咨询与建议

限定检索结果

文献类型

  • 1,336 篇 会议
  • 895 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,404 篇 工学
    • 873 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 331 篇 信息与通信工程
    • 254 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 150 篇 电气工程
    • 133 篇 机械工程
    • 111 篇 生物工程
    • 107 篇 光学工程
    • 98 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 58 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
    • 55 篇 化学工程与技术
    • 50 篇 建筑学
    • 49 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 745 篇 理学
    • 351 篇 数学
    • 221 篇 物理学
    • 128 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 64 篇 化学
  • 352 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 105 篇 医学
    • 88 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 39 篇 经济学
  • 28 篇 农学
  • 27 篇 教育学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 53 篇 deep learning
  • 41 篇 computational mo...
  • 41 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 34 篇 accuracy
  • 31 篇 data mining
  • 31 篇 training
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 25 篇 predictive model...
  • 25 篇 hardware
  • 25 篇 convolutional ne...
  • 24 篇 internet of thin...
  • 24 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 28 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 robbi rahim
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 zhi zhang
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe

语言

  • 2,110 篇 英文
  • 79 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer - Computer Technology"
2246 条 记 录,以下是81-90 订阅
排序:
Blockchain Driven Metaheuristic Route Planning in Secure Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 933-949页
作者: M.V.Rajesh T.Archana Acharya Hafis Hajiyev E.Laxmi Lydia Haya Mesfer Alshahrani Mohamed K Nour Abdullah Mohamed Mesfer Al Duhayyim Department of Computer Science and Engineering Aditya Engineering CollegeSurampalem533437India Department of Business Administration Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Accounting and Audit Azerbaijan State University of Economics(UNEC)BakuRepublic of Azerbaijan Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Research Centre Future University in EgyptNew Cairo11845Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Recently,Internet of Things(IoT)has been developed into a field of research and it purposes at linking many sensors enabling devices mostly to data collection and track *** sensor network(WSN)is a vital element of IoT... 详细信息
来源: 评论
OSAP‐Loss:Efficient optimization of average precision via involving samples after positive ones towards remote sensing image retrieval
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第4期8卷 1191-1212页
作者: Xin Yuan Xin Xu Xiao Wang Kai Zhang Liang Liao Zheng Wang Chia‐Wen Lin School of Computer Science and Technology Wuhan University of Science and TechnologyWuhanChina Hubei Province Key Laboratory of Intelligent Information Processing and Real‐time Industrial System Wuhan University of Science and TechnologyWuhanChina Nanyang Technological University SingaporeSingapore School of Computer Science Wuhan UniversityWuhanChina Department of Electrical Engineering Industrial Technology Research InstituteNational Tsing Hua UniversityHsinchuChina
In existing remote sensing image retrieval(RSIR)datasets,the number of images among different classes varies dramatically,which leads to a severe class imbalance *** studies propose to train the model with the ranking... 详细信息
来源: 评论
Earthquake Prediction Using Deep Neural Networks  8
Earthquake Prediction Using Deep Neural Networks
收藏 引用
8th International Conference on Advanced Computing and Communication systems, ICACCS 2022
作者: Bhargava, Bharat Pasari, Sumanta Birla Institute of Technology and Science Pilani Department of Computer Science and Information System Rajasthan Pilani India
Reliable prediction of earthquakes has numerous societal and engineering benefits. In recent years, the exponentially rising volume of seismic data has led to the development of several automatic earthquake detection ... 详细信息
来源: 评论
Social Media Multi-Emotion Detection  2
Social Media Multi-Emotion Detection
收藏 引用
2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025
作者: Ibrahiem, Soha S. El-Sayed Mohammed, Bahy Ibrahim El Sayed Ahmed, Mohammed Ahmed Elbahnasy, Khaled Menofia University Computality R&D System Analyst & Nlp Researcher Faculty of Science Menofia Egypt Web Developer Cairo Egypt Software Engineer Ekad Soft Cairo Egypt Jeddah International College Computer Science and Information Technology Department Jeddah Saudi Arabia
Natural language in social media is often ambiguous, carrying diverse perspectives that are critical for opinion analysis. With vast amounts of unstructured data, particularly on platforms like Twitter, it is impracti... 详细信息
来源: 评论
A Deep Learning Based Sentiment Analytic Model for the Prediction of Traffic Accidents
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 1599-1615页
