咨询与建议

限定检索结果

文献类型

  • 69,892 篇 会议
  • 40,432 篇 期刊文献
  • 798 册 图书

馆藏范围

  • 111,122 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 68,601 篇 工学
    • 45,951 篇 计算机科学与技术...
    • 37,532 篇 软件工程
    • 17,122 篇 信息与通信工程
    • 11,482 篇 控制科学与工程
    • 8,883 篇 电气工程
    • 8,408 篇 电子科学与技术(可...
    • 7,929 篇 生物工程
    • 5,695 篇 光学工程
    • 5,536 篇 生物医学工程(可授...
    • 5,445 篇 机械工程
    • 3,895 篇 化学工程与技术
    • 3,822 篇 仪器科学与技术
    • 3,564 篇 动力工程及工程热...
    • 2,805 篇 网络空间安全
    • 2,699 篇 交通运输工程
    • 2,651 篇 材料科学与工程(可...
    • 2,568 篇 安全科学与工程
  • 37,950 篇 理学
    • 19,115 篇 数学
    • 11,766 篇 物理学
    • 8,880 篇 生物学
    • 6,383 篇 统计学(可授理学、...
    • 4,213 篇 化学
    • 4,027 篇 系统科学
  • 18,324 篇 管理学
    • 11,640 篇 管理科学与工程(可...
    • 7,419 篇 图书情报与档案管...
    • 4,734 篇 工商管理
  • 5,354 篇 医学
    • 4,364 篇 临床医学
    • 3,917 篇 基础医学(可授医学...
    • 2,363 篇 药学(可授医学、理...
  • 2,940 篇 法学
    • 2,396 篇 社会学
  • 1,854 篇 经济学
  • 1,429 篇 农学
  • 1,018 篇 教育学
  • 468 篇 文学
  • 255 篇 军事学
  • 210 篇 艺术学
  • 7 篇 哲学
  • 7 篇 历史学

主题

  • 3,150 篇 accuracy
  • 3,026 篇 feature extracti...
  • 2,829 篇 deep learning
  • 2,624 篇 training
  • 2,421 篇 computational mo...
  • 2,141 篇 computer science
  • 2,023 篇 machine learning
  • 1,650 篇 optimization
  • 1,553 篇 predictive model...
  • 1,414 篇 semantics
  • 1,381 篇 convolutional ne...
  • 1,349 篇 internet of thin...
  • 1,341 篇 real-time system...
  • 1,304 篇 support vector m...
  • 1,293 篇 data models
  • 1,186 篇 neural networks
  • 1,184 篇 data mining
  • 1,031 篇 image segmentati...
  • 1,007 篇 artificial intel...
  • 928 篇 security

机构

  • 2,477 篇 school of comput...
  • 1,557 篇 school of comput...
  • 1,396 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,017 篇 department of ph...
  • 983 篇 school of comput...
  • 944 篇 physikalisches i...
  • 942 篇 oliver lodge lab...
  • 823 篇 university of ch...
  • 693 篇 school of comput...
  • 576 篇 school of comput...
  • 539 篇 fakultät physik ...
  • 536 篇 horia hulubei na...
  • 532 篇 chitkara univers...
  • 529 篇 school of physic...
  • 528 篇 school of physic...
  • 522 篇 department of ph...
  • 517 篇 school of optica...
  • 516 篇 imperial college...
  • 514 篇 h.h. wills physi...

作者

  • 276 篇 niyato dusit
  • 268 篇 a. gomes
  • 260 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 246 篇 g. bella
  • 246 篇 j. strandberg
  • 245 篇 c. amelung
  • 244 篇 d. calvet
  • 238 篇 beiter a.
  • 233 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 216 篇 g. spigo

