Differential Privacy Implementations...
收藏 引用
15th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2025
作者: Said, Huwida E. Mahmoud, Qusay H. Goyal, Mandeep Hashim, Faiza College of Technological Innovation Zayed University Department of Computing and Applied Technolgy Dubai United Arab Emirates Ontario Tech University Department of Electrical Computer and Software Engineering OshawaONL1G 0C6 Canada College of Information Technology Uae University Department of Computer Science and Software Engineering AI-Ain United Arab Emirates
Differential privacy offers a promising solution to balance data utility and user privacy. This paper compares two prominent differential privacy tools-PyDP and IBM's diffprivlib-that are applied to a synthetic da... 详细信息
来源: 评论
Improving Federated Learning Efficiency with PruneFL: A Healthcare Perspective  24
Improving Federated Learning Efficiency with PruneFL: A Heal...
收藏 引用
13th International Conference on Computing and Pattern Recognition, ICCPR 2024
作者: Shahid, Alvina Arshad, Muhammad Muneeb Azam, Farooque Anwar, Muhammad Waseem Shafi, Imran Department of Computer and Software Engineering EME College National University of Sciences and Technology Punjab Islamabad Pakistan School of Interdisciplinary Engineering and Sciences National University of Sciences and Technology Punjab Islamabad Pakistan
In healthcare, accessing diverse and large datasets for machine learning poses challenges due to data privacy concerns. Federated learning (FL) addresses this by training models on decentralized data while preserving ... 详细信息
来源: 评论
Performance-Based Scheduling in Distributed Mixed Criticality Systems
收藏 引用
IEEE Access 2025年 13卷 95321-95340页
作者: Ali, Amjad Wasly, Saud Khattak, Asad Masood Ali, Ihsan Iqbal, Shahid Hayat, Bashir University of Swat Department of Computer and Software Technology Swat Khyber Pakhtunkhwa Saidu Sharif19130 Pakistan King Abdulaziz University Electrical and Computer Engineering Department Jeddah21589 Saudi Arabia Zayed University College of Technological Innovation Dubai United Arab Emirates Institute of Management Sciences Peshawar School of Computer Science and IT Peshawar25000 Pakistan
With a focus on computationally intensive, distributed, and parallel workloads, scheduling in mixed-criticality distributed systems presents significant challenges due to shared memory and resources, as well as the di... 详细信息
来源: 评论
Comparison of pulse rate variability from post-auricula and heart rate variability during different body states for healthy subjects
收藏 引用
Journal of Medical engineering and Technology 2023年 第3期47卷 179-188页
作者: Qi, Yusheng Zhang, Aihua Ma, Yurun Chang, Tingting Xu, Jianwen College of Electrical and Information Engineering Lanzhou University of Technology Lanzhou China Key Laboratory of Gansu Advanced Control for Industrial Processes Lanzhou University of Technology Lanzhou China National Demonstration Center for Experimental Electrical and Control Engineering Education Lanzhou University of Technology Lanzhou China College of Computer and Communication Lanzhou University of Technology Lanzhou China
Heart rate variability (HRV) extracted from the electrocardiogram (ECG) is an essential indicator for assessing the autonomic nervous system in clinical. Some scholars have studied the feasibility of pulse rate variab... 详细信息
来源: 评论
Profinder: Towards Professionals Recognition on Mobile Devices for Users with Cognitive Decline  18th
Profinder: Towards Professionals Recognition on Mobile Devi...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Wang, Yong Xiong, Yi Yang, Tianyu Shen, Yiran College of Computer Science and Technology Harbin Engineering University Harbin China Modeling and Emulation in E-Government National Engineering Laboratory Harbin China School of Software Shandong University Jinan China
As the global population continues to age, there is a concurrent rise in the number of individuals experiencing cognitive impairment and dementia, underscoring the critical necessity to address their hospice needs and... 详细信息
来源: 评论
Analysis of the External Characteristics and Eddy Current Loss of PMSG-Based WECS Relying on a Multi-Domain Coupling Model  19th
Analysis of the External Characteristics and Eddy Current Lo...
收藏 引用
19th Annual Conference of China Electrotechnical Society, ACCES 2024
作者: Zuo, Peng Li, Weili Liu, Xiaoke Liu, Wenmao Li, Dan Qiao, Tianhuai School of Electrical Engineering Beijing Jiaotong University Beijing China Department of Electrical Engineering Tsinghua University Beijing China College of Computer and Control Engineering Northeast Forestry University Harbin China
With the trend towards larger-scale wind generators, the internal physical field and control strategy of high-capacity generator is becoming increasingly complex. The physical field change law inside the generator is ... 详细信息
来源: 评论
Enhancing Classification Algorithm Recommendation in Automated Machine Learning: A Meta-Learning Approach Using Multivariate Sparse Group Lasso
收藏 引用
computer Modeling in engineering & Sciences 2025年 第2期142卷 1611-1636页
作者: Irfan Khan Xianchao Zhang Ramesh Kumar Ayyasamy Saadat M.Alhashmi Azizur Rahim School of Software Dalian University of TechnologyDalian116620China Faculty of Information and Communication Technology Universiti Tunku Abdul RahmanKampar31900Malaysia College of Computing and Informatics University of SharjahSharjah27272United Arab Emirates Department of Computer Systems Engineering University of Engineering and Applied SciencesSwat19200Pakistan
The rapid growth of machine learning(ML)across fields has intensified the challenge of selecting the right algorithm for specific tasks,known as the Algorithm Selection Problem(ASP).Traditional trial-and-error methods... 详细信息
来源: 评论
Deeply‐Recursive Attention Network for video steganography
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1507-1523页
作者: Jiabao Cui Liangli Zheng Yunlong Yu Yining Lin Huajian Ni Xin Xu Zhongfei Zhang College of Computer Science and Technology Zhejiang UniversityHangzhouChina School of Software Technology Zhejiang UniversityNingboChina College of Information Science and Electronic Engineering Zhejiang UniversityHangzhouChina Shanghai SUPREMIND Technology Co. Ltd.ShanghaiChina College of Intelligence Science and Technology National University of Defense TechnologyChangshaChina Department of Computer Science Binghamton UniversityBinghamtonNew YorkUSA
Video steganography plays an important role in secret communication that conceals a secret video in a cover video by perturbing the value of pixels in the cover *** is the first and foremost requirement of any stegano... 详细信息
来源: 评论