作者: Nadeem Malik Saud Altaf Muhammad Usman Tariq Ashir Ahmed Muhammad Babar University Institute of Information Technology PMAS Arid Agriculture UniversityRawalpindi46000Pakistan Department of Marketing Operationsand Information SystemAbu Dhabi UniversityAbu Dhabi6844United Arab Emirates College of Computer and Information Sciences Prince Sultan UniversityRiyadh11442Saudi Arabia Robotics and Internet of Things Lab Prince Sultan UniversityRiyadh11442Saudi Arabia
The severity of traffic accidents is a serious global concern,particularly in developing *** the main causes and contributing circumstances may reduce the severity of traffic *** exist many machine learning models and... 详细信息
来源: 评论
Fine classification of rice paddy using multitemporal compact polarimetric SAR C band data based on machine learning methods
收藏 引用
Frontiers of Earth Science 2024年 第1期18卷 30-43页
作者: Xianyu GUO Junjun YIN Kun LI Jian YANG Huimin ZOU Fukun YANG School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Aerospace Information Research Institute Chinese Academy of SciencesBeijing 100094China Department of Electronic Engineering Tsinghua UniversityBeijing 100084China College of Global Change and Earth System Science Beijing Normal UniversityBeijing 100875China
Rice is an important food crop for human *** distinguishing different varieties and sowing methods of rice on a large scale can provide more accurate information for rice growth monitoring,yield estimation,and phenolo... 详细信息
来源: 评论
Specificity-preserving RGB-D saliency detection
收藏 引用
Computational Visual Media 2023年 第2期9卷 297-317页
作者: Tao Zhou Deng-Ping Fan Geng Chen Yi Zhou Huazhu Fu School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China Key Laboratory of System Control and Information Processing Ministry of EducationShanghaiChina Computer Vision Lab ETH Z¨urichZ¨urichSwitzerland School of Computer Science and Engineering Northwestern Polytechnical UniversityXi’anChina School of Computer Science and Engineering Southeast UniversityNanjingChina Inception Institute of Artificial Intelligence Abu DhabiUnited Arab Emirates
Salient object detection(SOD)in RGB and depth images has attracted increasing research *** RGB-D SOD models usually adopt fusion strategies to learn a shared representation from RGB and depth modalities,while few meth... 详细信息
来源: 评论
Prediction of Geopolymer Concrete Compressive Strength Using Convolutional Neural Networks
收藏 引用
computer Modeling in engineering & Sciences 2024年 第5期139卷 1455-1486页
作者: Kolli Ramujee Pooja Sadula Golla Madhu Sandeep Kautish Abdulaziz S.Almazyad Guojiang Xiong Ali Wagdy Mohamed Department of Civil Engineering VNR Vignana Jyothi Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Information Technology VNR Vignana Jyothi Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Computer Science LBEF Campus(Asia Pacific University of Technology&InnovationMalaysia)Kathmandu44600Nepal Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmmanJordan
Geopolymer concrete emerges as a promising avenue for sustainable development and offers an effective solution to environmental *** attributes as a non-toxic,low-carbon,and economical substitute for conventional cemen... 详细信息
来源: 评论
Deploying Healthcare Monitoring system For Elderly Patient Care using IoT and Neural Network Techniques  3
Deploying Healthcare Monitoring System For Elderly Patient C...
收藏 引用
3rd IEEE World Conference on Applied Intelligence and Computing, AIC 2024
作者: Singh, Jagendra Garg, Neha Sethuraman, Ravikumar Ghosh, Soumi Kumar, A Hemantha Kolluri, Raju Bennett University School of Computer Science Engineering and Technology Greater Noida India Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science & Engineering Chennai India Maharaja Agrasen Institute of Technology Department of Information Technology Delhi India Annamacharya Institute of Technology and Sciences Department of Mechanical Engineer India Narasaraopet Engineering College Department of Electronics and Communication Engineering Narasaraopet India
Utilizing Internet of Things (IoT) technology in the healthcare sector can revolutionize the care provided to individuals. This study illustrates the application of IoT in ensuring continuous healthcare for elderly pa... 详细信息
来源: 评论
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs: Precision in Vulnerability Detection: Advanced Slicing Techniques for Binary Program Analysis  7
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability ...
收藏 引用
7th International Conference on computer Science and Artificial Intelligence, CSAI 2023
作者: Chukkol, Abdulrahman Hamman Adama Luo, Senlin Yunusa, Haruna Yusuf, Abdulganiyu Abdu Mohammed, Abulfatahi School of Information and Electronics Beijing Institute of Technology Beijing China Information System and Security and Countermeasures Experimental Center Beijing Institute of Technology Beijing China School of Automation Science and Electrical Engineering Beihang University Beijing China School of Computer Science Beijing Institute of Technology Beijing China School of Management and Information Technology Modibbo Adama University Yola Nigeria
Identifying vulnerabilities in binary code with precision is a critical area of study in the field of software security. Most existing techniques fail to pinpoint the vulnerability's exact location, due to the ext... 详细信息
来源: 评论