咨询与建议

限定检索结果

文献类型

  • 4,336 篇 会议
  • 3,181 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 7,556 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,591 篇 工学
    • 3,201 篇 计算机科学与技术...
    • 2,659 篇 软件工程
    • 1,134 篇 信息与通信工程
    • 757 篇 控制科学与工程
    • 680 篇 电气工程
    • 635 篇 生物工程
    • 529 篇 生物医学工程(可授...
    • 482 篇 电子科学与技术(可...
    • 413 篇 光学工程
    • 326 篇 机械工程
    • 281 篇 化学工程与技术
    • 272 篇 动力工程及工程热...
    • 259 篇 仪器科学与技术
    • 252 篇 网络空间安全
    • 240 篇 安全科学与工程
    • 215 篇 交通运输工程
  • 2,700 篇 理学
    • 1,214 篇 数学
    • 938 篇 物理学
    • 722 篇 生物学
    • 404 篇 统计学(可授理学、...
    • 297 篇 化学
    • 241 篇 系统科学
  • 1,339 篇 管理学
    • 864 篇 管理科学与工程(可...
    • 529 篇 图书情报与档案管...
    • 390 篇 工商管理
  • 649 篇 医学
    • 545 篇 临床医学
    • 480 篇 基础医学(可授医学...
    • 320 篇 公共卫生与预防医...
    • 255 篇 药学(可授医学、理...
  • 250 篇 法学
    • 196 篇 社会学
  • 155 篇 经济学
  • 154 篇 农学
  • 90 篇 教育学
  • 26 篇 文学
  • 15 篇 艺术学
  • 10 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 314 篇 accuracy
  • 313 篇 deep learning
  • 221 篇 machine learning
  • 201 篇 feature extracti...
  • 199 篇 real-time system...
  • 193 篇 internet of thin...
  • 173 篇 training
  • 168 篇 predictive model...
  • 154 篇 computational mo...
  • 153 篇 convolutional ne...
  • 116 篇 optimization
  • 113 篇 support vector m...
  • 112 篇 security
  • 112 篇 data models
  • 94 篇 cloud computing
  • 89 篇 artificial intel...
  • 89 篇 machine learning...
  • 82 篇 reliability
  • 78 篇 prediction algor...
  • 77 篇 medical services

机构

  • 111 篇 university of sc...
  • 101 篇 college of intel...
  • 95 篇 tianfu cosmic ra...
  • 90 篇 hebei normal uni...
  • 90 篇 college of compu...
  • 89 篇 state key labora...
  • 88 篇 department of ph...
  • 85 篇 yunnan observato...
  • 73 篇 university of ch...
  • 72 篇 key laboratory f...
  • 65 篇 school of physic...
  • 61 篇 college of compu...
  • 57 篇 national astrono...
  • 56 篇 nanyang technolo...
  • 51 篇 institute for nu...
  • 49 篇 center for astro...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...

作者

  • 126 篇 niyato dusit
  • 81 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 78 篇 bastieri d.
  • 74 篇 jiang k.
  • 71 篇 kuleshov d.
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 69 篇 huang d.h.
  • 69 篇 dai h.l.
  • 67 篇 li cheng
  • 66 篇 li xin
  • 66 篇 guo y.q.
  • 63 篇 min z.
  • 61 篇 liu b.
  • 60 篇 bao y.w.
  • 59 篇 qin j.j.
  • 59 篇 hu h.b.

