咨询与建议

限定检索结果

文献类型

  • 6,177 篇 会议
  • 5,196 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,400 篇 工学
    • 5,327 篇 计算机科学与技术...
    • 4,386 篇 软件工程
    • 1,746 篇 信息与通信工程
    • 1,064 篇 控制科学与工程
    • 900 篇 生物工程
    • 866 篇 电气工程
    • 676 篇 电子科学与技术(可...
    • 600 篇 生物医学工程(可授...
    • 556 篇 光学工程
    • 538 篇 机械工程
    • 366 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 318 篇 动力工程及工程热...
    • 316 篇 网络空间安全
    • 264 篇 交通运输工程
    • 249 篇 安全科学与工程
  • 4,100 篇 理学
    • 2,036 篇 数学
    • 1,294 篇 物理学
    • 1,009 篇 生物学
    • 681 篇 统计学(可授理学、...
    • 415 篇 系统科学
    • 375 篇 化学
  • 2,056 篇 管理学
    • 1,214 篇 管理科学与工程(可...
    • 920 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 612 篇 医学
    • 527 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 393 篇 法学
    • 306 篇 社会学
  • 188 篇 经济学
  • 155 篇 教育学
  • 141 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 304 篇 deep learning
  • 260 篇 feature extracti...
  • 260 篇 machine learning
  • 224 篇 computational mo...
  • 208 篇 accuracy
  • 187 篇 semantics
  • 175 篇 internet of thin...
  • 175 篇 predictive model...
  • 167 篇 training
  • 149 篇 real-time system...
  • 118 篇 data mining
  • 114 篇 neural networks
  • 113 篇 support vector m...
  • 113 篇 optimization
  • 112 篇 artificial intel...
  • 111 篇 security
  • 106 篇 computer science
  • 95 篇 visualization
  • 92 篇 data models
  • 90 篇 cloud computing

机构

  • 175 篇 university of ch...
  • 123 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 95 篇 hebei normal uni...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 88 篇 school of comput...
  • 87 篇 department of ph...
  • 78 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 57 篇 school of inform...
  • 57 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 school of comput...
  • 53 篇 college of compu...
  • 53 篇 college of intel...
  • 52 篇 institute for nu...
  • 52 篇 school of physic...

