咨询与建议

限定检索结果

文献类型

  • 3,332 篇 会议
  • 2,016 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 5,368 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,323 篇 工学
    • 2,307 篇 计算机科学与技术...
    • 1,859 篇 软件工程
    • 721 篇 信息与通信工程
    • 531 篇 控制科学与工程
    • 343 篇 电子科学与技术(可...
    • 328 篇 电气工程
    • 320 篇 生物工程
    • 292 篇 机械工程
    • 208 篇 仪器科学与技术
    • 205 篇 生物医学工程(可授...
    • 197 篇 光学工程
    • 162 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 100 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,777 篇 理学
    • 915 篇 数学
    • 502 篇 物理学
    • 356 篇 生物学
    • 295 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 169 篇 化学
  • 942 篇 管理学
    • 573 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 224 篇 医学
    • 188 篇 临床医学
    • 147 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 103 篇 经济学
    • 102 篇 应用经济学
  • 65 篇 教育学
  • 65 篇 农学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 134 篇 feature extracti...
  • 131 篇 deep learning
  • 103 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 79 篇 machine learning
  • 77 篇 optimization
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 55 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 artificial intel...
  • 50 篇 data models
  • 48 篇 testing
  • 47 篇 genetic algorith...

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 107 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 college of infor...
  • 30 篇 shandong provinc...
  • 28 篇 university of ch...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 24 篇 ren jiadong
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 liu jun
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 dan feng
  • 17 篇 manar ahmed hamz...
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 16 篇 zhang kai
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 237 篇 其他
  • 123 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5368 条 记 录,以下是511-520 订阅
排序:
Two-sided Online Stable Task Assignment with Incomplete Lists and Ties in Spatial Crowdsourcing  19
Two-sided Online Stable Task Assignment with Incomplete List...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Huang, Weiyi Li, Peng Li, Bo Liu, Jing Nie, Lei Bao, Haizhou Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
For the application of task assignment in crowdsourcing, previous research has focused on offline version or one-sided online version. Some of them draw extra attention to stability in task assignment. Our work extend... 详细信息
来源: 评论
Research on Enhanced Perception and Attention-Driven Person Re-Identification  20
Research on Enhanced Perception and Attention-Driven Person ...
收藏 引用
20th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Wu, Cancan Li, Dong Zhang, Zhi College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Hubei Wuhan430065 China
When matching similarity among pedestrians in images, pedestrian re-identification algorithms are often disturbed by occlusions. A typical tactic is to improve the robustness of occlusion features in the model. Howeve... 详细信息
来源: 评论
Exams Item Analysis, Online Examination, and Education Evaluation system Via Internet  20
Exams Item Analysis, Online Examination, and Education Evalu...
收藏 引用
20th International Conference on Electrical Engineering/Electronics, computer, Telecommunications and information technology, ECTI-CON 2023
作者: Chaidee, Kamonlak Boontasri, Kanchana Chaidee, Ekkachai Punthura, Kittichai Kumtip, Narong Pankham, Yotsanan Rajamangala University of Technology Lanna Chiangrai Faculty of Business Administration and Liberal Arts Department of Computer Information System Chiang Rai Thailand Rajamangala University of Technology Lanna Chiangrai Faculty of Science and Agricultural Technology Department of Information Technology Chiang Rai Thailand Rajamangala University of Technology Lanna Chiangrai Faculty of Electrical Engineering Department of Electrical Engineering Chiang Rai Thailand
The objective of this study is to develop an exams item bank management system on the internet. The exam item analysis system is used to determine the reliability of the exams using K-R 20 and K-R 21 formulas. The dif... 详细信息
来源: 评论
Data Poisoning: Issues, Challenges, and Needs  7
Data Poisoning: Issues, Challenges, and Needs
收藏 引用
7th IET Smart Cities Symposium, SCS 2023
作者: Aljanabi, Mohammad Omran, Alaa Hamza Mijwil, Maad M. Abotaleb, Mostafa El-Kenawy, El-Sayed M. Mohammed, Sahar Yousif Ibrahim, Abdelhameed Department of computer College of Education Aliarqai university Baghdad Iraq University of information technology and communications Baghdad Iraq Computer Techniques Engineering Department Baghdad College of Economic Sciences University Baghdad Iraq Department of System Programming South Ural State University Chelyabinsk Russia Department of Communications and Electronics Delta Higher Institute of Engineering and Technology Egypt Computer Science Department Computer Science &Information Technology College Anbar University Anbar Iraq Computer Engineering and Control Systems Department Faculty of Engineering Mansoura University Mansoura Egypt
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp... 详细信息
来源: 评论
Unraveling Academic Failure: Examining the Influence of Course Correlations on Student Performance Through Association Rules Algorithms
Unraveling Academic Failure: Examining the Influence of Cour...
收藏 引用
International Conference on computer and Applications (ICCA)
作者: Hana Safour Mansour Essgaer Almahdi Alshareef Computer Sciences Department Faculty of Sciences Sebha University Sebha Libya Information System Department Faculty of Information Technology Sebha University Sebha Libya Computer Sciences Department Faculty of Information Technology Sebha University Sebha Libya
The field of information technology has witnessed rapid developments in data mining applications in education. In this context, association rule mining, one of the key aspects of data mining, has emerged as a speciali... 详细信息
来源: 评论
Improving Performance Fuzzy Methods in Stroke Disease Diagnosis systems with Certainty Factor
Improving Performance Fuzzy Methods in Stroke Disease Diagno...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Rini Sovia Mutiara Salsabila Musli Yanto Information System Faculty of Computer Science Universitas Putra Indonesia YPTK Padang Indonesia Information Technology Faculty of Computer Science Universitas Putra Indonesia YPTK Padang Indonesia
Stroke is a disease caused by damage to brain cells due to impaired blood supply. Stroke has causes such as hypertension, cholesterol, arteriosclerosis, heart disease, diabetes, family history of stroke, and migraine.... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
Displacement detection method of QR code reference object based on feature points  4
Displacement detection method of QR code reference object ba...
收藏 引用
4th IEEE International Conference on Power, Intelligent Computing and systems, ICPICS 2022
作者: Yang, Qiuhui Zhang, Baoxiang Ji, Xiaoyu Guangxi Colleges and Universities Key Laboratory of Image Processing and Intelligent Information System Wuzhou University Wuzhou China Faculty of Computer and Electronic Information Guangxi University Nanning China Faculty of Information Technology Macau University of Science and Technology China
With the continuous development of construction technology and computer technology, in order to meet the needs of concrete quality management, a real-time monitoring information system based on computer vision is esta... 详细信息
来源: 评论
Task Priority Aware Incentive Mechanism with Reward Privacy-Preservation in Mobile Crowdsensing  25
Task Priority Aware Incentive Mechanism with Reward Privacy-...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Jiahu Li, Peng Huang, Weiyi Chen, Zeqiang Nie, Lei Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing Real-Time Industrial System China
In mobile crowdsensing, there are generally two types of tasks, popular tasks, and unpopular tasks. For popular tasks, many people can perform that task, and the budget is overallocated. For unpopular tasks, fewer or ... 详细信息
来源: 评论
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model
收藏 引用
computer systems Science & Engineering 2023年 第5期45卷 1679-1694页
作者: Mashael M Asiri Heba G.Mohamed Mohamed K Nour Mesfer Al Duhayyim Amira Sayed A.Aziz Abdelwahed Motwakel Abu Sarwar Zamani Mohamed I.Eldesouki Department of Computer Science College of Science&Art atMahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly... 详细信息
来源: 评论