咨询与建议

限定检索结果

文献类型

  • 8,009 篇 会议
  • 4,372 篇 期刊文献
  • 160 册 图书

馆藏范围

  • 12,541 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,898 篇 工学
    • 6,153 篇 计算机科学与技术...
    • 5,007 篇 软件工程
    • 1,598 篇 信息与通信工程
    • 1,054 篇 控制科学与工程
    • 767 篇 生物工程
    • 707 篇 电气工程
    • 566 篇 电子科学与技术(可...
    • 530 篇 机械工程
    • 516 篇 生物医学工程(可授...
    • 393 篇 光学工程
    • 318 篇 仪器科学与技术
    • 284 篇 动力工程及工程热...
    • 283 篇 安全科学与工程
    • 254 篇 化学工程与技术
    • 218 篇 交通运输工程
  • 3,573 篇 理学
    • 2,128 篇 数学
    • 852 篇 生物学
    • 715 篇 物理学
    • 577 篇 统计学(可授理学、...
    • 508 篇 系统科学
    • 280 篇 化学
  • 2,410 篇 管理学
    • 1,555 篇 管理科学与工程(可...
    • 947 篇 图书情报与档案管...
    • 691 篇 工商管理
  • 575 篇 医学
    • 496 篇 临床医学
    • 437 篇 基础医学(可授医学...
    • 266 篇 药学(可授医学、理...
    • 232 篇 公共卫生与预防医...
  • 371 篇 法学
    • 290 篇 社会学
  • 247 篇 经济学
    • 246 篇 应用经济学
  • 184 篇 教育学
  • 131 篇 农学
  • 52 篇 文学
  • 36 篇 军事学
  • 27 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 524 篇 computer science
  • 336 篇 software enginee...
  • 243 篇 deep learning
  • 225 篇 data mining
  • 222 篇 computational mo...
  • 212 篇 machine learning
  • 185 篇 feature extracti...
  • 177 篇 application soft...
  • 176 篇 laboratories
  • 166 篇 optimization
  • 156 篇 computer archite...
  • 156 篇 wireless sensor ...
  • 155 篇 accuracy
  • 154 篇 software
  • 146 篇 internet of thin...
  • 137 篇 educational inst...
  • 136 篇 semantics
  • 125 篇 predictive model...
  • 123 篇 monitoring
  • 120 篇 algorithm design...

机构

  • 493 篇 state key labora...
  • 385 篇 department of co...
  • 256 篇 department of co...
  • 228 篇 school of softwa...
  • 168 篇 college of compu...
  • 159 篇 school of softwa...
  • 108 篇 state key labora...
  • 99 篇 school of comput...
  • 76 篇 school of inform...
  • 68 篇 department of co...
  • 66 篇 department of co...
  • 63 篇 department of co...
  • 51 篇 state key labora...
  • 48 篇 national key lab...
  • 47 篇 university of ch...
  • 46 篇 school of softwa...
  • 46 篇 school of softwa...
  • 45 篇 tsinghua nationa...
  • 41 篇 national key lab...
  • 39 篇 school of comput...

作者

  • 43 篇 xiang-yang li
  • 40 篇 baowen xu
  • 39 篇 yunhao liu
  • 31 篇 shen furao
  • 28 篇 zhao jian
  • 27 篇 aichholzer oswin
  • 27 篇 qi lianyong
  • 25 篇 zhou zhi-hua
  • 25 篇 yang tianbao
  • 24 篇 vogtenhuber birg...
  • 23 篇 rehman attique u...
  • 23 篇 xuandong li
  • 23 篇 wang wei
  • 22 篇 wang jianmin
  • 22 篇 jiacun wang
  • 22 篇 gao yang
  • 22 篇 zhang yan
  • 22 篇 sun fuchun
  • 21 篇 jun zhang
  • 21 篇 guihai chen

