咨询与建议

限定检索结果

文献类型

  • 3,330 篇 会议
  • 2,030 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 5,385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,316 篇 工学
    • 2,178 篇 计算机科学与技术...
    • 1,750 篇 软件工程
    • 786 篇 信息与通信工程
    • 577 篇 控制科学与工程
    • 416 篇 电气工程
    • 411 篇 电子科学与技术(可...
    • 329 篇 生物工程
    • 295 篇 机械工程
    • 223 篇 仪器科学与技术
    • 212 篇 生物医学工程(可授...
    • 189 篇 光学工程
    • 172 篇 动力工程及工程热...
    • 154 篇 化学工程与技术
    • 110 篇 网络空间安全
    • 108 篇 交通运输工程
    • 105 篇 材料科学与工程(可...
    • 101 篇 土木工程
  • 1,707 篇 理学
    • 845 篇 数学
    • 487 篇 物理学
    • 361 篇 生物学
    • 290 篇 统计学(可授理学、...
    • 221 篇 系统科学
    • 150 篇 化学
  • 944 篇 管理学
    • 589 篇 管理科学与工程(可...
    • 405 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 214 篇 医学
    • 187 篇 临床医学
    • 134 篇 基础医学(可授医学...
  • 146 篇 法学
    • 121 篇 社会学
  • 105 篇 经济学
    • 103 篇 应用经济学
  • 61 篇 教育学
  • 58 篇 农学
  • 21 篇 文学
  • 14 篇 军事学
  • 12 篇 艺术学

主题

  • 129 篇 deep learning
  • 112 篇 feature extracti...
  • 108 篇 computer science
  • 100 篇 data mining
  • 100 篇 accuracy
  • 89 篇 machine learning
  • 85 篇 computational mo...
  • 81 篇 training
  • 69 篇 neural networks
  • 69 篇 optimization
  • 69 篇 semantics
  • 63 篇 internet of thin...
  • 62 篇 protocols
  • 61 篇 information syst...
  • 56 篇 artificial intel...
  • 54 篇 support vector m...
  • 53 篇 security
  • 48 篇 predictive model...
  • 47 篇 wireless sensor ...
  • 47 篇 clustering algor...

机构

  • 59 篇 college of infor...
  • 48 篇 national enginee...
  • 46 篇 hubei province k...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 school of inform...
  • 29 篇 department of el...
  • 29 篇 school of comput...
  • 27 篇 college of compu...
  • 27 篇 department of co...
  • 26 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 national compute...
  • 23 篇 college of compu...
  • 23 篇 department of el...
  • 22 篇 department of sy...
  • 22 篇 distributed mult...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory f...
  • 20 篇 school of comput...

作者

  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 shu-ching chen
  • 27 篇 shen linlin
  • 27 篇 zongli lin
  • 25 篇 ren jiadong
  • 24 篇 chen shu-ching
  • 24 篇 robbi rahim
  • 24 篇 shyu mei-ling
  • 23 篇 abdelwahed motwa...
  • 15 篇 niyato dusit
  • 15 篇 hu shengshan
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 14 篇 mohamed k.nour
  • 14 篇 han zhu
  • 14 篇 dong jun
  • 14 篇 ishfaq yaseen
  • 14 篇 manar ahmed hamz...
  • 14 篇 mohamed i.eldeso...

