咨询与建议

限定检索结果

文献类型

  • 6,159 篇 会议
  • 5,244 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,482 篇 工学
    • 5,406 篇 计算机科学与技术...
    • 4,418 篇 软件工程
    • 1,769 篇 信息与通信工程
    • 1,127 篇 控制科学与工程
    • 907 篇 生物工程
    • 894 篇 电气工程
    • 679 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 579 篇 光学工程
    • 542 篇 机械工程
    • 365 篇 仪器科学与技术
    • 350 篇 化学工程与技术
    • 322 篇 动力工程及工程热...
    • 318 篇 网络空间安全
    • 267 篇 交通运输工程
    • 248 篇 安全科学与工程
  • 4,134 篇 理学
    • 2,042 篇 数学
    • 1,306 篇 物理学
    • 1,014 篇 生物学
    • 683 篇 统计学(可授理学、...
    • 416 篇 系统科学
    • 382 篇 化学
  • 2,072 篇 管理学
    • 1,224 篇 管理科学与工程(可...
    • 928 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 612 篇 医学
    • 527 篇 临床医学
    • 464 篇 基础医学(可授医学...
    • 290 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 398 篇 法学
    • 309 篇 社会学
  • 189 篇 经济学
  • 150 篇 教育学
  • 141 篇 农学
  • 37 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 301 篇 deep learning
  • 266 篇 machine learning
  • 261 篇 feature extracti...
  • 220 篇 computational mo...
  • 188 篇 accuracy
  • 184 篇 semantics
  • 170 篇 predictive model...
  • 169 篇 internet of thin...
  • 167 篇 training
  • 144 篇 real-time system...
  • 117 篇 data mining
  • 111 篇 artificial intel...
  • 110 篇 support vector m...
  • 110 篇 security
  • 109 篇 neural networks
  • 109 篇 optimization
  • 108 篇 computer science
  • 96 篇 visualization
  • 86 篇 analytical model...
  • 85 篇 data models

机构

  • 173 篇 university of ch...
  • 122 篇 key laboratory o...
  • 113 篇 university of sc...
  • 97 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 91 篇 hebei normal uni...
  • 89 篇 state key labora...
  • 87 篇 department of ph...
  • 86 篇 yunnan observato...
  • 86 篇 school of comput...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 55 篇 school of inform...
  • 53 篇 school of comput...
  • 53 篇 college of compu...
  • 53 篇 school of comput...
  • 53 篇 college of intel...
  • 48 篇 institute for nu...
  • 47 篇 department of co...