语言

  • 6,751 篇 英文
  • 746 篇 其他
  • 55 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=School of Computing College of Engineering and Technology"
7556 条 记 录,以下是441-450 订阅
排序:
Liquidt: stock market analysis using liquid time-constant neural networks
收藏 引用
International Journal of Information technology (Singapore) 2024年 第2期16卷 909-920页
作者: Gajjar, Pranshav Saxena, Aayush Acharya, Kairav Shah, Pooja Bhatt, Chintan Nguyen, Thanh Thi College of Engineering and Computing George Mason University Fairfax VA United States Electronics and Computer Science University of Southampton Southampton United Kingdom Department of Computer Science & Engineering School of Technology Pandit Deendayal Energy University Gandhinagar India School of Information Technology Deakin University Geelong Australia Institute of Technology Nirma University Ahmedabad India
Accurate and efficient predictions concerning stock prices are an intriguing and sought-after task in the field of computational financial analysis. This paper aims to leverage and validate novel deep learning pipelin... 详细信息
来源: 评论
Next-Gen Parking Facilities: Deep Learning for Face and License Plate based Access  18
Next-Gen Parking Facilities: Deep Learning for Face and Lice...
收藏 引用
18th INDIAcom;11th International Conference on computing for Sustainable Global Development, INDIACom 2024
作者: Balasubramanian, K. Kannan, N. Sivakami, S. Senthil, S. Immaculate Rexi Jenifer, P. Murali, N. E. G. S. Pillay Engineering College Department of Computer Science and Engineering Nagapattinam India K. Ramakrishnan College of Technology Department of Computer Science and Engineering Trichy India School of Computing SASTRA Department of Computer Science and Engineering India
Parking congestion has become a major problem in today's metropolitan environments, resulting in lost time, higher emissions, and irritated drivers. There is a severe shortage of parking places in metropolitan are... 详细信息
来源: 评论
Enhancing Network Intrusion Detection with Deep Oversampling and Convolutional Autoencoder for Imbalanced Dataset  18th
Enhancing Network Intrusion Detection with Deep Oversamplin...
收藏 引用
18th EAI International Conference on Communications and Networking in China, ChinaCom 2023
作者: Xiong, Xuanrui Li, Junfeng Zhang, Huijun Shen, Han Liu, Mengru Peng, Wei Huang, Qi Zhang, Yuan School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China College of Environmental Resources Chongqing Technology and Business University Chongqing400067 China School of Computing Chongqing Institute of Engineering Chongqing400056 China
Network intrusion detection is confronted with a shortage of intrusion samples about uncommon attacks, resulting in an imbalance in data distribution across most network intrusion detection datasets. Traditional machi... 详细信息
来源: 评论
YOLOv8n-CGW: A novel approach to multi-oriented vehicle detection in intelligent transportation systems
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3809-3840页
作者: Berwo, Michael Abebe Fang, Yong Sarwar, Nadeem Mahmood, Jabar Aljohani, Mansourah Elhosseini, Mostafa School of Information and Engineering Chang’an University Shaanxi Xi’an710064 China Department of Computer Science Bahria University Lahore Campus Punjab Lahore54600 Pakistan Department of Information Technology Faculty of Computing and Information Technology University of Sialkot Punjab Sialkot51040 Pakistan College of Computer Science and Engineering Taibah University Yanbu46421 Saudi Arabia Computers and Control Systems Engineering Department Faculty of Engineering Mansoura University Mansoura35516 Egypt
In the context of Intelligent Transportation Systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep... 详细信息
来源: 评论
Collaborative Edge Server Placement for Maximizing QoS with Distributed Data Cleaning
收藏 引用
IEEE Transactions on Services computing 2025年 第03期18卷 1321-1335页
作者: Liang, Yuzhu Yin, Mujun Wang, Wenhua Liu, Qin Wang, Liang Zheng, Xi Wang, Tian Beijing Normal University Institute of Artificial Intelligence and Future Networks Zhuhai519000 China Huaqiao University College of Computer Science and Technology Xiamen361021 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China Northwestern Polytechnical University School of Computer Science Xi'an710072 China Macquarie University School of Computing NSW2109 Australia
The proliferation of contaminated data on Internet of Things (IoT) devices has the potential to undermine the accuracy of data-driven decision-making by altering the distribution of original data. Existing data cleani... 详细信息
来源: 评论
Twitter sentiment analysis using conditional generative adversarial network
收藏 引用
International Journal of Cognitive computing in engineering 2024年 第1期5卷 161-169页
作者: Mahalakshmi, V. Shenbagavalli, P. Raguvaran, S. Rajakumareswaran, V. Sivaraman, E. Department of Information Technology Sengunthar College of Engineering Tiruchengode Tiruchengode637205 India Assistant Professor Karunya Institute of Technology and Sciences Coimbatore India Assistant Professor Department of Computational Intelligence School of Computing SRM Institute of Science and Technology SRM Nagar Kattankulathur Kanchipuram Chennai Tamil Nadu 603203 India Assistant Professor Department of Computer Science and Design Erode Sengunthar Engineering College Tamil Nadu Thuduppathi India Department of Electrical and Computer Engineering Curtin University Miri Malaysia
Sentiment analysis, which aims to extract information from textual data indicating people's ideas or attitudes about a particular problem, has developed into one of the most exciting study issues in natural langua... 详细信息
来源: 评论
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation  29
The Evolution of Zero Trust Architecture (ZTA) from Concept ...
收藏 引用
29th International Conference on Information technology, IT 2025
作者: Nasiruzzaman, Md Ali, Maaruf Salam, Iftekhar Miraz, Mahdi H. Xiamen University Malaysia School of Computing and Data Science Malaysia Universiteti Metropolitan Tirana Faculty of Computer Science and IT Albania The Doctoral College United Kingdom Xiamen University Malaysia Mahdi H. Miraz Is with the School of Computing and Data Science Malaysia Wrexham University School of Computing Faculty of Arts Science and Technology United Kingdom University of South Wales Faculty of Computing Engineering and Science United Kingdom
Zero Trust Architecture (ZTA) is one of the paradigm changes in cybersecurity, from the traditional perimeter-based model to perimeterless. This article studies the core concepts of ZTA, its beginning, a few use cases...
来源: 评论
A Logical Investigation of Stock Market Prediction and Analysis using Supervised Machine Learning Algorithm  1
A Logical Investigation of Stock Market Prediction and Analy...
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Kumar, V. Vasantha Basha, Saleem Vijayaraghavan, N. Vellore Institute of Technology School of Computer Science and Engineering Chennai India Mazoon University College Computing and Informatics Department Muscat Oman KCG College of Technology Department of CSE Chennai India
In the Field of computer science, artificial intelligence (AI) is a broad field, which is concerned with structuring smart products and machines able to perform tasks which require the intellectual capability of human... 详细信息
来源: 评论
Password Manager with Multi-Factor Authentication  1
Password Manager with Multi-Factor Authentication
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Vijayaraghavan, N. Narasimhan, S. Basha, Saleem Vellore Institute of Technology School of Computer Science and Engineering Chennai India KCG College of Technology Department of Mathematics Chennai India Mazoon University College Computing and Informatics Department muscat Oman
Data breach is a serious issue as it leaks the personal information of more than billions of users and their privacy is compromised. More than 77% of organizations do not have a Cyber Security Incident Response plan. ... 详细信息
来源: 评论
Empowering Semantic Segmentation with Selective Frequency Enhancement and Attention Mechanism for Tampering Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 3270-3283页
作者: Xu, Xu Lv, Wenrui Wang, Wei Zhang, Yushu Chen, Junxin Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while tampered images are also flooding the social networks. Tampering detection is therefore becoming increasingly important for multi... 详细信息
来源: 评论