咨询与建议

限定检索结果

文献类型

  • 70,901 篇 会议
  • 40,185 篇 期刊文献
  • 813 册 图书

馆藏范围

  • 111,899 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 68,954 篇 工学
    • 45,983 篇 计算机科学与技术...
    • 37,747 篇 软件工程
    • 17,120 篇 信息与通信工程
    • 11,286 篇 控制科学与工程
    • 8,866 篇 电气工程
    • 8,473 篇 电子科学与技术(可...
    • 7,994 篇 生物工程
    • 5,696 篇 光学工程
    • 5,589 篇 生物医学工程(可授...
    • 5,487 篇 机械工程
    • 3,943 篇 化学工程与技术
    • 3,841 篇 仪器科学与技术
    • 3,596 篇 动力工程及工程热...
    • 2,832 篇 网络空间安全
    • 2,786 篇 材料科学与工程(可...
    • 2,713 篇 交通运输工程
    • 2,590 篇 安全科学与工程
  • 38,059 篇 理学
    • 19,179 篇 数学
    • 11,818 篇 物理学
    • 8,962 篇 生物学
    • 6,450 篇 统计学(可授理学、...
    • 4,226 篇 化学
    • 4,048 篇 系统科学
  • 18,428 篇 管理学
    • 11,718 篇 管理科学与工程(可...
    • 7,470 篇 图书情报与档案管...
    • 4,789 篇 工商管理
  • 5,394 篇 医学
    • 4,400 篇 临床医学
    • 3,965 篇 基础医学(可授医学...
    • 2,422 篇 药学(可授医学、理...
  • 2,977 篇 法学
    • 2,430 篇 社会学
  • 1,874 篇 经济学
  • 1,448 篇 农学
  • 1,035 篇 教育学
  • 471 篇 文学
  • 258 篇 军事学
  • 216 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,253 篇 accuracy
  • 3,093 篇 feature extracti...
  • 2,865 篇 deep learning
  • 2,645 篇 training
  • 2,489 篇 computational mo...
  • 2,138 篇 computer science
  • 2,073 篇 machine learning
  • 1,700 篇 optimization
  • 1,600 篇 predictive model...
  • 1,423 篇 convolutional ne...
  • 1,419 篇 real-time system...
  • 1,401 篇 internet of thin...
  • 1,388 篇 semantics
  • 1,350 篇 data models
  • 1,336 篇 support vector m...
  • 1,207 篇 neural networks
  • 1,169 篇 data mining
  • 1,053 篇 image segmentati...
  • 1,047 篇 artificial intel...
  • 959 篇 security

机构

  • 2,471 篇 school of comput...
  • 1,548 篇 school of comput...
  • 1,367 篇 school of comput...
  • 1,087 篇 cavendish labora...
  • 1,022 篇 department of ph...
  • 989 篇 school of comput...
  • 943 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 835 篇 university of ch...
  • 687 篇 school of comput...
  • 579 篇 school of comput...
  • 569 篇 chitkara univers...
  • 540 篇 fakultät physik ...
  • 532 篇 school of physic...
  • 531 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 520 篇 department of ph...
  • 516 篇 imperial college...
  • 511 篇 school of comput...
  • 508 篇 h.h. wills physi...

作者

  • 273 篇 niyato dusit
  • 269 篇 a. gomes
  • 264 篇 barter w.
  • 248 篇 c. alexa
  • 246 篇 j. m. izen
  • 245 篇 c. amelung
  • 244 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 239 篇 beiter a.
  • 236 篇 blake t.
  • 233 篇 s. chen
  • 229 篇 bellee v.
  • 229 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 221 篇 brundu d.
  • 221 篇 borsato m.
  • 220 篇 boettcher t.
  • 215 篇 g. spigo

