咨询与建议

限定检索结果

文献类型

  • 738 篇 会议
  • 447 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 1,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 771 篇 工学
    • 556 篇 计算机科学与技术...
    • 459 篇 软件工程
    • 168 篇 信息与通信工程
    • 102 篇 控制科学与工程
    • 83 篇 生物工程
    • 80 篇 电气工程
    • 71 篇 机械工程
    • 64 篇 光学工程
    • 61 篇 电子科学与技术(可...
    • 61 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 31 篇 仪器科学与技术
    • 30 篇 安全科学与工程
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 345 篇 理学
    • 175 篇 数学
    • 110 篇 物理学
    • 91 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 39 篇 系统科学
    • 32 篇 化学
  • 235 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 101 篇 图书情报与档案管...
    • 60 篇 工商管理
  • 56 篇 医学
    • 53 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 38 篇 法学
    • 29 篇 社会学
  • 34 篇 教育学
    • 30 篇 教育学
  • 30 篇 经济学
    • 30 篇 应用经济学
  • 22 篇 农学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 34 篇 feature extracti...
  • 27 篇 data mining
  • 25 篇 deep learning
  • 25 篇 computational mo...
  • 24 篇 training
  • 23 篇 machine learning
  • 22 篇 accuracy
  • 21 篇 computer science
  • 21 篇 artificial intel...
  • 18 篇 optimization
  • 18 篇 semantics
  • 15 篇 predictive model...
  • 15 篇 databases
  • 14 篇 support vector m...
  • 14 篇 neural networks
  • 13 篇 software enginee...
  • 13 篇 algorithm design...
  • 13 篇 clustering algor...
  • 13 篇 software
  • 13 篇 convolutional ne...

机构

  • 74 篇 faculty of compu...
  • 42 篇 faculty of compu...
  • 41 篇 faculty of compu...
  • 23 篇 faculty of compu...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 department of in...
  • 15 篇 huaiyin institut...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 14 篇 national key lab...
  • 14 篇 faculty of compu...
  • 14 篇 computer vision ...
  • 13 篇 faculty of compu...
  • 12 篇 faculty of autom...

作者

  • 59 篇 quanyin zhu
  • 35 篇 zhu quanyin
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 17 篇 gao shangbing
  • 17 篇 yan yunyang
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 hong zhou
  • 15 篇 zhou hong
  • 14 篇 zain ul abideen
  • 12 篇 wanli feng
  • 11 篇 belikov juri
  • 11 篇 pal umapada
  • 11 篇 levron yoash
  • 10 篇 lei zhou
  • 10 篇 ali zeeshan ijaz
  • 10 篇 zhang haiyan
  • 10 篇 li xiang
  • 10 篇 zhengfeng ji

