咨询与建议

限定检索结果

文献类型

  • 1,474 篇 会议
  • 733 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,475 篇 工学
    • 1,089 篇 计算机科学与技术...
    • 871 篇 软件工程
    • 438 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 167 篇 生物工程
    • 162 篇 电气工程
    • 142 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 113 篇 生物医学工程(可授...
    • 112 篇 机械工程
    • 106 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 77 篇 仪器科学与技术
    • 77 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 60 篇 化学工程与技术
  • 750 篇 理学
    • 419 篇 数学
    • 191 篇 物理学
    • 185 篇 生物学
    • 144 篇 统计学(可授理学、...
    • 84 篇 系统科学
    • 67 篇 化学
  • 466 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 113 篇 医学
    • 92 篇 临床医学
    • 90 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 49 篇 公共卫生与预防医...
  • 80 篇 法学
    • 55 篇 社会学
  • 46 篇 农学
  • 30 篇 经济学
  • 18 篇 教育学
  • 16 篇 军事学
  • 11 篇 文学
  • 8 篇 艺术学

主题

  • 64 篇 deep learning
  • 53 篇 accuracy
  • 46 篇 feature extracti...
  • 46 篇 machine learning
  • 44 篇 computational mo...
  • 38 篇 internet of thin...
  • 38 篇 training
  • 37 篇 convolutional ne...
  • 31 篇 data mining
  • 31 篇 real-time system...
  • 28 篇 optimization
  • 27 篇 semantics
  • 27 篇 data models
  • 25 篇 cloud computing
  • 24 篇 predictive model...
  • 22 篇 support vector m...
  • 22 篇 authentication
  • 21 篇 object detection
  • 21 篇 convolution
  • 21 篇 artificial intel...

机构

  • 66 篇 department of co...
  • 59 篇 vivekananda glob...
  • 57 篇 faculty of infor...
  • 49 篇 college of compu...
  • 45 篇 maharishi school...
  • 42 篇 hunan provincial...
  • 39 篇 department of co...
  • 36 篇 department of co...
  • 27 篇 infn e laborator...
  • 27 篇 faculty of scien...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 west university ...
  • 27 篇 research center ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 graduate school ...
  • 27 篇 department physi...
  • 27 篇 institute of phy...
  • 27 篇 deutsches elektr...
  • 27 篇 institute of phy...

作者

  • 23 篇 c. alexa
  • 23 篇 j. m. izen
  • 23 篇 j. gao
  • 23 篇 g. bella
  • 23 篇 j. strandberg
  • 23 篇 d. calvet
  • 23 篇 c. amelung
  • 23 篇 b. konya
  • 23 篇 f. pastore
  • 23 篇 a. grummer
  • 23 篇 k. j. r. cormier
  • 23 篇 n. orlando
  • 23 篇 f. a. förster
  • 23 篇 y. tayalati
  • 23 篇 t. pham
  • 23 篇 g. spigo
  • 23 篇 v. chiarella
  • 23 篇 m. lu
  • 23 篇 f. siegert
  • 23 篇 a. e. c. coimbra

