咨询与建议

限定检索结果

文献类型

  • 18,088 篇 会议
  • 6,853 篇 期刊文献
  • 237 册 图书

馆藏范围

  • 25,178 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,936 篇 工学
    • 10,508 篇 计算机科学与技术...
    • 8,408 篇 软件工程
    • 4,914 篇 信息与通信工程
    • 2,451 篇 控制科学与工程
    • 2,221 篇 电子科学与技术(可...
    • 2,076 篇 电气工程
    • 1,744 篇 生物工程
    • 1,289 篇 生物医学工程(可授...
    • 1,139 篇 机械工程
    • 1,139 篇 光学工程
    • 1,020 篇 仪器科学与技术
    • 922 篇 动力工程及工程热...
    • 838 篇 网络空间安全
    • 683 篇 安全科学与工程
    • 652 篇 化学工程与技术
    • 559 篇 交通运输工程
  • 7,539 篇 理学
    • 3,759 篇 数学
    • 2,216 篇 物理学
    • 1,949 篇 生物学
    • 1,261 篇 统计学(可授理学、...
    • 759 篇 化学
    • 751 篇 系统科学
  • 4,006 篇 管理学
    • 2,611 篇 管理科学与工程(可...
    • 1,568 篇 图书情报与档案管...
    • 1,156 篇 工商管理
  • 1,465 篇 医学
    • 1,177 篇 临床医学
    • 1,064 篇 基础医学(可授医学...
    • 728 篇 公共卫生与预防医...
    • 606 篇 药学(可授医学、理...
  • 727 篇 法学
    • 600 篇 社会学
  • 460 篇 经济学
  • 342 篇 农学
  • 207 篇 教育学
  • 135 篇 文学
  • 89 篇 军事学
  • 48 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 811 篇 accuracy
  • 773 篇 deep learning
  • 636 篇 internet of thin...
  • 625 篇 feature extracti...
  • 464 篇 real-time system...
  • 412 篇 computational mo...
  • 398 篇 computer science
  • 382 篇 support vector m...
  • 374 篇 training
  • 373 篇 machine learning
  • 366 篇 convolutional ne...
  • 313 篇 optimization
  • 308 篇 wireless communi...
  • 306 篇 wireless sensor ...
  • 268 篇 predictive model...
  • 252 篇 routing
  • 248 篇 artificial intel...
  • 246 篇 reliability
  • 241 篇 throughput
  • 232 篇 image segmentati...

机构

  • 1,071 篇 school of comput...
  • 165 篇 maharishi school...
  • 148 篇 school of comput...
  • 131 篇 department of co...
  • 130 篇 school of inform...
  • 123 篇 school of comput...
  • 117 篇 school of comput...
  • 98 篇 department of el...
  • 83 篇 university of sc...
  • 80 篇 lovely professio...
  • 78 篇 school of comput...
  • 66 篇 school of inform...
  • 66 篇 centre of resear...
  • 64 篇 department of el...
  • 62 篇 school of comput...
  • 61 篇 karnataka bangal...
  • 56 篇 department of co...
  • 54 篇 department of co...
  • 53 篇 department of el...
  • 53 篇 centre of interd...

作者

  • 71 篇 niyato dusit
  • 48 篇 j. relin francis...
  • 45 篇 yang yang
  • 43 篇 guo hong
  • 38 篇 srinivasan c.
  • 38 篇 leonard barolli
  • 33 篇 liang qi
  • 33 篇 liu yang
  • 33 篇 mekruksavanich s...
  • 32 篇 hnoohom narit
  • 31 篇 zhiguo shi
  • 31 篇 shi zhiguo
  • 31 篇 jitpattanakul an...
  • 29 篇 wang lei
  • 29 篇 ming li
  • 29 篇 othman mohamed
  • 28 篇 raj j. relin fra...
  • 27 篇 li yang
  • 27 篇 luo xiong
  • 25 篇 tao yang

