咨询与建议

限定检索结果

文献类型

  • 5,427 篇 期刊文献
  • 4,481 篇 会议
  • 38 册 图书

馆藏范围

  • 9,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,549 篇 工学
    • 3,169 篇 计算机科学与技术...
    • 2,522 篇 软件工程
    • 1,267 篇 信息与通信工程
    • 850 篇 控制科学与工程
    • 845 篇 电气工程
    • 718 篇 电子科学与技术(可...
    • 602 篇 生物工程
    • 599 篇 光学工程
    • 525 篇 生物医学工程(可授...
    • 441 篇 仪器科学与技术
    • 386 篇 化学工程与技术
    • 332 篇 核科学与技术
    • 329 篇 机械工程
    • 309 篇 动力工程及工程热...
    • 308 篇 网络空间安全
    • 297 篇 材料科学与工程(可...
  • 4,552 篇 理学
    • 2,428 篇 物理学
    • 1,364 篇 数学
    • 770 篇 生物学
    • 526 篇 化学
    • 498 篇 统计学(可授理学、...
    • 428 篇 地球物理学
  • 1,294 篇 管理学
    • 811 篇 管理科学与工程(可...
    • 494 篇 图书情报与档案管...
    • 334 篇 工商管理
  • 693 篇 医学
    • 514 篇 临床医学
    • 430 篇 基础医学(可授医学...
    • 293 篇 公共卫生与预防医...
    • 239 篇 药学(可授医学、理...
  • 278 篇 法学
    • 236 篇 社会学
  • 175 篇 农学
  • 129 篇 经济学
  • 74 篇 文学
  • 61 篇 教育学
  • 29 篇 军事学
  • 19 篇 艺术学
  • 3 篇 历史学
  • 2 篇 哲学

主题

  • 297 篇 accuracy
  • 280 篇 deep learning
  • 233 篇 hadron colliders
  • 226 篇 machine learning
  • 197 篇 real-time system...
  • 193 篇 feature extracti...
  • 176 篇 internet of thin...
  • 157 篇 computational mo...
  • 137 篇 optimization
  • 134 篇 training
  • 131 篇 convolutional ne...
  • 128 篇 support vector m...
  • 127 篇 security
  • 119 篇 predictive model...
  • 101 篇 reliability
  • 101 篇 artificial intel...
  • 91 篇 semantics
  • 89 篇 hadrons
  • 87 篇 galaxies
  • 83 篇 higgs bosons

机构

  • 887 篇 department of ph...
  • 860 篇 cavendish labora...
  • 825 篇 physikalisches i...
  • 824 篇 oliver lodge lab...
  • 578 篇 school of physic...
  • 472 篇 infn laboratori ...
  • 469 篇 infn sezione di ...
  • 456 篇 fakultät physik ...
  • 446 篇 infn sezione di ...
  • 434 篇 university of ch...
  • 428 篇 infn sezione di ...
  • 414 篇 iccub universita...
  • 414 篇 horia hulubei na...
  • 411 篇 department of ph...
  • 394 篇 school of physic...
  • 389 篇 school of physic...
  • 381 篇 nikhef national ...
  • 379 篇 imperial college...
  • 378 篇 center for high ...
  • 371 篇 h.h. wills physi...

作者

  • 270 篇 a. gomes
  • 256 篇 c. alexa
  • 256 篇 j. m. izen
  • 245 篇 g. bella
  • 245 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 c. amelung
  • 242 篇 s. chen
  • 235 篇 g. spigo
  • 233 篇 f. siegert
  • 219 篇 r. ströhmer
  • 219 篇 j. wang
  • 216 篇 y. tayalati
  • 214 篇 m. rijssenbeek
  • 210 篇 s. jin
  • 205 篇 g. gaudio
  • 204 篇 m. gandelman
  • 203 篇 t. gershon
  • 200 篇 s. mohapatra
  • 197 篇 d. golubkov