语言

  • 11,972 篇 英文
  • 373 篇 其他
  • 209 篇 中文
  • 2 篇 德文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Software and Computer Technology"
12541 条 记 录,以下是151-160 订阅
排序:
African Bison Optimization Algorithm:A New Bio-Inspired Optimizer with Engineering Applications
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 603-623页
作者: Jian Zhao Kang Wang Jiacun Wang Xiwang Guo Liang Qi School of Science University of Science and Technology LiaoningAnshan114051China Team of Artificial Intelligence Theory and Application University of Science and Technology LiaoningAnshan114051China Department of Computer Science and Software Engineering Monmouth UniversityWest Long BranchNJ 07764USA Information and Control Engineering College Liaoning Petrochemical UniversityFushun113000China Department of Computer Science and Technology Shandong University of Science and TechnologyQingdao266590China
This paper introduces the African Bison Optimization(ABO)algorithm,which is based on biological *** is inspired by the survival behaviors of the African bison,including foraging,bathing,jousting,mating,and *** foragin... 详细信息
来源: 评论
Optimal Feature-Centric Approach for EEG-Based Human Emotion Identification  5
Optimal Feature-Centric Approach for EEG-Based Human Emotion...
收藏 引用
5th International Conference on Advancements in Computational Sciences, ICACS 2024
作者: Ashraf, Hira Saeed, Sanay Muhammad Umar Khan, Sheharyar Noorani, Sadam Hussain Arsalan, Aamir Rauf, Usman University of Engineering & Technology Department of Computer Engineering Taxila Pakistan Fatima Jinnah Women University Department of Software Engineering Rawalpindi Pakistan
Emotions are intrinsic to human nature, playing a vital role in human cognition. Emotions are closely intertwined with rational decision-making, perception, human interaction, and human intelligence. EEG has emerged a... 详细信息
来源: 评论
Integrating Quantum Computing and Blockchain: Building the Foundations of Secure, Efficient 6G technology  1
Integrating Quantum Computing and Blockchain: Building the F...
收藏 引用
1st ACM International Workshop on Quantum software Engineering: The Next Evolution, QSE-NE 2024
作者: Zohaib, Muhammad Altuwaijri, Fahad S. Hyrynsalmi, Sami Department of Software Engineering LUT University Lahti Finland Department of Information Technology College of Computer Qassim University Buraydah Saudi Arabia
This research presents a modern framework that combine quantum computing and blockchain technologies to transform city management in provision for the 6G era. Quantum computing is recognized for its extraordinary proc... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论
Enhancing Soft Skills in Autistic Children: The Next Generation of Mind Champ's Technological Approach  6
Enhancing Soft Skills in Autistic Children: The Next Generat...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Peiris, Kalna Nelaka, Ruchira Manathunga, Kalpani Department of Computer Systems Engineering Sri Lanka Institute of Information and Technology Sri Lanka Department of Information Technology Sri Lanka Institute of Information and Technology Sri Lanka Department of Computer Science and Software Engineering Sri Lanka Institute of Information and Technology Sri Lanka
Autism Spectrum Disorder (ASD) significantly impacts a child's ability to navigate social interactions, regulate emotions, and develop adaptive skills crucial for daily functioning. While various interventions exi... 详细信息
来源: 评论
An Approach for Early Detection of Schizophrenia  15
An Approach for Early Detection of Schizophrenia
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Paranagama, Sachin Uditha, Isiwara Daundasekara, Pamodya Hettiarachchi, Shehani Weerasinghe, Lokesha Kasthurirathna, Dharshana Sri Lanka Institue Of Information Technology Faculty Of Computing Department of Computer Science and Software Engineering Malabe Sri Lanka
Schizophrenia is a chronic mental disorder with distorted thinking, hallucinations, and social difficulties. Early diagnosis is vital, but current methods are limited. This research proposes a web-based application in... 详细信息
来源: 评论
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain
收藏 引用
IEEE Internet of Things Journal 2024年 第6期11卷 10325-10335页
作者: Yang, Ching-Nung Li, Peng Cheng, Hsiang-Han Kuo, Hsin-Chuan Lu, Ming-Chan Xiong, Lizhi National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan North China Electric Power University Department of Mathematics and Physics Hebei Key Laboratory of Physics and Energy Technology Baoding071003 China Nanjing University of Information Science and Technology School of Computer and Software Nanjing210044 China
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing n shares in the way that a set of any k shares can recover the secret. On the other hand, blockchain is a decentr... 详细信息
来源: 评论
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 363-378页
作者: Khalid Hamid Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce... 详细信息
来源: 评论
A deep Q-learning model for sequential task offloading in edge AI systems
收藏 引用
Intelligent and Converged Networks 2024年 第3期5卷 207-221页
作者: Dong Liu Shiheng Gu Xinyu Fan Xu Zheng Department of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610000China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of ChinaShenzhen 515100China Department of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu 610000China
Currently,edge Artificial Intelligence(AI)systems have significantly facilitated the functionalities of intelligent devices such as smartphones and smart cars,and supported diverse applications and *** fundamental sup... 详细信息
来源: 评论
Improving the Performance of Firewalls through Network Traffics Logs' Classification of Firat Dataset Using Decision Tree Algorithm  10
Improving the Performance of Firewalls through Network Traff...
收藏 引用
10th International Conference on Web Research, ICWR 2024
作者: Talaeepoor, Maryam Soleimani Neysiani, Behzad Jezi, Mohammad Davarpanah Naghshe Jahan Institute of Higher Education Faculty of Computer Engineering Department of Computer Engineering Isfahan Iran Department of Software Engineering Isfahan Iran Isfahan University of Technology Department of Electrical and Computer Engineering Isfahan Iran
As long as a computer system is connected to the Internet, it is susceptible to attack as a victim. In computer networks, it becomes important to manage the network based on parameters such as network size and network... 详细信息
来源: 评论