作者

  • 97 篇 niyato dusit
  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 9,626 篇 英文
  • 1,742 篇 其他
  • 130 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11498 条 记 录,以下是1041-1050 订阅
排序:
Computation of Big Data Security through Cross-Layer Techniques  5
Computation of Big Data Security through Cross-Layer Techniq...
收藏 引用
5th IEEE International Conference on computing, Power, and Communication Technologies, IC2PCT 2024
作者: Sharma, Priya Dwivedi, Shweta Bhati, Nitesh Singh Kumar, Santosh Sharda University Dept. of Computer Science Greater Noida India Integral and Innovative of Sustainable Education College Dept. of Information Technology Lucknow India Galgotias University School of Computing Science and Engineering Greater Noida India
Because smart devices are so common and have generated enormous volumes of data, a new strategy is required to handle the kinds of data known as big data in the modern world. Many people are quite concerned about secu... 详细信息
来源: 评论
A Method for Plant Diseases Detection Based on Transfer Learning and Data Enhancement  4
A Method for Plant Diseases Detection Based on Transfer Lear...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Liu, Jing Zhang, Guofeng Feng, Bin Hou, Yingkun Kang, Wendi Shen, Boyang Shenyang Institute of Computing Technology University of Chinese Academy of Sciences Shenyang China School of Information Science and Technology Taishan University Tai'an China
With the wide application of deep learning in the field of agriculture, how to quickly and accurately identify and process structured and unstructured monitoring data to support intelligent decision-making has become ... 详细信息
来源: 评论
A Gradient-Guided Evolutionary Approach to Training Deep Neural Networks
收藏 引用
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2022年 第9期33卷 4861-4875页
作者: Yang, Shangshang Tian, Ye He, Cheng Zhang, Xingyi Tan, Kay Chen Jin, Yaochu Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Anhui University Hefei China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Anhui University Hefei China Department of Computer Science and Engineering Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Southern University of Science and Technology Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong SAR Department of Computer Science University of Surrey Guildford U.K
It has been widely recognized that the efficient training of neural networks (NNs) is crucial to classification performance. While a series of gradient-based approaches have been extensively developed, they are critic... 详细信息
来源: 评论
Adaptive Weighted Low-Rank Sparse Representation for Multi-View Clustering
收藏 引用
IEEE Access 2023年 11卷 60681-60692页
作者: Khan, Mohammad Ahmar Khan, Ghufran Ahmad Khan, Jalaluddin Anwar, Taushif Ashraf, Zubair Atoum, Ibrahim A. Ahmad, Naved Shahid, Mohammad Ishrat, Mohammad Alghamdi, Abdulrahman Abdullah Dhofar University College of Commerce and Business Administration Salalah211 Oman Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Guntur522502 India Southwest Jiaotong University School of Computing and Artificial Intelligence Chengdu611756 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China GLA University Department of Computer Engineering and Applications Uttar Pradesh Mathura281406 India AlMaarefa University College of Applied Sciences Department of Computer Science and Information Systems Riyadh13731 Saudi Arabia National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei10607 Taiwan Shaqra University College of Computing and Information Technology Shaqra11961 Saudi Arabia
Ongoing researches on multiple view data are showing competitive behavior in the machine learning field. Multi-view clustering has gained widespread acceptance for managing multi-view data and improves clustering effi... 详细信息
来源: 评论
Wireless Sensor Networks: Revolutionizing Explosive Detection  5
Wireless Sensor Networks: Revolutionizing Explosive Detectio...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Sujith Kumar, P.S. Anand, C. Vasuki, N. Ramesh, V. Santhoshkumar, S.P. Sree Buddha College of Engineering Department of Computer Science and Engineering Kerala Alappuzha India Nandha College of Technology Department of Information Technology Erode India Government College of Engineering Department of Computer Science and Engineering Erode India School of Computing Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Avadi India
One of the important technologies for protecting civilian life from terrorist attacks is explosive detection techniques. The global incidence of terrorist activities has been considerably reduced by the development of... 详细信息
来源: 评论
Super-Resolution of Diffusion-Weighted Images via TDI-Conditioned Diffusion Model  15th
Super-Resolution of Diffusion-Weighted Images via TDI-Cond...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Ma, Jiquan Teng, Yujun Chen, Geng Jiang, Haotian Zhang, Kai Liu, Feihong Rekik, Islem Shen, Dinggang School of Computer Science and Technology Heilongjiang University Harbin China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology School of Computer Science and Engineering Northwestern Polytechnical University Xi’an China School of Biomedical Engineering and State Key Laboratory of Advanced Medical Materials and Devices ShanghaiTech University Shanghai China School of Information Science and Technology Northwest University Xi’an China BASIRA Lab Imperial-X and Department of Computing Imperial College London London United Kingdom
Diffusion-Weighted Imaging (DWI) is a significant technique for studying white matter. However, it suffers from low-resolution obstacles in clinical settings. Post-acquisition Super-Resolution (SR) can enhance the res... 详细信息
来源: 评论
DDoSNet: A Deep Learning Model for detecting Network Attacks in Cloud computing  4
DDoSNet: A Deep Learning Model for detecting Network Attacks...
收藏 引用
4th International Conference on Inventive Research in computing Applications, ICIRCA 2022
作者: Srilatha, Doddi Thillaiarasu, N. School of Computing and Information Technology Reva University Bengaluru560064 India Sreenidhi Institute of Science and Technology Department of Cse Hyderabad501301 India
Cloud services are the major target for malicious attacks as more organizations and individuals shift to the cloud. When DDoS assaults pose one of the most significant dangers to Internet users and cloud services, thi... 详细信息
来源: 评论
Simulating a Finite-State Markov Chain for Rayleigh Block-Fading Channel based on its Mathematical Model, and Practical Representation  25
Simulating a Finite-State Markov Chain for Rayleigh Block-Fa...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Attar, Hani Ababneh, Jafar Al-Hihi, Mohammad Rachini, Ali Solyman, Ahmed Zarqa University Faculty of Engineering Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Erlangen Germany Department of Computer Science and Information Technology Jounieh Lebanon Glasgow Caledonian University School of Computing Engineering and Built Environment Glasgow United Kingdom
In the proposed paper, simulating the Finite State Markov Chain (FSMC) to be implemented as Rayleigh Block-fading channel. Indeed, FSMC is regarded as a practical fading channel because of its random choice for future... 详细信息
来源: 评论
Software Security Measurements: A Survey
Software Security Measurements: A Survey
收藏 引用
2022 International Conference on Intelligent technology, System and Service for Internet of Everything, ITSS-IoE 2022
作者: Almogahed, Abdullah Omar, Mazni Zakaria, Nur Haryani Alawadhi, Abdulwadood Taiz University Faculty of Engineering and Information Technology Department of Software Engineering Taiz Yemen Universiti Utara Malaysia School of Computing Sintok06010 Malaysia University of Science and Technology Faculty of Engineering and Computing Department of Computers and Information Technology Yemen
Security metrics for software products give a quantifiable assessment of a software system's trustworthiness. Metrics can also help detect vulnerabilities in systems, prioritize corrective actions, and raise the l... 详细信息
来源: 评论
Fog based Edge Learning using IoT: Concepts, Challenges and Applications  4
Fog based Edge Learning using IoT: Concepts, Challenges and ...
收藏 引用
4th International Conference on Smart Systems and Inventive technology, ICSSIT 2022
作者: Sindhu, V. Sudhakaran, Pradeep Anitha, G. Mahendiran, P.D. Department of Information Technology Sri Krishna College of Engineering and Technology Coimbatore India Department of Computing Technologies School of Computing SRM Institute of Science and Technology Chengalpattu India Department of Information Technology Sri Shakthi Institute of Engineering and Technology Coimbatore India Department of Computer Science and Business Systems Sri Krishna College of Engineering and Technology Coimbatore India
In innovation world, fog and edge computing is extremely near the client which means making the processing capacities extremely nearer to the customer or user. The mushrooming of IoT devices and usage is increasing da... 详细信息
来源: 评论