咨询与建议

限定检索结果

文献类型

  • 1,330 篇 会议
  • 893 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,403 篇 工学
    • 873 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 331 篇 信息与通信工程
    • 254 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 150 篇 电气工程
    • 133 篇 机械工程
    • 111 篇 生物工程
    • 106 篇 光学工程
    • 98 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 58 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
    • 55 篇 化学工程与技术
    • 50 篇 建筑学
    • 49 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 744 篇 理学
    • 351 篇 数学
    • 221 篇 物理学
    • 127 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 64 篇 化学
  • 352 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 104 篇 医学
    • 87 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 39 篇 经济学
  • 27 篇 教育学
  • 27 篇 农学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 53 篇 deep learning
  • 41 篇 computational mo...
  • 41 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 33 篇 accuracy
  • 31 篇 data mining
  • 31 篇 training
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 25 篇 hardware
  • 25 篇 convolutional ne...
  • 24 篇 internet of thin...
  • 24 篇 predictive model...
  • 23 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 robbi rahim
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 zhi zhang
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe

语言

  • 2,102 篇 英文
  • 79 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer-Computer Technology"
2238 条 记 录,以下是301-310 订阅
排序:
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Yizhou Sun, Zeyu Gong, Zhihao Hao, Dan MOE School of Computer Science Peking University Beijing China Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China
Currently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat. They... 详细信息
来源: 评论
Hybrid Power Generation Forecasting Using an Intellectual Evolutionary Energy-Preserve Rate Clustering Technique  1
收藏 引用
10th International Conference on Innovations in computer Science and engineering, ICICSE 2022
作者: Webber, Julian L. Jayagopal, Vellingiri Mehbodniya, Abolfazl Sengan, Sudhakar Velayutham, Priya Rangasamy, Rajasekar Stalin David, D. Doha Kuwait Department of Software & System Engineering School of Information Technology & Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli627152 India Department of Computer Science and Engineering Paavai Engineering College Tamil Nadu Namakkal637018 India Department of Computer Science and Engineering GITAM School of Technology GITAM University Karnataka Bengaluru561203 India Department of Information Technology Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Tamil Nadu Chennai600072 India
The significant growth of Wind Power (WP) has significant challenges due to the inconsistency and uncertainty of Wind Power Generation (WPG) to ensure the power system. Solar energy and WP calculation are great ways t... 详细信息
来源: 评论
FULLY POLARIZED RADAR TARGET DETECTION AND WAVEFORM OPTIMIZATION UNDER RAINY CONDITION
FULLY POLARIZED RADAR TARGET DETECTION AND WAVEFORM OPTIMIZA...
收藏 引用
IET International Radar Conference 2023, IRC 2023
作者: Li, Xinda Cheng, Xu Ju, Xinjie Wang, Xuesong Li, Jianbing College of Electronic Science and Technology National University of Defense Technology Hunan Changsha410073 China State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System Hunan Changsha410073 China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan430205 China Hubei Key Laboratory of Intelligent Robot Wuhan430205 China
Polarization and waveform optimization can significantly improve the detection ability of fully polarized radar. However, in practical scenarios, atmospheric particles frequently induce depolarization effects on radar... 详细信息
来源: 评论
Power Consumption Dashboard Using Iot
收藏 引用
Harbin Gongcheng Daxue Xuebao/Journal of Harbin engineering University 2023年 第10期44卷 327-335页
作者: Sowmiya, S. Sakthivel, P. Nithya, C. Ravi, P. RanjithKumar, M. Computer Science and Engineering Mahendra Engineering College Mahendrapuri Mallasamudhram Namakkal India Information Technology Sona College of Technology Salem India Computer Science and Business System Knowledge Institute of Technology Namakkal India Information Technology K S R Institute for Engineering and Technology Tiruchengode Namakkal India Computer Science and Business Systems Knowledge Institute of Technology Namakkal India
"Power Consumption Dash Board Using IoT" was developed using a web application. The planned system includes a home energy monitoring system and cloud service notifications. An Internet of Things (IoT) platfo... 详细信息
来源: 评论
