咨询与建议

限定检索结果

文献类型

  • 3,983 篇 会议
  • 3,150 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 7,158 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,416 篇 工学
    • 3,217 篇 计算机科学与技术...
    • 2,585 篇 软件工程
    • 1,197 篇 信息与通信工程
    • 798 篇 控制科学与工程
    • 603 篇 电气工程
    • 492 篇 生物工程
    • 482 篇 电子科学与技术(可...
    • 350 篇 光学工程
    • 334 篇 生物医学工程(可授...
    • 332 篇 机械工程
    • 328 篇 网络空间安全
    • 231 篇 仪器科学与技术
    • 219 篇 动力工程及工程热...
    • 209 篇 交通运输工程
    • 187 篇 化学工程与技术
    • 184 篇 安全科学与工程
  • 2,488 篇 理学
    • 1,145 篇 数学
    • 868 篇 物理学
    • 565 篇 生物学
    • 359 篇 统计学(可授理学、...
    • 243 篇 化学
    • 237 篇 系统科学
  • 1,293 篇 管理学
    • 804 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 277 篇 工商管理
  • 449 篇 医学
    • 344 篇 临床医学
    • 289 篇 基础医学(可授医学...
    • 201 篇 公共卫生与预防医...
    • 164 篇 药学(可授医学、理...
  • 233 篇 法学
    • 182 篇 社会学
  • 157 篇 教育学
  • 108 篇 农学
  • 85 篇 经济学
  • 55 篇 文学
  • 15 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 226 篇 deep learning
  • 204 篇 accuracy
  • 186 篇 feature extracti...
  • 184 篇 machine learning
  • 139 篇 computational mo...
  • 135 篇 training
  • 131 篇 semantics
  • 110 篇 internet of thin...
  • 107 篇 data mining
  • 106 篇 real-time system...
  • 95 篇 convolutional ne...
  • 89 篇 support vector m...
  • 88 篇 optimization
  • 87 篇 predictive model...
  • 86 篇 artificial intel...
  • 85 篇 security
  • 82 篇 visualization
  • 77 篇 computer science
  • 72 篇 neural networks
  • 70 篇 data models

机构

  • 284 篇 faculty of scien...
  • 284 篇 department of ph...
  • 283 篇 department for p...
  • 277 篇 departamento de ...
  • 275 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 272 篇 institute of phy...
  • 268 篇 department of ph...
  • 264 篇 department of ph...
  • 260 篇 institute of phy...
  • 259 篇 faculté des scie...
  • 257 篇 fakultät für phy...
  • 241 篇 institut für ast...
  • 233 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 216 篇 department of ph...
  • 215 篇 department of ph...
  • 211 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 260 篇 s. guindon
  • 257 篇 a. kaczmarska