语言

  • 1,891 篇 英文
  • 299 篇 其他
  • 39 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Application and Information Technology"
2226 条 记 录,以下是311-320 订阅
排序:
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论
Exploratory Data Analysis using Autoviz for Machine Learning Classification Problem
Exploratory Data Analysis using Autoviz for Machine Learning...
收藏 引用
2024 International Conference on Emerging Innovations and Advanced Computing, INNOCOMP 2024
作者: Guru Prasad, M.S. Praveen Gujjar, J. Kotiyal, Arnav Prasanna Kumar, H.R. Devadas, Raghavendra M Jahan, Afsar Department of Computer Science and Engg. Dehradun India Faculty of Management Studies Bengaluru India Visvesvaraya Technological University PESITM Dept. of Information Science & Engg. Shivamogga India Gitam School of Technology Department of Computer Science and Engineering Gitam University Bengaluru India Department of Computer Application Dehradun India
As the field of machine learning continues to advance, the importance of effective exploratory data analysis (EDA) cannot be overstated, especially in the context of classification problems. This research paper introd... 详细信息
来源: 评论
A Comprehensive Study on Intrusion Detection System for Distributed Blockchain Ledger Security with Using Advanced Smart Contracts  8th
A Comprehensive Study on Intrusion Detection System for Dist...
收藏 引用
8th International Conference on information and Communication technology for Intelligent Systems, ICTIS 2024
作者: Vats, Shailender Kumar Peddi, Prasadu Vats, Prashant Department of Computer Application Institute of Computer Science and Engineering Shri Jagdishprasad Jhabarmal Tibrewala University Jhunjhunu Rajasthan Chudela India Uttar Pradesh Noida India Department of Computer Science Engineering and Information Technology Shri Jagdishprasad Jhabarmal Tibrewala University Rajasthan Jhunjhunu India Department of Computer Science and Engineering SCSE Manipal University Jaipur Rajasthan Jaipur India
The potential of blockchain technology to transform several industries, including supply chains, health care, and banking, has drawn much interest in recent years. Blockchain is becoming widely used, but this has rais... 详细信息
来源: 评论
Specific Emitter Identification based on CNN and Transformer  5
Specific Emitter Identification based on CNN and Transformer
收藏 引用
5th International Academic Exchange Conference on Science and technology Innovation, IAECST 2023
作者: Wang, Bin Gao, Ning Wang, Feng The 38th Research Institute of China Electronics Technology Group Corporation Key Laboratory of Aperture Array and Space Application Key Laboratory of Intelligent Information Processing Anhui Hefei230088 China Hefei University of Technology School of Computer and Information Hefei230601 China
Specific emitter identification(SEI) plays an increasingly crucial and potential role in both military and civilian scenarios. It refers to a process to discriminate individual emitters from each other by analyzing ex... 详细信息
来源: 评论
Security Test Case Prioritization through Ant Colony Optimization Algorithm
收藏 引用
computer Systems Science & Engineering 2023年 第12期47卷 3165-3195页
作者: Abdulaziz Attaallah Khalil al-Sulbi Areej Alasiry Mehrez Marzougui Mohd Waris Khan Mohd Faizan Alka Agrawal Dhirendra Pandey Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Al-Qunfudah Computer CollegeUmm Al-Qura UniversityMeccaSaudi Arabia College of Computer Science King Khalid UniversityAbha61421Saudi Arabia Department of Computer Application Integral UniversityLucknowUttar Pradesh226026India Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknowUttar Pradesh226025India
Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software *** of the challenges in software security testing is tes... 详细信息
来源: 评论
Lightweight 6-bit S-boxes with DPA Resistance
收藏 引用
IEEE Transactions on Network Science and Engineering 2025年
作者: Yan, Liuyan Li, Lang Song, Qingling Hengyang Normal University College of Computer Science and Technology Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Lightweight S-boxes have a significant impact on cryptographic algorithms for resource-constrained devices in the Internet of Things (IoT). Previous research on such S-oxes has focused on low area and good cryptograph... 详细信息
来源: 评论
TB Chest X-Ray Diagnostic Technique Using Deep Learning  3
TB Chest X-Ray Diagnostic Technique Using Deep Learning
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Goyal, Manish Kumar Yadav, Dhananjay Kumar Brar, Khushmeen Kaur Mittal, Manisha Ojha, Ananta Alzubaidi, Laith H. Pathani, Ashish Vivekananda Global University Dept. of Computer Science & Application Jaipur India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Chandigarh University Dept. of Electronics and Communication Engineering Mohali India Guru Tegh Bahadur Institute of Technology New Delhi India Dept. of Computer Science and Information Technology Bangalore India The Islamic University Najaf Iraq Uttaranchal Institute of Technology Uttaranchal University Department of Civil Engineering Dehradun India
The bacteria Mycobacterium tuberculosis is responsible for the infectious illness tuberculosis (TB). Although the lungs are the primary organs affected, the kidneys, bones, and brain may also be affected. Whenever an ... 详细信息
来源: 评论
Graph Regularized Sparse Non-Negative Matrix Factorization for Clustering
收藏 引用
IEEE Transactions on Computational Social Systems 2023年 第3期10卷 910-921页
作者: Deng, Ping Li, Tianrui Wang, Hongjun Wang, Dexian Horng, Shi-Jinn Liu, Rui Southwest Jiaotong University National Engineering Laboratory of Integrated Transportation Big Data Application Technology School of Computing and Artificial Intelligence Chengdu611756 China National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan North Sichuan Medical College School of Preclinical Medicine Department of Computer and Mathematics Nanchong637100 China
The graph regularized nonnegative matrix factorization (GNMF) algorithms have received a lot of attention in the field of machine learning and data mining, as well as the square loss method is commonly used to measure... 详细信息
来源: 评论
Detection of Arrhythmia from ECG Signal Using Bat Algorithm-Based Deep Neural Network  7th
Detection of Arrhythmia from ECG Signal Using Bat Algorithm-...
收藏 引用
7th International Conference on Advanced Computing and Intelligent Engineering, ICACIE 2022
作者: Singh, Kabrambam Rupabanta Dash, Sujata Atta-ur-Rahman Department of Computer Application Maharaja Srirama Chandra Bhanja Deo University Sriramachandra Vihar Odisha Baripada India DRIEMS School of Professional Studies Odisha Tangi Cuttack India College of Computer Science and Information Technology Imam Abdul Rahman Bin Faisal University Damian Saudi Arabia
Heart disease is one of the deathliest diseases in the world. As the ECG data is widely available, many machine learning and deep learning models have been developed for the automatic Arrhythmia diagnosis system. In t... 详细信息
来源: 评论
Prediction of rainfall-type debris flow in Jiangjiagou based on LSTM-Attention  3
Prediction of rainfall-type debris flow in Jiangjiagou based...
收藏 引用
3rd International Conference on computer Vision, Image and Deep Learning and International Conference on computer Engineering and applications, CVIDL and ICCEA 2022
作者: Gao, Yuan Li, Yingna Kunming University of Science and Technology College of Faculty of Information Engineering and Automation Kunming China Key Laboratory of Computer Technology Application of Yunnan Province Kunming China
Through the neural network model, the rainfall-type debris flow in Jiangjiagou is predicted. Based on seven meteorological factors with time series characteristics, such as daily rainfall, previous effective rainfall,... 详细信息
来源: 评论