咨询与建议

限定检索结果

文献类型

  • 1,693 篇 会议
  • 1,349 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 3,109 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,027 篇 工学
    • 1,545 篇 计算机科学与技术...
    • 1,263 篇 软件工程
    • 450 篇 信息与通信工程
    • 255 篇 生物工程
    • 242 篇 控制科学与工程
    • 212 篇 电气工程
    • 160 篇 光学工程
    • 152 篇 电子科学与技术(可...
    • 146 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 67 篇 网络空间安全
  • 1,023 篇 理学
    • 560 篇 数学
    • 285 篇 生物学
    • 272 篇 物理学
    • 168 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 593 篇 管理学
    • 369 篇 管理科学与工程(可...
    • 249 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 148 篇 医学
    • 132 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 108 篇 法学
    • 84 篇 社会学
  • 55 篇 经济学
    • 54 篇 应用经济学
  • 55 篇 教育学
  • 33 篇 农学
  • 17 篇 军事学
  • 12 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 77 篇 machine learning
  • 72 篇 deep learning
  • 71 篇 software enginee...
  • 65 篇 training
  • 62 篇 feature extracti...
  • 53 篇 data mining
  • 53 篇 computational mo...
  • 52 篇 artificial intel...
  • 47 篇 accuracy
  • 42 篇 semantics
  • 41 篇 cloud computing
  • 39 篇 internet of thin...
  • 37 篇 predictive model...
  • 36 篇 software
  • 35 篇 optimization
  • 35 篇 data models
  • 34 篇 authentication
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 70 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 28 篇 national enginee...
  • 27 篇 shenzhen institu...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 24 篇 guangdong key la...
  • 23 篇 school of comput...
  • 23 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 23 篇 institute of sof...
  • 22 篇 software enginee...

