咨询与建议

限定检索结果

文献类型

  • 14,754 篇 会议
  • 10,147 篇 期刊文献
  • 218 册 图书

馆藏范围

  • 25,119 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,683 篇 工学
    • 10,362 篇 计算机科学与技术...
    • 8,474 篇 软件工程
    • 3,612 篇 信息与通信工程
    • 2,504 篇 控制科学与工程
    • 2,171 篇 电气工程
    • 1,874 篇 生物工程
    • 1,819 篇 电子科学与技术(可...
    • 1,427 篇 生物医学工程(可授...
    • 1,267 篇 光学工程
    • 1,198 篇 机械工程
    • 1,026 篇 化学工程与技术
    • 959 篇 动力工程及工程热...
    • 890 篇 仪器科学与技术
    • 802 篇 材料科学与工程(可...
    • 643 篇 网络空间安全
    • 639 篇 交通运输工程
    • 622 篇 安全科学与工程
  • 8,993 篇 理学
    • 4,365 篇 数学
    • 3,092 篇 物理学
    • 2,075 篇 生物学
    • 1,490 篇 统计学(可授理学、...
    • 1,079 篇 化学
    • 957 篇 系统科学
  • 4,091 篇 管理学
    • 2,586 篇 管理科学与工程(可...
    • 1,676 篇 图书情报与档案管...
    • 1,171 篇 工商管理
  • 1,419 篇 医学
    • 1,189 篇 临床医学
    • 1,064 篇 基础医学(可授医学...
    • 640 篇 公共卫生与预防医...
    • 627 篇 药学(可授医学、理...
  • 734 篇 法学
  • 489 篇 经济学
  • 386 篇 农学
  • 287 篇 教育学
  • 68 篇 文学
  • 50 篇 军事学
  • 50 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 659 篇 deep learning
  • 635 篇 accuracy
  • 443 篇 feature extracti...
  • 431 篇 training
  • 418 篇 machine learning
  • 411 篇 computational mo...
  • 379 篇 internet of thin...
  • 300 篇 predictive model...
  • 298 篇 real-time system...
  • 280 篇 support vector m...
  • 240 篇 optimization
  • 236 篇 data models
  • 209 篇 neural networks
  • 209 篇 convolutional ne...
  • 197 篇 image segmentati...
  • 194 篇 reliability
  • 184 篇 semantics
  • 183 篇 artificial intel...
  • 175 篇 computer archite...
  • 165 篇 computer science

机构

  • 244 篇 institute of com...
  • 195 篇 university of ch...
  • 128 篇 university of sc...
  • 111 篇 school of comput...
  • 101 篇 department of co...
  • 98 篇 tianfu cosmic ra...
  • 96 篇 national enginee...
  • 89 篇 school of comput...
  • 87 篇 department of ph...
  • 85 篇 north-west unive...
  • 84 篇 hebei normal uni...
  • 81 篇 state key labora...
  • 79 篇 infn sezione di ...
  • 79 篇 institut univers...
  • 79 篇 yunnan observato...
  • 77 篇 infn sezione di ...
  • 75 篇 national centre ...
  • 74 篇 department of co...
  • 70 篇 faculty of compu...
  • 67 篇 key laboratory o...

作者

  • 135 篇 niyato dusit
  • 103 篇 bastieri d.
  • 87 篇 ferrara g.
  • 87 篇 ardid m.
  • 86 篇 calvo d.
  • 85 篇 chen a.
  • 78 篇 gal t.
  • 78 篇 bozza c.
  • 76 篇 fang j.
  • 76 篇 feng c.f.
  • 75 篇 díaz a.f.
  • 74 篇 li xin
  • 71 篇 kalekin o.
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 65 篇 liu d.
  • 65 篇 boumaaza j.
  • 64 篇 li cheng
  • 64 篇 chen m.j.
  • 60 篇 huang f.