语言

  • 4,652 篇 英文
  • 614 篇 其他
  • 116 篇 中文
  • 7 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Computer and Information System Engineering"
5385 条 记 录,以下是51-60 订阅
排序:
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
Combating Digital Deception: Machine Learning Approaches for Detecting Political Misinformation and Clickbait on Social Media  6
Combating Digital Deception: Machine Learning Approaches for...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Harindi, Dewmini Perera, Nirmal Liyanage, Chamath Dematagoda, Hirushini Fernando, Harinda Rathnayake, Samadhi Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer System Engineering Malabe Sri Lanka
This paper presents machine learning-based strategies for mitigating the problem of misinformation in social media, with a special focus on political misinformation detection and clickbait detection. The following res... 详细信息
来源: 评论
Battery Monitoring system on IoT-Based Smart Micro Grid  4
Battery Monitoring System on IoT-Based Smart Micro Grid
收藏 引用
4th International Conference on Electronic and Electrical engineering and Intelligent system, ICE3IS 2024
作者: Iksan, Nur Widodo, Djoko Adi Djuniadi, Djuniadi Putri, Riana Defi Mahadji Suryanto, Agus Udayanti, Erika Devi Universitas Negeri Semarang Faculty of Engineering Department of Electrical Engineering Indonesia Universitas Dian Nuswantoro Faculty of Computer Science Department of Information System Indonesia
The use of batteries as an energy storage medium has a very important role in the installation of renewable energy power plants, such as photovoltaics to overcome intermittency in photovoltaics and to maintain stable ... 详细信息
来源: 评论
CapsNet-FR: Capsule Networks for Improved Recognition of Facial Features
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2169-2186页
作者: Mahmood Ul Haq Muhammad Athar Javed Sethi Najib Ben Aoun Ala Saleh Alluhaidan Sadique Ahmad Zahid farid Department of Computer System Engineering University of Engineering&TechnologyPeshawar25000Pakistan College of Computer Science and Information Technology Al-Baha UniversityAlaqiq65779-7738Saudi Arabia REGIM-Lab:Research Groups in Intelligent Machines National School of Engineers of Sfax(ENIS)University of SfaxSfax3038Tunisia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Computer Sciences Bahria University Karachi CampusKarachi541004Pakistan Department of Electrical Engineering Abasyn UniversityPeshawar25000Pakistan
Face recognition (FR) technology has numerous applications in artificial intelligence including biometrics, security,authentication, law enforcement, and surveillance. Deep learning (DL) models, notably convolutional ... 详细信息
来源: 评论
Color Image Encryption Using Genetic Recombination With Tent Mapping Based Time-Delay Chaotic  4
Color Image Encryption Using Genetic Recombination With Tent...
收藏 引用
4th International Conference on computer Graphics, Image, and Virtualization, ICCGIV 2024
作者: Xu, Yaoqun Liu, Jiaoyang Institute of System Engineering Harbin University of Commerce Harbin150028 China School of Computer and Information Engineering Harbin University of Commerce Harbin150028 China
As the form of information transmission has shifted from text to images in recent years, the in-crease in information dimension has led to a growing interest in secure and efficient encryption algorithms. This paper p... 详细信息
来源: 评论
Fusion Strategy for Improving Medical Image Segmentation
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3627-3646页
作者: Fahad Alraddady E.A.Zanaty Aida HAbu bakr Walaa M.Abd-Elhafiez Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Information System Department Faculty of Computers and InformationSohag UniversitySohagEgypt Mathematical and Computer Science Department Faculty of ScienceAswan UniversityAswanEgypt College of Computer Science&Information Technology Jazan UniversityJazanKingdom of Saudi Arabia Computer Science Department Faculty of Computers and Artificial IntelligenceSohag UniversitySohagEgypt
In this paper,we combine decision fusion methods with four metaheuristic algorithms(Particle Swarm Optimization(PSO)algorithm,Cuckoo search algorithm,modification of Cuckoo Search(CS McCulloch)algorithm and Genetic al... 详细信息
来源: 评论
Review of National Cybersecurity Policies: A Case Study on Asian Countries  1
Review of National Cybersecurity Policies: A Case Study on A...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Noor, Hera Seelro, Dodo Khan Ali, Syed Abbas NED University of Engineering & Technology Department of Computer Information System Engineering Karachi Pakistan Thar Institute of Engineering Science & Technology NED University of Engineering & Technology Karachi Pakistan
Accelerating the economic advantages of ICT is one of the finest methods for any nation to boost its economy. Due to the unique topography, governing laws, and cultural traditions of each nation, these colossal challe... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Super-resolution reconstruction of single image for latent features
收藏 引用
Computational Visual Media 2024年 第6期10卷 1219-1239页
作者: Xin Wang Jing-Ke Yan Jing-Ye Cai Jian-Hua Deng Qin Qin Yao Cheng School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610000 China State Key Laboratory of Rail Transit Vehicle System Southwest Jiaotong UniversityChengdu 610000China School of Marine Engineering Guilin University of Electronic TechnologyGuilin 541000China School of Computer and Information Security Guilin University of Electronic TechnologyGuilin 541000China
Single-image super-resolution(SISR)typically focuses on restoring various degraded low-resolution(LR)images to a single high-resolution(HR)***,during SISR tasks,it is often challenging for models to simultaneously mai... 详细信息
来源: 评论
Semantic Segmentation and YOLO Detector over Aerial Vehicle Images
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3315-3332页
作者: Asifa Mehmood Qureshi Abdul Haleem Butt Abdulwahab Alazeb Naif Al Mudawi Mohammad Alonazi Nouf Abdullah Almujally Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Computer Science College of Computer Science and Information SystemNajran UniversityNajran55461Saudi Arabia Department of Information Systems College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Cognitive Systems Lab University of BremenBremen28359Germany
Intelligent vehicle tracking and detection are crucial tasks in the realm of highway ***,vehicles come in a range of sizes,which is challenging to detect,affecting the traffic monitoring system’s overall *** learning... 详细信息
来源: 评论