咨询与建议

限定检索结果

文献类型

  • 68,042 篇 会议
  • 32,068 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 100,943 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 62,221 篇 工学
    • 44,092 篇 计算机科学与技术...
    • 35,703 篇 软件工程
    • 17,188 篇 信息与通信工程
    • 10,083 篇 控制科学与工程
    • 7,557 篇 电气工程
    • 7,373 篇 电子科学与技术(可...
    • 7,062 篇 生物工程
    • 4,971 篇 生物医学工程(可授...
    • 4,692 篇 机械工程
    • 4,417 篇 光学工程
    • 3,452 篇 仪器科学与技术
    • 3,157 篇 动力工程及工程热...
    • 2,917 篇 化学工程与技术
    • 2,616 篇 网络空间安全
    • 2,529 篇 安全科学与工程
    • 2,348 篇 交通运输工程
  • 32,419 篇 理学
    • 17,328 篇 数学
    • 9,045 篇 物理学
    • 7,833 篇 生物学
    • 5,619 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,074 篇 化学
  • 17,439 篇 管理学
    • 10,798 篇 管理科学与工程(可...
    • 7,373 篇 图书情报与档案管...
    • 4,603 篇 工商管理
  • 4,876 篇 医学
    • 4,089 篇 临床医学
    • 3,658 篇 基础医学(可授医学...
    • 2,249 篇 药学(可授医学、理...
    • 2,073 篇 公共卫生与预防医...
  • 2,807 篇 法学
    • 2,195 篇 社会学
  • 1,721 篇 经济学
  • 1,428 篇 农学
  • 1,214 篇 教育学
  • 471 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,671 篇 feature extracti...
  • 2,343 篇 accuracy
  • 2,266 篇 deep learning
  • 2,117 篇 computer science
  • 1,985 篇 computational mo...
  • 1,931 篇 training
  • 1,893 篇 machine learning
  • 1,462 篇 data mining
  • 1,324 篇 optimization
  • 1,317 篇 internet of thin...
  • 1,305 篇 support vector m...
  • 1,185 篇 information tech...
  • 1,166 篇 predictive model...
  • 1,102 篇 educational inst...
  • 1,097 篇 wireless sensor ...
  • 983 篇 artificial intel...
  • 962 篇 neural networks
  • 944 篇 real-time system...
  • 939 篇 semantics
  • 937 篇 security

机构

  • 695 篇 school of comput...
  • 516 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 266 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 203 篇 school of comput...
  • 201 篇 department of co...
  • 194 篇 department of ph...
  • 183 篇 department of ph...
  • 175 篇 departamento de ...
  • 175 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 254 篇 m. klein
  • 251 篇 r. ströhmer
  • 243 篇 y. tayalati
  • 240 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 221 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 196 篇 d. guest
  • 190 篇 s. jin