语言

  • 101,601 篇 英文
  • 7,671 篇 其他
  • 1,834 篇 中文
  • 129 篇 日文
  • 13 篇 德文
  • 11 篇 法文
  • 10 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science Engineering and Technology"
111122 条 记 录,以下是4481-4490 订阅
排序:
A Novel Private Encryption Model in IoT Under Cloud Computing Domain
A Novel Private Encryption Model in IoT Under Cloud Computin...
收藏 引用
Proceedings of the International Conference on Intelligent Systems and Network, ICISN 2023
作者: Yadala, Sucharitha Pundru, Chandra Shaker Reddy Solanki, Vijender Kumar Department of Computer Science and Engineering VNR Vignana Jyothi Institute of Engineering and Technology TS Hyderabad India School of Computer Science and Engineering Lovely Professional University Punjab Phagwara India Department of Computer Science and Engineering CMR Institute of Technology Hyderabad India
The presence of the Internet of Things (IoT) works with the assortment and diffusion of metropolitan information data. In any case, it can release clients’ very own security data in brilliant urban areas. Many works ... 详细信息
来源: 评论
The Enhanced Analysis of FACT-Based Framework for Traffic Prediction in V2V Networks
The Enhanced Analysis of FACT-Based Framework for Traffic Pr...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Inzimam Aadil, Mir Agarwal, Ankita Vivekananda Global University Department of Computer Science & Application Jaipur India Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
The vehicular-to-car (V2V) communique networks have enabled a new generation of urban transportation phase. Vehicular conversation technology can offer scalability, dependability, and accuracy in various vehicle offer... 详细信息
来源: 评论
A fast anomaly network traffic detection method based on the constrained k-nearest neighbor  13
A fast anomaly network traffic detection method based on the...
收藏 引用
13th International Conference on Cloud Computing, Data science and engineering, Confluence 2023
作者: Zhu, Zhiguang Xie, Ying Yang, Xu Hu, Wei University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu China Southwest Minzu University School of Computer Science and Engineering Chengdu China National Engineering Research Center of Classified Protection Safeguard Technology for Cybersecurity Beijing China
The k-nearest neighbor algorithm has been widely used in network anomaly detection works, but its query efficiency decreases significantly when the number of samples and feature dimensions increase. To meet the demand... 详细信息
来源: 评论
Disentangling Prosody Representations With Unsupervised Speech Reconstruction
收藏 引用
IEEE/ACM Transactions on Audio Speech and Language Processing 2024年 32卷 39-54页
作者: Qu, Leyuan Li, Taihao Weber, Cornelius Pekarek-Rosin, Theresa Ren, Fuji Wermter, Stefan Institute of Artificial Intelligence Zhejiang Lab Hangzhou311121 China Department of Informatics University of Hamburg Hamburg20148 Germany School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
Human speech can be characterized by different components, including semantic content, speaker identity and prosodic information. Significant progress has been made in disentangling representations for semantic conten... 详细信息
来源: 评论
Image-Based Extraction of Prescription Information using OCR-Tesseract  2
Image-Based Extraction of Prescription Information using OCR...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Ponnuru, Mahesh Ponmalar, Sridevi P. Likhitha, A. Sree, Tanu B. Chaitanya, Guna G. School of Computing SRM Institute of Science and Technology Potheri603203 India Department of Computational Intelligence School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Potheri603203 India School of Computer Science Vellore Institute of Technology Amaravathi522237 India
The paper presents advancements in healthcare data capture through the application of image-based extraction techniques, which include sophisticated image processing techniques such as resizing and adaptive thresholdi... 详细信息
来源: 评论
Construction of marketing risk perception framework based on large model agent  24
Construction of marketing risk perception framework based on...
收藏 引用
2024 International Conference on Cloud Computing and Big Data, ICCBD 2024
作者: Chi, Wenxin Wei, Shijie School of Computer Science and Engineering Macau University of Science and Technology China Business-Intelligence of Oriental Nations Corporation Ltd. China
The new generation of artificial intelligence technology represented by the Chat-GPT large model is profoundly affecting all walks of life. The marketing risk perception framework based on large model agents brings ne... 详细信息
来源: 评论
Advancing Vehicular Ad-Hoc Network Solutions in Emerging Economies: A Comparative Analysis of V2V Protocols Through Simulation Studies
收藏 引用
SN computer science 2024年 第8期5卷 1-13页
作者: Raj, Dharm Ather, Danish Sagar, Anil Kumar Department of Computer Science & amp Engineering Sharda School of Engineering & amp Technology Sharda University Greater Noida India Amity University in Tashkent Tashkent Uzbekistan
This paper aims at moving ahead with Vehicular Ad-Hoc Network (VANET) in the emerging economies via protocol analysis of Vehicle-to-Vehicle (V2V) communication through simulation study. Given the distinct challenges i... 详细信息
来源: 评论
Multilevel Discrete Cosine Transform and CNN-Based Image Steganography  3
Multilevel Discrete Cosine Transform and CNN-Based Image Ste...
收藏 引用
3rd International Conference on Intelligent Systems, Advanced Computing, and Communication, ISACC 2025
作者: Subburaj, Brindha Sai, Aditya Shantanu, Shantanu Won, Daehan Vellore Institute of Technology School of Computer Science and Engineering Chennai India Binghamton University Department of Systems Science and Industrial Engineering United States
This paper investigates the growing role of steganography in cybersecurity and presents a hybrid implementation called Multi-level Discrete Cosine Convolution (MDCC) that applies a Multi-level Discrete Cosine Transfor... 详细信息
来源: 评论
Global Weak Entropy Solution of Nonlinear Ideal Reaction Chromatography System and Applications
收藏 引用
Acta Mathematicae Applicatae Sinica 2023年 第1期39卷 109-134页
作者: Jing ZHANG Hong-xia LIU Tao PAN School of Computer Science and Technology Dongguan University of TechnologyDongguan 523808China Department of Mathematics Jinan UniversityGuangzhou 510632China Department of Optoelectronic Engineering Jinan UniversityGuangzhou 510632China
The ideal reaction chromatography model can be regarded as a semi-coupled system of two hyperbolic partial differential equations, in which, one is a self-closed nonlinear equation for the reactant concentration and a... 详细信息
来源: 评论
Levy Flight Adopted Particle Swarm Optimization-based Resource Allocation Strategy in Fog Computing
收藏 引用
Chinese Journal of Electronics 2023年
作者: Sharmila Patil(Karpe) Brahmananda S H Research Scholar Department of Computer Science and Engineering GITAM School of Technology GITAM Deemed University Professor Department of Computer Science and Engineering GITAM Bengaluru
The prevalence of the Internet of Things(Io T) is unsteady in the context of cloud computing, it is difficult to identify fog and cloud resource scheduling policies that will satisfy users’ Qo S need. As a result, it...
来源: 评论