语言

  • 20,998 篇 英文
  • 3,903 篇 其他
  • 259 篇 中文
  • 7 篇 日文
  • 3 篇 德文
  • 2 篇 捷克文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing Engineering and Technology"
25119 条 记 录,以下是4621-4630 订阅
排序:
Optimization Techniques in University Timetabling Problem:Constraints,Methodologies,Benchmarks,and Open Issues
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 6461-6484页
作者: Abeer Bashab Ashraf Osman Ibrahim Ibrahim Abakar Tarigo Hashem Karan Aggarwal Fadhil Mukhlif Fuad A.Ghaleb Abdelzahir Abdelmaboud Faculty of Computer Science&Information Technology Alzaiem Alazhari University13311KhartoumSudan Faculty Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400SabahMalaysia Department of Computer Science University of SharjahSharjah27272United Arab Emirates Electronic and Communication Engineering Department Maharishi Markandeshwar Deemed to be UniversityMullanaAmbala133207HaryanaIndia Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi Malaysia81310JohorMalaysia Department of Information Systems King Khaled UniversityMuhayel61913AseerSaudi Arabia
University timetabling problems are a yearly challenging task and are faced repeatedly each *** problems are considered nonpolynomial time(NP)and combinatorial optimization problems(COP),which means that they can be s... 详细信息
来源: 评论
Investigation of Security Attacks in IoMT Devices and Federated Learning as a Mitigation Strategy
Investigation of Security Attacks in IoMT Devices and Federa...
收藏 引用
3rd International Conference on Machine Learning and Data engineering, ICMLDE 2024
作者: Kiruthika, M. Poongodi, T. Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Tamilnadu Kattankulathur603203 India Department of Computer Science and Engineering School of Engineering Dayananda Sagar University Karnataka Bangalore India
Internet of Medical Things (IoMT) is transforming the healthcare business with an increasing number of wearables, gadgets, and sensing devices. As a result, several patients are under daily monitoring for their cardio... 详细信息
来源: 评论
Resolution-Adaptive Representation Learning via Eliminating Abnormal Features for Cross-Resolution Person Re-Identification  14
Resolution-Adaptive Representation Learning via Eliminating ...
收藏 引用
14th International Conference on Information technology in Medicine and Education, ITME 2024
作者: Lu, Xing Lai, Fengshan Cao, Zhixiang Xia, Daoxun Guizhou Normal University School of Big Data and Computer Science Guiyang China Guizhou Normal University Key Laboratory of Information and Computing Science Guizhou Province Guiyang China Guizhou Normal University Engineering Laboratory for Applied Technology of Big Data in Education Guiyang China
Cross-resolution person re-identification(CR-ReID) seeks to overcome the challenge of retrieving and matching specific person images across cameras with varying resolutions. Numerous existing studies utilize establish... 详细信息
来源: 评论
Predicting Distributed Denial of Service Attacks in Machine Learning Field  2
Predicting Distributed Denial of Service Attacks in Machine ...
收藏 引用
2nd International Conference on Advance computing and Innovative Technologies in engineering, ICACITE 2022
作者: Umarani, S. Aruna, R. Kavitha, V. Erode Sengunthar Engineering College Department of Information Technology Perundurai India School of Computing Vel Tech Rangarajan Dr Sangunthala R &d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Nandha College of Technology Department of Information Technology Erode India
A persistent and serious danger to the Internet is a denial of service attack on a large scale (DDoS) attack using machine learning. Because they originate at the low layers, new Infections that use genuine hypertext ... 详细信息
来源: 评论
A MEC Offloading Strategy Based on Improved DQN and Simulated Annealing for Internet of Behavior
收藏 引用
ACM Transactions on Sensor Networks 2022年 第2期19卷 1-20页
作者: Yuan, Xiaoming Tian, Hansen Zhang, Zedan Zhao, Zheyu Liu, Lei Sangaiah, Arun Kumar Yu, Keping Qinghuangdao Branch Campus Northeastern University Qinhuangdao066004 China State Key Laboratory of Integrated Service Networks Xidian University Xian710071 China Xidian Guangzhou Institute of Technology Guangzhou510555 China School of Computing Science and Engineering Vellore Institute of Technology Vellore632014 India National Yunlin University of Science and Technology Douliou64002 Taiwan K. Yu Graduate School of Science and Engineering Hosei University Tokyo184-8584 Japan
The Internet of Medical Things (IoMT) and Artificial Intelligence (AI) have brought unprecedented opportunities to meet massive behavioral data access and personalization requirements for Internet of Behavior (IoB). T... 详细信息