语言

  • 93,965 篇 英文
  • 5,350 篇 其他
  • 1,647 篇 中文
  • 77 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 德文
  • 10 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Information Technology"
100943 条 记 录,以下是561-570 订阅
排序:
Cluster Head Selection and Multipath Routing Based Energy Efficient Wireless Sensor Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 879-894页
作者: T.Shanmugapriya Dr.K.Kousalya Department of Information Technology SNS College of TechnologyCoimbatore641035India Department of Computer Science and Engineering Kongu Engineering CollegeErode638060India
The Wireless Sensor Network(WSN)is a network of Sensor Nodes(SN)which adopt radio signals for communication amongst *** is an increase in the prominence of WSN adaptability to emerging applications like the Internet o... 详细信息
来源: 评论
A dynamic and resource sharing virtual network mapping algorithm
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1101-1112页
作者: Xiancui Xiao Xiangwei Zheng Ji Bian Cun Ji Xinchun Cui School of Information Science and Engineering Shandong Normal UniversityJinan250014China School of Information Engineering Shandong Management UniversityJinan250358China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250014China School of Computer Science and Technology Qufu Normal UniversityRizhao276800China
Network virtualization can effectively establish dedicated virtual networks to implement various network ***,the existing research works have some shortcomings,for example,although computing resource properties of ind... 详细信息
来源: 评论
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 857-873页
作者: Amardeep Singh Hamad Ali Abosaq Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa School of Computer Information Sciences University of CumberlandsWilliamsburgKentucky40769USA Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Electrical Engineering The University of LahoreLahore54000Pakistan Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... 详细信息
来源: 评论
FeAdaBoost: EnhancingFederated Learning Accuracy by Ensemble Techniques  29
FeAdaBoost: EnhancingFederated Learning Accuracy by Ensemble...
收藏 引用
29th International computer Conference, computer Society of Iran, CSICC 2025
作者: Fotoohabadi, Vida Afzali, Afsaneh Shamsinejadbabaki, Pirooz Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran
Federated Learning (FL), an advanced technique in machine learning (ML), allows for model training without transferring data to a central server. This method is particularly valuable in sensitive applications, such as... 详细信息
来源: 评论
IoT-Supported Indoor Navigation System Using Machine Learning Technique  12th
IoT-Supported Indoor Navigation System Using Machine Learnin...
收藏 引用
12th International Conference on Recent Trends in Computing, ICRTC 2024
作者: Christy Jeba Malar, A. Deva Priya, M. Bhuvana, S. Vidhya, K. Sudharsan, S. Suhita, S. Department of Information Technology Sri Krishna College of Technology Tamilnadu Coimbatore India Department of Computer Science and Engineering Karpagam College of Engineering Tamilnadu Coimbatore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Indoor Navigation System (INS) supports seamless movement of objects within confined spaces in smart environments. In this paper, a novel INS that relies on ESP32-based Received Signal Strength Indication (RSSI) measu... 详细信息
来源: 评论
Joint Beamforming, Power Control, and Interference Coordination: A Reinforcement Learning Approach Replacing Rewards With Examples
收藏 引用
IEEE Access 2023年 11卷 88854-88868页
作者: Sheu, Jeng-Shin Huang, Cheng-Kuei Tsai, Chun-Lung National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Yunlin640002 Taiwan
In this paper, we consider the problem of multi-cell interference coordination by joint beamforming and power control. Recent efforts have explored the use of reinforcement learning (RL) methods to tackle this complex... 详细信息
来源: 评论
Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5793-5823页
作者: Li, Fengyong Li, Longwei Zeng, Yishu Yu, Jiang Qin, Chuan College of Computer Science and Technology Shanghai University of Electric Power Shanghai201306 China School of Information and Computer Shanghai Business School Shanghai201400 China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200092 China
Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the traditional steganography which only requires the security of an ind... 详细信息
来源: 评论
DeepOCL:A deep neural network for Object Constraint Language generation from unrestricted nature language
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第1期9卷 250-263页
作者: Yilong Yang Yibo Liu Tianshu Bao Weiru Wang Nan Niu Yongfeng Yin School of Software Beihang UniversityBeijingChina College of Computer Science and Technology Guizhou UniversityGuiyangGuizhouChina Faculty of Information Technology Beijing University of TechnologyBeijingChina Department of Electrical Engineering and Computer Sciences University of CincinnatiCincinnatiOhioUSA
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn... 详细信息
来源: 评论
Preserving friendly stacking and weighted shadows in selective scalable secret image sharing
收藏 引用
Multimedia Tools and Applications 2023年 第19期82卷 29283-29305页
作者: Lee, Jung-San Chen, Yin-Chin Hsieh, Yun-Hao Chang, Shih-Hao Huynh, Ngoc-Tu Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Department of Information Technology Ton Duc Thang University Ho Chi Minh City Viet Nam
With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of secret image sharing. The region of interest (ROI) in the protected s... 详细信息
来源: 评论
TSC:Efficient FRB Signal Search by a Two-stage Cascade Deep Learning Model on FAST
收藏 引用
Research in Astronomy and Astrophysics 2025年 第3期25卷 60-69页
作者: Ronghuan Yan Junlin Li Weixin Tian Nyasha Mkwanda Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering China Three Gorges University College of Computer and Information Technology China Three Gorges University
Fast Radio Bursts(FRBs) have emerged as one of the most intriguing and enigmatic phenomena in the field of radio astronomy. The key of current related research is to obtain enough FRB signals. computer-aided search is... 详细信息
来源: 评论