咨询与建议

限定检索结果

文献类型

  • 3,330 篇 会议
  • 2,030 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 5,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,316 篇 工学
    • 2,178 篇 计算机科学与技术...
    • 1,750 篇 软件工程
    • 786 篇 信息与通信工程
    • 577 篇 控制科学与工程
    • 416 篇 电气工程
    • 411 篇 电子科学与技术(可...
    • 329 篇 生物工程
    • 295 篇 机械工程
    • 223 篇 仪器科学与技术
    • 212 篇 生物医学工程(可授...
    • 189 篇 光学工程
    • 172 篇 动力工程及工程热...
    • 154 篇 化学工程与技术
    • 110 篇 网络空间安全
    • 108 篇 交通运输工程
    • 105 篇 材料科学与工程(可...
    • 101 篇 土木工程
  • 1,707 篇 理学
    • 845 篇 数学
    • 487 篇 物理学
    • 361 篇 生物学
    • 290 篇 统计学(可授理学、...
    • 221 篇 系统科学
    • 150 篇 化学
  • 944 篇 管理学
    • 589 篇 管理科学与工程(可...
    • 405 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 214 篇 医学
    • 187 篇 临床医学
    • 134 篇 基础医学(可授医学...
  • 146 篇 法学
    • 121 篇 社会学
  • 105 篇 经济学
    • 103 篇 应用经济学
  • 61 篇 教育学
  • 58 篇 农学
  • 21 篇 文学
  • 14 篇 军事学
  • 12 篇 艺术学

主题

  • 129 篇 deep learning
  • 112 篇 feature extracti...
  • 108 篇 computer science
  • 100 篇 data mining
  • 100 篇 accuracy
  • 89 篇 machine learning
  • 85 篇 computational mo...
  • 81 篇 training
  • 69 篇 neural networks
  • 69 篇 optimization
  • 69 篇 semantics
  • 63 篇 internet of thin...
  • 62 篇 protocols
  • 61 篇 information syst...
  • 56 篇 artificial intel...
  • 54 篇 support vector m...
  • 53 篇 security
  • 48 篇 predictive model...
  • 47 篇 wireless sensor ...
  • 47 篇 clustering algor...

机构

  • 59 篇 college of infor...
  • 48 篇 national enginee...
  • 46 篇 hubei province k...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 school of inform...
  • 29 篇 department of el...
  • 29 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 department of co...
  • 26 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 national compute...
  • 23 篇 college of compu...
  • 23 篇 department of el...
  • 22 篇 department of sy...
  • 22 篇 distributed mult...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory f...
  • 20 篇 school of comput...

作者

  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 shu-ching chen
  • 27 篇 shen linlin
  • 27 篇 zongli lin
  • 25 篇 ren jiadong
  • 24 篇 chen shu-ching
  • 24 篇 robbi rahim
  • 24 篇 shyu mei-ling
  • 23 篇 abdelwahed motwa...
  • 15 篇 niyato dusit
  • 15 篇 hu shengshan
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 14 篇 mohamed k.nour
  • 14 篇 han zhu
  • 14 篇 dong jun
  • 14 篇 ishfaq yaseen
  • 14 篇 manar ahmed hamz...
  • 14 篇 mohamed i.eldeso...

