咨询与建议

限定检索结果

文献类型

  • 1,330 篇 会议
  • 907 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,252 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,418 篇 工学
    • 879 篇 计算机科学与技术...
    • 682 篇 软件工程
    • 335 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 157 篇 电气工程
    • 135 篇 机械工程
    • 111 篇 生物工程
    • 110 篇 光学工程
    • 100 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 59 篇 动力工程及工程热...
    • 58 篇 材料科学与工程(可...
    • 58 篇 化学工程与技术
    • 58 篇 交通运输工程
    • 50 篇 建筑学
    • 50 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 754 篇 理学
    • 354 篇 数学
    • 227 篇 物理学
    • 127 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 66 篇 化学
  • 355 篇 管理学
    • 231 篇 管理科学与工程(可...
    • 136 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 104 篇 医学
    • 87 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 40 篇 经济学
  • 27 篇 教育学
  • 27 篇 农学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 54 篇 deep learning
  • 42 篇 computational mo...
  • 42 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 33 篇 accuracy
  • 32 篇 training
  • 31 篇 data mining
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 26 篇 convolutional ne...
  • 25 篇 hardware
  • 24 篇 internet of thin...
  • 24 篇 predictive model...
  • 23 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 robbi rahim
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe
  • 8 篇 li jiangmeng

