咨询与建议

限定检索结果

文献类型

  • 968 篇 会议
  • 863 篇 期刊文献
  • 26 册 图书

馆藏范围

  • 1,857 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,181 篇 工学
    • 899 篇 计算机科学与技术...
    • 740 篇 软件工程
    • 275 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 140 篇 生物工程
    • 139 篇 电气工程
    • 94 篇 生物医学工程(可授...
    • 90 篇 电子科学与技术(可...
    • 83 篇 机械工程
    • 80 篇 光学工程
    • 51 篇 化学工程与技术
    • 51 篇 安全科学与工程
    • 48 篇 动力工程及工程热...
    • 44 篇 仪器科学与技术
    • 43 篇 交通运输工程
    • 41 篇 网络空间安全
  • 579 篇 理学
    • 330 篇 数学
    • 157 篇 生物学
    • 137 篇 物理学
    • 105 篇 统计学(可授理学、...
    • 56 篇 化学
    • 54 篇 系统科学
  • 396 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 183 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 98 篇 医学
    • 87 篇 临床医学
    • 73 篇 基础医学(可授医学...
    • 45 篇 药学(可授医学、理...
    • 35 篇 公共卫生与预防医...
  • 56 篇 法学
    • 44 篇 社会学
  • 36 篇 教育学
  • 27 篇 经济学
  • 22 篇 农学
  • 7 篇 艺术学
  • 5 篇 文学
  • 5 篇 军事学
  • 1 篇 哲学

主题

  • 69 篇 feature extracti...
  • 62 篇 deep learning
  • 56 篇 training
  • 40 篇 machine learning
  • 40 篇 accuracy
  • 36 篇 computational mo...
  • 36 篇 convolutional ne...
  • 35 篇 data mining
  • 32 篇 software enginee...
  • 29 篇 internet of thin...
  • 28 篇 predictive model...
  • 28 篇 semantics
  • 27 篇 optimization
  • 25 篇 neural networks
  • 24 篇 artificial intel...
  • 23 篇 data models
  • 22 篇 cloud computing
  • 21 篇 computer science
  • 20 篇 clustering algor...
  • 20 篇 machine learning...

机构

  • 164 篇 college of compu...
  • 41 篇 faculty of compu...
  • 35 篇 college of compu...
  • 31 篇 national enginee...
  • 31 篇 state key labora...
  • 25 篇 college of compu...
  • 25 篇 shenzhen univers...
  • 19 篇 university of ch...
  • 18 篇 college of infor...
  • 16 篇 computer vision ...
  • 16 篇 state key labora...
  • 16 篇 tsinghua shenzhe...
  • 16 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 college of compu...
  • 15 篇 huaiyin institut...
  • 15 篇 shenzhen institu...
  • 15 篇 faculty of compu...
  • 15 篇 harbin institute...
  • 15 篇 faculty of compu...

作者

  • 29 篇 quanyin zhu
  • 21 篇 shen linlin
  • 13 篇 dai tao
  • 12 篇 zhou jie
  • 12 篇 xiang li
  • 12 篇 gao can
  • 12 篇 leung victor c.m...
  • 11 篇 gao shangbing
  • 11 篇 chen bin
  • 11 篇 wang zhi
  • 11 篇 r. saravanakumar
  • 10 篇 wang hui
  • 10 篇 xia shu-tao
  • 9 篇 wu chunming
  • 9 篇 wang yuanyuan
  • 9 篇 jiacun wang
  • 9 篇 liu feng
  • 9 篇 zhang haiyan
  • 9 篇 li xiang
  • 9 篇 wang xin

