咨询与建议

限定检索结果

文献类型

  • 787 篇 会议
  • 388 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 1,192 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 761 篇 工学
    • 564 篇 计算机科学与技术...
    • 438 篇 软件工程
    • 225 篇 信息与通信工程
    • 149 篇 控制科学与工程
    • 97 篇 电气工程
    • 84 篇 生物工程
    • 80 篇 电子科学与技术(可...
    • 72 篇 生物医学工程(可授...
    • 72 篇 网络空间安全
    • 62 篇 光学工程
    • 61 篇 安全科学与工程
    • 57 篇 交通运输工程
    • 53 篇 机械工程
    • 41 篇 石油与天然气工程
    • 40 篇 动力工程及工程热...
    • 38 篇 仪器科学与技术
    • 34 篇 化学工程与技术
  • 381 篇 理学
    • 215 篇 数学
    • 108 篇 物理学
    • 98 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 46 篇 系统科学
    • 40 篇 化学
  • 266 篇 管理学
    • 159 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 77 篇 医学
    • 63 篇 临床医学
    • 61 篇 基础医学(可授医学...
    • 37 篇 公共卫生与预防医...
    • 37 篇 药学(可授医学、理...
  • 50 篇 法学
  • 27 篇 农学
  • 21 篇 经济学
  • 9 篇 教育学
  • 7 篇 军事学
  • 6 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 accuracy
  • 34 篇 deep learning
  • 31 篇 machine learning
  • 26 篇 internet of thin...
  • 21 篇 computational mo...
  • 21 篇 artificial intel...
  • 20 篇 optimization
  • 20 篇 convolutional ne...
  • 18 篇 medical services
  • 17 篇 feature extracti...
  • 16 篇 training
  • 15 篇 support vector m...
  • 14 篇 big data
  • 14 篇 data mining
  • 14 篇 wireless sensor ...
  • 14 篇 real-time system...
  • 13 篇 authentication
  • 13 篇 blockchain
  • 12 篇 predictive model...
  • 12 篇 security

机构

  • 66 篇 department of co...
  • 59 篇 vivekananda glob...
  • 45 篇 maharishi school...
  • 39 篇 department of co...
  • 36 篇 department of co...
  • 27 篇 infn e laborator...
  • 27 篇 faculty of scien...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 west university ...
  • 27 篇 research center ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 graduate school ...
  • 27 篇 department physi...
  • 27 篇 institute of phy...
  • 27 篇 deutsches elektr...
  • 27 篇 institute of phy...
  • 27 篇 department of ph...
  • 27 篇 instituto de fís...
  • 27 篇 niels bohr insti...

作者

  • 23 篇 c. alexa
  • 23 篇 j. m. izen
  • 23 篇 j. gao
  • 23 篇 g. bella
  • 23 篇 j. strandberg
  • 23 篇 d. calvet
  • 23 篇 c. amelung
  • 23 篇 b. konya
  • 23 篇 f. pastore
  • 23 篇 a. grummer
  • 23 篇 k. j. r. cormier
  • 23 篇 n. orlando
  • 23 篇 f. a. förster
  • 23 篇 y. tayalati
  • 23 篇 t. pham
  • 23 篇 g. spigo
  • 23 篇 v. chiarella
  • 23 篇 m. lu
  • 23 篇 f. siegert
  • 23 篇 a. e. c. coimbra

