咨询与建议

限定检索结果

文献类型

  • 68,042 篇 会议
  • 32,068 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 100,943 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 62,221 篇 工学
    • 44,092 篇 计算机科学与技术...
    • 35,703 篇 软件工程
    • 17,188 篇 信息与通信工程
    • 10,083 篇 控制科学与工程
    • 7,557 篇 电气工程
    • 7,373 篇 电子科学与技术(可...
    • 7,062 篇 生物工程
    • 4,971 篇 生物医学工程(可授...
    • 4,692 篇 机械工程
    • 4,417 篇 光学工程
    • 3,452 篇 仪器科学与技术
    • 3,157 篇 动力工程及工程热...
    • 2,917 篇 化学工程与技术
    • 2,616 篇 网络空间安全
    • 2,529 篇 安全科学与工程
    • 2,348 篇 交通运输工程
  • 32,419 篇 理学
    • 17,328 篇 数学
    • 9,045 篇 物理学
    • 7,833 篇 生物学
    • 5,619 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,074 篇 化学
  • 17,439 篇 管理学
    • 10,798 篇 管理科学与工程(可...
    • 7,373 篇 图书情报与档案管...
    • 4,603 篇 工商管理
  • 4,876 篇 医学
    • 4,089 篇 临床医学
    • 3,658 篇 基础医学(可授医学...
    • 2,249 篇 药学(可授医学、理...
    • 2,073 篇 公共卫生与预防医...
  • 2,807 篇 法学
    • 2,195 篇 社会学
  • 1,721 篇 经济学
  • 1,428 篇 农学
  • 1,214 篇 教育学
  • 471 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,671 篇 feature extracti...
  • 2,343 篇 accuracy
  • 2,266 篇 deep learning
  • 2,117 篇 computer science
  • 1,985 篇 computational mo...
  • 1,931 篇 training
  • 1,893 篇 machine learning
  • 1,462 篇 data mining
  • 1,324 篇 optimization
  • 1,317 篇 internet of thin...
  • 1,305 篇 support vector m...
  • 1,185 篇 information tech...
  • 1,166 篇 predictive model...
  • 1,102 篇 educational inst...
  • 1,097 篇 wireless sensor ...
  • 983 篇 artificial intel...
  • 962 篇 neural networks
  • 944 篇 real-time system...
  • 939 篇 semantics
  • 937 篇 security

机构

  • 695 篇 school of comput...
  • 516 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 266 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 203 篇 school of comput...
  • 201 篇 department of co...
  • 194 篇 department of ph...
  • 183 篇 department of ph...
  • 175 篇 departamento de ...
  • 175 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 254 篇 m. klein
  • 251 篇 r. ströhmer
  • 243 篇 y. tayalati
  • 240 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 221 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 196 篇 d. guest
  • 190 篇 s. jin

