咨询与建议

限定检索结果

文献类型

  • 14,710 篇 会议
  • 10,249 篇 期刊文献
  • 217 册 图书

馆藏范围

  • 25,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,735 篇 工学
    • 10,478 篇 计算机科学与技术...
    • 8,513 篇 软件工程
    • 3,652 篇 信息与通信工程
    • 2,586 篇 控制科学与工程
    • 2,193 篇 电气工程
    • 1,886 篇 生物工程
    • 1,813 篇 电子科学与技术(可...
    • 1,435 篇 生物医学工程(可授...
    • 1,294 篇 光学工程
    • 1,209 篇 机械工程
    • 1,037 篇 化学工程与技术
    • 970 篇 动力工程及工程热...
    • 894 篇 仪器科学与技术
    • 765 篇 材料科学与工程(可...
    • 654 篇 网络空间安全
    • 644 篇 交通运输工程
    • 624 篇 安全科学与工程
  • 9,040 篇 理学
    • 4,352 篇 数学
    • 3,112 篇 物理学
    • 2,081 篇 生物学
    • 1,469 篇 统计学(可授理学、...
    • 1,091 篇 化学
    • 963 篇 系统科学
  • 4,127 篇 管理学
    • 2,608 篇 管理科学与工程(可...
    • 1,684 篇 图书情报与档案管...
    • 1,177 篇 工商管理
  • 1,429 篇 医学
    • 1,194 篇 临床医学
    • 1,066 篇 基础医学(可授医学...
    • 639 篇 公共卫生与预防医...
    • 626 篇 药学(可授医学、理...
  • 741 篇 法学
  • 490 篇 经济学
  • 388 篇 农学
  • 286 篇 教育学
  • 71 篇 文学
  • 50 篇 军事学
  • 50 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 654 篇 deep learning
  • 607 篇 accuracy
  • 435 篇 training
  • 433 篇 machine learning
  • 432 篇 feature extracti...
  • 402 篇 computational mo...
  • 369 篇 internet of thin...
  • 283 篇 predictive model...
  • 277 篇 real-time system...
  • 272 篇 support vector m...
  • 234 篇 optimization
  • 231 篇 data models
  • 203 篇 neural networks
  • 199 篇 convolutional ne...
  • 193 篇 image segmentati...
  • 192 篇 reliability
  • 176 篇 semantics
  • 173 篇 artificial intel...
  • 169 篇 computer science
  • 169 篇 computer archite...

机构

  • 242 篇 institute of com...
  • 182 篇 university of ch...
  • 125 篇 university of sc...
  • 112 篇 school of comput...
  • 96 篇 department of co...
  • 95 篇 national enginee...
  • 93 篇 school of comput...
  • 91 篇 tianfu cosmic ra...
  • 87 篇 department of ph...
  • 86 篇 north-west unive...
  • 80 篇 infn sezione di ...
  • 80 篇 department of co...
  • 79 篇 infn sezione di ...
  • 79 篇 hebei normal uni...
  • 77 篇 institut univers...
  • 74 篇 state key labora...
  • 72 篇 yunnan observato...
  • 71 篇 national centre ...
  • 69 篇 faculty of compu...
  • 66 篇 università di ca...

作者

  • 134 篇 niyato dusit
  • 105 篇 bastieri d.
  • 88 篇 ferrara g.
  • 88 篇 ardid m.
  • 87 篇 calvo d.
  • 86 篇 chen a.
  • 76 篇 li xin
  • 76 篇 gal t.
  • 76 篇 bozza c.
  • 75 篇 fang j.
  • 75 篇 feng c.f.
  • 71 篇 díaz a.f.
  • 69 篇 jiang k.
  • 69 篇 li cheng
  • 68 篇 kuleshov d.
  • 67 篇 kalekin o.
  • 66 篇 liu d.
  • 65 篇 chen m.j.
  • 62 篇 boumaaza j.
  • 61 篇 min z.

