咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,302 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 81,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,013 篇 工学
    • 36,684 篇 计算机科学与技术...
    • 29,779 篇 软件工程
    • 13,878 篇 信息与通信工程
    • 8,169 篇 控制科学与工程
    • 6,011 篇 电气工程
    • 5,997 篇 生物工程
    • 5,721 篇 电子科学与技术(可...
    • 4,128 篇 生物医学工程(可授...
    • 3,802 篇 机械工程
    • 3,623 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,380 篇 化学工程与技术
    • 2,275 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,957 篇 交通运输工程
  • 26,693 篇 理学
    • 14,360 篇 数学
    • 7,335 篇 物理学
    • 6,652 篇 生物学
    • 4,658 篇 统计学(可授理学、...
    • 3,039 篇 系统科学
    • 2,500 篇 化学
  • 14,629 篇 管理学
    • 8,996 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,107 篇 医学
    • 3,438 篇 临床医学
    • 3,086 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,794 篇 公共卫生与预防医...
  • 2,379 篇 法学
    • 1,868 篇 社会学
  • 1,414 篇 经济学
  • 1,159 篇 农学
  • 973 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,214 篇 feature extracti...
  • 2,084 篇 computer science
  • 2,000 篇 accuracy
  • 1,981 篇 deep learning
  • 1,637 篇 computational mo...
  • 1,622 篇 machine learning
  • 1,547 篇 training
  • 1,215 篇 data mining
  • 1,098 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,070 篇 optimization
  • 1,004 篇 predictive model...
  • 895 篇 educational inst...
  • 891 篇 wireless sensor ...
  • 867 篇 semantics
  • 860 篇 real-time system...
  • 836 篇 artificial intel...
  • 801 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 687 篇 school of comput...
  • 559 篇 school of comput...
  • 478 篇 maharishi school...
  • 351 篇 department of co...
  • 275 篇 department of ph...
  • 261 篇 department of ph...
  • 257 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 223 篇 departamento de ...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 217 篇 department of co...
  • 210 篇 school of comput...
  • 206 篇 department of ph...
  • 198 篇 department of ph...
  • 192 篇 department of ph...
  • 170 篇 department of co...
  • 168 篇 department for p...
  • 165 篇 department of ph...
  • 163 篇 college of compu...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 248 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 231 篇 niyato dusit
  • 227 篇 d. guest
  • 225 篇 s. jin
  • 206 篇 g. gaudio
  • 202 篇 f. pastore

语言

  • 71,072 篇 英文
  • 9,658 篇 其他
  • 1,285 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science and Engineering and Information Technology"
81933 条 记 录,以下是351-360 订阅
排序:
Quantized Control for Input-to-State Stabilization of Discrete-Time Markov Jump Systems with Coding and Decoding Procedures
收藏 引用
IAENG International Journal of Applied Mathematics 2025年 第1期55卷 26-33页
作者: Gao, Xiaohui Su, Yue Han, Chengyi Han, Jing Chen, Yebin School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China School of Electrical and Information Engineering Wanjiang University of Technology Ma'anshan243032 China School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China School of Computer Science and Technology Anhui University of Technology Ma'anshan243032 China
This paper investigates the input-to-state stabilization of discrete-time Markov jump systems. A quantized control scheme that includes coding and decoding procedures is proposed. The relationship between the error in... 详细信息
来源: 评论
Privacy-Enhanced Federated Expanded Graph Learning for Secure QoS Prediction
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1641-1654页
作者: Zou, Guobing Yan, Zhi Hu, Shengxiang Gan, Yanglan Zhang, Bofeng Chen, Yixin Shanghai University School of Computer Engineering and Science Shanghai200444 China Donghua University School of Computer Science and Technology Shanghai201620 China Shanghai Polytechnic University School of Computer and Information Engineering Shanghai201209 China Washington University Department of Computer Science and Engineering St. LouisMO63130 United States
Current state-of-the-art QoS prediction methods face two main limitations. Firstly, most existing QoS prediction approaches are centralized, gathering all user-service invocation QoS records for training and optimizat... 详细信息
