咨询与建议

限定检索结果

文献类型

  • 29,608 篇 会议
  • 20,361 篇 期刊文献
  • 503 册 图书

馆藏范围

  • 50,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31,035 篇 工学
    • 18,275 篇 计算机科学与技术...
    • 14,736 篇 软件工程
    • 8,018 篇 信息与通信工程
    • 5,663 篇 电气工程
    • 5,652 篇 电子科学与技术(可...
    • 5,380 篇 控制科学与工程
    • 3,594 篇 生物工程
    • 3,169 篇 光学工程
    • 2,868 篇 生物医学工程(可授...
    • 2,117 篇 机械工程
    • 2,099 篇 动力工程及工程热...
    • 1,933 篇 化学工程与技术
    • 1,864 篇 仪器科学与技术
    • 1,849 篇 材料科学与工程(可...
    • 1,091 篇 交通运输工程
    • 1,052 篇 网络空间安全
  • 18,823 篇 理学
    • 8,833 篇 数学
    • 6,990 篇 物理学
    • 4,051 篇 生物学
    • 3,239 篇 统计学(可授理学、...
    • 2,260 篇 系统科学
    • 2,210 篇 化学
  • 6,946 篇 管理学
    • 4,591 篇 管理科学与工程(可...
    • 2,535 篇 图书情报与档案管...
    • 2,283 篇 工商管理
  • 2,976 篇 医学
    • 2,389 篇 临床医学
    • 2,135 篇 基础医学(可授医学...
    • 1,265 篇 公共卫生与预防医...
    • 1,265 篇 药学(可授医学、理...
  • 1,425 篇 法学
    • 1,232 篇 社会学
  • 841 篇 经济学
  • 538 篇 农学
  • 477 篇 教育学
  • 261 篇 文学
  • 101 篇 军事学
  • 55 篇 艺术学
  • 7 篇 哲学
  • 6 篇 历史学

主题

  • 1,190 篇 accuracy
  • 1,110 篇 deep learning
  • 1,069 篇 computer science
  • 889 篇 computational mo...
  • 878 篇 machine learning
  • 755 篇 training
  • 750 篇 feature extracti...
  • 662 篇 internet of thin...
  • 566 篇 optimization
  • 554 篇 real-time system...
  • 513 篇 predictive model...
  • 476 篇 artificial intel...
  • 457 篇 convolutional ne...
  • 424 篇 support vector m...
  • 398 篇 data models
  • 374 篇 neural networks
  • 351 篇 robustness
  • 338 篇 analytical model...
  • 334 篇 wireless sensor ...
  • 333 篇 reinforcement le...

机构

  • 617 篇 department of el...
  • 185 篇 department of co...
  • 155 篇 school of electr...
  • 129 篇 school of automa...
  • 128 篇 school of comput...
  • 118 篇 department of co...
  • 115 篇 school of electr...
  • 115 篇 school of electr...
  • 110 篇 school of comput...
  • 109 篇 college of compu...
  • 106 篇 department of ph...
  • 105 篇 department of co...
  • 104 篇 faculty of scien...
  • 101 篇 departamento de ...
  • 100 篇 faculté des scie...
  • 98 篇 school of comput...
  • 93 篇 department of ph...
  • 93 篇 department of ph...
  • 91 篇 north-west unive...
  • 89 篇 department of ph...

作者

  • 323 篇 niyato dusit
  • 116 篇 han zhu
  • 95 篇 ferrara g.
  • 94 篇 ardid m.
  • 93 篇 calvo d.
  • 92 篇 chen a.
  • 91 篇 c. alexa
  • 90 篇 j. m. izen
  • 90 篇 s. veneziano
  • 90 篇 g. bella
  • 90 篇 d. calvet
  • 90 篇 c. amelung
  • 90 篇 y. tayalati
  • 89 篇 j. strandberg
  • 89 篇 n. orlando
  • 89 篇 g. spigo
  • 89 篇 v. chiarella
  • 89 篇 f. siegert
  • 88 篇 f. buehrer
  • 88 篇 a. t. law

