咨询与建议

限定检索结果

文献类型

  • 152 篇 期刊文献
  • 29 篇 会议

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 73 篇 计算机科学与技术...
    • 31 篇 软件工程
    • 28 篇 控制科学与工程
    • 21 篇 电子科学与技术(可...
    • 17 篇 机械工程
    • 15 篇 仪器科学与技术
    • 14 篇 信息与通信工程
    • 7 篇 材料科学与工程(可...
    • 7 篇 网络空间安全
    • 3 篇 力学(可授工学、理...
    • 3 篇 光学工程
    • 2 篇 化学工程与技术
    • 2 篇 航空宇航科学与技...
    • 1 篇 电气工程
    • 1 篇 水利工程
    • 1 篇 交通运输工程
    • 1 篇 生物工程
  • 29 篇 理学
    • 15 篇 数学
    • 8 篇 物理学
    • 2 篇 系统科学
    • 1 篇 化学
    • 1 篇 大气科学
    • 1 篇 生物学
  • 29 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 11 篇 医学
    • 10 篇 临床医学
  • 5 篇 艺术学
    • 4 篇 设计学(可授艺术学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 文学
    • 1 篇 外国语言文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 13 篇 machine learning
  • 9 篇 deep learning
  • 8 篇 blockchain
  • 4 篇 object detection
  • 4 篇 peer to peer com...
  • 4 篇 generative adver...
  • 3 篇 covid-19
  • 3 篇 privacy protecti...
  • 3 篇 computer archite...
  • 3 篇 healthcare
  • 3 篇 smart contract
  • 3 篇 algorithm design...
  • 3 篇 federated learni...
  • 3 篇 genetic algorith...
  • 3 篇 cloud computing
  • 3 篇 streaming media
  • 3 篇 convolutional ne...
  • 3 篇 data analysis
  • 2 篇 internet of thin...
  • 2 篇 dcgan

机构

  • 16 篇 school of comput...
  • 9 篇 jiangsu collabor...
  • 7 篇 school of comput...
  • 7 篇 computer science...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 wuxi research in...
  • 4 篇 school of comput...
  • 4 篇 department of in...
  • 4 篇 hunan provincial...
  • 3 篇 jiangsu engineer...
  • 3 篇 key laboratory o...
  • 3 篇 school of automa...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 university of ch...
  • 3 篇 school of inform...
  • 3 篇 department of el...
  • 3 篇 school of inform...
  • 3 篇 college of infor...

作者

  • 13 篇 jin wang
  • 9 篇 osama alfarraj
  • 6 篇 amr tolba
  • 5 篇 pradip kumar sha...
  • 5 篇 gwang-jun kim
  • 5 篇 xiaorui zhang
  • 5 篇 yongjun ren
  • 4 篇 wei sun
  • 4 篇 yi cao
  • 4 篇 victor s.sheng
  • 4 篇 wei fang
  • 4 篇 xingming sun
  • 4 篇 r.simon sherratt
  • 4 篇 muhammad adnan k...
  • 4 篇 hani alquhayz
  • 4 篇 allah ditta
  • 3 篇 lei wang
  • 3 篇 hui wang
  • 3 篇 jun wang
  • 3 篇 yuming chu

