咨询与建议

限定检索结果

文献类型

  • 8,178 篇 会议
  • 5,053 篇 期刊文献
  • 165 册 图书

馆藏范围

  • 13,396 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,746 篇 工学
    • 4,088 篇 计算机科学与技术...
    • 3,313 篇 软件工程
    • 1,659 篇 控制科学与工程
    • 1,500 篇 信息与通信工程
    • 1,235 篇 电子科学与技术(可...
    • 1,183 篇 电气工程
    • 822 篇 机械工程
    • 715 篇 生物工程
    • 671 篇 仪器科学与技术
    • 633 篇 光学工程
    • 613 篇 生物医学工程(可授...
    • 526 篇 化学工程与技术
    • 452 篇 材料科学与工程(可...
    • 417 篇 动力工程及工程热...
    • 326 篇 交通运输工程
    • 317 篇 航空宇航科学与技...
    • 282 篇 安全科学与工程
    • 262 篇 力学(可授工学、理...
  • 4,761 篇 理学
    • 2,081 篇 数学
    • 1,790 篇 物理学
    • 825 篇 生物学
    • 705 篇 统计学(可授理学、...
    • 689 篇 系统科学
    • 546 篇 化学
  • 1,762 篇 管理学
    • 1,282 篇 管理科学与工程(可...
    • 631 篇 工商管理
    • 547 篇 图书情报与档案管...
  • 624 篇 医学
    • 538 篇 临床医学
    • 425 篇 基础医学(可授医学...
  • 272 篇 经济学
    • 272 篇 应用经济学
  • 262 篇 法学
  • 142 篇 农学
  • 131 篇 教育学
  • 39 篇 文学
  • 36 篇 军事学
  • 24 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 deep learning
  • 167 篇 computational mo...
  • 165 篇 optimization
  • 162 篇 control systems
  • 155 篇 laboratories
  • 151 篇 machine learning
  • 150 篇 information syst...
  • 147 篇 systems engineer...
  • 136 篇 wireless communi...
  • 129 篇 neural networks
  • 125 篇 simulation
  • 124 篇 information tech...
  • 121 篇 feature extracti...
  • 118 篇 internet of thin...
  • 113 篇 data mining
  • 112 篇 electronic mail
  • 104 篇 predictive model...
  • 103 篇 accuracy
  • 102 篇 educational inst...
  • 99 篇 support vector m...

机构

  • 137 篇 department of la...
  • 91 篇 school of comput...
  • 72 篇 graduate school ...
  • 65 篇 nagoya universit...
  • 51 篇 department of el...
  • 49 篇 center for space...
  • 44 篇 school of inform...
  • 44 篇 ieee
  • 41 篇 department of ph...
  • 40 篇 department of ph...
  • 38 篇 center for astro...
  • 37 篇 graduate school ...
  • 37 篇 astroparticle ph...
  • 36 篇 the graduate sch...
  • 36 篇 heliospheric phy...
  • 35 篇 department of in...
  • 34 篇 graduate school ...
  • 34 篇 department of ph...
  • 33 篇 department of as...
  • 32 篇 nambu yoichiro i...

作者

  • 124 篇 ozawa s.
  • 90 篇 uchihori y.
  • 82 篇 leonard barolli
  • 73 篇 katayose y.
  • 68 篇 jui c.c.h.
  • 67 篇 oshima a.
  • 67 篇 bergman d.r.
  • 66 篇 kim j.h.
  • 66 篇 allen m.
  • 66 篇 ishii t.
  • 64 篇 shiomi a.
  • 62 篇 tamura t.
  • 60 篇 kim s.w.
  • 59 篇 matsuyama t.
  • 58 篇 wong t.
  • 56 篇 tsuda r.
  • 55 篇 kawakubo y.
  • 55 篇 fatos xhafa
  • 54 篇 ohnishi m.
  • 53 篇 cherry m.l.