语言

  • 46,184 篇 英文
  • 3,775 篇 其他
  • 496 篇 中文
  • 32 篇 日文
  • 10 篇 德文
  • 8 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Engineering Department of Computer Science and Electrical Engineering"
50472 条 记 录,以下是1031-1040 订阅
排序:
AI-Driven Image-to-Audio Encryption with Data Hiding  15
AI-Driven Image-to-Audio Encryption with Data Hiding
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Chennupati, Anjali Prahas, Bhamidipati Ghali, Bharadwaj Aaditya Nidhin Prabhakar, T.V. Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
The proposed framework addresses the critical need for secure multimedia data sharing by integrating image-to-audio encryption with advanced AI-based data-hiding techniques. The core concept involves transforming stat... 详细信息
来源: 评论
Adapting Deep Learning Transformer Model for Depression-Specific Named Entity Recognition: A Transfer Learning Approach  3
Adapting Deep Learning Transformer Model for Depression-Spec...
收藏 引用
3rd International Conference on Automation, computing and Renewable Systems, ICACRS 2024
作者: Pawar, Dipti Phansalkar, Shraddha Department of Computer Science Engineering MIT School of Computing MIT Art DesignTechnology University Pune India
Named Entity Recognition (NER) is essential in the biomedical domain, particularly in mental health studies focused on disorders like depression. It helps extract structured information from unstructured text, enablin... 详细信息
来源: 评论
Integrated Approach to Detect Cyberbullying Text:Mobile Device Forensics Data
收藏 引用
computer Systems science & engineering 2022年 第3期40卷 963-978页
作者: G.Maria Jones S.Godfrey Winster P.Valarmathie Department of Computer Science and Engineering Saveetha Engineering CollegeChennai602105India Department of Computer Science and Engineering School of ComputingSRM Institute of Science and TechnologyChengalpattu603203India Department of Information Technology Saveetha Engineering CollegeChennai602105India
Mobile devices and social networks provide communication opportunities among the young generation,which increases vulnerability and cybercrimes activities.A recent survey reports that cyberbullying and cyberstalking c... 详细信息
来源: 评论
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge computing networks
收藏 引用
Digital Communications and Networks 2023年 第6期9卷 1310-1318页
作者: Shumei Liu Yao Yu Lei Guo Phee Lep Yeoh Branka Vucetic Yonghui Li School of Computer Science and Engineering Northeastern UniversityShenyang110819China Key Laboratory of Intelligent Computing in Medical Image Ministry of EducationNortheastern UniversityShenyang110819China School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China School of Electrical and Information Engineering University of SydneySydneyNSW2006Australia
Mobile Edge computing(MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy *** this paper,we propose a flexible MECbased requirement-ad... 详细信息
来源: 评论
Optimizing Federated Semantic Learning in Distributed AIGC-Enabled Human Digital Twins: A Multi-Criteria and Multi-Shard User Selection Framework
收藏 引用
IEEE Transactions on Mobile computing 2025年 第7期24卷 5916-5933页
作者: Okegbile, Samuel D. Gao, Haoran Talabi, Oluwasegun Cai, Jun Niyato, Dusit Shen, Xuemin Concordia University Department of Electrical and Computer Engineering MontrealQCH3G 1M8 Canada University of the Fraser Valley School of Computing AbbotsfordBCV2S 7M8 Canada Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Waterloo Department of Electrical and Computer Engineering WaterlooONN2L 3G1 Canada
Artificial intelligence-generated content (AIGC) has been proposed as a solution to meet the requirements of ultra-reliable, secure, and privacy-preserving connectivity in human digital twin (HDT) networks. In such an... 详细信息
来源: 评论
Revolutionizing Healthcare: Cloud-Based Health Information Exchange and Disease Prediction
Revolutionizing Healthcare: Cloud-Based Health Information E...
收藏 引用
2024 International Symposium on computing and Intelligent Systems, SCI 2024
作者: Nayini, Sai Nithin Gade, Vishwas Gudapareddy, Mani Prakash Reddy Peddineni, Varshith Beena, B.M. Department of Computer Science &Engineering Amrita School of Computing AmritaVishwa Vidyapeetham Karnataka Bangalore560035 India
A cloud-based system called Health Information Exchange (HIE) is. Hosted on Amazon Web Services (AWS). This system provides logins, for doctors, administrators and patients. The primary objective of this work is to re... 详细信息
来源: 评论
Decision Support System for Spontaneous Volunteers During Emergency Response  15
Decision Support System for Spontaneous Volunteers During Em...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Anand, Sruthy Rao, Sethuraman N. Nandan, A.D. Dev Gopal, B.Madan Das, Madhav A. Amritapuri India School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India
Disasters affect a large number of people yearly and recurrently at many locations. Emergencies compel the local community to participate in disaster response;they are mostly the first responders during any disaster. ... 详细信息
来源: 评论
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 857-873页
作者: Amardeep Singh Hamad Ali Abosaq Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa School of Computer Information Sciences University of CumberlandsWilliamsburgKentucky40769USA Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Electrical Engineering The University of LahoreLahore54000Pakistan Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... 详细信息
来源: 评论
Control Strategy of Wind Turbines for Their Withdrawl of Frequency Regulation  3
Control Strategy of Wind Turbines for Their Withdrawl of Fre...
收藏 引用
3rd International Conference on Energy, Power and electrical Technology, ICEPET 2024
作者: Gao, Haishu Zhang, Feng Wu, Guanghao Cornelusse, Bertrand Shandong University School of Electrical Engineering Jinan China University of Liege Department of Electrical Engineering and Computer Science Liège Belgium
The simultaneous withdrawal of multiple WTGs after wind farm participation in frequency regulation will cause a large power plunge, which in turn will cause a serious secondary frequency drop in the system. Moreover, ... 详细信息
来源: 评论
Enhancing Energy Efficiency and Security in Wireless Sensor Networks: A Survey and Proposed Methodology Integrating Prediction Algorithms and Deep Neural Networks  6
Enhancing Energy Efficiency and Security in Wireless Sensor ...
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Shafiuddin, Shaik Krishna, Konda Hari Mohan Babu University School of Computing Department of Computer Science and Engineering Andhra Pradesh Tirupati India
This research study provides a complete assessment of energy- and trust-aware techniques in IoT-WSNs, emphasizing the significant problems and limits of current methodologies. Traditional methodologies frequently face... 详细信息
来源: 评论