咨询与建议

限定检索结果

文献类型

  • 3,332 篇 会议
  • 2,016 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 5,368 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,323 篇 工学
    • 2,307 篇 计算机科学与技术...
    • 1,859 篇 软件工程
    • 721 篇 信息与通信工程
    • 531 篇 控制科学与工程
    • 343 篇 电子科学与技术(可...
    • 328 篇 电气工程
    • 320 篇 生物工程
    • 292 篇 机械工程
    • 208 篇 仪器科学与技术
    • 205 篇 生物医学工程(可授...
    • 197 篇 光学工程
    • 162 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 100 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,777 篇 理学
    • 915 篇 数学
    • 502 篇 物理学
    • 356 篇 生物学
    • 295 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 169 篇 化学
  • 942 篇 管理学
    • 573 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 224 篇 医学
    • 188 篇 临床医学
    • 147 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 103 篇 经济学
    • 102 篇 应用经济学
  • 65 篇 教育学
  • 65 篇 农学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 134 篇 feature extracti...
  • 131 篇 deep learning
  • 103 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 79 篇 machine learning
  • 77 篇 optimization
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 55 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 artificial intel...
  • 50 篇 data models
  • 48 篇 testing
  • 47 篇 genetic algorith...

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 107 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 college of infor...
  • 30 篇 shandong provinc...
  • 28 篇 university of ch...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 24 篇 ren jiadong
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 liu jun
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 dan feng
  • 17 篇 manar ahmed hamz...
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 16 篇 zhang kai
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 237 篇 其他
  • 123 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5368 条 记 录,以下是491-500 订阅
排序:
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams
Enhancing Cybersecurity with Transformers: Preventing Phishi...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Essam Al Daoud Laith Al Daoud Mahmoud Asassfeh Ala'a Al-Shaikh Ala'a Saeb Al-Sherideh Suha Afaneh Department of Cybersecurity Zarqa University Zarqa Jordan Computer Information System Jordan University of Science and Technology Jordan
In this study, the enhancement of cybersecurity through the use of transformer models is explored, specifically focusing on the prevention of phishing emails and social media scams. Two modern datasets were utilized: ... 详细信息
来源: 评论
Influence Maximization With Graph Neural Network in Multi-Feature Social Network  24
Influence Maximization With Graph Neural Network in Multi-Fe...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Wang, Yuhao Li, Peng Huang, Weiyi School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
The classical influence maximization (IM) prob-lem aims to select a set of nodes as seed nodes for information propagation. Most related studies focus on one-dimensional information dissemination. However, the diffusi... 详细信息
来源: 评论
Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS
收藏 引用
computer systems Science & Engineering 2023年 第5期45卷 1199-1210页
作者: Himanshu Sharma karthikeyan Rajagopal G.Gugapriya Rajneesh Pareek Arun Kumar HayaMesfer Alshahrani Mohamed K.Nour Hany Mahgoub Mohamed Mousa Anwer Mustafa Hilal Department of Computer Science&Engineering JECRC UniversityJaipurIndia Centre for Nonlinear Systems Chennai Institute of TechnologyChennaiIndia School of Electronics Engineering Vellore Institute of TechnologyChennaiIndia Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Electrical Engineering Department Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular *** generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be import... 详细信息
来源: 评论
Deep Transfer Learning Driven Oral Cancer Detection and Classification Model
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3905-3920页
作者: Radwa Marzouk Eatedal Alabdulkreem Sami Dhahbi Mohamed K.Nour Mesfer Al Duhayyim Mahmoud Othman Manar Ahmed Hamza Abdelwahed Motwakel Ishfaq Yaseen Mohammed Rizwanullah Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Natural and Applied Sciences College of Community-AflajPrince Sattam Bin Abdulaziz UniversitySaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia
Oral cancer is the most commonly occurring‘head and neck cancers’across the *** of the oral cancer cases are diagnosed at later stages due to absence of awareness among *** earlier identification of disease is essen... 详细信息
来源: 评论
Enhanced fireworks algorithm based on particle swarm optimization and reverse learning of small-hole imaging experiment
Enhanced fireworks algorithm based on particle swarm optimiz...
收藏 引用
2022 IEEE International Conference on systems, Man, and Cybernetics, SMC 2022
作者: Jiao, Jiao Li, Jun Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System College of Computer Science and Technology Wuhan China
Since the traditional fireworks algorithm (FWA) is easy to fall into local optimization and has insufficient global optimization capability and low optimization accuracy, this paper proposes the enhanced fireworks alg... 详细信息
来源: 评论
IntelliCross: Adaptive Pedestrian Crossing system  5
IntelliCross: Adaptive Pedestrian Crossing System
收藏 引用
5th International Conference on Advanced Research in Computing, ICARC 2025
作者: Dissanayake, Udayanga Weerasekara, Dinusha Sumanasekara, Hansika Ishara, Dodamgoda Wijesiri, Pipuni Moonamaldeniya, Menaka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer System Engineering Sri Lanka Sri Lanka Institute of Information Technology Department of Computing Kandy Uni Sri Lanka
Urban traffic management at pedestrian crossings presents considerable issues, such as pedestrian safety, congestion, and effective prioritizing of emergency vehicles. Traditional traffic signal systems are frequently... 详细信息
来源: 评论
Deep Complex-valued Convolutional Learning for Waveform OFDM Receiver Design
Deep Complex-valued Convolutional Learning for Waveform OFDM...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Jiequ Ji Nam Phuong Tran Zehui Xiong Kun Zhu Tony Q. S. Quek Department of Information System and Design Singapore University of Technology Design Singapore College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China
Orthogonal frequency division multiplexing (OFD-M) has been widely used in modern communication networks. Notice that OFDM typically relies on (inverse) Discrete Fourier Transform (DFT/IDFT) for processing its wavefor... 详细信息
来源: 评论
Low Energy Consumption and Time Deterministic Energy-saving Workflow Task Scheduling Algorithm based on DVFS  9
Low Energy Consumption and Time Deterministic Energy-saving ...
收藏 引用
9th IEEE International Conference on Cyber Security and Cloud Computing and 8th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022
作者: Liu, Xun Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System College of Computer Science and Technology Wuhan China
With the development of streaming media, soft real-time system in today's life could participate in the use of more extensive areas. The use frequency was also increasing. Consequently, modern processors were equi... 详细信息
来源: 评论
Mining Alarm Association Rules in Optical Transmission Networks Using a Statistical Approach  24
Mining Alarm Association Rules in Optical Transmission Netwo...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Deng, Miao Li, Peng Liu, Yu Zhu, Rongjing Zhang, Yujie School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
Due to the interconnection between devices in the optical transmission network (OTN), when one device fails and generates alarm information, a large number of other invalid alarms are generated in OTN. How to mining a... 详细信息
来源: 评论
An Integrated Approach to Robotic Object Grasping and Manipulation
arXiv
收藏 引用
arXiv 2024年
作者: Ahmed, Owais Huzaifa, M. Areeb, M. Khan, Hamza Ali Students B.E Computer & Information System Engineering NED University OF Engineering and Technology Karachi Pakistan
In response to the growing challenges of manual labor and efficiency in warehouse operations, Amazon has embarked on a significant transformation by incorporating robotics to assist with various tasks. While a substan...
来源: 评论