语言

  • 93,965 篇 英文
  • 5,350 篇 其他
  • 1,647 篇 中文
  • 77 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 德文
  • 10 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Information Technology"
100943 条 记 录,以下是461-470 订阅
排序:
A Survey of Edge Caching:Key Issues and Challenges
收藏 引用
Tsinghua Science and technology 2024年 第3期29卷 818-842页
作者: Hanwen Li Mingtao Sun Fan Xia Xiaolong Xu Muhammad Bilal School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 262700China Reading Academy Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Department of Computer Engineering Hankuk University of Foreign StudiesYongin-si 17035Republic of Korea
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... 详细信息
来源: 评论
Comparison of Geographically Weighted Regression (GWR) and Mixed Geographically Weighted Regression (MGWR) Models on the Poverty Levels in Central Java in 2023
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2746-2757页
作者: Alya, Najma Attaqiya Almaulidiyah, Qothrotunnidha Farouk, Bailey Reshad Rantini, Dwi Ramadan, Arip Othman, Fazidah Engineering Department Data Science Technology Study Program Universitas Airlangga Indonesia Engineering Department Data Science Technology Study Program Faculty of Advanced Technology and Multi-discipline Universitas Airlangga Indonesia Information System Study Program Department of Industrial and System Engineering Telkom University Surabaya Campus Indonesia Department of Computer System and Technology Faculty of Computer Science and Information Technology University of Malaya Malaysia
Poverty is considered a serious global issue that must be immediately eradicated by Sustainable Development Goals (SDGs) 1, namely ending poverty anywhere and in any form. As a developing country, poverty is a complex... 详细信息
来源: 评论
Oppositional Red Fox Optimization Based Task Scheduling Scheme for Cloud Environment
收藏 引用
computer Systems Science & engineering 2023年 第4期45卷 483-495页
作者: B.Chellapraba D.Manohari K.Periyakaruppan M.S.Kavitha Department of Information Technology Karpagam Institute of TechnologyCoimbatore641032TamilnaduIndia Department of Computer Science and Engineering St.Joseph’s Institute of TechnologyChennai600119India Department of Computer Science&Engineering SNS College of EngineeringCoimbatore641107India Department of Computer Science&Engineering SNS College of TechnologyCoimbatore641035India
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various re... 详细信息
来源: 评论
DyPSS: Dynamic Priority Signalling System for Emergency Vehicles using Fog and YOLOv8  17
DyPSS: Dynamic Priority Signalling System for Emergency Vehi...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Kakde, Anuj Nath, Shubha Brata Ghosh, Soumya K. Indian Institute of Technology Department of Computer Science and Engineering Kharagpur India Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India
Efficient navigation of emergency response vehicles (ERVs) through urban congestion is crucial to life-saving efforts, yet traditional traffic systems often slow down their swift passage. In this work, we introduce Dy... 详细信息
来源: 评论
Salp swarm algorithm using lens opposition-based learning and local search for constrained optimization problems
收藏 引用
Iran Journal of computer Science 2025年 第2期8卷 659-686页
作者: Majumdar, Parijata Mitra, Sanjoy Department of Computer Science and Engineering Indian Institute of Information Technology Agartala Jirania 799046 India Department of Computer Science and Engineering Tripura Institute of Technology Agartala Narsingarh 799009 India
The Salp swarm algorithm (SSA) simulates how salps forage and travel in the ocean. SSA suffers from low initial population diversity, improper balancing of exploration and exploitation, and slow convergence speed. Thu... 详细信息
来源: 评论
Neuroadaptive Containment Control for Nonlinear Multiagent Systems With Input Saturation: An Event-Triggered Communication Approach
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3163-3173页
作者: Wang, Xin Zhang, Sen Li, Huaqing Zhang, Wei Li, Hongyi Huang, Tingwen Southwest University College of Electronic and Information Engineering Chongqing400715 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
In this article, a neuroadaptive event-triggered containment control strategy combined with the dynamic surface control (DSC) approach is proposed for nonlinear multiagent systems (MASs) with input saturation. Based o... 详细信息
来源: 评论
Deep Subspace K-Means Clustering for Syringe Defect Detection Without Defective Samples
Deep Subspace K-Means Clustering for Syringe Defect Detectio...
收藏 引用
2023 International Symposium on Design Studies and Intelligence engineering, DSIE 2023
作者: Yan, Fei Wang, Xiaodong Hong, Longfu Xie, Zhiyao College of Computer and Information Engineering Xiamen University of Technology Xiamen China
Modern clustering techniques are becoming more popular, but traditional clustering methods often heavily rely on artificial feature extraction, costing too much human labor resources. This task is especially important... 详细信息
来源: 评论
Multi Pedestrian Tracking Algorithm Based on Improved YOLOv5 and DeepSORT  9
Multi Pedestrian Tracking Algorithm Based on Improved YOLOv5...
收藏 引用
9th International Conference on Intelligent Informatics and BioMedical Sciences, ICIIBMS 2024
作者: Wan, Hong Zhang, Yu Yang, Delong Shanghai Institute of Technology School of Computer and Information Engineering Shanghai China
A pedestrian detection and tracking algorithm based on improved YOLOv5s and DeepSORT is proposed to address the issues of pedestrian identity jumps and tracking failures caused by mutual occlusion, similar appearance ... 详细信息
来源: 评论
A Bilateral Assessment of Human Activities Using PSO-Based Feature Optimization and Non-linear Multi-task Least Squares Twin Support Vector Machine
收藏 引用
SN computer Science 2024年 第3期5卷 315页
作者: Thakur, Ujwala Vidyarthi, Ankit Prajapati, Amarjeet Department of Computer Science Engineering and Information Technology Jaypee Institute of Information Technology Noida Sector-62 Uttar Pradesh Noida 201309 India
Human activity recognition (HAR) is an essential part of many applications, including smart surroundings, sports analysis, and healthcare. Accurately categorizing intricate actions from sensor data is still difficult,... 详细信息
来源: 评论
Employing Machine Learning Algorithms to Detect Phishing URL Websites  5
Employing Machine Learning Algorithms to Detect Phishing URL...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Charishma, T.N.S. Koushik, A Sai Reddy, G Sai Ashmit Himabindu, M. Institute of Aeronautical Engineering Computer Science and Information Technology Hyderabad India
Phishing attacks have risen like wildfire in the era of new digital technology in the wake of exploiting holes in the electronic communication process while cheating a user to seek private information. This work provi... 详细信息
来源: 评论