语言

  • 172 篇 英文
  • 9 篇 中文
检索条件"机构=Department of Computer Science&Technology"
181 条 记 录,以下是61-70 订阅
排序:
Interval Type-2 Fuzzy Model for Intelligent Fire Intensity Detection Algorithm with Decision Making in Low-Power Devices
收藏 引用
Intelligent Automation & Soft Computing 2023年 第10期38卷 57-81页
作者: Emmanuel Lule Chomora Mikeka Alexander Ngenzi Didacienne Mukanyiligira African Center of Excellence in Internet of Things(ACEIoT) College of Science&TechnologyUniversity of RwandaNyarugenge-Kigali3900Rwanda Department of Computer Science College of Computing&Information SciencesMakerere UniversityKampala7062Uganda Directorate of Science Technology&Innovation(DSTI)Ministry of EducationMalawiLilongwe328Malawi Department of Computer&Software Engineering College of Science&TechnologyUniversity of RwandaNyarugenge-Kigali3900Rwanda National Council for Science&Technology(NCST) Government of RwandaKigali2285Rwanda
Local markets in East Africa have been destroyed by raging fires,leading to the loss of life and property in the nearby *** circuits,arson,and neglected charcoal stoves are the major causes of these *** methods,i.e.,s... 详细信息
来源: 评论
Let’s all dance:Enhancing amateur dance motions
收藏 引用
Computational Visual Media 2023年 第3期9卷 531-550页
作者: Qiu Zhou Manyi Li Qiong Zeng Andreas Aristidou Xiaojing Zhang Lin Chen Changhe Tu School of Computer Science&Technology Shandong UniversityQingdao 266000China School of Software Shandong UniversityJinan 250101China Department of Computer Science University of CyprusNicosia 1678Cyprus CYENS Centre of Excellence Nicosia 1016Cyprus Qingdao Institute of Humanities and Social Sciences Shandong UniversityQingdao 266000China.
Professional dance is characterized by high impulsiveness,elegance,and aesthetic *** order to reach the desired professionalism,it requires years of long and exhausting practice,good physical condition,musicality,but ... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in Engineering & sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
The construction of orthodox super rpp semigroups
收藏 引用
science China Mathematics 2004年 第4期47卷 552-565页
作者: He Yong Guo Yuqi Kar Ping Shum School of Computer Science Hunan University of Science&TechnologyXiangtan 411201China Department of Mathematics Southwest Normal UniversityChongqing 400715China Department of Mathematics Soochow UniversitySuzhou 215000China Faculty of Science The Chinese University of Hong KongShatinN.T.Hong KongChina
We define orthodox super rpp semigroups and study their semilattice decompositions. Standard representation theorem of orthodox super rpp semigroups whose subband of idempotents is in the varieties of bands described ... 详细信息
来源: 评论
MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5573-5595页
作者: Zhanyang Xu Jianchun Cheng Luofei Cheng Xiaolong Xu Muhammad Bilal School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory Novel Software Technology Nanjing UniversityNanjing210023China Department of Computer and Electronics Systems Engineering Hankuk University of Foreign StudiesYongin-siGyeonggi-do17035Korea
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym... 详细信息
来源: 评论
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1613-1633页
作者: Jingyu Zhang Pian Zhou Jin Wang Osama Alfarraj Saurabh Singh Min Zhu School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410015China Science and Technology on Information Systems Engineering Laboratory School of Systems EngineeringNational University of Defense TechnologyChangsha410073China Computer Science Department King Saud UniversityRiyadh11437Saudi Arabia Department of Artificial Intelligence and Big Data Woosong UniversityDaejeon34606South Korea College of Information Science and Technology Zhejiang Shuren UniversityHangzhou310015China
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across ... 详细信息
来源: 评论
A Fusion Steganographic Algorithm Based on Faster R-CNN
收藏 引用
computers, Materials & Continua 2018年 第4期55卷 1-16页
作者: Ruohan Meng Steven G.Rice Jin Wang Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNing Liu RoadNo.219Nanjing210044China Jiangsu Engineering Centre of Network Monitoring Ning Liu RoadNo.219Nanjing210044China Department of Mathematics and Computer Science Northeastern State University TahlequahOK 74464USA School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China
The aim of information hiding is to embed the secret message in a normal cover media such as image,video,voice or text,and then the secret message is transmitted through the transmission of the cover *** secret messag... 详细信息
来源: 评论
MCC: A Message and Command Correlation Method for Identifying New Interactive Protocols via Session Analyses
收藏 引用
Tsinghua science and technology 2012年 第3期17卷 344-353页
作者: Chenglong Li Yibo Xue Yingfei Dong Dongsheng Wang Tsinghua National Lab for Information Science and Technology(TNList) Beijing 100084China Research Institute of Information Technology(RIIT) Tsinghua UniversityBeijing 100084China Department of Computer Science&Technology Tsinghua UniversityBeijing 100084China Department of Electrical Engineering University of HawaiiHonoluluHI 96822USA
Traffic classification is critical to effective network management. However, more and more pro- prietary, encrypted, and dynamic protocols make traditional traffic classification methods less effective. A Message and ... 详细信息
来源: 评论
Robust Frequency Estimation Under Additive Mixture Noise
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1671-1684页
作者: Yuan Chen Yulu Tian Dingfan Zhang Longting Huang Jingxin Xu School of Computer and Communication Engineering University of Science&Technology BeijingBeijing100083China School of Automation Science and Electrical Engineering Beihang UniversityBeijing100191China School of Information Engineering Wuhan University of TechnologyWuhan430070China Department of Energy and Public Works Queensland4702Australia
In many applications such as multiuser radar communications and astrophysical imaging processing,the encountered noise is usually described by the finite sum ofα-stable(1≤α<2)*** this paper,a new parameter estim... 详细信息
来源: 评论
A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things
收藏 引用
computers, Materials & Continua 2019年 第3期58卷 679-695页
作者: Baowei Wang Weiwen Kong Wei Li Neal NXiong Jiangsu Engineering Centre of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment TechnologySchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Engineering Research Center of Electronic Information and Control from Fujian Provincial Education Department Fuzhou350108China Department of Mathematics and Computer Science Northeastern State UniversityOklahomaUSA.
Chaining watermark is an effective way to verify the integrity of streaming data in wireless network environment,especially in resource-constrained sensor networks,such as the perception layer of Internet of Things **... 详细信息
来源: 评论