Identifying Inaccurate Stories: Leveraging High Knowledge and Big Data  15
Identifying Inaccurate Stories: Leveraging High Knowledge an...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Khan, Mohammad Ahmar Verma, Pushpendra Kumar Ghaldiyal, Shivangi Balaji, N.V. Francis, G. Arun Patil, Swati Bula Department of Management Information System College of Commerce & Business Administration Dhofar University Country Sultanate of Oman Oman School of Computer Science and Applications IIMT University Meerut India Department of Computer Applications Invertis University Uttar Pradesh Bareilly India Department of Computer Science Karpagam Academy of Higher Education Tamil Nadu Coimbatore India Department of Electronics and Communication Engineering Karpagam College of Engineering Tamil Nadu Coimbatore India IT Vishwakarma Institute of Technology Pune India
Research on fake news has gained significant traction in a number of fields, We describe how the issue is tackled from a natural language processing standpoint in this research with the aim of developing identify fals... 详细信息
来源: 评论
Anomaly Detection in Microservice systems Using Autoencoders
Anomaly Detection in Microservice Systems Using Autoencoders
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Manul de Silva Sam Daniel Manith Kumarapeli Sashika Mahadura Lakmal Rupasinghe Chethana Liyanapathirana Computer System Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The adaptation of microservice architecture has increased massively during the last few years with the emergence of the cloud. Containers have become a common choice for microservices architecture instead of VMs (Virt... 详细信息
来源: 评论
Automatic License Plate Detection Using information Processing system Vision and Deep Learning  2
Automatic License Plate Detection Using Information Processi...
收藏 引用
2nd International Conference on Recent Trends in Microelectronics, Automation, Computing, and Communications systems, ICMACC 2024
作者: Sharma, Avinash Dwivedi, Ishita Dawar, Divya Saxena, Rini Barua, Tarkcshwar Goyel, Parul Chandigarh Engineering Chandigarh Group of Colleges Department of information processing system Science and Engineering Mohali140307 India Mohali140307 India Roorkee Institute of Technology Computer Science & Engineering Department Roorkee India M. M. Engineering College Maharishi Markandeshwar University CSE Department Mullana Haryana Ambala133207 India
The content of this probe is to overcome the current cognitive content with ALPR playacting, with a special accent on developing a dead and impelling playacting for distinguishing License plates from video film. The s... 详细信息
来源: 评论
Virtual-Source and Virtual-Swarm-Based Particle Swarm Optimizer for Large-Scale Multi-Source Location via Robot Swarm
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Zhang, JunQi Lin, YuXuan Zhou, MengChu Department of Computer Science and Technology the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai Electronic Transactions and Information Service Collaborative Innovation Center Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Multi-source location is a significant application in the field of robot swarm and is required to find all sources whose number and distribution are unknown in advance. With few parameters and fast search, Particle Sw... 详细信息
来源: 评论
Optimizing Quality of Service in IoT PORTAL through Strategic Bandwidth Allocation: A NEXUS access model  4
Optimizing Quality of Service in IoT PORTAL through Strategi...
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2024
作者: Manu, Mehul Adnan, Myasar Mundher Mudhafar, Mustafa Chaudhary, Diwakar Dhabalia, Dharmesh Al-Saidi, Imad Al-Din Hussein Sabah, Hawraa Ali Shendi, Adeeb Qassim Graphic Era Hill University Department of Allied Science Uttarakhand Bhimtal India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Al-Taff University College Department of Anesthesia Techniques and Intensive Care Kerbala56001 Iraq Mangalmay Institute of Management and Technology Greater Noida India Vishwakarma Institute of Information Technology Information Technology Department Pune India Al-kunooze University College Computer Engineer Department Basra Iraq National University of Science and Technology College of Technical Engineering Dhi Qar64001 Iraq Kut University College 'Business Administration Department wasit Al kut52001 Iraq
This paper, therefore, offers a paradigm that is specifically aimed at addressing the growing bandwidth requirements imposed by the Internet of Things: PDBA. This model will adaptively predict resource demands and net... 详细信息
来源: 评论