咨询与建议

限定检索结果

文献类型

  • 163,773 篇 会议
  • 90,769 篇 期刊文献
  • 1,641 册 图书

馆藏范围

  • 256,183 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 158,931 篇 工学
    • 98,813 篇 计算机科学与技术...
    • 79,826 篇 软件工程
    • 39,151 篇 信息与通信工程
    • 25,773 篇 控制科学与工程
    • 22,683 篇 电子科学与技术(可...
    • 22,013 篇 电气工程
    • 16,014 篇 生物工程
    • 13,523 篇 机械工程
    • 13,245 篇 光学工程
    • 11,574 篇 生物医学工程(可授...
    • 11,005 篇 化学工程与技术
    • 10,233 篇 仪器科学与技术
    • 8,683 篇 动力工程及工程热...
    • 8,507 篇 材料科学与工程(可...
    • 5,724 篇 网络空间安全
    • 5,670 篇 交通运输工程
    • 5,455 篇 安全科学与工程
  • 90,044 篇 理学
    • 43,814 篇 数学
    • 30,811 篇 物理学
    • 18,145 篇 生物学
    • 13,999 篇 统计学(可授理学、...
    • 11,264 篇 化学
    • 9,461 篇 系统科学
  • 39,577 篇 管理学
    • 25,100 篇 管理科学与工程(可...
    • 16,059 篇 图书情报与档案管...
    • 10,194 篇 工商管理
  • 11,281 篇 医学
    • 9,209 篇 临床医学
    • 7,985 篇 基础医学(可授医学...
    • 4,890 篇 药学(可授医学、理...
  • 6,156 篇 法学
    • 4,987 篇 社会学
  • 4,107 篇 经济学
  • 3,369 篇 农学
  • 2,664 篇 教育学
  • 1,094 篇 文学
  • 721 篇 军事学
  • 493 篇 艺术学
  • 34 篇 哲学
  • 25 篇 历史学

主题

  • 6,476 篇 feature extracti...
  • 5,901 篇 accuracy
  • 5,257 篇 deep learning
  • 5,033 篇 training
  • 4,822 篇 computational mo...
  • 4,678 篇 computer science
  • 4,036 篇 machine learning
  • 3,481 篇 optimization
  • 3,103 篇 data mining
  • 3,077 篇 predictive model...
  • 2,886 篇 semantics
  • 2,764 篇 data models
  • 2,701 篇 neural networks
  • 2,699 篇 support vector m...
  • 2,654 篇 real-time system...
  • 2,542 篇 internet of thin...
  • 2,501 篇 educational inst...
  • 2,499 篇 convolutional ne...
  • 2,287 篇 artificial intel...
  • 2,198 篇 image segmentati...

机构

  • 2,488 篇 school of comput...
  • 1,890 篇 school of inform...
  • 1,582 篇 university of ch...
  • 1,500 篇 school of comput...
  • 1,338 篇 school of comput...
  • 1,055 篇 cavendish labora...
  • 1,045 篇 physikalisches i...
  • 978 篇 department of ph...
  • 958 篇 school of comput...
  • 850 篇 oliver lodge lab...
  • 780 篇 school of comput...
  • 623 篇 chitkara univers...
  • 620 篇 department of co...
  • 612 篇 school of inform...
  • 560 篇 school of comput...
  • 538 篇 infn laboratori ...
  • 520 篇 university of sc...
  • 517 篇 school of inform...
  • 516 篇 nikhef national ...
  • 504 篇 school of comput...

作者

  • 331 篇 niyato dusit
  • 302 篇 yang yang
  • 250 篇 barter w.
  • 233 篇 wang wei
  • 221 篇 blake t.
  • 219 篇 s. chen
  • 217 篇 a. gomes
  • 215 篇 bellee v.
  • 212 篇 betancourt c.
  • 211 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 207 篇 liu yang
  • 206 篇 brundu d.
  • 201 篇 amato s.
  • 197 篇 y. li
  • 194 篇 c. alexa
  • 193 篇 beiter a.
  • 191 篇 boettcher t.
  • 189 篇 j. m. izen
  • 185 篇 c. amelung