作者

  • 97 篇 niyato dusit
  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 10,382 篇 英文
  • 1,010 篇 其他
  • 127 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11528 条 记 录,以下是321-330 订阅
排序:
Deep Learning Approach for Analysis and Characterization of COVID-19
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 451-468页
作者: Indrajeet Kumar Sultan S.Alshamrani Abhishek Kumar Jyoti Rawat Kamred Udham Singh Mamoon Rashid Ahmed Saeed AlGhamdi School of Computing Graphic Era Hill UniversityDehradun(UK)India Department of Information Technology College of Computer and Information TechnologyTaif UniversityTaif21944Saudi Arabia School of Computer Science&IT JAIN(to be Deemed University)BangaloreIndia School of Computing Dehradun Institute of TechnologyUttarakhandIndia Department of Computer Engineering Faculty of Science and TechnologyVishwakarma UniversityPuneIndia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21944Saudi Arabia
Early diagnosis of a pandemic disease like COVID-19 can help deal with a dire situation and help radiologists and other experts manage human resources more *** a recent pandemic,laboratories perform diagnostics manual... 详细信息
来源: 评论
An Empirical Investigation on Employing Machine Learning for Balancing Home Agent Loads in Next Generation IP Mobility  2
An Empirical Investigation on Employing Machine Learning for...
收藏 引用
2nd International Conference on Machine Learning and Data Engineering, ICMLDE 2023
作者: Khatri, Anshu Mathi, Senthilkumar Ashiq Sheriff, A. Deepthika, R. Naveen Raaghavendran, G. Ramalingam, Venkadeshan Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India Faculty in Information Technology Department University of Technology and Applied Sciences-Shinas Oman
Mobile IPv6 is a key technology to enable the mobility of devices on next-generation internet protocol networks. Home agents provide simple services to registered mobile nodes. In addition, the use of multiple domesti... 详细信息
来源: 评论
Image Captcha Blended with OTP for Secured Authentication  1
收藏 引用
7th International Conference on Intelligent computing and Optimization, ICO 2023
作者: Bazeer Ahamed, B. Krishnamoorthy, Murugan University of Technology and Applied Sciences College of Computing and Information Sciences Al Musannah Oman School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
With the recent development in digital currency, the number of online transactions done every day is increasing exponentially. Along with the growing need for online transactions various attacks are developed to mimic... 详细信息
来源: 评论
An Automated Model for Predicting Weekly Tea Auction Prices at Colombo Tea Auction for Specific Elevations and Grades  6
An Automated Model for Predicting Weekly Tea Auction Prices ...
收藏 引用
6th International Conference on Advancements in computing, ICAC 2024
作者: Ariyaratne, Chandika Arachchi, Samantha Mathara Pallewatta, Pandula Karunanayaka, Kasun Seneviratne, Gihan Halloluwa, Thilina University of Colombo School of Computing Colombo Sri Lanka Nanjing University of Information Science and Technology Nanjing China The University of Queensland School of Electrical Engineering and Computer Science Australia
Sri Lanka's tea business has existed since the 1800s and maintains a high standard worldwide. However, rivalry is increasing as more competitors enter the market, and tea exporters strive to make their operations ... 详细信息
来源: 评论
Trustworthy Sensor Fusion Against Inaudible Command Attacks in Advanced Driver-Assistance Systems
收藏 引用
IEEE Internet of Things Journal 2023年 第19期10卷 17254-17264页
作者: Guan, Jiwei Pan, Lei Wang, Chen Yu, Shui Gao, Longxiang Zheng, Xi Macquarie University School of Computing SydneyNSW2109 Australia CSIRO Data61 SydneyNSW1710 Australia Deakin University School of Information Technology Waurn PondsVIC3125 Australia University of Technology Sydney Faculty of Engineering and Information Technology SydneyNSW2007 Australia Qilu University of Technology Shangdong Computer Science Center Jinan250316 China
There are increasing concerns about malicious attacks on autonomous vehicles. In particular, inaudible voice command attacks pose a significant threat as voice commands become available in autonomous driving systems. ... 详细信息
来源: 评论
A New Approach to Road Incident Detection Leveraging Live Traffic Data: An Empirical Investigation  2
A New Approach to Road Incident Detection Leveraging Live Tr...
收藏 引用
2nd International Conference on Machine Learning and Data Engineering, ICMLDE 2023
作者: Kumar Gannina, Aswin Ram Jaffarullah, Aadhil Ahamed Reddy, Tiyyagura Mohit Subba Reddy, Sabbella Manoj Vikas, Ambati Sai Mathi, Senthilkumar Ramalingam, Venkadeshan Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India Faculty in Information Technology Department University of Technology and Applied Sciences-Shinas Oman
Accidents can have a significant impact on road safety and the efficiency of transport. With the ever-increasing number of vehicles on the road, it is crucial to quickly detect and respond to such events to decrease t... 详细信息
来源: 评论
Lightweight Blockchain Prototype for Food Supply Chain Management  17
Lightweight Blockchain Prototype for Food Supply Chain Manag...
收藏 引用
17th International Conference on Security of information and Networks, SIN 2024
作者: Rusakov, Alexey Moradpoor, Naghmeh Akbarzadeh, Aida School of Computing Engineering and the Built Environment Edinburgh Napier University Edinburgh United Kingdom Norwegian University of Science and Technology Faculty of Information Technology and Electrical Engineering Gjovik Norway
The modern food supply chain often involves multiple layers of participants spread across different countries and continents. This complex system offers significant benefits to businesses worldwide;however, it also pr... 详细信息
来源: 评论
Metamorphic Relation Patterns for Metamorphic Testing, Exploration and Robustness
Metamorphic Relation Patterns for Metamorphic Testing, Explo...
收藏 引用
作者: Ying, Zhihao Towey, Dave Bellotti, Anthony Chua, Caslon Quan Zhou, Zhi School of Computer Science University of Nottingham Ningbo China Zhejiang Ningbo China Department of Computer Science and Software Engineering Swinburne University of Technology HawthornVIC Australia School of Computing and Information Technology University of Wollongong WollongongNSW Australia
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob... 详细信息
来源: 评论
Digital Nudge Alerts: Fact-Checking Generative AI Responses  26th
Digital Nudge Alerts: Fact-Checking Generative AI Responses
收藏 引用
26th International Conference on Asia-Pacific Digital Libraries, ICADL 2024
作者: Lee, Chei Sian Lim, Kok Khiang Lee, Heechan Goh, Dion Hoe-Lian Wee Kim Wee School of Communication and Information Nanyang Technological University Singapore Singapore School of Computing Korea Advanced Institute of Science and Technology Daejeon Korea Republic of
Generative artificial intelligence (GenAI) chatbots have reshaped human-AI interaction behavior and transformed industries and educational sectors. Despite its advantages, GenAI presents several limitations and concer... 详细信息
来源: 评论
Testing the Phenomenological Interacting Dark Energy Model with Gamma-Ray Bursts and Pantheon+ type Ia Supernovae
收藏 引用
Research in Astronomy and Astrophysics 2024年 第12期24卷 24-30页
作者: Xiao-Dong Nong Nan Liang Key Laboratory of Information and Computing Science Guizhou Province Guizhou Normal UniversityGuiyang 550025China School of Cyber Science and Technology Guizhou Normal UniversityGuiyang 550025China Joint Center for FAST Sciences Guizhou Normal University Node Guiyang 550025China
In this paper, we utilize recent observational data from gamma-ray bursts(GRBs) and Pantheon+ supernovae Ia(SNe Ia) samples to explore the interacting dark energy(IDE) model in a phenomenological scenario. Results fro... 详细信息
来源: 评论