咨询与建议

限定检索结果

文献类型

  • 3,841 篇 会议
  • 2,345 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 6,216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,713 篇 工学
    • 2,286 篇 计算机科学与技术...
    • 1,818 篇 软件工程
    • 735 篇 信息与通信工程
    • 676 篇 控制科学与工程
    • 543 篇 电气工程
    • 478 篇 电子科学与技术(可...
    • 349 篇 生物工程
    • 313 篇 机械工程
    • 267 篇 生物医学工程(可授...
    • 249 篇 光学工程
    • 230 篇 仪器科学与技术
    • 222 篇 动力工程及工程热...
    • 170 篇 化学工程与技术
    • 132 篇 交通运输工程
    • 125 篇 材料科学与工程(可...
    • 118 篇 土木工程
  • 2,050 篇 理学
    • 1,002 篇 数学
    • 611 篇 物理学
    • 404 篇 生物学
    • 294 篇 统计学(可授理学、...
    • 260 篇 系统科学
    • 178 篇 化学
  • 989 篇 管理学
    • 663 篇 管理科学与工程(可...
    • 351 篇 图书情报与档案管...
    • 279 篇 工商管理
  • 302 篇 医学
    • 257 篇 临床医学
    • 202 篇 基础医学(可授医学...
    • 123 篇 药学(可授医学、理...
  • 155 篇 法学
    • 122 篇 社会学
  • 121 篇 经济学
    • 121 篇 应用经济学
  • 75 篇 农学
  • 61 篇 教育学
  • 27 篇 文学
  • 19 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学

主题

  • 159 篇 computer science
  • 114 篇 deep learning
  • 100 篇 feature extracti...
  • 98 篇 computational mo...
  • 97 篇 computer archite...
  • 94 篇 machine learning
  • 93 篇 accuracy
  • 85 篇 laboratories
  • 81 篇 optimization
  • 75 篇 training
  • 74 篇 data mining
  • 73 篇 hardware
  • 68 篇 control systems
  • 63 篇 artificial intel...
  • 62 篇 testing
  • 60 篇 educational inst...
  • 60 篇 wireless sensor ...
  • 59 篇 algorithm design...
  • 56 篇 costs
  • 55 篇 application soft...

机构

  • 175 篇 department of co...
  • 88 篇 department of co...
  • 53 篇 key laboratory o...
  • 47 篇 school of softwa...
  • 41 篇 national enginee...
  • 40 篇 department of co...
  • 38 篇 tsinghua nationa...
  • 37 篇 department of co...
  • 35 篇 key laboratory o...
  • 29 篇 college of compu...
  • 26 篇 school of system...
  • 25 篇 department of co...
  • 25 篇 department of co...
  • 25 篇 vlsi and system ...
  • 24 篇 university of ch...
  • 23 篇 key laboratory f...
  • 22 篇 department of el...
  • 22 篇 the key laborato...
  • 20 篇 ieee
  • 18 篇 state key labora...

作者

  • 33 篇 hai jin
  • 26 篇 zhou mengchu
  • 21 篇 abdelwahed motwa...
  • 21 篇 guangwen yang
  • 21 篇 dutta paramartha
  • 20 篇 liuchen chang
  • 19 篇 mengchu zhou
  • 19 篇 changjun jiang
  • 18 篇 mohamed k.nour
  • 17 篇 jiang changjun
  • 16 篇 haohuan fu
  • 16 篇 ligang hou
  • 16 篇 ishfaq yaseen
  • 15 篇 robbi rahim
  • 15 篇 gaol ford lumban
  • 15 篇 wang jinhui
  • 15 篇 hou ligang
  • 15 篇 jin hai
  • 14 篇 liu xiwei
  • 14 篇 xiang-yang li