语言

  • 4,652 篇 英文
  • 614 篇 其他
  • 116 篇 中文
  • 7 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Computer and Information System Engineering"
5385 条 记 录,以下是281-290 订阅
排序:
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving engineering Design Problems
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 219-265页
作者: Farouq Zitouni Saad Harous Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche Department of Computer Science and Information Technology Kasdi Merbah UniversityP.O.Box 30000OuarglaAlgeria Department of Computer Science College of Computing and InformaticsUniversity of SharjahP.O.Box 27272SharjahUnited Arab Emirates Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11937Jordan Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization *** approach aims to leverage the strengths of mult... 详细信息
来源: 评论
A Coarse to Fine Detection Method for Prohibited Object in X-ray Images Based on Progressive Transformer Decoder  24
A Coarse to Fine Detection Method for Prohibited Object in X...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ma, Chunjie Du, Lina Gao, Zan Zhuo, Li Wang, Meng Shandong Jinan China School of Computer Science and Technology Shandong Jianzhu University Shandong Jinan China Faculty of Information Technology Beijing University Of Technology Beijing China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China
Currently, Transformer-based prohibited object detection methods in X-ray images appear constantly, but there are still some shortcomings such as poor performance and high computational complexity for prohibited objec... 详细信息
来源: 评论
Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks
收藏 引用
computer systems Science & engineering 2023年 第5期45卷 2033-2047页
作者: Anwer Mustafa Hilal Aisha Hassan Abdalla Hashim Heba G.Mohamed Lubna A.Alharbi Mohamed K.Nour Abdullah Mohamed Ahmed S.Almasoud Abdelwahed Motwakel Department of Electrical and Computer Engineering International Islamic University MalaysiaKuala Lumpur53100Malaysia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTabuk UniversityTabuk47512Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversityMecca24382Saudi Arabia Research Centre Future University in EgyptNew Cairo11845Egypt Department of Information Systems College of Computer and Information SciencesPrince Sultan UniversityRiyadh12435Saudi Arabia
Recent developments on Internet and social networking have led to the growth of aggressive language and hate *** provocation,abuses,and attacks are widely termed cyberbullying(CB).The massive quantity of user generate... 详细信息
来源: 评论
End-to-end Flow Scheduling Optimization for Industrial 5G and TSN Integrated Networks
End-to-end Flow Scheduling Optimization for Industrial 5G an...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Liu, Houling Li, Mingyan Gu, Fuqiang Li, Qihao Zhang, Weiting Guo, Songtao Chongqing University College of Computer Science Chongqing400044 China Ministry of Education of China Key Laboratory of System Control and Information Processing Shanghai China Jilin University College of Communication Engineering Changchun130015 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100091 China
The integrated of the fifth generation (5G) and time-sensitive networking (TSN) is a promising approach to meet the requirements of deterministic forwarding with extremely low latency and high flexibility for the Indu... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
Sentiment Analysis for Curriculum of Independent Learning Based on Naïve Bayes with Laplace Estimator  2
Sentiment Analysis for Curriculum of Independent Learning Ba...
收藏 引用
2nd International Conference on information Technology Research and Innovation, ICITRI 2023
作者: Ariefah, Amelia Widodo Nugraheni, Murien State University of Jakarta Dept. of Informatics and Computer Engineering Education Jakarta Indonesia State University of Jakarta Dept. of Information System and Technology Jakarta Indonesia
Curriculum changes have a significant impact on the field of education in Indonesia, especially in universities. This is because the curriculum is used as a means to achieve the goals of educational success as well as... 详细信息
来源: 评论
Distributed Denial of Service (DDoS) Mitigation: Security Awareness Domain and Resources (SADAR)  22
Distributed Denial of Service (DDoS) Mitigation: Security Aw...
收藏 引用
10th International Conference on computer and Communications Management, ICCCM 2022
作者: Hidayat, Taufik Safar Fadillah, Yoga Lubis, Muharman Lubis, Arif Ridho Department of Information System Telkom University Indonesia Department of Computer Engineering and Informatics Politeknik Negeri Medan Indonesia
information security is a constantly evolving field to safeguard confidentiality, integrity and assets with defensive measures should be developed and planned to improve information security. Therefore, it is very imp... 详细信息
来源: 评论
MeHyper: Accelerating Hypergraph Neural Networks by Exploring Implicit Dataflows  31
MeHyper: Accelerating Hypergraph Neural Networks by Explorin...
收藏 引用
31st IEEE International Symposium on High Performance computer Architecture, HPCA 2025
作者: Zhao, Wenju Yao, Pengcheng Chen, Dan Zheng, Long Liao, Xiaofei Wang, Qinggang Ma, Shaobo Li, Yu Liu, Haifeng Xiao, Wenjing Sun, Yufei Zhu, Bing Jin, Hai Xue, Jingling Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China National University of Singapore School of Computing 119077 Singapore Guangxi University School of Computer Electronics and Information NanNing530004 China University of New South Wales School of Computer Science and Engineering SydneyNSW2052 Australia
Hypergraph Neural Networks (HGNNs) are increasingly utilized to analyze complex inter-entity relationships. Traditional HGNN systems, based on a hyperedge-centric dataflow model, independently process aggregation task... 详细信息
来源: 评论
Unknown Task Selection and Worker Recruitment Using Two-Stage Multi-Armed Bandit in Crowdsensing
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24441-24456页
作者: Song, Haoyuan Li, Peng Du, Rui Yu, Hai Huang, Weiyi Nie, Lei Bao, Haizhou Liu, Qin Wuhan University of Science and Technology School of Computer Science and Technology Wuhan430065 China Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan430065 China Hubei Polytechnic University School of Computer Huangshi435003 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China
Mobile Crowdsensing (MCS) faces significant challenges in selecting tasks with expected high revenue and recruiting workers with expected high qualities to maximize overall utility. Existing approaches often assume th... 详细信息
来源: 评论
Robotic Anchoring system with Two Locomotion Modes for Preoperative Localization of Colorectal Cancer
Robotic Anchoring System with Two Locomotion Modes for Preop...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: Wang, Jiale Ren, Hao Yang, Liu Zhao, Haoxiang Zhang, Ruijia Shen, Yajing Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Kowloon Hong Kong City University of Hong Kong Department of Biomedical Engineering Kowloon Hong Kong Institute of Robotics and Automatic Information System Nankai University China
At present, colorectal cancer is one of the most prevalent cancers in the world. Colectomy serves as an effective treatment option for this disease. Preoperative localization plays a vital role in the colectomy proced... 详细信息
来源: 评论