咨询与建议

限定检索结果

文献类型

  • 1,336 篇 会议
  • 895 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,404 篇 工学
    • 873 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 331 篇 信息与通信工程
    • 254 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 150 篇 电气工程
    • 133 篇 机械工程
    • 111 篇 生物工程
    • 107 篇 光学工程
    • 98 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 58 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
    • 55 篇 化学工程与技术
    • 50 篇 建筑学
    • 49 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 745 篇 理学
    • 351 篇 数学
    • 221 篇 物理学
    • 128 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 64 篇 化学
  • 352 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 105 篇 医学
    • 88 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 39 篇 经济学
  • 28 篇 农学
  • 27 篇 教育学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 53 篇 deep learning
  • 41 篇 computational mo...
  • 41 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 34 篇 accuracy
  • 31 篇 data mining
  • 31 篇 training
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 25 篇 predictive model...
  • 25 篇 hardware
  • 25 篇 convolutional ne...
  • 24 篇 internet of thin...
  • 24 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 28 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 robbi rahim
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 zhi zhang
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe

语言

  • 2,110 篇 英文
  • 79 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer-Computer Technology"
2246 条 记 录,以下是391-400 订阅
排序:
Interior Scene Intelligent Generated for Smart Homes Based on GAN-ID Algorithms
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第2期9卷 1046-1055页
作者: Zhang, Fu-Quan Ma, Lin-Juan Zhou, Jun-Xian Wang, Run-Hong Zhang, Guang-Zhen College of Computer and Control Engineering Minjiang University Fuzhou China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu China Fuzhou Technology Innovation Center of Intelligent Manufacturing Information System Minjiang University Fuzhou China Fujian Province University Fuzhou China School of Computer Science and Technology Beijing Institute of Technology Beijing China Minjiang University Fuzhou China Information Media School of Tianjin Technician Institute of Mechanical & Electrical Technology Tianjin China
The purpose of this paper is to present a new GAN-ID algorithm to gener-ate interior scene intelligently based on Artificial Intelligence of Things (AIoT). Although great progress has been made when GAN algorithm appl... 详细信息
来源: 评论
Optimal Selection of Software Reliability Growth Models: A CRITIC-CODAS Technique  10
Optimal Selection of Software Reliability Growth Models: A C...
收藏 引用
10th International Conference on Reliability, Infocom Technologies and Optimization ,Trends and Future Directions, ICRITO 2022
作者: Singh, Veenu Kumar, Vijay Singh, V.B Amity Institute of Information Technology Amity University Uttar Pradesh Noida India Amity University Department of Applied Mathematics Aias Uttar Pradesh Noida India School of Computer and System Sciences Jawaharlal Nehru University New Delhi India
A plethora of software reliability growth models (SRGMs) have been proposed in the last forty years. SRGMs are the mathematical relation which are helpful in predicting the remaining number of faults, software release... 详细信息
来源: 评论
Performance Analysis of IDS_MDL Algorithm to Predict Intrusion Detection for IoT Applications
Performance Analysis of IDS_MDL Algorithm to Predict Intrusi...
收藏 引用
National Conference on Radio Science (NSRC)
作者: Walaa Adel Mahmoud Mohamad Fathi Hesham El-Badawy Rowayda Sadek Information System Department College of Computing & Information Technology Arab Academy for Science Technology and Maritime Transport Cairo Egypt National Telecommunication Institute Cairo Egypt Faculty of Computer and Artificial Intelligence Helwan University Cairo Egypt
In the last year, many modern attacks have targeted Internet of Things (IoT) devices. IoT botnet attacks are the most common. Despite the plethora of detection and prevention systems for cyberattacks, a security mecha...
来源: 评论
Improving Smart Contract Security with Contrastive Learning-Based Vulnerability Detection
Improving Smart Contract Security with Contrastive Learning-...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Yizhou Chen Zeyu Sun Zhihao Gong Dan Hao Key Lab of HCST (PKU) MOE School of Computer Science Peking University Beijing China Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China
Currently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat. They... 详细信息
来源: 评论
Multi-party secure communication using blockchain over 5G