语言

  • 1,125 篇 英文
  • 51 篇 其他
  • 16 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Information Technology and Computer Application"
1192 条 记 录,以下是1-10 订阅
排序:
Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts
收藏 引用
International Journal of information technology (Singapore) 2025年 第2期17卷 1207-1223页
作者: Hemani Singh, Dayashankar Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology UP Gorakhpur India
The future of autonomous vehicles is exciting and holds significant potential for transforming transportation. The future is bright, but these vehicles require a high degree of connectivity complex software to functio... 详细信息
来源: 评论
application of adaptive guard channel reservation under hard handoff constraint in wireless cellular network
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 170-185页
作者: Sahu, Promod Kumar Pati, Hemanta Kumar Pradha, Sateesh Kumar Department of Computer Science and Application Utkal University Vani Vihar Odisha Bhubaneswar India Department of Computer Science and Engineering International Institute of Information Technology Bhubaneswar Odisha Bhubaneswar India
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp... 详细信息
来源: 评论
Optimal Production Capacity Matching for Blockchain-Enabled Manufacturing Collaboration With the Iterative Double Auction Method
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 550-562页
作者: Ying Chen Feilong Lin Zhongyu Chen Changbing Tang Cailian Chen the Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province Zhejiang Normal University the School of Computer Science and Technology Zhejiang Normal University IEEE the College of Physics and Electronic Information Engineering Zhejiang Normal University the Department of Automation Shanghai Jiao Tong University
The increased demand for personalized customization calls for new production modes to enhance collaborations among a wide range of manufacturing practitioners who unnecessarily trust each other. In this article, a blo... 详细信息
来源: 评论
Multimodal emotion recognition model via hybrid model with improved feature level fusion on facial and EEG feature set
收藏 引用
Multimedia Tools and applications 2025年 第1期84卷 1-36页
作者: Singh, Pratima Tripathi, Mukesh Kumar Patil, Mithun B. Shivendra Neelakantappa, Madugundu Department of Computer Science and Engineering Galgotias University Gautam Buddh Nagar Uttar Pradesh India Department of Computer Science and Engineering Vardhaman College of Engineering Telangana Hyderabad India Department of Computer Science and Engineering N K Orchid College of Engineering & Technology Maharastra Solapur India Department of Computer Application D. K. College Dumraon Bihar Buxar India Department of Information Technology Vasavi College of Engineering Telangana Hyderabad India
In recent years, academics have placed a high value on multi-modal emotion identification, as well as extensive research has been conducted in the areas of video, text, voice, and physical signal emotion detection. Th... 详细信息
来源: 评论
Forensic handwriting analysis: a hybrid classification framework for writer identification in Devanagari script
收藏 引用
Multimedia Tools and applications 2025年 1-12页
作者: Sethi, Monika Kumar, Munish Jindal, M.K. Department of Computer Science and Application Panjab University Chandigarh India P.G. Department of Information Technology Goswami Ganesh Dutta Sanatan Dharma College Chandigarh India Department of Computational Sciences Maharaja Ranjit Singh Punjab Technical University Punjab Bathinda India Department of Computer Science and Applications Panjab University Regional Centre Muktsar India
In a period marked by swift technological progress, the task of identifying writers through handwriting holds significant importance across various domains, including forensic investigation, plagiarism detection, and ... 详细信息
来源: 评论
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论
Investigating the Impact of Public-Key Infrastructure in information Security Models for Networked applications  5th
Investigating the Impact of Public-Key Infrastructure in Inf...
收藏 引用
5th International Conference on Data Science, Machine Learning and applications, ICDSMLA 2023
作者: Shree, Ritu Saxena, Kumud Mehta, Deepak Pandeya, Megha Department of Computer Science and Application Vivekananda Global University Jaipur India Department of Computer Science Engineering Noida Institute of Engineering and Technology Uttar Pradesh Greater Noida India Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Public-key infrastructure (PKI) is poised to play a crucial function in the use of secure data technology systems. With the increasing complexity of these dais’s networks and packages, PKI gives a reliable way to ele... 详细信息
来源: 评论
Fuzzy Decision-Based Clustering for Efficient Data Aggregation in Mobile UWSNs
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 259-279页
作者: Aadil Mushtaq Pandith Manni Kumar Naveen Kumar Nitin Goyal Sachin Ahuja Yonis Gulzar Rashi Rastogi Rupesh Gupta Department of Computer Science and Engineering Lovely Professional UniversityJalandhar144402PunjabIndia Department of Computer Science and Engineering Chandigarh UniversityMohali140413PunjabIndia Salesforce Inc. DallasTX 75201USA Department of Computer Science and Engineering School of Engineering and TechnologyCentral University of HaryanaMahendragarh123031HaryanaIndia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Application Sir Chhotu Ram Institute of Engineering and TechnologyCh.Charan Singh UniversityMeerut250001Uttar PradeshIndia Chitkara University Institute of Engineering and Technology Chitkara UniversityRajpura140401PunjabIndia
Underwater wireless sensor networks(UWSNs)rely on data aggregation to streamline routing operations by merging information at intermediate nodes before transmitting it to the ***,many existing data aggregation techniq... 详细信息
来源: 评论
ColorVein: Colorful Cancelable Vein Biometrics
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 4943-4955页
作者: Wang, Yifan Gui, Jie Shi, Xinli Gui, Linqing Tang, Yuan Yan Kwok, James Tin-Yau Southeast University School of Cyber Science and Engineering Nanjing210000 China Ministry of Education Purple Mountain Laboratories Engineering Research Center of Blockchain Application Nanjing210000 China Nanjing University of Posts and Telecommunications College of Computer Nanjing210003 China University of Macao Department of Computer and Information Science 999078 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong
Vein recognition technologies have become one of the primary solutions for high-security identification systems. However, the issue of biometric information leakage can still pose a serious threat to user privacy and ... 详细信息
来源: 评论
Efficient energy-preserving methods for the Schrödinger-Boussinesq equation
Efficient energy-preserving methods for the Schrödinger-Bou...
收藏 引用
作者: Yan, Jinliang Zheng, Lianghong Lu, Fuqiang Zhang, Qiongyue Fujian Key Laboratory of Big Data Application and Intellectualization for Tea Industry College of Mathematics and Computer Fujian354300 China Department of Information and Computer Technology No.1 Middle School of Nanping Fujian353000 China Changzhou Institute of Technology Changzhou213032 China
In this paper, we present two novel energy-preserving schemes for the Schrödinger-Boussinesq system based on the second-order Adams prediction-correction method. We first introduce supplementary variables to the ... 详细信息
来源: 评论