咨询与建议

限定检索结果

文献类型

  • 18,088 篇 会议
  • 6,853 篇 期刊文献
  • 237 册 图书

馆藏范围

  • 25,178 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,936 篇 工学
    • 10,508 篇 计算机科学与技术...
    • 8,408 篇 软件工程
    • 4,914 篇 信息与通信工程
    • 2,451 篇 控制科学与工程
    • 2,221 篇 电子科学与技术(可...
    • 2,076 篇 电气工程
    • 1,744 篇 生物工程
    • 1,289 篇 生物医学工程(可授...
    • 1,139 篇 机械工程
    • 1,139 篇 光学工程
    • 1,020 篇 仪器科学与技术
    • 922 篇 动力工程及工程热...
    • 838 篇 网络空间安全
    • 683 篇 安全科学与工程
    • 652 篇 化学工程与技术
    • 559 篇 交通运输工程
  • 7,539 篇 理学
    • 3,759 篇 数学
    • 2,216 篇 物理学
    • 1,949 篇 生物学
    • 1,261 篇 统计学(可授理学、...
    • 759 篇 化学
    • 751 篇 系统科学
  • 4,006 篇 管理学
    • 2,611 篇 管理科学与工程(可...
    • 1,568 篇 图书情报与档案管...
    • 1,156 篇 工商管理
  • 1,465 篇 医学
    • 1,177 篇 临床医学
    • 1,064 篇 基础医学(可授医学...
    • 728 篇 公共卫生与预防医...
    • 606 篇 药学(可授医学、理...
  • 727 篇 法学
    • 600 篇 社会学
  • 460 篇 经济学
  • 342 篇 农学
  • 207 篇 教育学
  • 135 篇 文学
  • 89 篇 军事学
  • 48 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 811 篇 accuracy
  • 773 篇 deep learning
  • 636 篇 internet of thin...
  • 625 篇 feature extracti...
  • 464 篇 real-time system...
  • 412 篇 computational mo...
  • 398 篇 computer science
  • 382 篇 support vector m...
  • 374 篇 training
  • 373 篇 machine learning
  • 366 篇 convolutional ne...
  • 313 篇 optimization
  • 308 篇 wireless communi...
  • 306 篇 wireless sensor ...
  • 268 篇 predictive model...
  • 252 篇 routing
  • 248 篇 artificial intel...
  • 246 篇 reliability
  • 241 篇 throughput
  • 232 篇 image segmentati...

机构

  • 1,071 篇 school of comput...
  • 165 篇 maharishi school...
  • 148 篇 school of comput...
  • 131 篇 department of co...
  • 130 篇 school of inform...
  • 123 篇 school of comput...
  • 117 篇 school of comput...
  • 98 篇 department of el...
  • 83 篇 university of sc...
  • 80 篇 lovely professio...
  • 78 篇 school of comput...
  • 66 篇 school of inform...
  • 66 篇 centre of resear...
  • 64 篇 department of el...
  • 62 篇 school of comput...
  • 61 篇 karnataka bangal...
  • 56 篇 department of co...
  • 54 篇 department of co...
  • 53 篇 department of el...
  • 53 篇 centre of interd...

作者

  • 71 篇 niyato dusit
  • 48 篇 j. relin francis...
  • 45 篇 yang yang
  • 43 篇 guo hong
  • 38 篇 srinivasan c.
  • 38 篇 leonard barolli
  • 33 篇 liang qi
  • 33 篇 liu yang
  • 33 篇 mekruksavanich s...
  • 32 篇 hnoohom narit
  • 31 篇 zhiguo shi
  • 31 篇 shi zhiguo
  • 31 篇 jitpattanakul an...
  • 29 篇 wang lei
  • 29 篇 ming li
  • 29 篇 othman mohamed
  • 28 篇 raj j. relin fra...
  • 27 篇 li yang
  • 27 篇 luo xiong
  • 25 篇 tao yang