来源: 评论
Retraction Note: Enhanced machine learning approach with orthogonal frequency division multiplexing to avoid congestion in wireless communication system
收藏 引用
Optical and Quantum Electronics 2024年 第12期56卷 1-2页
作者: Saad Alqahtani, Abdulrahman Mubarakali, Azath Saravanan, M. Babu Changalasetty, Suresh Saroja Thota, Lalitha Parthasarathy, P. Sivakumar, B. College of Computing and Information Technology Department of Computer Science University of Bisha Bisha Kingdom of Saudi Arabia Department of Computer Science King Khalid University Abha Kingdom of Saudi Arabia Department of Computer Science and Engineering KPR Institute of Engineering and Technology Coimbatore India King Khalid University Abha Kingdom of Saudi Arabia Department of CSE Shadan Womens College of Engineering and Technology Hyderabad India Department of Electronics and Communication Engineering CMR Institute of Technology Bengaluru India Department of Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur India
来源: 评论
A Machine Learning-Based Elastic Strategy for Operator Parallelism in a Big Data Stream computing System  1
收藏 引用
12th International Conference on Broadband Communications, Networks, and Systems, BROADNETS 2021
作者: Li, Wei Sun, Dawei Gao, Shang Buyya, Rajkumar School of Information Engineering China University of Geosciences Beijing100083 China School of Information Technology Deakin University MelbourneVIC3216 Australia Laboratory School of Computing and Information Systems The University of Melbourne Melbourne Australia
Elastic scaling in/out of operator parallelism degree is needed for processing real time dynamic data streams under low latency and high stability requirements. Usually the operator parallelism degree is set when a st... 详细信息
来源: 评论
Secure computing: NGSCB's Journey and Windows Security Impact
Secure Computing: NGSCB's Journey and Windows Security Impac...
收藏 引用
2024 IEEE International Conference on Automation and Computation, AUTOCOM 2024
作者: Singh, Kamred Udham Kumar, Surendra Mishra, Umang Deep Tiwari, Sudha Singh, Teekam Vikash Graphic Era Hill University School of Computing Dehradun India Glbitm Departnment of Computer Applications Greater Noida India Unique Institute of Management & Technology Muradnagar India Government Engineering College Department of Information Technology Chhattisgarh Bilaspur India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Appventurez Mobitech Pvt Ltd Greater Noida201310 India
The Next-Generation Secure computing Base (NGSCB) aimed to improve privacy, boost security, and reinforce system integrity for users of the Windows operating system. The NGSCB's approach relied on hardware that wa... 详细信息
来源: 评论
A Study of Search User Interface Design based on Hofstede's Six Cultural Dimensions  6
A Study of Search User Interface Design based on Hofstede's ...
收藏 引用
6th International Conference on Computer-Human Interaction Research and Applications, CHIRA 2022
作者: Chessum, Karen Liu, Haiming Frommholz, Ingo School of Computer Science and Technology University of Bedfordshire Luton United Kingdom School of Electronics and Computer Science University of Southampton United Kingdom School of Engineering Computing and Mathematical Sciences University of Wolverhampton Wolverhampton United Kingdom
An information seeker's cultural background could influence their preference for search user interface (UI) design. To study cultural influences Geert Hofstede's cultural dimensions have been applied to websit... 详细信息
来源: 评论
Improved YOLOv5 Algorithm for Intensive Pedestrian Detection  29th
Improved YOLOv5 Algorithm for Intensive Pedestrian Detection
收藏 引用
29th International Conference on Computational and Experimental engineering and Sciences, ICCES 2023
作者: Zhao, Siqi Tian, Ye Hao, Ning Zhou, Jianbo Zhang, Xian College of Computer Science and Technology Harbin Engineering University Harbin150001 China Modeling and Emulation in E-Government National Engineering Laboratory Harbin150001 China Hangzhou Institute of Technology Xidian University Hangzhou311200 China Beijing Institute of Spacecraft Environment Engineering Haidian District Space City Beijing100048 China Hangzhou Hikvision Digital Technology Co. Ltd Hangzhou310051 China School of Physics Mathematics and Computing University of Western Australia PerthWA6009 Australia
Pedestrian detection is an important basic research topic in the field of target detection, which can provide effective information support for public places with large flow density such as shopping malls and scenic s... 详细信息
来源: 评论