咨询与建议

限定检索结果

文献类型

  • 3,792 篇 会议
  • 1,674 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 5,507 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,353 篇 工学
    • 2,322 篇 计算机科学与技术...
    • 1,905 篇 软件工程
    • 856 篇 信息与通信工程
    • 544 篇 控制科学与工程
    • 406 篇 电气工程
    • 393 篇 生物工程
    • 342 篇 电子科学与技术(可...
    • 299 篇 生物医学工程(可授...
    • 263 篇 光学工程
    • 253 篇 机械工程
    • 209 篇 化学工程与技术
    • 201 篇 网络空间安全
    • 176 篇 安全科学与工程
    • 169 篇 仪器科学与技术
    • 169 篇 动力工程及工程热...
    • 152 篇 材料科学与工程(可...
    • 148 篇 交通运输工程
  • 1,906 篇 理学
    • 893 篇 数学
    • 667 篇 物理学
    • 429 篇 生物学
    • 311 篇 统计学(可授理学、...
    • 224 篇 化学
    • 177 篇 系统科学
  • 969 篇 管理学
    • 617 篇 管理科学与工程(可...
    • 406 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 273 篇 医学
    • 208 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 139 篇 公共卫生与预防医...
  • 165 篇 法学
    • 135 篇 社会学
  • 100 篇 农学
  • 85 篇 经济学
  • 46 篇 教育学
  • 37 篇 文学
  • 27 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 205 篇 accuracy
  • 178 篇 deep learning
  • 141 篇 feature extracti...
  • 132 篇 computational mo...
  • 128 篇 machine learning
  • 126 篇 training
  • 102 篇 convolutional ne...
  • 100 篇 predictive model...
  • 100 篇 hadron colliders
  • 92 篇 real-time system...
  • 91 篇 support vector m...
  • 90 篇 data models
  • 79 篇 artificial intel...
  • 78 篇 security
  • 71 篇 internet of thin...
  • 71 篇 optimization
  • 69 篇 cloud computing
  • 68 篇 data mining
  • 63 篇 reliability
  • 61 篇 semantics