语言

  • 5,821 篇 英文
  • 245 篇 其他
  • 143 篇 中文
  • 12 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Technology Department"
6216 条 记 录,以下是511-520 订阅
排序:
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Attack Detection Method in Vehicular Networks  3
BMSAD: Behavior Feature and Multi-Scenario -Based Sybil Atta...
收藏 引用
3rd International Seminar on Artificial Intelligence, Networking, and Information technology, AINIT 2022
作者: Luo, Jie Li, Zhong College of Information Science and Technology Donghua University Shanghai201620 China Key Laboratory of the Ministry of Education for Embedded System and Service Computing Department of Computer Science Tongji University Shanghai201804 China
Vehicular networks improve traffic safety and efficiency by wireless communications among vehicles and infrastructures. However, security has always been a challenge to vehicular networks, which may cause severe harm ... 详细信息
来源: 评论
Community Opinion Maximization in Social Networks
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Liu, Yilu Zhang, Qingfu Wang, Zhenkun Department of Computer Science City University of Hong Kong Hong Kong China School of System Design and Intelligent Manufacturing and the Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Maximizing the influence of opinions is an emerging research topic in social networks. Although the community is a key structure of social networks, little effort has been made to investigate how to maximize the influ... 详细信息
来源: 评论
Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity  22
Dynamic Searchable Scheme with Forward Privacy for Encrypted...
收藏 引用
22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2023
作者: Al Sibahee, Mustafa A. Luo, Chengwen Zhang, Jin Huang, Yijing Abduljabbar, Zaid Ameen Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Iraq University College Computer Technology Engineering Department Basrah61004 Iraq University of Basrah College of Education for Pure Sciences Department of Computer Science Basrah61004 Iraq Huazhong University of Science and Technology Shenzhen Institute Shenzhen518000 China
Document retrieval plays an essential role in many real-world applications especially when the data storage is outsourced. Due to the great advantages offered by cloud computing, clients tend to outsource their person... 详细信息
来源: 评论
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams
Enhancing Cybersecurity with Transformers: Preventing Phishi...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Essam Al Daoud Laith Al Daoud Mahmoud Asassfeh Ala'a Al-Shaikh Ala'a Saeb Al-Sherideh Suha Afaneh Department of Cybersecurity Zarqa University Zarqa Jordan Computer Information System Jordan University of Science and Technology Jordan
In this study, the enhancement of cybersecurity through the use of transformer models is explored, specifically focusing on the prevention of phishing emails and social media scams. Two modern datasets were utilized: ... 详细信息
来源: 评论
A Scalable Solution for Pneumonia Diagnosis: Transfer Learning for Chest X-ray Analysis  7
A Scalable Solution for Pneumonia Diagnosis: Transfer Learni...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Haque, Rezaul Sultana, Shayma Prasad, Chandan Hasan, Sayed Fardin, Hasib Sakib, Abdullah Al Malik, Neeru Kaushik, Keshav East West University Department of Cse Dhaka Bangladesh International American University Department of Management Information System United States Pimpri Chinchwad University Department of Computer Science and Engineering Maharashtra Pune India Westcliff University Department of Engineering Management United States Westcliff University Department of Information Technology United States Pimpri Chinchwad University School of Engineering & Technology Maharashtra Pune India Amity University Amity School of Engineering and Technology Punjab India
The high death rate and rapid spread of pneumonia make it a serious global health concern. The precision of traditional diagnostic techniques is often compromised, particularly in resource-limited settings. Existing s... 详细信息
来源: 评论
Battery Degradation Modeling in Hybrid Power Plants: An Island system Unit Commitment Study  4
Battery Degradation Modeling in Hybrid Power Plants: An Isla...
收藏 引用
4th Annual IEEE Kansas Power and Energy Conference, KPEC 2023
作者: Huang, Jianqiao Fang, Xin Zhou, Xinyang Tan, Jin Dong, Shuan Hoke, Andy National Renewable Energy Laboratory Power System Engineering Center GoldenCO United States Illinois Institute of Technology Electrical and Computer Engineering Chicago United States Mississippi State University Electrical and Computer Engineering Department StarkvilleMS United States
As hybrid power plants (HPPs), such as photovoltaic (PV) and battery combinations, become increasingly important in power systems with high renewable energy penetration to address PV variability and ensure grid stabil... 详细信息
来源: 评论
DEEP LEARNING-BASED CHANNEL ESTIMATION FOR RIS-ASSISTED UAV-ENABLED WIRELESS COMMUNICATIONS system
DEEP LEARNING-BASED CHANNEL ESTIMATION FOR RIS-ASSISTED UAV-...
收藏 引用
2023 International Conference on Innovation, Communication and Engineering, ICICE 2023
作者: Tesfaw, Belayneh A. Lin, Hsin-Piao Tarekegn, Getaneh B. Juang, Rong-Terng Jeng, Shiann-Shiun Department of International Graduate Program in Electrical Engineering and Computer Science National Taipei University of Technology Taipei Taiwan Institute of Aerospace and System Engineering National Taipei University of Technology Taipei10608 Taiwan Department of Electrical and Computer Engineering National Yang-Ming Chiao Tung University Hsinchu30010 Taiwan Department of Electrical Engineering National Dong Hwa University Hualien Taiwan
Wireless communication via unmanned aerial vehicles (UAVs) has drawn a great deal of attention due to its flexibility in establishing line-of-sight (LoS) communications. However, in complex urban and dynamic environme... 详细信息
来源: 评论
Model for Assessment Information Security Awareness Level for Data Stewardship by Understanding the Context of Use  2022
Model for Assessment Information Security Awareness Level fo...
收藏 引用
11th International Conference on Software and computer Applications, ICSCA 2022
作者: Lubis, Muharman Azies Muslim, Abdul Ridho Lubis, Arif Alkhowarizmi, Alkhowarizmi Department of Information System Telkom University Indonesia Department of Computer Engineering and Informatics Politeknik Negeri Medan Indonesia Department of Information Technology Universitas Muhammadiyah Sumatera Utara Indonesia
The role of data stewardship satisfies various requirement for the users, employee or staff to provide necessary awareness in ensuring information security strategy take place accordingly. It relates to have properly ... 详细信息
来源: 评论
Path Planning Algorithm for Multiple UAVs Based on Artificial Potential Field  11
Path Planning Algorithm for Multiple UAVs Based on Artificia...
收藏 引用
11th Joint International Information technology and Artificial Intelligence Conference, ITAIC 2023
作者: Ren, Chongde Chen, Jinchao Du, Chenglie Yu, Wenquan School of Software Northwestern Polytechnical University Xi'an China Northwestern Polytechnical University Department of Computer Science Xi'an China North Automatic Control Technology Research Institute Department of Land Unmanned System Research and Development Taiyuan China
Due to the lower cost and higher maneuverability, unmanned aerial vehicles (UAVs) have found extensive use in both the civilian and military worlds. Path planning, as a crucial problem in the process of UAVs flight, a... 详细信息
来源: 评论
The Impact of Information system and technology of Courier Service During Pandemic  7th
The Impact of Information System and Technology of Courier S...
收藏 引用
7th International Conference on Inventive Communication and Computaional Technologies, ICICCT 2023
作者: Siahaan, Andre Timiko Pinajung, Bagas Rizkyka Kennidy Gaol, Ford Lumban Matsuo, Tokuro School of Information System Bina Nusantara University Alam Sutra Tangerang13960 Indonesia Computer Science Department BINUS Graduate Program—Doctor of Computer Science Bina Nusantara University Jakarta11480 Indonesia Advanced Institute of Industrial Technology Tokyo Japan
Courier services are a means of transport that can be used to deliver orders to customers or claim orders from them, and customers can use technology from the courier service like track order to track their order. The... 详细信息
来源: 评论