来源: 评论
Variance-SNR Based Noise Suppression on Linear Canonical Choi-Williams Distribution of LFM Signals
收藏 引用
Chinese Journal of Electronics 2022年 第5期31卷 804-820页
作者: ZHANG Zhichao School of Mathematics and Statistics Nanjing University of Information Science and Technology School of Computer Science and Engineering Macau University of Science and Technology
By solving the existing expectation-signal-to-noise ratio(expectation-SNR) based inequality model of the closed-form instantaneous cross-correlation function type of Choi-Williams distribution(CICFCWD),the linear cano... 详细信息
来源: 评论
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science and Engineering University College of EngineeringTindivanamMelpakkamTamil nadu 604001India Department of Computer Engineering National Institute of Technology KurukshetraIndia
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri... 详细信息
来源: 评论
Salp swarm algorithm using lens opposition-based learning and local search for constrained optimization problems
收藏 引用
Iran Journal of computer science 2025年 第2期8卷 659-686页
作者: Majumdar, Parijata Mitra, Sanjoy Department of Computer Science and Engineering Indian Institute of Information Technology Agartala Jirania 799046 India Department of Computer Science and Engineering Tripura Institute of Technology Agartala Narsingarh 799009 India
The Salp swarm algorithm (SSA) simulates how salps forage and travel in the ocean. SSA suffers from low initial population diversity, improper balancing of exploration and exploitation, and slow convergence speed. Thu... 详细信息
来源: 评论
Introduction
Signals and Communication Technology
收藏 引用
Signals and Communication technology 2024年 Part F1492卷 3-17页
作者: Tian, Yu-Chu Gao, Jing School of Computer Science Queensland University of Technology BrisbaneQLD Australia College of Computer and Information Engineering Inner Mongolia Agricultural University Hohhot China
The main theme of this book is network analysis and architecture design for network planning. While there are various types of networks, this book specifically focuses on computer networks for data communication. Ther...
来源: 评论
Dynamic Neurological Insights: Real-Time Stress Analysis Utilizing Portable EEG Kits  21
Dynamic Neurological Insights: Real-Time Stress Analysis Uti...
收藏 引用
21st International engineering Research Conference 2024, EURECA 2024
作者: Saranya, K. Gokila, N.M. Computer Science Engineering Kumaraguru College of Technology India Information Science and Engineering Kumaraguru College of Technology India
Clinical Electroencephalogram(EEG) devices are effective in hospitals, but for everyday monitoring, portable options are more accessible and convenient, albeit less accurate. In this research, the working of three por... 详细信息
来源: 评论
Feature Selection and Support Vector Machine Classification method for Banknote Dirtiness Recognition Based on Marine Predator Algorithm with Mathematical Functions
收藏 引用
Journal of Intelligent and Fuzzy Systems 2023年 第3期45卷 4315-4336页
作者: Guo, Fu-Jun Sun, Wei-Zhong Wang, Jie-Sheng Zhang, Min Hou, Jia-Ning Song, Hao-Ming Wang, Yu-Cai School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China
Dealing with classification problems requires the crucial step of feature selection (FS), which helps to reduce data dimensions and shorten classification time. Feature selection and support vector machines (SVM) clas... 详细信息
来源: 评论
An Investigation on Open-RAN Specifications:Use Cases,Security Threats,Requirements,Discussions
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 13-41页
作者: Heejae Park Tri-HaiNguyen Laihyuk Park Department of Computer Science and Engineering Seoul National University of Science and TechnologySeoul01811Republic of Korea Faculty of Information Technology School of TechnologyVan Lang UniversityHo Chi Minh City70000Vietnam
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure ***,the Op... 详细信息
来源: 评论
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论