咨询与建议

限定检索结果

文献类型

  • 53,774 篇 会议
  • 27,402 篇 期刊文献
  • 754 册 图书

馆藏范围

  • 81,930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,039 篇 工学
    • 36,796 篇 计算机科学与技术...
    • 29,921 篇 软件工程
    • 13,916 篇 信息与通信工程
    • 8,206 篇 控制科学与工程
    • 6,060 篇 电气工程
    • 6,001 篇 生物工程
    • 5,701 篇 电子科学与技术(可...
    • 4,141 篇 生物医学工程(可授...
    • 3,806 篇 机械工程
    • 3,686 篇 光学工程
    • 2,710 篇 仪器科学与技术
    • 2,506 篇 动力工程及工程热...
    • 2,369 篇 化学工程与技术
    • 2,279 篇 网络空间安全
    • 2,131 篇 安全科学与工程
    • 1,962 篇 交通运输工程
  • 26,785 篇 理学
    • 14,387 篇 数学
    • 7,349 篇 物理学
    • 6,661 篇 生物学
    • 4,635 篇 统计学(可授理学、...
    • 3,046 篇 系统科学
    • 2,488 篇 化学
  • 14,691 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,260 篇 图书情报与档案管...
    • 3,812 篇 工商管理
  • 4,128 篇 医学
    • 3,458 篇 临床医学
    • 3,107 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,806 篇 公共卫生与预防医...
  • 2,382 篇 法学
    • 1,865 篇 社会学
  • 1,418 篇 经济学
  • 1,169 篇 农学
  • 977 篇 教育学
  • 372 篇 文学
  • 241 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,197 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,967 篇 deep learning
  • 1,966 篇 accuracy
  • 1,618 篇 machine learning
  • 1,605 篇 computational mo...
  • 1,560 篇 training
  • 1,224 篇 data mining
  • 1,075 篇 internet of thin...
  • 1,074 篇 support vector m...
  • 1,049 篇 optimization
  • 1,002 篇 predictive model...
  • 891 篇 educational inst...
  • 870 篇 wireless sensor ...
  • 867 篇 semantics
  • 836 篇 artificial intel...
  • 823 篇 real-time system...
  • 789 篇 security
  • 773 篇 neural networks
  • 730 篇 image segmentati...

机构

  • 689 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 259 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 220 篇 department of ph...
  • 220 篇 departamento de ...
  • 216 篇 physics division...
  • 216 篇 department of co...
  • 206 篇 department of ph...
  • 201 篇 school of comput...
  • 197 篇 department of ph...
  • 186 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 167 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 253 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 243 篇 y. tayalati
  • 234 篇 niyato dusit
  • 226 篇 d. guest
  • 226 篇 s. jin
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,091 篇 英文
  • 4,603 篇 其他
  • 1,248 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering and Information Technology"
81930 条 记 录,以下是251-260 订阅
排序:
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论
An intrusion attack classification using bio-inspired optimization technique and ensemble learning model for edge computing environments
收藏 引用
Multimedia Tools and Applications 2024年 1-28页
作者: Rahamathulla, Mohemmed Yousuf Ramaiah, Mangayarkarasi School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamilnadu Vellore India
The phenomenal rise in network traffic across various sectors, driven by advancements in network communication, has led to an explosion of connected devices. While internet-based service providers have enhanced smart ... 详细信息
来源: 评论
Computation of Graph Fourier Transform Centrality Using Graph Filter
IEEE Open Journal of Circuits and Systems
收藏 引用
IEEE Open Journal of Circuits and Systems 2024年 5卷 69-80页
作者: Tseng, Chien-Cheng Lee, Su-Ling National Kaohsiung University of Science and Technology Department of Computer and Communication Engineering Kaohsiung824005 Taiwan Chang Jung Christian University Department of Computer Science and Information Engineering Tainan711301 Taiwan
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g... 详细信息
来源: 评论
IaaSI: a device based interoperability as a service for IoMT devices
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 14321-14332页
作者: Kotha, Aditya Manohar, Kota U, Venkanna Department of Computer Science and Engineering International Institute of Information Technology Naya Raipur India
Interoperability is a crucial aspect of the effective functioning of Internet of Things (IoT) devices, particularly in the healthcare industry. Although the use of IoT devices in healthcare has brought numerous benefi... 详细信息
来源: 评论
A Pre-Selection-Based Ant Colony System for Integrated Resources Scheduling Problem at Marine Container Terminal
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2363-2385页
作者: Rong Wang Xinxin Xu Zijia Wang Fei Ji Nankun Mu School of Electronic and Information Engineering South China University of TechnologyGuangzhou510641China School of Computer Science and Technology Ocean University of ChinaQingdao266100China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China School of Computer Science Chongqing UniversityChongqing400044China
Marine container terminal(MCT)plays a key role in the marine intelligent transportation system and international logistics ***,the efficiency of resource scheduling significantly influences the operation performance o... 详细信息
来源: 评论
DedupChain: A secure Blockchain-enabled Storage System with Deduplication for Zero-Trust Network
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2070-2086页
作者: Qi, Saiyu Wang, Qiuhao Wei, Wei Yang, Xu Zhao, Hongguang Liu, Yuhao Yang, Xu Qi, Yong Xi'an Jiaotong University School of Computer Science and Technology China Xi'an University of Technology School of Computer Science and Engineering China Alibaba Group China Northwestern Polytechnical University School of Electronics and Information China
Permissioned blockchain is a promising methodology to build zero-trust storage foundation with trusted data storage and sharing for the zero-trust network. However, the inherent full-backup feature of the permissioned... 详细信息
来源: 评论
Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 806-817页
作者: Lei Zeng Qi Liu Shigen Shen Xiaodong Liu School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Information Engineering Huzhou UniversityHuzhou 313000China School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study prop... 详细信息
来源: 评论
Social issues of aging: Immersive technology solutions
收藏 引用
IEEE Potentials 2023年 第6期42卷 12-17页
作者: Huang, Xiang-Rui Chen, Liang-Bi National Penghu University of Science and Technology Department of Computer Science and Information Engineering Penghu880011 Taiwan
With the advancement of medical care and technology, human life expectancy is increasing, many advanced countries have aging societies, and the elderly have increasing needs for society to address;these have become so... 详细信息
来源: 评论
OSSIoT: An ontology-based Operational Security model for Social Internet of Things using Machine Learning Techniques
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第10期51卷 1440-1453页
作者: Kumar, K.S. Santhosh Hanumanthappa, J. Prakash, S.P. Shiva Krinkin, Kirill Department of Studies in Computer Science University of Mysore Karnataka Mysuru India Department of Information Science and Engineering JSS Science and Technology University Karnataka Mysuru India School of Computer Science and Engineering Constructor University Bremen Germany
The Social Internet of Things (SIoT) is an innovative fusion of IoT and smart devices that enable them to establish dynamic relationships. Securing sensitive data in a smart environment requires a model to determine t... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论