语言

  • 23,207 篇 英文
  • 1,624 篇 其他
  • 340 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Communication Technology"
25178 条 记 录,以下是71-80 订阅
排序:
Improve the Semantic Perception Ability of CNN-Based Object Detection Systems with Attention Model
Improve the Semantic Perception Ability of CNN-Based Object ...
收藏 引用
2024 International Conference on Mechatronics and Intelligent Control, ICMIC 2024
作者: Shi, TianYang Xu, XinYin Fu, Wei Huang University of Science and Technology Beijing School of Computer and Communication Engineering Beijing China
Convolutional neural networks(CNNs) based object detection methods are prone to be interfered with by background noise and cannot make full use of semantic information in the positive sample-choosing phase. To overcom... 详细信息
来源: 评论
Adaptive Dispersion Estimation for Linearized Electronic Dispersion Compensation in IM-DD Systems
收藏 引用
China communications 2025年 第4期22卷 55-64页
作者: Huo Jiahao Tao Jianlong Zhang Xiaoying Zhu Jin Qin Peng Wei Huangfu School of Computer and Communication Engineering University of Science and TechnologyBeijing 100083China
An adaptive dispersion estimation(ADE)is proposed to compensate dispersion and estimate the transfer function of the fiber channel with GerchbergSaxton(G-S)algorithm,using the stochastic gradient descent(SGD)method in... 详细信息
来源: 评论
A secure double spectrum auction scheme
收藏 引用
Digital communications and Networks 2024年 第5期10卷 1415-1427页
作者: Jiaqi Wang Ning Lu Ziyang Gong Wenbo Shi Chang Choi School of Computer Science and Engineering Northeastern UniversityShenyang110004China School of Computer Science and Technology Xidian UniversityXi©anChina Dept.of Computer Engineering Gachon University1342Seongnam-daeroSujeong-guSeongnam-si13120G School of Computer and Communication Engineering Northeastern UniversityQinhuangdao066004China
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ... 详细信息
来源: 评论
Joint Rain Streaks & Haze Removal Network for Object Detection
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4683-4702页
作者: Ragini Thatikonda Prakash Kodali Ramalingaswamy Cheruku Eswaramoorthy K.V Department of Electronics and Communication Engineering National Institute of TechnologyWarangal506004India Department of Computer Science and Engineering National Institute of TechnologyWarangal506004India Department of Electronics and Communication Engineering Indian Institute of Information TechnologyDesign and ManufacturingKurnool518008India
In the realm of low-level vision tasks,such as image deraining and dehazing,restoring images distorted by adverse weather conditions remains a significant *** emergence of abundant computational resources has driven t... 详细信息
来源: 评论
Introduction to the Special Issue on Machine Learning-Guided Intelligent Modeling with Its Industrial Applications
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 7-11页
作者: Xiong Luo Yongqiang Cheng Zhifang Liao School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Faculty of Technology University of SunderlandSunderlandSR60DDUK School of Computer Science and Engineering Central South UniversityChangsha410083China
With the advancement of Artificial Intelligence(AI)technology,traditional industrial systems are undergoing an intelligent transformation,bringing together advanced computing,communication and control technologies,Mac... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Bouke, Mohamed Aly El Atigh, Hayate Abdullah, Azizol Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia Departement of Computer Engineering Faculty of Computer Engineering Bandirma Onyedi Eylul University Balikesir10200 Turkey
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io... 详细信息
来源: 评论
A Holistic Secure communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4417-4452页
作者: Fauziyah Zhaoshun Wang Mujahid Tabassum School of Computer and Communication Engineering University of Science and TechnologyBeijing100000China Noroff School of Technology and Digital Media(Noroff Accelerate) Noroff University CollegeKristiansand4612Norway
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is *** cyber threats evolve in complexity,traditional cryptographic methods face in... 详细信息
来源: 评论
A Survey on Logic-Locking Characteristics and Attacks
收藏 引用
Journal of The Institution of Engineers (India): Series B 2024年 第4期105卷 1073-1087页
作者: Subbiah, Karthik Chinnathevar, Sujatha Electronics and Communication Engineering SSM Institute of Engineering and Technology Tamilnadu Dindigul India Computer Science and Engineering SSM Institute of Engineering and Technology Tamilnadu Dindigul India
Integrated circuits (ICs) are ubiquitous and a crucial component of electronic systems, from satellites and military hardware to consumer devices and cell phones. The computing system’s foundation of trust is the IC.... 详细信息
来源: 评论
Decoy-state method for quantum-key-distribution-based quantum private query
收藏 引用
science China(Physics,Mechanics & Astronomy) 2022年 第4期65卷 41-48页
作者: Bin Liu Shuang Xia Di Xiao Wei Huang Bingjie Xu Yang Li College of Computer Science Chongqing UniversityChongqing 400044China Science and Technology on Communication Security Laboratory Institute of Southwestern CommunicationChengdu 610041China
The quantum private query(QPQ)is a quantum solution for the symmetrically private information retrieval *** study the security of quantum-key-distribution-based QPQ with weak coherent *** result shows that multiphoton... 详细信息
来源: 评论