语言

  • 9,093 篇 英文
  • 756 篇 其他
  • 97 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Cyberspace Research and College of Computer Science and Technology"
9946 条 记 录,以下是111-120 订阅
排序:
Robust and Interpretable Vector Borne Disease Prediction in IoT-Enabled Edge Networks
Robust and Interpretable Vector Borne Disease Prediction in ...
收藏 引用
2024 IEEE Region 10 Symposium, TENSYMP 2024
作者: Doulani, Khushbu Sharma, Samarth Adhikari, Mainak Vijayalata, Y. Indian Institute of Information Technology Lucknow Department of Computer Science Lucknow India Indian Institute of Information Technology Lucknow Department of Computer Science and Artificial Intelligence Lucknow India School of Data Science Indian Institute of Science Education and Research Thiruvananthapuram Thiruvananthapuram India Vardhaman College of Engineering Department of Computer Science and Engineering Hyderabad India
Vector-borne diseases have created critical world-wide public health hazards that require innovative approaches for prevention and management. Within the context of IoT-enabled edge networks, this study offers a uniqu... 详细信息
来源: 评论
A Lightweight and Trustworthy Authentication Protocol for UAV Networks Based on PUF  24
A Lightweight and Trustworthy Authentication Protocol for UA...
收藏 引用
14th International Conference on Communication and Network Security, ICCNS 2024
作者: Zhu, Juntao Peng, Jin Wang, Long College of Computer Science Beijing University of Technology Beijing China The 6th Research Institute of China Electronics Corporation Beijing China
With the continuous development of drone remote sensing technology, drone networks have garnered widespread attention. The application of drones has expanded from military uses to industrial and civilian sectors, faci... 详细信息
来源: 评论
SSD object detection algorithm based on knowledge map
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第2期27卷 152-160页
作者: Huang, Li Wang, Xiaofeng Lu, Jianhua Hu, Wei Zhang, Changrong College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan China China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Hubei Wuhan China Key Laboratory of Metallurgical Equipment and Control Technology of the Ministry of Education Wuhan University of Science and Technology Hubei Wuhan China Precision Manufacturing Research Institute Research Centre for Biomimetic Robot and Intelligent Measurement and Control Wuhan University of Science and Technology Hubei Wuhan China
With the pervasive integration of artificial intelligence into all aspects of human life, talent emerges as a primary resource. Upon analysing the current state of talent training in higher education institutions, iss... 详细信息
来源: 评论
Design Thinking and Innovative Tool Use in Business Model
Design Thinking and Innovative Tool Use in Business Model
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Singhi, Nitika Verma, Ankush Agrawal, Atul Khan, Irfan Computer Science Engineering Shri Vaishnav Vidhyapeeth Vishwavidyalava Indore India Data Analytics and Information System Prestige Institute of Management and Research Indore India Computer Science Engineering Sushila Devi Bansal College of Technology Indore India Computer Science Engineering Bansal Institute of Science and Technology Bhopal India
In past few year designs thinking has worked on several new effective problem and has generated innovative solution for new business model. For the scenario of today's demand, to better understand how design think... 详细信息
来源: 评论
A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN
A Generic Blockchain-based Steganography Framework with High...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhuo Chen Liehuang Zhu Peng Jiang Jialing He Zijian Zhang School of Cyberspace Science and Technology Beijing Institute of Technology China College of Computer Science Chongqing University China
Blockchain-based steganography enables data hiding via encoding the covert data into a specific blockchain transaction field. However, previous works focus on the specific field-embedding methods while lacking a consi... 详细信息
来源: 评论
Managing Health Treatment by Optimizing Complex Lab-Developed Test Configurations: A Health Informatics Perspective
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 6251-6267页
作者: Uzma Afzal Tariq Mahmood Ali Mustafa Qamar Ayaz H.Khan Department of Computer Science Federal Urdu University of Arts Science and TechnologyKarachiPakistan Department of Computer Science Institute of Business AdministrationKarachiPakistan Department of Computer Science College of ComputerQassim UniversityBuraydahSaudi Arabia Computer Engineering Department King Fahd University of Petroleum and MineralsDhahranSaudi Arabia SDAIA-KFUPM Joint Research Center for Artificial Intelligence Dhahran31261Saudi Arabia
A complex Laboratory Developed Test(LDT)is a clinical test developed within a single *** is typically configured from many fea-ture constraints from clinical repositories,which are part of the existing Lab-oratory Inf... 详细信息
来源: 评论
SP-ADMM: a distributed optimization method of SFC placement for 5G-MEC networks  3
SP-ADMM: a distributed optimization method of SFC placement ...
收藏 引用
3rd International Conference on Algorithms, Microchips, and Network Applications, AMNA 2024
作者: Zhang, Zhibo Wang, Huiqiang Niu, Shuangyue Lv, Hongwu College of Computer Science and Technology Harbin Engineering University Harbin China AVIC Chengdu Aircraft Design and Research Institute Chengdu China
Recently, the combination of a service function chain (SFC) with network function virtualization (NFV) and software-defined networking (SDN) has provided customers with flexible and efficient services. The emergence o... 详细信息
来源: 评论
New MRA Schemes Based on the CRT for Polynomial Rings
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4671-4685页
作者: Yang, Jing Wang, Xianfang Xiang, Can Fu, Fang-Wei Xia, Shu-Tao Shandong Technology and Business University School of Computer Science and Technology Shandong Yantai264005 China Westone Cryptologic Research Center CETC Cyberspace Security Technology Company Ltd. Beijing100070 China South China Agricultural University College of Mathematics and Informatics Guangdong Guangzhou510642 China Nankai University Chern Institute of Mathematics LPMC Tianjin300071 China Tsinghua University Tsinghua Shenzhen International Graduate School Guangdong Shenzhen518055 China
At present, existing multi-receiver authentication (MRA) schemes can only handle situations where the capacities of all receivers in the schemes are the same. However, in reality, different receivers may need to have ... 详细信息
来源: 评论
Knowledge-Enhanced Recommendation System Design for Mechatronics IoT Cloud Platform  1
收藏 引用
5th International Conference on Artificial Intelligence in China, AIC 2023
作者: Dong, Shaohua Ma, Xinchun Fan, Xiaochao Wang, Shoutong College of Computer Science and Technology Xinjiang Normal University Urumqi830054 China XinJiang Electronic Research Institute Urumqi830013 China
In recent years, with the rapid development of the Internet and the continuous maturation of artificial intelligence technology, mechatronics has embraced the Internet of Things and is progressively advancing towards ... 详细信息
来源: 评论
Revolutionizing Content Identification: A Comprehensive Study on YouTube Live and Video-on-Demand Detection
Revolutionizing Content Identification: A Comprehensive Stud...
收藏 引用
2024 International Conference on Smart Systems for Electrical, Electronics, Communication and computer Engineering, ICSSEEC 2024
作者: Srija R, Keerthana Kavya, D. Agarwal, Viraj Krithik, R. Pranav, S. Arul Anand, N. Bhat, Raviraj Gunasekaran, Shyam Prabhu PSG College of Technology Department of Computer Science and Engineering Tamil Nadu Coimbatore India Samsung Research Institute Karnataka Bengaluru India
With the growing popularity of over-the-top (OTT) streaming services, distinguishing between live and video-on-demand (VoD) streams is becoming increasingly important for network operators and OEMs [1]. However, tradi... 详细信息
来源: 评论