语言

  • 22,858 篇 英文
  • 2,095 篇 其他
  • 243 篇 中文
  • 7 篇 日文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=School of Computing Engineering and Technology"
25176 条 记 录,以下是141-150 订阅
排序:
Oral Vision: Advanced Image Recognition for Oral Cancer  5
Oral Vision: Advanced Image Recognition for Oral Cancer
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Ghosh, Joita Mishra, Khushi Sindhuja, M. Nagadevi, S. Anand, M. School of Computing College of Engineering and Technology SRM Institute of Science and Technology Dept. of Computing Technologies Tamil Nadu Kattankulathur India
Cancer that affects the lining of the mouth, lips, or upper throat is called oral cancer. Other names for it include tongue cancer, mouth cancer, and oral cavity cancer. There is an urgent need for early cancer detect... 详细信息
来源: 评论
Massively parallel algorithms for fully dynamic all-pairs shortest paths
收藏 引用
Frontiers of Computer Science 2024年 第4期18卷 201-203页
作者: Chilei WANG Qiang-Sheng HUA Hai JIN Chaodong ZHENG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g... 详细信息
来源: 评论
E-Waste Alchemy: A Unified Solution for Recycling and Sustainability  5
E-Waste Alchemy: A Unified Solution for Recycling and Sustai...
收藏 引用
5th International Conference on Sustainable Communication Networks and Application, ICSCNA 2024
作者: Sharma, Vansh Sameer, Md Sindhuja, M. Nagadevi, S. Anand, M. School of Computing College of Engineering and Technology SRM Institute of Science and Technology Dept. of Computing Technologies Tamil Nadu Kattankulathur India
Through user-centric solutions and advanced features, E-Waste Alchemy is an innovative platform that aims to transform the administration of electronic waste (e-waste). The Recycle Centre on the platform is comprehens... 详细信息
来源: 评论
Dynamic Charging and Path Planning for UAV-Powered Rechargeable WSNs Using Multi-Agent Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Automation Science and engineering 2025年 22卷 15610-15626页
作者: Betalo, Mesfin Leranso Leng, Supeng Seid, Abegaz Mohammed Abishu, Hayla Nahom Erbad, Aiman Bai, Xiaoshan Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Hamad Bin Khalifa University Division of Information and Computing Technology College of Science and Engineering Doha Qatar Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Unmanned Aerial Vehicle (UAV)-powered 5G/6G networks integrated with rechargeable wireless sensor networks (RWSNs) offer promising solutions for extending system lifetime, collecting data, and providing computing serv... 详细信息
来源: 评论
Spontaneous Infection and Periodic Evolving of Domain in a Diffusive SIS Epidemic Model
收藏 引用
Acta Mathematicae Applicatae Sinica 2024年 第1期40卷 164-191页
作者: Qiang Wen Guo-qiang Ren Bin Liu School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan430074China
In this paper, we consider a susceptible-infective-susceptible(SIS) reaction-diffusion epidemic model with spontaneous infection and logistic source in a periodically evolving domain. Using the iterative technique,the... 详细信息
来源: 评论
Forecasting Pedestrian Traffic in Melbourne Central Business District: Integrating Sensor Data with COVID-19 Impacts to Inform City Planning  13
Forecasting Pedestrian Traffic in Melbourne Central Business...
收藏 引用
13th International Conference on Control, Automation and Information Sciences, ICCAIS 2024
作者: Anh Dang, Nhat Vu, Tung Luong, Stanley Ngoc Dinh, Tan Seyedmahmoudian, Mehdi Chandran, Jaideep Stojcevski, Alex Department of Computing Technologies School of Science Computing and Engineering Technologies Swinburne University of Technology VIC Australia Siemens-Swinburne Energy Transition Hub School of Science Computing and Engineering Technologies Swinburne University of Technology VIC Australia School of Science Engineering and Technology Rmit University Viet Nam Curtin Singapore
Accurate forecasting of pedestrian counts in the Central Business District of Melbourne during extreme scenarios such as the COVID-19 pandemic is crucial for optimizing resource allocation and ensuring public safety. ... 详细信息
来源: 评论
SecuDroid : Android Malware Detection using ML classifier on Static Features  2
SecuDroid : Android Malware Detection using ML classifier on...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Vanusha, D. Singh, Shashank Jha, Abhijeet Kumar Delsi Robinsha, S. School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Department of Computing Technologies Tamil Nadu Kattankulathur603203 India School of Computing SRM Institute of Science and Technology Department of Computing Technologies Tamil Nadu Kattankulathur603203 India
The Android operating system's widespread use has unfortunately made it a target for malware attacks, underlining the necessity for robust detection strategies. Existing literature has explored the potential of ma... 详细信息
来源: 评论
A Hybrid Approach of Black Widow Optimization with Firefly (FF) Algorithm for Efficient Routing in Wireless Sensor Network  2
A Hybrid Approach of Black Widow Optimization with Firefly (...
收藏 引用
2nd International Conference on Self Sustainable Artificial Intelligence Systems, ICSSAS 2024
作者: Sindhuja, M. Srm Institute of Science and Technology Department of Computing Technologies School of Computing College of Engineering and Technology Kattankulathur Tamil Nadu Chennai India
The sensor nodes that make up a Wireless Sensor Network (WSN) can be located anywhere and are linked wirelessly so that they can all keep tabs on the same set of physical characteristics in the area of interest. The n... 详细信息
来源: 评论
Graph-Theoretic Approaches in Semantic Web Service Orchestration and Discovery: A Comprehensive Literature Survey  5
Graph-Theoretic Approaches in Semantic Web Service Orchestra...
收藏 引用
5th International Conference on Data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Vignesh, T.V. Vijaya, K. Minu, R.I. Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Computing Technologies School of Computing Tamil Nadu Kattankulathur603203 India
Semantic Web Services (SWS) have become a powerful means for automating the discovery, composition, and orchestration of web services by providing them with semantic descriptions. This paper provides a comprehensive s... 详细信息
来源: 评论
Explaining in Local Differential Privacy Through the Lens of Quantitative Information Flow  37
Explaining in Local Differential Privacy Through the Lens of...
收藏 引用
37th IEEE Computer Security Foundations Symposium, CSF 2024
作者: Fernandes, Natasha McIver, Annabelle Sadeghi, Parastoo School of Computing Macquarie University Sydney Australia School of Engineering and Technology Unsw Canberra Australia
The study of leakage measures for privacy has been a subject of intensive research and is an important aspect of understanding how privacy leaks occur in computer systems. Differential privacy has been a focal point i... 详细信息
来源: 评论