语言

  • 1,690 篇 英文
  • 138 篇 其他
  • 34 篇 中文
检索条件"机构=Computer and Software Engineering College of Huaiyin Institute of Technology"
1857 条 记 录,以下是151-160 订阅
排序:
An Intelligent Method for Detecting Jute Pests Using Deep Convolutional Neural Networks  5
An Intelligent Method for Detecting Jute Pests Using Deep Co...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Vignesh, S. Prabhu, S. Sampathkumar, R. Rani, M. Thillai Rejina Parvin, J. Maheswari, G. Uma Saravanakumar, R. Karpagam Academy of Higher Education Department of Computer Applications Tamil Nadu Coimbatore India KPR Institute of Engineering and Technology Department of Mechatronics Engineering Tamil Nadu Coimbatore India Sri Krishna College of Technology Department of Electronics and Communication Engineering Tamil Nadu Coimbatore India Sri Krishna College of Engineering and Technology Department of Electronics and Communication Engineering Tamil Nadu Coimbatore India RMK College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Iconix Software Solution Tamil Nadu Tirunelveli India
Pest attacks pose a serious threat to the production of jute and other significant crops. Jute farmers often utilize their visual sense and hands-on expertise to distinguish between multiple diseases that seem to be i... 详细信息
来源: 评论
Health-Care Monitoring of Patient using CNN based Model in Internet of Things  1
Health-Care Monitoring of Patient using CNN based Model in I...
收藏 引用
1st IEEE International Conference on Applied Intelligence and Sustainable Computing, ICAISC 2023
作者: Parameshachari, B.D. Hemalatha, K.L. Rahebi, Javad Baker, Mohammed Rashad Upendra Roy, B.P. Nitte Meenakshi Institute of Technology Department of Electronics and Communications Engineering Bengaluru India Sri Krishna Institute of Technology Department of Information Science and Engineering Bangalore India Istanbul Topkapi University Department of Software Engineering Turkey University of Kirkuk College of Computer Science and Information Technology Department of Software Kirkuk Iraq Channabasaveshwara Institute of Technology Gubbi Department of Electronics and Communication Engineering Tumkur India
There is rising public concern about exposure to radiofrequency (RF) electromagnetic fields (EMF) as more and more wireless communications become concentrated in everyday living surroundings. There are a number of obs... 详细信息
来源: 评论
Deniable authenticated encryption for e-mail applications
收藏 引用
International Journal of computers and Applications 2020年 第5期42卷 429-438页
作者: Jin, Chunhua Chen, Guanhua Yu, Changhui Zhao, Jianyang Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai'an China
In this paper, we introduce a deniable electronic mail authenticated encryption service. Our design meets the security requirement of the current Pretty Good Privacy and Secure/Multipurpose Internet Mail Extensions to... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Nur Siddiqi, Hafied Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Research Institute for Future Media Computing College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
Boundary-Guided Learning for Gene Expression Prediction in Spatial Transcriptomics
Boundary-Guided Learning for Gene Expression Prediction in S...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Qu, Mingcheng Wu, Yuncong Di, Donglin Su, Anyang Su, Tonghua Song, Yang Fan, Lei Harbin Institute of Technology Faculty of Computing Harbin China Harbin Institute of Technology School of Astronautics Harbin China Space AI Li Auto Beijing China Jilin University College of Software Changchun China Computer Science and Engineering Unsw Sydney Australia
Spatial transcriptomics (ST) has emerged as an advanced technology that provides spatial context to gene expression. Recently, deep learning-based methods have shown the capability to predict gene expression from WSI ... 详细信息
来源: 评论
Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
收藏 引用
computer Systems Science & engineering 2022年 第5期41卷 479-492页
作者: A.S.Anakath R.Kannadasan Niju P.Joseph P.Boominathan G.R.Sreekanth School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002TamilnaduIndia Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science CHRIST(Deemed to be University)Bengaluru560029India Department of Information Security School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science and Engineering Kongu Engineering CollegeErode638060TamilnaduIndia
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor... 详细信息
来源: 评论
Proactive Hybrid Autoscaling for Container-Based Edge Applications in Kubernetes  19th
Proactive Hybrid Autoscaling for Container-Based Edge Appli...
收藏 引用
19th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2023
作者: Zhu, Kaile Shen, Shihao Lan, Shizhan Wang, Xiaofei Zhang, Cheng Qiu, Chao Leung, Victor College of Intelligence and Computing Tianjin University Tianjin China China Mobile Guangxi Institute Co. Ltd. Shanghai China Institute of Technology Tianjin University of Finance and Economics Tianjin China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
As the rising of the Internet of Things (IoT), edge computing is widely adopted in numerous applications. However, current autoscaling tools are not designed for edge applications and can not utilize the heterogeneous... 详细信息
来源: 评论
Introducing on-chain graph data to consortium blockchain for commercial transactions
收藏 引用
Frontiers of computer Science 2024年 第2期18卷 255-257页
作者: Pengyi ZHANG Yuchen YUAN Jie SONG Yu GU Qiang QU Yongjie BAI Software College Northeastern UniversityShenyang 110819China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Blockchain Lab Huawei Cloud Computing Technologies Co.Ltd.Shenzhen 518101China
1 Introduction A blockchain can be referred to as a distributed ledger[1].Nowadays,according to our previous work[2],the graphrelated blockchain grows efficiently in both academic studies and commercial *** data,algor... 详细信息
来源: 评论
Deep Learning-based Classification of Lung CT Scan for Accurate Cancer Diagnosis  7
Deep Learning-based Classification of Lung CT Scan for Accur...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Sujatha, D.Christy Lakshmi, T.R. Vijaya Surya, G. Surendar, U. Rajendiran, M. Maranan, Ramya Periyar Maniammai Institute of Science And Technology Department of Software Engineering Tamail Nadu Thanjavur India Mahatma Gandhi Institute of Technology Department of Electronics And Communication Engineering Telangana Hyderabad India K. Ramakrishnan College of Engineering Department of Computer Science And Engineering Tamil Nadu Tiruchirappalli India Srm Institute of Science And Technology Department of Electronics And Communication Engineering Tamil Nadu Chennai India Panimalar Engineering College Department of Computer Science And Engineering Chennai Tamil Nadu Poonamallee India Saveetha School of Engineering SIMATS Department of Research And Innovation Tamil Nadu Chennai India
This paper investigates the suitability of advanced deep learning models for precise diagnosis of lung cancer from MRI images. Recurrent neural networks (RNN), K-Nearest Neighbors (KNN), ResNet50, and convolutional ne... 详细信息
来源: 评论
Google Scholar University Ranking Algorithm to Evaluate the Quality of Institutional Research
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 4955-4972页
作者: Noor Ul Sabah Muhammad Murad Khan Ramzan Talib Muhammad Anwar Muhammad Sheraz Arshad Malik Puteri Nor Ellyza Nohuddin Department of Computer Science Government College UniversityFaisalabad 38000Pakistan Department of Information Sciences Division of Science and TechnologyUniversity of EducationLahore54000Pakistan Department of Software Engineering Government College UniversityFaisalabad 38000Pakistan Institute of IR4.0 Universiti Kebangsaan MalaysiaBangiSelangor43600Malaysia
Education quality has undoubtedly become an important local and international benchmark for education,and an institute’s ranking is assessed based on the quality of education,research projects,theses,and dissertation... 详细信息
来源: 评论