机构

  • 185 篇 institute of com...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 charles universi...
  • 124 篇 zhejiang univers...
  • 123 篇 department of ph...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 119 篇 imperial college...
  • 119 篇 rwth aachen univ...
  • 115 篇 department of ph...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,050 篇 英文
  • 371 篇 其他
  • 87 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Engineering and Application"
5507 条 记 录,以下是211-220 订阅
排序:
Fuzzy Decision-Based Clustering for Efficient Data Aggregation in Mobile UWSNs
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 259-279页
作者: Aadil Mushtaq Pandith Manni Kumar Naveen Kumar Nitin Goyal Sachin Ahuja Yonis Gulzar Rashi Rastogi Rupesh Gupta Department of Computer Science and Engineering Lovely Professional UniversityJalandhar144402PunjabIndia Department of Computer Science and Engineering Chandigarh UniversityMohali140413PunjabIndia Salesforce Inc. DallasTX 75201USA Department of Computer Science and Engineering School of Engineering and TechnologyCentral University of HaryanaMahendragarh123031HaryanaIndia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Application Sir Chhotu Ram Institute of Engineering and TechnologyCh.Charan Singh UniversityMeerut250001Uttar PradeshIndia Chitkara University Institute of Engineering and Technology Chitkara UniversityRajpura140401PunjabIndia
Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the ***,many existing data aggregation techniq... 详细信息
来源: 评论
Assessment of network performance indexes’ designing based on combined trapezoidal and intuitionistic fuzzy information axiom
Assessment of network performance indexes’ designing based ...
收藏 引用
2022 International Conference on Artificial Intelligence and Industrial Design, AIID 2022
作者: Zhou, Kun Deng, Kai Chen, Zhi Institute of Computer Application China Academy of Engineering Physics Sichuan Province MianYang City621900 China
The designing of network performances indexes are critical to respond to the factors that assess network performances. In this study, a novel assessment method for designing network performance indexes based on combin... 详细信息
来源: 评论
Optimizing Stroke Diagnosis: application of Machine Learning Algorithms for Early Detection
Optimizing Stroke Diagnosis: Application of Machine Learning...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Sharma, Chetan Anooja, A. Kishore, Jaydeep Bhardwaj, Vivek UpGrad Education Private Limited Bangalore India School of Computer Application Jecrc University Rajasthan Jaipur India School of Computer Science and Engineering Manipal University Jaipur Jaipur India
Being a top cause of mortality and serious disability, stroke demands urgent diagnosis and impactful prevention. Current innovations in machine learning (ML) show a great capacity for predicting the likelihood of a st... 详细信息
来源: 评论
Empirical Analysis of Digital Currency Herding and Contagion Effect Using Deep Learning Approaches  3
Empirical Analysis of Digital Currency Herding and Contagion...
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Tripathy, Nrusingha Hota, Sarbeswara Mishra, Debahuti Dash, Biswajit Nayak, Subrat Kumar Tripathy, Jogeswar Deemed to Be University Department of Computer Science and Engineering Siksha 'O' Anusandhan Odisha Bhubaneswar India Deemed to Be University Department of Computer Application Siksha 'O' Anusandhan Odisha Bhubaneswar India Raajdhani Engineering College Department of Computer Science and Engineering Odisha Bhubaneswar India
In recent years, the use of virtual or cryptocurrency-based money has grown. Blockchain, a digital accounting system, is the foundation of cryptocurrency. The markets for cryptocurrencies are eminent for their high vo... 详细信息
来源: 评论
IOT-based Smart Ground water Recharge System  1
IOT-based Smart Ground water Recharge System
收藏 引用
1st International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2023
作者: Uniyal, Manas Bhatt, Chandradeep Mohd, Noor Kumar, Devendra Graphic Era Hill University Computer Science Department Dehradun India Abes Engineering College Computer Application Department Ghaziabad India
Water is the most important commodity for the existence of life. In India, the main sources of water are rainwater(monsoon) that fills the rivers with water and underground water. However, we have seen a steady declin... 详细信息
来源: 评论
Communication Countermeasure Strategy Decision-Making Based on Incomplete Information Game  27
Communication Countermeasure Strategy Decision-Making Based ...
收藏 引用
27th International Conference on Advanced Communications Technology, ICACT 2025
作者: Liu, Jinyue Gao, Xiang Yang, Haowei Zhang, Jihao Liu, Yuhan Gong, Peng National Key Laboratory of Mechatronic Engineering and Control School of Mechatronical Engineering Beijing Institute of Technology Beijing China Institute of Computer Application Technology Norinco Group Beijing China
In modern battlefields, the stability of wireless communications is crucial for intelligence transmission, command coordination, and maintaining strategic advantage. However, with the rapid advancement of communicatio... 详细信息
来源: 评论
A Survey of Dynamic Exploration Symmetric Encryption with Backward & Forward Secrecy  3
A Survey of Dynamic Exploration Symmetric Encryption with Ba...
收藏 引用
3rd International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2023
作者: Singh, Satendra Bhagat, Samriti Vivekananda Global University Department of Computer Science Engineering Jaipur India Chandigarh School of Business Department of Master of Computer Application India
A sophisticated type of symmetric encryption is called Multiuser Dynamic Searchable Symmetric Encryption. It expands the capabilities of conventional symmetric encryption to enable actions such as adding and removing ... 详细信息
来源: 评论
Research and Implementation of DM1 Based on the J1939  3
Research and Implementation of DM1 Based on the J1939
收藏 引用
3rd IEEE International Conference on computer Systems, ICCS 2023
作者: Wang, Ying Guo, LiWei Tang, Tian Xi'an Aeronautics Computing Technique Research Institute Avic Laboratory of Computer Application Engineering Xi'an China
The J1939 protocol is a communication protocol widely used in automotive electronic network. It supports real-time closed-loop control and communication among electronic control systems which are distributed in the wh... 详细信息
来源: 评论
ChatGPT Based Image Steganography (CGIS): A Novel Intelligent Information Hiding Approach to Achieve Secure Covert Communication  1
ChatGPT Based Image Steganography (CGIS): A Novel Intelligen...
收藏 引用
1st International Conference on Advances in Electrical, Electronics and Computational Intelligence, ICAEECI 2023
作者: Mukherjee, Subhadip Mukhopadhyay, Somnath Sarkar, Sunita Assam University Department of Computer Science and Engineering Silchar788011 India Sikkim University Department of Computer Application Gangtok737102 India
Covert communication refers to the practice of exchanging information or messages in a discreet or secretive manner, with the intent of keeping the communication hidden from unintended or unauthorized recipients. Steg... 详细信息
来源: 评论
An Efficient AdaBoost and CNN Hybrid Model for Weed Detection and Removal
An Efficient AdaBoost and CNN Hybrid Model for Weed Detectio...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Tiwari, Shivam Srivastava, Anurag Kumar Rathore, Yogesh Singh Vats, Satvik Rastogi, Ashish Kumar Department of Computer Science & Engineering Sharda University Greater Noida India Computer Science and Application Sharda University Greater Noida India
With the aid of AI-based methods like convolution neural networks, this article seeks to enhance weed detection and removal. A plant that is not wanted and is growing wild, especially one that does so on cultivated la... 详细信息
来源: 评论