语言

  • 6,533 篇 英文
  • 512 篇 其他
  • 121 篇 中文
  • 4 篇 日文
  • 2 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer and Information Technology and Engineering Education"
7158 条 记 录,以下是101-110 订阅
排序:
Appearance and motion-based unusual crowd events detection using multiple moving objects
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90177-90189页
作者: Babu, K. Atlas, L. Godlin Sreeji, S. Arjun, K.P. Rasmi, A. Senthilvel, P. Gururama Computational Intelligence SRM Institute of Science & Technology Chengalpet Kattankulathur603203 India Department of Computer Science and Engineering Bharath Institute of Higher Education and Research Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Department of Computer Science and Engineering Gitam University Karnataka Bengaluru India Information Science and Engineering RRIT Bangalore India Saveetha University Chennai602 105 India
Unusual crowd analysis is an important problem in surveillance video due to their features cannot be extracted efficiently on the crowd scenes. To overcome this challenge, this paper introduced the appearance and moti... 详细信息
来源: 评论
Learning-Based Joint Service Caching and Load Balancing for MEC Blockchain Networks
收藏 引用
China Communications 2023年 第1期20卷 125-139页
作者: Wenqian Zhang Wenya Fan Guanglin Zhang Shiwen Mao College of Information Science and Technology Donghua UniversityShanghai 201620China Engineering Research Center of Digitized Textile and Apparel Technology Ministry of EducationShanghai 201620China Department of Electrical and Computer Engineering Auburn UniversityAuburnAL 36849-5201USA
Integrating the blockchain technology into mobile-edge computing(MEC)networks with multiple cooperative MEC servers(MECS)providing a promising solution to improving resource utilization,and helping establish a secure ... 详细信息
来源: 评论
UAV-Assisted Dynamic Avatar Task Migration for Vehicular Metaverse Services: A Multi-Agent Deep Reinforcement Learning Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第2期11卷 430-445页
作者: Jiawen Kang Junlong Chen Minrui Xu Zehui Xiong Yutao Jiao Luchao Han Dusit Niyato Yongju Tong Shengli Xie IEEE School of Automation Guangdong University of TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing based on IoT Technology Guangzhou 510006China Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of EducationGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Pillar of Information Systems Technology and Design Singapore University of Technology and DesignSingaporeSingapore College of Communication Engineering Army Engineering University of PLANanjing 210007China National Natural Science Foundation of China Beijing 100085China Key Laboratory of Intelligent Detection and IoT in Manufacturing Ministry of EducationGuangzhou 510006China Guangdong Key Laboratory of IoT Information Technology Guangzhou 510006China
Avatars, as promising digital representations and service assistants of users in Metaverses, can enable drivers and passengers to immerse themselves in 3D virtual services and spaces of UAV-assisted vehicular Metavers... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Layer-Wise Learning Rate Optimization for Task-Dependent Fine-Tuning of Pre-Trained Models: An Evolutionary Approach
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-23页
作者: Bu, Chenyang Liu, Yuxin Huang, Manzong Shao, Jianxuan Ji, Shengwei Luo, Wenjian Wu, Xindong Key Laboratory of Knowledge Engineering with Big Data Ministry of Education and School of Computer Science and Information Engineering Hefei University of Technology Hefei China School of Artificial Intelligence and Big Data Hefei University Hefei China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
The superior performance of large-scale pre-Trained models, such as Bidirectional Encoder Representations from Transformers (BERT) and Generative Pre-Trained Transformer (GPT), has received increasing attention in bot... 详细信息
来源: 评论
Unknown Category Malicious Traffic Detection Based on Contrastive Learning  6th
Unknown Category Malicious Traffic Detection Based on Contra...
收藏 引用
6th International Conference on Machine Learning for Cyber Security, ML4CS 2024
作者: Yan, Leiming Zhou, Tao Chen, Xianyi Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and Cyber Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China
In response to the continuous emergence of novel unknown malicious traffic and the limitations of traditional detection methods, this paper presents an unknown-category malicious traffic detection approach based on co... 详细信息
来源: 评论
Multi-level glowworm swarm convolution neural networks for abnormal event detection in online surveillance video
收藏 引用
International Journal of information technology (Singapore) 2025年 第2期17卷 1179-1187页
作者: Rao, M. Koteswara Ashok Kumar, P.M. Department of Information technology VNR Vignana Jyothi Institute of Engineering and Technology Telangana Hyderabad 500090 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Guntur District Vaddeswaram 522502 India
A surveillance camera is one of the most important tools for observing people's movements and stopping unauthorized or unplanned activity. Security management experts now significantly rely on video surveillance t... 详细信息
来源: 评论
Analysis of CNN Models using Augmented Data in Tomato Diseases  18
Analysis of CNN Models using Augmented Data in Tomato Diseas...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Sharma, Pavan Yadav, Rakesh Kumar Rawat, Sur Singh Iftm University Department of Computer Science and Engineering Moradabad India Maharishi University of Information Technology Department of Computer Science and Engineering Lucknow India Jss Academy of Technical Education Department of Computer Science and Engineering Noida India
A vital source of nourishment for millions of people, tomatoes are one of the most significant vegetables in the world. However, many diseases may substantially decrease the yield and quality of tomato plants. Early b... 详细信息
来源: 评论
Histological Image Diagnosis of Breast Cancer Based on Multi-Attention Convolution Neural Network
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2025年 第1期30卷 91-106页
作者: XU Wangwang XU Liangfeng LIU Ninghui LU Na Key Laboratory of Knowledge Engineering with Big Data(Hefei University of Technology) Ministry of EducationHefei230601China School of Computer and Information Hefei University of TechnologyHefei230601China First Affiliated Hospital of Anhui Medical University Hefei230022China
Breast cancer is a serious and high morbidity disease in women,and it is the main cause of cancer death in ***,getting tested and diagnosed early can reduce the risk of *** present,there are clinical examinations,imag... 详细信息
来源: 评论
Optimizing VNF Service Provisioning in Mobile Edge Computing Networks Through PSO-RL  3
Optimizing VNF Service Provisioning in Mobile Edge Computing...
收藏 引用
3rd IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing, INCOS 2024
作者: Abinaya, K. Dhanasekaran, S. Vasudevan, V. Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu Srivilliputtur India Kalasalingam Academy of Research and Education Department of Information Technology Tamilnadu Srivilliputtur India
This study deals with setting up Virtual Network Function (VNF) services in Mobile Edge Computing (MEC) networks. It aims to balance different user needs in the everchanging MEC environment. Leveraging Particle Swarm ... 详细信息
来源: 评论