咨询与建议

限定检索结果

文献类型

  • 20,082 篇 会议
  • 13,063 篇 期刊文献
  • 314 册 图书

馆藏范围

  • 33,459 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,763 篇 工学
    • 14,511 篇 计算机科学与技术...
    • 11,958 篇 软件工程
    • 4,832 篇 信息与通信工程
    • 3,339 篇 控制科学与工程
    • 2,704 篇 生物工程
    • 2,695 篇 电气工程
    • 2,163 篇 电子科学与技术(可...
    • 2,052 篇 生物医学工程(可授...
    • 1,773 篇 光学工程
    • 1,369 篇 机械工程
    • 1,257 篇 化学工程与技术
    • 1,193 篇 动力工程及工程热...
    • 1,047 篇 网络空间安全
    • 1,027 篇 仪器科学与技术
    • 951 篇 安全科学与工程
    • 922 篇 材料科学与工程(可...
  • 11,935 篇 理学
    • 5,844 篇 数学
    • 3,859 篇 物理学
    • 2,998 篇 生物学
    • 1,983 篇 统计学(可授理学、...
    • 1,385 篇 化学
    • 1,248 篇 系统科学
  • 5,597 篇 管理学
    • 3,418 篇 管理科学与工程(可...
    • 2,398 篇 图书情报与档案管...
    • 1,511 篇 工商管理
  • 2,212 篇 医学
    • 1,769 篇 临床医学
    • 1,587 篇 基础医学(可授医学...
    • 1,060 篇 公共卫生与预防医...
    • 954 篇 药学(可授医学、理...
  • 1,167 篇 法学
    • 960 篇 社会学
  • 600 篇 经济学
  • 514 篇 农学
  • 366 篇 教育学
  • 208 篇 文学
  • 65 篇 军事学
  • 44 篇 艺术学
  • 9 篇 哲学
  • 5 篇 历史学

主题

  • 1,129 篇 accuracy
  • 1,111 篇 deep learning
  • 733 篇 machine learning
  • 726 篇 computational mo...
  • 692 篇 training
  • 667 篇 feature extracti...
  • 514 篇 predictive model...
  • 498 篇 real-time system...
  • 464 篇 internet of thin...
  • 454 篇 convolutional ne...
  • 433 篇 support vector m...
  • 408 篇 data models
  • 335 篇 semantics
  • 298 篇 computer science
  • 278 篇 reliability
  • 272 篇 artificial intel...
  • 269 篇 optimization
  • 263 篇 neural networks
  • 257 篇 scalability
  • 256 篇 computer archite...

机构

  • 232 篇 school of comput...
  • 194 篇 department of co...
  • 153 篇 key laboratory o...
  • 150 篇 university of ch...
  • 125 篇 university of sc...
  • 120 篇 department of co...
  • 119 篇 school of comput...
  • 116 篇 school of comput...
  • 115 篇 school of comput...
  • 112 篇 department of co...
  • 111 篇 school of comput...
  • 111 篇 institute of com...
  • 104 篇 college of compu...
  • 102 篇 department of co...
  • 101 篇 school of comput...
  • 100 篇 school of comput...
  • 97 篇 school of comput...
  • 94 篇 north-west unive...
  • 92 篇 national enginee...
  • 90 篇 department of co...

作者

  • 172 篇 niyato dusit
  • 104 篇 bastieri d.
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 chen a.
  • 95 篇 calvo d.
  • 83 篇 gal t.
  • 82 篇 zheng wei-shi
  • 82 篇 bozza c.
  • 80 篇 anjali t.
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 72 篇 li xin
  • 69 篇 li cheng
  • 68 篇 jiang k.
  • 67 篇 kuleshov d.
  • 64 篇 liu d.
  • 63 篇 kalekin o.
  • 61 篇 chen m.j.
  • 60 篇 min z.