Multi-party secure communication using blockchain over 5G
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Archana, K. Kareem, Z.H. Al-Farhani, Liwa H. Bagyalakshmi, K. Jenvi, Ignatia K. Majella Kumar, Ashok Department of Computer Engineering Pimpri Chinchwad College of Engineering and Research Maharashtra Pune India Medical Instrumentation Techniques Engineering Department Al-Mustaqbal University College Babylon Iraq System Analysis Control and Information Processing dep Academy of Engineering RUDN University Moscow Russia Sri Ranganathar Institute of Engineering and Technology Coimbatore India Mathematics Department Saveetha School of Engineering SIMATS Saveetha Nagar Chennai India Department of Computer Science Banasthali Vidyapith Rajasthan Banasthali India
One of the most critical problems facing the blockchain technology industry right now is how to protect the privacy of users’ data on the blockchain in a way that is both effective and cheap. Based on the Pedersen co... 详细信息
来源: 评论
Query-Centered Temporal Community Search via Time-Constrained Personalized PageRank
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Longlong Yuan, Pingpeng Li, Rong-Hua Zhu, Chunxue Qin, Hongchao Jin, Hai Jia, Tao College of Computer and Information Science Southwest University Chongqing400715 China National Engineering Research Center for Big Data Technology and System Service Computing Technology and System Laboratory Cluster and Grid Computing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technololgy Beijing Institute of Technology Beijing100081 China
Existing temporal community search suffers from two defects: (i) they ignore the temporal proximity between the query vertex q and other vertices but simply require the result to include q. Thus, they find many tempor... 详细信息
来源: 评论
Short-term multi-step-ahead sector-based traffic flow prediction based on the attention-enhanced graph convolutional LSTM network (AGC-LSTM)
收藏 引用
Neural Computing and Applications 2024年 1-20页
作者: Zhang, Ying Xu, Shimin Zhang, Linghui Jiang, Weiwei Alam, Sameer Xue, Dabin College of General Aviation and Flight Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Air Traffic Management System Nanjing China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Air Traffic Management Research Institute School of Mechanical & ampAerospace Engineering Nanyang Technological University Singapore Singapore Department of Land Surveying and Geo-Informatics The Hong Kong Polytechnic University Hong Kong
Accurate sector-based air traffic flow predictions are essential for ensuring the safety and efficiency of the air traffic management (ATM) system. However, due to the inherent spatial and temporal dependencies of air... 详细信息
来源: 评论
Deploying Healthcare Monitoring system For Elderly Patient Care using IoT and Neural Network Techniques
Deploying Healthcare Monitoring System For Elderly Patient C...
收藏 引用
Applied Intelligence and Computing (AIC), IEEE World Conference on
作者: Jagendra Singh Neha Garg Ravikumar Sethuraman Soumi Ghosh A Hemantha Kumar Raju Kolluri School of Computer Science Engineering and Technology Bennett University Greater Noida India Department of Computer Science & Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Information Technology Maharaja Agrasen Institute of Technology Delhi India Department of Mechanical Engineer Annamacharya Institute of Technology and Sciences India Department Of Electronics and Communication Engineering Narasaraopet Engineering College Narasaraopet India
Utilizing Internet of Things (IoT) technology in the healthcare sector can revolutionize the care provided to individuals. This study illustrates the application of IoT in ensuring continuous healthcare for elderly pa... 详细信息
来源: 评论
Analysis of Eavesdropping Region in Hybrid mmWave-Microwave Wireless systems
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Qu, Qianyue Zhang, Yuanyu Kasahara, Shoji Graduate School of Information Science Nara Institute of Science and Technology Ikoma Japan School of Computer Science and Technology Xidian University Xi’an China Shannxi Key Laboratory of Network and System Security Beijing Sunwise Information Technology Ltd Beijing China
Hybrid communication systems, where millimeter-wave (mmWave) links coexist with microwave links, have been an essential component in the fifth-generation (5G) wireless networks. Nevertheless, the open feature of the w... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection  41
Size-Invariance Matters: Rethinking Metrics and Losses for I...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论