作者

  • 51 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 19 篇 mahmood khalid
  • 18 篇 ashok kumar das
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 linlin shen
  • 16 篇 xie weicheng
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 14 篇 wang wei
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,840 篇 英文
  • 220 篇 其他
  • 54 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3109 条 记 录,以下是491-500 订阅
排序:
Deep Reinforcement Learning for Solving the Vehicle Routing Problem in Practical Logistics
Deep Reinforcement Learning for Solving the Vehicle Routing ...
收藏 引用
Congress on Evolutionary Computation
作者: Junchuang Cai Xinzhi Zhang Qiuzhen Lin Lisha Dong Weineng Chen Zhong Ming College of Computer Science and Software Engineering Shenzhen University Shenzhen China College of Sino-German Robotics Shenzhen Institute of Information Technology Shenzhen China College of Computer Science and Engineering SSouth China University of Technology Guangzhou China
The vehicle routing problem with simultaneous pickup-delivery and time windows (VRPPDTW) is applicable to a wide range of practical scenarios within the domains of transportation and logistics. When addressing this co... 详细信息
来源: 评论
Novel Approach for Enhancing Mental Well-Being Through Machine Learning Techniques
Novel Approach for Enhancing Mental Well-Being Through Machi...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: O.V.D.E Roshani H.M.K.J.J Ayuwardhana P.H.M.S Rodrigo R.U Hewageegana Harinda Fernando Dilshan I. de Silva Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
Frequently, individuals undergo specific episodes of mental health challenges throughout their lifetime. But the COVID pandemic has triggered a surge in mental health disorders arising from isolation, monotonous routi...
来源: 评论
Fast Second-order Method for Neural Networks under Small Treewidth Setting
Fast Second-order Method for Neural Networks under Small Tre...
收藏 引用
IEEE International Conference on Big Data
作者: Xiaoyu Li Jiangxuan Long Zhao Song Tianyi Zhou Department of Computer Science Stevens Institute of Technology Hoboken NJ School of Software Engineering South China University of Technology Guangzhou China The Simons Institute for the Theory of Computing University of California Berkeley Berkeley CA Department of Computer Science University of Southern California Los Angeles CA
Training neural networks is a fundamental problem in theoretical machine learning. Second-order methods are rarely used in practice due to their high computational cost, even they converge much faster than first-order... 详细信息
来源: 评论
Advanced Bearing Fault Diagnosis Using Cuckoo Optimization and KAN Algorithms
Advanced Bearing Fault Diagnosis Using Cuckoo Optimization a...
收藏 引用
Electronic information engineering and computer science (EIECS), 2021 International Conference on
作者: Lingchao Wang Qiang Ai Hailong Yan Ming Hao Xiaoxin Li School of Information Engineering Liaoning Institute of Science and Engineering Jinzhou China College of Computer Qinghai Normal University Xining China Software College Liaoning Technical University Huludao China
This study proposes a bearing fault diagnosis method that combines the Cuckoo Optimization Algorithm (COA) with the KAN algorithm. COA, as an intelligent optimization algorithm, is primarily used to find the optimal h... 详细信息
来源: 评论
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论
Machine Learning-Based Security Mechanism for Detecting Phishing Attacks
Machine Learning-Based Security Mechanism for Detecting Phis...
收藏 引用
2024 IEEE International Conference on Communications, Computing, Cybersecurity and Informatics, CCCI 2024
作者: Bhatt, Pragya Obaidat, Mohammad S. Dangwal, Gagan Das, Ashok Kumar Wazid, Mohammad Sadoun, Balqies Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun248 002 India University of Science and Technology Beijing Beijing100083 China SRM University Kattankulathur603203 India Amity University Noida201301 India Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad500 032 India College of Engineering Al-Balqa' Applied University Al-Salt19117 Jordan
Phishing attacks pose a serious threat to online users by impersonatina trustworthy entities and stealing sensitive data. This can result in reputational damage, financial loss, ransomware, or additional spyware outbr... 详细信息
来源: 评论
Integrating Design Thinking into software Process Improvement  4
Integrating Design Thinking into Software Process Improvemen...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Khalid, Anum Hashmi, Amber Sarwar Kiani, Azaz Ahmed Muzammal, Syeda Mariam Jhanjhi, N.Z. Bibi, Ruqia Kumar, Sandeep Foundation University Department of Software Engineering Islamabad Pakistan Rawalpindi Women University Department of Software Engineering Rawalpindi Pakistan National University of Modern Languages Rawalpindi Pakistan School of Computer Science Taylor's University Faculty of Innovation and Technology Subang Jaya Malaysia University Institute of Information Technology Pir Mehr Ali Shah Arid Agriculture University Rawalpindi Pakistan Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India
The need for software improvement is growing widely due to the demand for technology development. The issues that arise by expanding the software processes in the workplace are expense, lack of understanding, time con... 详细信息
来源: 评论
AI Based Monitoring System for Social engineering  3
AI Based Monitoring System for Social Engineering
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Yapa, K. Udara, S.W.I. Wijayawardane, U.P.B. Kularatne, K.N.P. Navaratne, N.M.P.P. Dharmaphriya, W. G. V. U Sri Lanka Institute of Information Technology Dept. of Computer System Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Dept. of Computer Science and Software Engineering Malabe Sri Lanka
Social media is one of the most predominantly used online platforms by individuals across the world. However, very few of these social media users are educated about the adverse effects of obliviously using social med... 详细信息
来源: 评论
Exploring Text-Guided Single Image Editing for Remote Sensing Images
arXiv
收藏 引用
arXiv 2024年
作者: Han, Fangzhou Si, Lingyu Dong, Hongwei Zhang, Lamei Chen, Hao Du, Bo The Department of Information Engineering Harbin Institute of Technology Harbin China The National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences Beijing China The Hubei Luojia Laboratory National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China
Artificial intelligence generative content (AIGC) has significantly impacted image generation in the field of remote sensing. However, the equally important area of remote sensing image (RSI) editing has not received ... 详细信息
来源: 评论
Designing Secure Big Data Analytics Mechanism Using Authentication for Drones-Assisted Military Applications
Designing Secure Big Data Analytics Mechanism Using Authenti...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Sourav Saha Ashok Kumar Das Saksham Mittal Mohammad Wazid Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India
In this article, we present an efficient and secure communication scheme for military applications assisted by drones. The scheme involves authentication between the drones and their respective management server (MS),... 详细信息
来源: 评论