语言

  • 1,142 篇 英文
  • 50 篇 其他
  • 14 篇 中文
  • 1 篇 日文
检索条件"机构=Faculty of Computer and Software Engineering Huaiyin Institute of Technology"
1206 条 记 录,以下是431-440 订阅
排序:
Enhanced Security Protocol for VLSI Systems: Modified AES Algorithm for Robust Data Transmission
Enhanced Security Protocol for VLSI Systems: Modified AES Al...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Jinsha Lawrence Dinesh Kumar Budagam P. Mukilan Kavitha Veerappan E. Chandrasekhar K. Barathi Department of Computer Science and Engineering Faculty of Engineering Karpagam Academy of Higher Education (Deemed to be University) Coimbatore India Department of MS in Software Engineering Security Architect at VISA California United States Department of Electronics and Communication Engineering Dhanalakshmi Srinivasan College of Engineering Coimbatore India Department of Electronics and Communication Engineering Kongu Engineering College Erode India Department of Electronics and Communication Engineering Chaitanya Bharathi Institute of Technology (A) Hyderabad India Department of Electrical and Electronics Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India
The development of compact and efficient devices has been made possible by the growth of Very Large Scale Integration (VLSI) technologies, which has transformed modern electronics. However, there are cautions regardin... 详细信息
来源: 评论
Slices reconstructing algorithm for single image dedusting
收藏 引用
International Journal of Information and Communication technology 2020年 第2期16卷 140-151页
作者: Zhang, Haiyan Gao, Shangbing Jiang, Mingxin Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai'an China School of Computer Science and Engineering Southeast University Nanjing China
For solving the image degradation in the non-uniform dusting environment with multiple scattering lights, the slices reconstructing algorithm for single image was proposed for dust elimination in the paper. Firstly, t... 详细信息
来源: 评论
Identity-Based Threshold Key-Insulated Proxy Signature in the Standard Model  2
Identity-Based Threshold Key-Insulated Proxy Signature in th...
收藏 引用
2nd International Conference on computer Information Science and Application technology, CISAT 2019
作者: Chen, Jianhong Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian Jiangsu223003 China
Loss of secret keys is the deadly attack in public key cryptosystems. We present an identity-based threhold key-insulated proxy signature (IBTKIPS) scheme to settle the problem of key exposure in the identity-based pr... 详细信息
来源: 评论
Identification of Sounds Using Deep Learning with MFCC Features Extraction
Identification of Sounds Using Deep Learning with MFCC Featu...
收藏 引用
AITU: Digital Generation, IEEE
作者: Veeramanickam M.R.M Aniket Ingavale Vikas Khullar Sneha S Tirth Bishwajeet Pandey Harjit Pal Singh Department of Software Engineering Universidad Nacional Mayor de San Marcos (UNMSM) Lima Peru School of Engineering and Technology DES Pune University Pune India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Engineering Trinity College of Engineering and Research Pune India Department of IS&CS Astana IT University Astana Kazakhstan Department of Physics Faculty of Science and Technology The University of West Indies St Augustine Trinidad & Tobago
Environmental sound classification is an essential aspect of identifying different classes of sounds using a machine learning approach. This work investigates the efficacy of convolutional neural networks for classify... 详细信息
来源: 评论
Cyberbullying Classification Using a Natural Language Processing and Machine Learning Techniques
Cyberbullying Classification Using a Natural Language Proces...
收藏 引用
Advances in Computing Research on Science engineering and technology (ACROSET), International Conference on
作者: Nikhilesh Pramod Mankar Tushar Mahure Anushka A. Joshi Sagar Dhanraj Pande Aditya Khamparia Ankita Shrikrushna Nathe Fadi Al Turjman School of Engineering and Technology Pimpri Chinchwad University (PCU) Pune India Independent Researcher Amravati India Department of Computer Science Babasaheb Bhimrao Ambedkar University Amethi India Department of Information Technology Kavikulguru Institute of Technology and Science Nagpur India Artificial Intelligence Software Information Systems Engineering Departments AI and Robotics Institute Near East University Nicosia Turkey Research Center for AI and IoT Faculty of Engineering University of Kyrenia Kyrenia Turkey
The usage of online entertainment has increased dramatically after some time with the enhancement of the Internet and has turned into the most compelling systems administration stage in this century. Notwithstanding, ... 详细信息
来源: 评论
A Novel Trust Assessment System for Online Social Networking Environment Using Learning Assisted Classification Model
A Novel Trust Assessment System for Online Social Networking...
收藏 引用
Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), International Conference on
作者: S. Nithya D. Deepa Vunnava Dinesh Babu Pallavi G Hamed Fawareh R. D. Kayalvizhy Department of Computer Science Engineering Saveetha Engineering College Chennai Department of CSE St. Joseph's College of Engineering Chennai Department of CSE RV Institute of Technology Guntur Department of Civil Engineering Laxminarayan Innovation Technological University Nagpur India Software Engineering Dept Faculty of Information Technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah Saudi Arabia Department of Electronics and Communication Engineering R.M.K. Engineering College Kavaraipettai Tamil Nadu
Trust is essential in the constantly developing environment of online social networks. The Nexus Terroism Impact and Intro Trust facilitate the communication, decision-making, and maintenance of digital communities am... 详细信息
来源: 评论
Metric Spaces in Which Many Triangles Are Degenerate
arXiv
收藏 引用
arXiv 2024年
作者: Chvátal, Vašek de Rancourt, Noé Quintero, Guillermo Gamboa Kantor, Ida Szabó, Péter G.N. Department of Computer Science and Software Engineering Concordia University Montreal Canada Department of Applied Mathematics Charles University Prague Czech Republic Univ. Lille CNRS UMR 8524 Laboratoire Paul Painlevé LilleF-59000 France Computer Science Institute of Charles University Prague Czech Republic Department of Engineering Mathematics Faculty of Engineering and Information Technology University of Pécs Pécs Hungary Department of Computer Science and Information Theory Budapest University of Technology and Economics Hungary
Richmond and Richmond (American Mathematical Monthly 104 (1997), 713–719) proved the following theorem: If, in a metric space with at least five points, all triangles are degenerate, then the space is isometric to a ... 详细信息
来源: 评论
Data-Driven DLT3 Federated Deep Reinforcement Learning for Secure and Efficient Autonomous Driving
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Fei, Rong Li, Qianxi Wang, Kan Khan, Fazlullah Alturki, Ryan Lan, Dapeng Xi’an University of Technology School of Computer and Engineering Xi’an710000 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Ningbo315104 China Umm Al-Qura University College of Computing Department of Software Engineering Makkah21955 Saudi Arabia Chinese Academy of Sciences Shenyang Institute of Automation Shenyang110003 China
As autonomous vehicles (AVs) become increasingly widespread, the intelligent driving control and safety concerns have emerged. Recent advents in Internet of Things (IoTs) and 6G technologies have vastly boosted AVs’ ... 详细信息
来源: 评论
Hierarchical Reverse Games for the Resource Ecosystem in Cloud-Edge Computing
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Pei, Manlin Wang, Chenyu Wang, Xia Zheng, Zhigao Huang, Jianhui Wang, Shengling Guo, Yufei School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Computer Science Georgia State University United States Beijing University of Technology School of Statistics and Data Science Faculty of Science Beijing China Institute of Artificial Intelligence School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Hubei Luojia Laboratory Wuhan University Wuhan China Chinese Academy of Sciences Institute of Computing Technology Beijing China Beijing Normal University School of Artificial Intelligence Beijing China George Washington University Department of Statistics United States
Edge computing has emerged as a killer technology for a hyper-connected world due to its distributed architecture and customer-proximity property. Combined edge nodes with the cloud data center, a cloud-edge computing... 详细信息
来源: 评论
Enhanced Security Protocol for VLSI Systems: Modified AES Algorithm for Robust Data Transmission  3
Enhanced Security Protocol for VLSI Systems: Modified AES Al...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Lawrence, Jinsha Budagam, Dinesh Kumar Mukilan, P. Veerappan, Kavitha Chandrasekhar, E. Barathi, K. Faculty of Engineering Department of Computer Science and Engineering Coimbatore India Visa Department of Ms in Software Engineering CA United States Dhanalakshmi Srinivasan College of Engineering Department of Electronics and Communication Engineering Coimbatore India Kongu Engineering College Department of Electronics and Communication Engineering Erode India Department of Electronics and Communication Engineering Hyderabad India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Electrical and Electronics Engineering Chennai India
The development of compact and efficient devices has been made possible by the growth of Very Large Scale Integration (VLSI) technologies, which has transformed modern electronics. However, there are cautions regardin... 详细信息
来源: 评论