语言

  • 23,207 篇 英文
  • 1,624 篇 其他
  • 340 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Communication Technology"
25178 条 记 录,以下是61-70 订阅
排序:
GP‐FMLNet:A feature matrix learning network enhanced by glyph and phonetic information for Chinese sentiment analysis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 960-972页
作者: Jing Li Dezheng Zhang Yonghong Xie Aziguli Wulamu Yao Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijingChina Beijing Key Laboratory of Knowledge Engineering for Materials Science University of Science and Technology BeijingBeijingChina University of Alberta EdmontonAlbertaCanada
Sentiment analysis is a fine‐grained analysis task that aims to identify the sentiment polarity of a specified *** methods in Chinese sentiment analysis tasks only consider sentiment features from a single pole and s... 详细信息
来源: 评论
Adoption of electronic payment platforms by fast moving consumer goods (FMCG) businesses in Ghana: PLS-SEM and FSQCA approaches
收藏 引用
SN Business and Economics 2025年 第5期5卷 1-28页
作者: Appiah, Thomas Assefuah, Blessed Agblewornu, Veronica Venyo Forson, Nelly Mac-Arhin Donkoh, Grace Department of Accounting Banking and Finance Ghana Communication Technology University Accra Ghana Ghana Communication Technology University Accra Ghana Department of Computer Science Ghana Communication Technology University Accra Ghana
Over the past decade, the antecedents of electronic payment (e-payment) adoption have been studied extensively in the extant literature. Nonetheless, these studies have often investigated how individual antecedents af... 详细信息
来源: 评论
Greenshields Model-Based Fuzzy System for Predicting Traffic Congestion on Highways
收藏 引用
IEEE Access 2024年 12卷 115868-115882页
作者: Hao, Miin-Jong Hsieh, Bo-Yi National Kaohsiung University of Science and Technology Department of Computer and Communication Engineering Yanchao Kaohsiung824005 Taiwan
Highways serve as vital connectors between cities, yet they often suffer from traffic congestion as the population continues to grow. Various intelligent frameworks or models for traffic status prediction have been em... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
Data Secure Storage Mechanism for IIoT Based on Blockchain
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4029-4048页
作者: Jin Wang Guoshu Huang R.Simon Sherratt Ding Huang Jia Ni School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Systems Engineering The University of ReadingReadingRG66AYUK School of Computer Nanjing University of Information Science and TechnologyNanjing210044China
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... 详细信息
来源: 评论
Decomposition-based learning in drone-assisted wireless-powered mobile edge computing networks
收藏 引用
Digital communications and Networks 2024年 第6期10卷 1769-1781页
作者: Xiaoyi Zhou Liang Huang Tong Ye Weiqiang Sun State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Jiao Tong UniversityShanghai 200240China College of Computer Science and Technology Zhejiang University of TechnologyHangzhou 310058China
This paper investigates the multi-Unmanned Aerial Vehicle(UAV)-assisted wireless-powered Mobile Edge Computing(MEC)system,where UAVs provide computation and powering services to mobile *** aim to maximize the number o... 详细信息
来源: 评论
Predicting software vulnerability based on software metrics: a deep learning approach
收藏 引用
Iran Journal of computer science 2024年 第4期7卷 801-812页
作者: Agbenyegah, Francis Kwadzo Asante, Micheal Chen, Jinfu Akpaku, Ernest Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Department of Information Technology Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit... 详细信息
来源: 评论
AIO: Automating I/O Optimization Pipeline for Data-Intensive Applications in HPC  22
AIO: Automating I/O Optimization Pipeline for Data-Intensive...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Wang, Wanxin Wu, Huijun Yang, Lihua Liu, Zhangyu Zheng, Bin Changsha University of Science and Technology School of Computer and Communication Engineering China National University of Defense Technology College of Computer Science and Technology China
High-performance computing (HPC) systems has entered the exascale era, but I/O performance has lagged behind due to storage hardware limitations, creating a "storage wall effect"that hinders HPC systems full... 详细信息
来源: 评论
SiamS3C: spatial-channel cross-correlation for visual tracking with centerness-guided regression
收藏 引用
Multimedia Systems 2024年 第5期30卷 1-14页
作者: Zhang, Jianming Chen, Wentao He, Yufan Kuang, Li-Dan Sangaiah, Arun Kumar School of Computer and Communication Engineering Changsha University of Science and Technology Changsha410076 China International Graduate School of AI National Yunlin University of Science and Technology Douliu64002 Taiwan
Visual object tracking can be divided into the object classification and bounding-box regression tasks, but only one sharing correlation map leads to inaccuracy. Siamese trackers compute correlation map by cross-corre... 详细信息
来源: 评论
Computation of Graph Fourier Transform Centrality Using Graph Filter
IEEE Open Journal of Circuits and Systems
收藏 引用
IEEE Open Journal of Circuits and Systems 2024年 5卷 69-80页
作者: Tseng, Chien-Cheng Lee, Su-Ling National Kaohsiung University of Science and Technology Department of Computer and Communication Engineering Kaohsiung824005 Taiwan Chang Jung Christian University Department of Computer Science and Information Engineering Tainan711301 Taiwan
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g... 详细信息
来源: 评论