语言

  • 12,478 篇 英文
  • 652 篇 其他
  • 196 篇 中文
  • 75 篇 日文
  • 4 篇 法文
  • 1 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Engineering of Systems and Information Technology"
13396 条 记 录,以下是21-30 订阅
排序:
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Network traffic classification:Techniques,datasets,and challenges
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 676-692页
作者: Ahmad Azab Mahmoud Khasawneh Saed Alrabaee Kim-Kwang Raymond Choo Maysa Sarsour College of Information Technology and Systems Victorian Institute of TechnologyAustralia College of Engineering Al Ain UniversityAbu DhabiUnited Arab Emirates Information Systems and Security College of ITUnited Arab Emirates UniversityAl Ain15551United Arab Emirates Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78260USA School of Photovoltaic and Renewable Energy Engineering University of New South WalesSydneyNSW2052Australia
In network traffic classification,it is important to understand the correlation between network traffic and its causal application,protocol,or service group,for example,in facilitating lawful interception,ensuring the... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Deep Learning-Based Enhanced Object Detection for Humanoid Robots  1
Deep Learning-Based Enhanced Object Detection for Humanoid R...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Negi, Akshit Patel, Harshita Vellore Institute of Technology School of Computer Science Engineering & Information Systems Vellore India
In the contemporary world, humanoid robots are likely to play a key role in various fields, including health care, domestic service, hospitality, business, and military and security activities. The robots are employed... 详细信息
来源: 评论
Recommendation System using Emotion Detection  3
Recommendation System using Emotion Detection
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Susindra, S. Sweta, B. Keerthikha Shri, R. Brindha, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The need for a personalized user experience brought recommendation systems to the forefront of digital innovation. However, traditional approaches tend to often forget human emotions, which represent a critical driver... 详细信息
来源: 评论
Fuzzing:Progress,Challenges,and Perspectives
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1-29页
作者: Zhenhua Yu Zhengqi Liu Xuya Cong Xiaobo Li Li Yin Institute of Systems Security and Control College of Computer Science and TechnologyXi'an University of Science and TechnologyXi'an710054China School of Mathematics and Information Science Baoji University of Arts and SciencesBaoji721013China Institute of Systems Engineering Macao University of Science and TechnologyTaipaMacaoChina
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi... 详细信息
来源: 评论
Monetary Loan Eligibility Prediction using Logistic Regression Algorithm  2
Monetary Loan Eligibility Prediction using Logistic Regressi...
收藏 引用
2nd International Conference on Emerging Trends in information technology and engineering, ic-ETITE 2024
作者: Deepa, M. Pal, Siddhartha Ghusey, Vaishnavi Prashant School of ComputerScience Engineering and Information Systems Vellore Institute of Technology Vellore India
In the banking sector, predicting customer loan eligibility is a crucial task. This paper presents a study of using machine learning algorithms to predict loan eligibility of customers based on credit history, income,... 详细信息
来源: 评论
Event-Triggered Robust Parallel Optimal Consensus Control for Multiagent systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 40-53页
作者: Qinglai Wei Shanshan Jiao Qi Dong Fei-Yue Wang IEEE the Institute of Systems Engineering Macau University of Science and Technology the State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences the School of Artificial Intelligence University of Chinese Academy of Sciences China Academy of Electronics and Information Technology the State Key Laboratory of Multimodal Artificial Intelligence Systems the School of Artificial Intelligence University of Chinese Academy of Sciences
This paper highlights the utilization of parallel control and adaptive dynamic programming(ADP) for event-triggered robust parallel optimal consensus control(ETRPOC) of uncertain nonlinear continuous-time multiagent s... 详细信息
来源: 评论
Analysis of community question-answering issues via machine learning and deep learning:State-of-the-art review
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第1期8卷 95-117页
作者: Pradeep Kumar Roy Sunil Saumya Jyoti Prakash Singh Snehasish Banerjee Adnan Gutub Department of Computer Science and Engineering Indian Institute of Information TechnologySuratIndia Indian Institute of Information Technology DharwadIndia Department of Computer Science and Engineering National Institute of TechnologyPatnaIndia The York Management School University of YorkYorkUK Computer Engineering Department College of Computer&Information SystemsUmm Al-Qura UniversityMakkahSaudi Arabia
Over the last couple of decades,community question-answering sites(CQAs)have been a topic of much academic *** have often leveraged traditional machine learning(ML)and deep learning(DL)to explore the ever-growing volu... 详细信息
来源: 评论
Enhancing Automated Android Application Security through Hybrid Static and Dynamic Analysis Techniques  6
Enhancing Automated Android Application Security through Hyb...
收藏 引用
6th International Congress on Human-Computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Manukulasooriya, G.E. Munasingha, R.S.I. Fernando, Harinda Uthpali, H.K.I. Yeshani, A.V.S.H. Siriwardana, Deemantha Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth... 详细信息
来源: 评论