语言

  • 95,265 篇 英文
  • 14,833 篇 其他
  • 1,860 篇 中文
  • 129 篇 日文
  • 20 篇 德文
  • 19 篇 法文
  • 11 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=Computer Science and Engineering Amity School of Engineering and Technology"
111899 条 记 录,以下是211-220 订阅
排序:
VKFQ:A Verifiable Keyword Frequency Query Framework with Local Differential Privacy in Blockchain
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4205-4223页
作者: Youlin Ji Bo Yin Ke Gu School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
With its untameable and traceable properties,blockchain technology has been widely used in the field of data *** to preserve individual privacy while enabling efficient data queries is one of the primary issues with s... 详细信息
来源: 评论
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2675-2719页
作者: Singamaneni Krishnapriya Sukhvinder Singh Department of Computer Science School of Engineering and TechnologyPondicherry UniversityKalapet605014India
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att... 详细信息
来源: 评论
Biometrics 2.0 for the Security of Smart Cities
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1121-1144页
作者: Wei Jia Zhecheng Zhang Yang Zhao Hai Min Shujie Li School of Computer Science and Information Engineering Hefei University of TechnologyHefei230009China
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 196... 详细信息
来源: 评论
DDSS: Driver decision support system based on the driver behaviour prediction to avoid accidents in intelligent transport system
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 1-13页
作者: S, Balasubramani D, John Aravindhar Renjith, P.N. Ramesh, K. Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram India Department of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering Sri Krishna College of Engineering and Technology Coimbatore India
Accidents caused by drivers who exhibit unusual behavior are putting road safety at ever-greater risk. When one or more vehicle nodes behave in this way, it can put other nodes in danger and result in potentially cata... 详细信息
来源: 评论
SA-Model:Multi-Feature Fusion Poetic Sentiment Analysis Based on a Hybrid Word Vector Model
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 631-645页
作者: Lingli Zhang Yadong Wu Qikai Chu Pan Li Guijuan Wang Weihan Zhang Yu Qiu Yi Li School of Computer Science and Engineering Sichuan University of Science and EngineeringZigong643000China School of Automation and Information Engineering Sichuan University of Science and EngineeringZigong643000China School of Computer Science and Technology Southwest University of Science and TechnologyMianyang621000China School of Information Engineering Southwest University of Science and TechnologyMianyang621000China
Sentiment analysis in Chinese classical poetry has become a prominent topic in historical and cultural tracing,ancient literature research,***,the existing research on sentiment analysis is relatively *** does not eff... 详细信息
来源: 评论
Variable Neighborhood Search Based Human Learning Optimization Algorithm for Secure Data Analysis and Computing
收藏 引用
SN computer science 2024年 第5期5卷 1-14页
作者: Ahmed, Feroz Kumar, Sumit Singh, Pradeep Kumar Amity School of Engineering and Technology Amity University Uttar Pradesh Noida India Department of Computer Science and Engineering Central University of Jammu J&K Samba India
The data analysis in medical field is a very crucial task in order to gain insights from a large collection of data. The analysis of data comprises of several well-defined processes like data collection, data preproce... 详细信息
来源: 评论
Slender loris optimization algorithm for solving optimization problems
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 8799-8810页
作者: Lakshmi, A. Vijaya Vaitheki, K. Joseph, K. Suresh Department of Computer Science School of Engineering and Technology Pondicherry University India
Over the years, numerous optimization problems have been addressed utilizing meta-heuristic algorithms. Continuing initiatives have always been to create and develop new, practical algorithms. This work proposes a nov... 详细信息
来源: 评论
Feature-Grounded Single-Stage Text-to-Image Generation
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 469-480页
作者: Yuan Zhou Peng Wang Lei Xiang Haofeng Zhang School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache... 详细信息
来源: 评论
Domain generalization with semi-supervised learning for people-centric activity recognition
收藏 引用
science China(Information sciences) 2025年 第1期68卷 171-188页
作者: Jing LIU Wei ZHU Di LI Xing HU Liang SONG Academy for Engineering & Technology Fudan University Shanghai East-bund Research Institute on Networking Systems of AI School of Optoelectronic Information and Computer Engineering University of Shanghai for Science & Technology
People-centric activity recognition is one of the most critical technologies in a wide range of real-world applications,including intelligent transportation systems, healthcare services, and brain-computer interfaces.... 详细信息
来源: 评论
Intrusion detection system and fuzzy ant colony optimization based secured routing in wireless sensor networks
收藏 引用
Soft Computing 2024年 第17-18期28卷 10345-10367页
作者: Subramani, Shalini Selvi, M. School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Recent advances in wireless sensor networks (WSNs) have brought the sensor based monitoring developments to the surface in many applications. In such a scenario, the security of communication is a major challenge in t... 详细信息
来源: 评论