语言

  • 30,086 篇 英文
  • 3,117 篇 其他
  • 295 篇 中文
  • 6 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computing Science and Engineering School Of Computing Science & Engineering"
33459 条 记 录,以下是201-210 订阅
排序:
An Innovative Deep Learning-Based Predictive Maintenance Model for Smart Automotive System
An Innovative Deep Learning-Based Predictive Maintenance Mod...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Indumathi, V. Ashokkumar, C. School of Computing College of Engineering and Technology Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur Chennai India
This research presents an innovative deep learning-based predictive maintenance model designed for smart automotive systems, utilizing the EnsembleAE-Boost (EAE-Boost) algorithm. The primary objective of the proposed ... 详细信息
来源: 评论
Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5901-5914页
作者: R.Brindha S.Nandagopal H.Azath V.Sathana Gyanendra Prasad Joshi Sung Won Kim Department of Computing Technologies SRM Institute of Science and TechnologyKattankulathur603203India Department of Computing Science and Engineering Nandha College of TechnologyErode638052India School of Computing Science and Engineering VIT Bhopal UniversityBhopal466114India Department of Computer Science and Engineering K.Ramakrishnan College of EngineeringTiruchirappalli621112India Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-si38541Gyeongbuk-doKorea
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us... 详细信息
来源: 评论
Precise trajectory tracking of mecanum-wheeled omnidirectional mobile robots via a novel fixed-time sliding mode control approach
收藏 引用
Control Theory and Technology 2024年 第4期22卷 596-611页
作者: Zhe Sun Zhipeng Li Hao Xie Yunjun Zheng Jinchuan Zheng Bo Chen College of Information Engineering Zhejiang University of TechnologyHangzhou310023China School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyHawthorn3122VICAustralia School of Mechanical Engineering Hefei University of TechnologyHefei230009AnhuiChina
This paper proposes a novel fixed-time sliding mode control approach for trajectory-tracking tasks of a mecanum-wheeled omnidirectional mobile ***,the idea of two-phase attractors is introduced into the domain of slid... 详细信息
来源: 评论
Enhancing Secure Data Transmission Through Deep Learning-Based Image Steganography and Super-Resolution Generative Adversarial Networks
收藏 引用
SN Computer science 2024年 第8期5卷 1138页
作者: Ramesh, Sreyas Sukanth, B.N. Jaswanth, Sathyavarapu Sri Singh, Rimjhim Padam Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
In the era of multimedia technology digital images are essential and keeping them safe from unauthorised access is crucial. To address this issue, the proposed research explores the intersection of image steganography... 详细信息
来源: 评论
Convergence of Deep Learning and Forensic Methodologies Using Self-attention Integrated EfficientNet Model for Deep Fake Detection
收藏 引用
SN Computer science 2024年 第8期5卷 1-12页
作者: Singh, Rimjhim Padam Sree, Nichenametla Hima Reddy, Koti Leela Sai Praneeth Jashwanth, Kandukuri Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
The immensely increasing number of Deepfake technologies poses significant challenges to digital media integrity, leading to the immediate need for effective Deepfake detection methods. In light of the growing threat ... 详细信息
来源: 评论
Distributed Nash Equilibrium Seeking Strategies Under Quantized Communication
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第1期11卷 103-112页
作者: Maojiao Ye Qing-Long Han Lei Ding Shengyuan Xu Guobiao Jia IEEE the School of Automation Nanjing University of Science and TechnologyNanjing 210094China the School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourne VIC 3122Australia the Institute of Advanced Technology Nanjing University of Posts and TelecommunicationsNanjing 210023China
This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achi... 详细信息
来源: 评论
Establishment of secure and authentic data security framework in wireless sensor network using key reconciliation
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第5期16卷 3325-3336页
作者: Devi, Suman Kumar, Avadhesh School of Computing Science and Engineering Greater Noida India Galgotias University Greater Noida India
A massive amount of data is generated in today's modern era. The world's open and interconnected nature puts this data and its privacy at constant risk. As a result, establishing a secure data exchange mechani... 详细信息
来源: 评论
A Multi-path Droplet Routing Protocol for Digital Microfluidic Biochip
收藏 引用
Informatica (Slovenia) 2024年 第7期48卷 95-102页
作者: Swain, Jyotiranjan Pyne, Sumanta School of Computing and Information Technology REVA University Bangalore India Department of Computer Science and Engineering National Institute of Technology Rourkela India
Digital microfluidic biochip provides an alternative platform to synthesize the biochemical protocols. Droplet routing in biochemical synthesis involves moving multiple droplets across the biochip simultaneously. It i... 详细信息
来源: 评论
Spontaneous Infection and Periodic Evolving of Domain in a Diffusive SIS Epidemic Model
收藏 引用
Acta Mathematicae Applicatae Sinica 2024年 第1期40卷 164-191页
作者: Qiang Wen Guo-qiang Ren Bin Liu School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan430074China
In this paper, we consider a susceptible-infective-susceptible(SIS) reaction-diffusion epidemic model with spontaneous infection and logistic source in a periodically evolving domain. Using the iterative technique,the... 详细信息
来源: 评论
IoT-Based Fire Alarm System and Motion Detector: A Comprehensive Protocol Analysis for Enhanced Performance  9
IoT-Based Fire Alarm System and Motion Detector: A Comprehen...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Samudrala, Sai Santhoshi Haneesha Thambi, Jaishitha Vadluri, Sai Rishisri Rajagopal, Shinu M. Bhaskaran, Sreebha Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bangalore India Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bengaluru India
Fire alarm systems play a vital role in providing early warnings, facilitating prompt evacuation in emergency situations. These systems ensure the security of individuals by alerting them to possible risks and allowin... 详细信息
来源: 评论