语言

  • 212,554 篇 英文
  • 37,880 篇 其他
  • 5,870 篇 中文
  • 494 篇 日文
  • 78 篇 德文
  • 71 篇 法文
  • 38 篇 斯洛文尼亚文
  • 21 篇 朝鲜文
  • 8 篇 俄文
  • 7 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 波兰文
检索条件"机构=School of Computer Science Engineering and Information Technology"
256183 条 记 录,以下是4651-4660 订阅
排序:
Multi-Label Classification with Weakly Labeled Data Based on Concept-Cognitive Learning  23
Multi-Label Classification with Weakly Labeled Data Based on...
收藏 引用
23rd International Conference on Machine Learning and Cybernetics, ICMLC 2024
作者: Wu, Jia-Ming Tsang, Eric C.C. Zhang, Cheng-Ling Yang, Lan-Zhen School of Computer Science and Engineering Macau University of Science and Technology Taipa China College of Mathematics and Information Sciences Hebei University Baoding071002 China
With the increasing complexity of datasets in reality, it is difficult to obtain instances with full labels, resulting in weak label problems. The existing methods are mainly based on the low rank and instance manifol... 详细信息
来源: 评论
Snap Through Nonlinear Vibration Control of Bi-stable Composite Plates Actuated by MFC Intelligent Material  2nd
Snap Through Nonlinear Vibration Control of Bi-stable Compos...
收藏 引用
2nd International Conference of Mechanical System Dynamics, ICMSD 2023
作者: Rongbo, He Yuxin, Hao Zhuming, Cheng School of Electrical and Information Engineering Anhui University of Technology Maanshan China School of Mechanical and Electrical Engineering Beijing Information Science and Technology University Beijing China
Due to the residual stress, asymmetric cross-ply bi-stable laminates can show two different stable deformation states at room temperature. In this paper, the stable configurations and snap through nonlinear vibration ... 详细信息
来源: 评论
A Stopgap Solution for EON Resource Assignment Postponing the Need for Disruptive Technologies
A Stopgap Solution for EON Resource Assignment Postponing th...
收藏 引用
2023 Asia Communications and Photonics Conference/2023 International Photonics and Optoelectronics Meetings, ACP/POEM 2023
作者: Xu, Yuxin Xing, Hang Chen, Bin College of Information Engineering Zhejiang University of Technology Zhejiang Hangzhou China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China
In order to enhance the network throughput for modern fiber optic networks, disruptive capacity-expanding technologies are emerging, such as spatial division multiplexing or adding L-band transmission, at the cost of ... 详细信息
来源: 评论
An Uncertainty Decision Model for Partial Observable Agents by Dynamically Sharing Group Utilities  9
An Uncertainty Decision Model for Partial Observable Agents ...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Xia, Shengqi Zhang, Shangyan Xu, Yang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
A decision-making model for intelligent agents is proposed in this study, emphasizing the maximization of group utility to address the challenges of multi-agent decision-making in dynamic and partially observable envi... 详细信息
来源: 评论
Heart Disease Prediction Using Machine Learning Algorithms
Heart Disease Prediction Using Machine Learning Algorithms
收藏 引用
2023 Innovations in Power and Advanced Computing Technologies, i-PACT 2023
作者: Priya, M. Anitha, A. Nallakaruppan, M.K. Raju, J. Raghavan, R. Srivastava, Divyansh School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India School of Electrical Engineering Vellore Institute of Technology Vellore India
Heart disease is one of the destructive infections that an enormous populace of individuals all over the planet grieves. The prediction of heart disease is very much urged because of increasing death rates. The conven... 详细信息
来源: 评论
Gamification Design and Implementation of Cybersecurity Virtual Training Platform  14
Gamification Design and Implementation of Cybersecurity Virt...
收藏 引用
14th International Conference on information technology in Medicine and Education, ITME 2024
作者: Qi, Wenjing Zhang, Yan Xu, Lina Ge, Mengkai Xu, Zhehao Qilu Normal University School of Information Science and Engineering Jinan China Shandong Jianzhu University School Science Jinan China Shandong Jianzhu University School of Computer Science and Technology Jinan China
This paper presents a gamified virtual cybersecurity training platform, which aims to control the potential risk of cybersecurity training through virtualization technology, increase the interaction of the training pr... 详细信息
来源: 评论
Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5901-5914页
作者: R.Brindha S.Nandagopal H.Azath V.Sathana Gyanendra Prasad Joshi Sung Won Kim Department of Computing Technologies SRM Institute of Science and TechnologyKattankulathur603203India Department of Computing Science and Engineering Nandha College of TechnologyErode638052India School of Computing Science and Engineering VIT Bhopal UniversityBhopal466114India Department of Computer Science and Engineering K.Ramakrishnan College of EngineeringTiruchirappalli621112India Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-si38541Gyeongbuk-doKorea
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us... 详细信息
来源: 评论
Data collection of wireless sensor network based on trajectory optimization of laser-charged UAV
收藏 引用
High-Confidence Computing 2024年 第2期4卷 116-128页
作者: Chuanwen Luo Jian Zhang Jin Qian Yi Hong Zhibo Chen Yunan Hou Xiujuan Zhang Yuqing Zhu School of Information Science and Technology Beijing Forestry UniversityBeijing 100083China Engineering Research Center for Forestry-Oriented Intelligent Information Processing of National Forestry and Grassland Administration Beijing 100083China College of Information Engineering Taizhou UniversityTaizhou 225300China School of Computer Science Qufu Normal UniversityRizhao 276826China Research Center of Applied Mathematics and Machine Intelligence Zhejiang LabHangzhou 311121China Department of Computer Science California State UniversityCA 90032USA
Unmanned Aerial Vehicle(UAV)can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks(WSNs),which is crucial for providing seamless services and improvin... 详细信息
来源: 评论
Heterogeneous distributed data mining method based on decision tree classification algorithm  5
Heterogeneous distributed data mining method based on decisi...
收藏 引用
5th International Conference on computers, information Processing and Advanced Education, CIPAE 2024
作者: Zheng, Yingzi School of Computer Science and Engineering Guangzhou Institute of Science and Technology Guangzhou510540 China
The mining of heterogeneous distributed data is a key technology for insight data traceability and classification feature analysis. A heterogeneous distributed data mining method based on decision tree classification ... 详细信息
来源: 评论
Efficient Multi-subset Fine-grained Authorization PSI over Outsourced Encrypted Datasets  23
Efficient Multi-subset Fine-grained Authorization PSI over O...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Zheng, Jinlong Liu, Jia-Nan Su, Minhua Li, Dingcheng He, Kai Liu, Xueqiao Dongguan University of Technology School of Computer Science and Technology Dongguan China University of Wollongong School of Computing and Information Technology Wollongong Australia
Private set intersection (PSI) is an important cryptographic primitive with many real-world applications. Delegating PSI computation to the cloud can effectively reduce management and computational costs of data owner... 详细信息
来源: 评论