语言

  • 2,113 篇 英文
  • 80 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer-Computer Technology"
2252 条 记 录,以下是151-160 订阅
排序:
Combating Digital Deception: Machine Learning Approaches for Detecting Political Misinformation and Clickbait on Social Media  6
Combating Digital Deception: Machine Learning Approaches for...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Harindi, Dewmini Perera, Nirmal Liyanage, Chamath Dematagoda, Hirushini Fernando, Harinda Rathnayake, Samadhi Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer System Engineering Malabe Sri Lanka
This paper presents machine learning-based strategies for mitigating the problem of misinformation in social media, with a special focus on political misinformation detection and clickbait detection. The following res... 详细信息
来源: 评论
AI-Based Child Care Parental Control system  4
AI-Based Child Care Parental Control System
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Jayasekara, Udara Maniyangama, Hansindu Vithana, Kalhan Weerasinghe, Tharana Wijekoon, Janaka Panchendrarajan, Rrubaa Department of Computer Science and Software Engineering Sri Lanka Institute of Information Technology Sri Lanka Department of Computer System Engineering Sri Lanka Institute of Information Technology Sri Lanka
Due to the prevalence of the COVID-19 epidemic around the globe, children were compelled to engage in remote learning through online platforms, hence mobile phone has become one of their predominant devices. Mobile de... 详细信息
来源: 评论
Sagittarius: Floating Self Navigating Robot for Monitor the Water Quality of Rural Reservoirs  6
Sagittarius: Floating Self Navigating Robot for Monitor the ...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Pedige, Nishan Ilandara Abeywarna, Thaveesha Amarasinge, Randheera Bandara, Menuka Nawarathna Javakody, Anuradha Gamage, Narmada Sri Lanka Institute of Information Technology Department of Computer System Engineering Malabe Sri Lanka
This paper proposes an optimal solution for monitoring water quality in Sri Lanka, where reservoirs are essential for daily life and agriculture, especially in rural areas. Despite its importance, 3.6 million communit... 详细信息
来源: 评论
Matched design method for concatenated trellis-coded modulation
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND computer SCIENCES 1996年 第11期E79A卷 1911-1917页
作者: Wadayama, T Wakasugi, K Kasahara, M Faculty of Computer Science and System Engineering Okayama Prefectural University Soja-shi 719-11 Japan Department of Electronics and Information Science Kyoto Institute of Technology Kyotoshi 606 Japan
A new design method, which is referred to as the matched design method, for concatenated trellis-coded modulation (TCM) is presented. Most of the conventional concatenated TCM employs TCM designed to maximize the mini... 详细信息
来源: 评论
A self learning VLSI lab along with web-based platform to design schematics and layouts
A self learning VLSI lab along with web-based platform to de...
收藏 引用
International Conference on technology for Education
作者: Sharma, Shashank Azeemuddin, Syed Anwar, Mohd Computer Science Engineering Department International Institute of Information Technology Hyderabad India Center for VLSI and Embedded System Technology International Institute of Information Technology Hyderabad India
We present a web-based environment along with an interactive interface for VLSI schematic design, simulation, and layout design. It consist of 10 experiments starting from transistor level design of inverter, then som... 详细信息
来源: 评论
Low-cost video-based air quality estimation system using structured deep learning with selective state space modeling
收藏 引用
Environment International 2025年 199卷 109496页
作者: Ahmed, Maqsood Zhang, Xiang Shen, Yonglin Ahmed, Tanveer Ali, Shahid Ali, Ayaz Gulakhmadov, Aminjon Nam, Won-Ho Chen, Nengcheng National Engineering Research Center of Geographic Information System School of Geography and Information Engineering China University of Geosciences Wuhan430074 China Department of Computer Science School of Engineering and Digital Sciences Nazarbayev University Astana Kazakhstan Software College Northeastern University Shenyang110169 China Department of Cybernetics Nanotechnology and Data Processing Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 16 Gliwice44-100 Poland Research Center of Ecology and Environment in Central Asia Xinjiang Institute of Ecology and Geography Chinese Academy of Sciences Urumqi830011 China Institute of Water Problems Hydropower and Ecology of the National Academy of Sciences of Tajikistan Dushanbe734042 Tajikistan School of Social Safety and Systems Engineering Institute of Agricultural Environmental Science National Agricultural Water Research Center Hankyong National University Anseong Korea Republic of
Air quality is crucial for both public health and environmental sustainability. An efficient and cost-effective model is essential for accurate air quality predictions and proactive pollution control. However, existin... 详细信息
来源: 评论
Cluster-Based Saliency-Guided Content-Aware Image Retargeting
收藏 引用
Journal of Electronic Science and technology 2017年 第2期15卷 141-146页
作者: Li-Wei Kang Ching-Yu Tseng Chao-Long Jheng Ming-Fang Weng Chao-Yung Hsu Graduate School of Engineering Science and Technology and the Department of Computer Science and Information Engineering MPI Corporation Hsinchu Changing Information Technology Inc.Hsinchu 308 Institute for Information Industry Taipei 106 automation and Instrumentation System Development Sec. China Steel CorporationKaohsiung 81233
Straightforward image resizing operators without considering image contents (e.g., uniform scaling) cannot usually produce satisfactory results, while content-aware image retargeting aims to arbitrarily change image... 详细信息
来源: 评论
Brain Tumor Detection Using Image Processing  5
Brain Tumor Detection Using Image Processing
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Wijerathna, Udari Dissanayake, Nimavi Nimasha, Dinithi Senarathne, Udara Weerasinghe, Lokeesha Kahandawaarachchi, Chathurangika Sri Lanka Institute of Information Technology Faculty of Computing Dept of Computer System Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Dept of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Dept of Computer System Network Engineering Malabe Sri Lanka
Abnormal formation of cells in a layer. The brain is known as the brain cancer complex, and a brain cancer detection system is needed to detect cancer in its early stages Phase. As a result, the primary goal of this i... 详细信息
来源: 评论
Load balance controlling algorithm on unstructured P2P network
Load balance controlling algorithm on unstructured P2P netwo...
收藏 引用
2010 International Conference on Educational and Network technology, ICENT 2010
作者: Xu, Lijun Li, Xueyong Gao, Guohong Institute of Computer and Information Engineering Xinxiang University Henan Xinxiang 453003 China Henan Institute of Science and Technology School of Information Engineer Xinxiang 453003 China
To find hubs correctly on unstructured P2P network, considering different ability for different nodes, this paper imported load degree for nodes and takes nodes possessing high load degree as heavy ones, then proposed... 详细信息
来源: 评论
Cluster key scheme based on bilinear pairing for wireless sensor networks  4th
Cluster key scheme based on bilinear pairing for wireless se...
收藏 引用
4th International Conference on computer engineering and Networks, CENet2014
作者: Liu, Xiaoming Zhao, Qisheng Information Center Huaihai Institute of Technology LianyungangJiangsu222005 China Computer Engineer College Huaihai Institute of Technology LianyungangJiangsu222005 China
The past security policy about public key management strongly relied on the key matrix which was preset by the base station or generated by the algorithm embedded in the nodes, then to exchange the public key with oth... 详细信息
来源: 评论