咨询与建议

限定检索结果

文献类型

  • 6,150 篇 会议
  • 5,208 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 11,484 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,436 篇 工学
    • 5,354 篇 计算机科学与技术...
    • 4,415 篇 软件工程
    • 1,755 篇 信息与通信工程
    • 1,070 篇 控制科学与工程
    • 905 篇 生物工程
    • 891 篇 电气工程
    • 682 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 577 篇 光学工程
    • 541 篇 机械工程
    • 366 篇 仪器科学与技术
    • 347 篇 化学工程与技术
    • 320 篇 动力工程及工程热...
    • 315 篇 网络空间安全
    • 265 篇 交通运输工程
    • 250 篇 安全科学与工程
  • 4,131 篇 理学
    • 2,041 篇 数学
    • 1,310 篇 物理学
    • 1,014 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 416 篇 系统科学
    • 379 篇 化学
  • 2,072 篇 管理学
    • 1,227 篇 管理科学与工程(可...
    • 925 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 611 篇 医学
    • 528 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 257 篇 药学(可授医学、理...
  • 398 篇 法学
    • 309 篇 社会学
  • 189 篇 经济学
  • 156 篇 教育学
  • 142 篇 农学
  • 36 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 298 篇 deep learning
  • 261 篇 machine learning
  • 260 篇 feature extracti...
  • 221 篇 computational mo...
  • 192 篇 accuracy
  • 185 篇 semantics
  • 171 篇 predictive model...
  • 168 篇 internet of thin...
  • 168 篇 training
  • 144 篇 real-time system...
  • 117 篇 data mining
  • 110 篇 support vector m...
  • 110 篇 artificial intel...
  • 109 篇 neural networks
  • 109 篇 security
  • 108 篇 computer science
  • 108 篇 optimization
  • 95 篇 visualization
  • 88 篇 data models
  • 87 篇 cloud computing

机构

  • 172 篇 university of ch...
  • 122 篇 key laboratory o...
  • 113 篇 university of sc...
  • 97 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 91 篇 hebei normal uni...
  • 89 篇 state key labora...
  • 87 篇 department of ph...
  • 87 篇 school of comput...
  • 86 篇 yunnan observato...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 56 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 college of compu...
  • 54 篇 school of comput...
  • 54 篇 college of intel...
  • 48 篇 institute for nu...
  • 47 篇 department of co...

作者

  • 97 篇 niyato dusit
  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 10,384 篇 英文
  • 959 篇 其他
  • 127 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11484 条 记 录,以下是511-520 订阅
排序:
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-Ⅱ
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5641-5661页
作者: Afia Zafar Muhammad Aamir Nazri Mohd Nawi Ali Arshad Saman Riaz Abdulrahman Alruban Ashit Kumar Dutta Badr Almutairi Sultan Almotairi Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaMalaysia School of Electronics Computing and MathematicsUniversity of DerbyUK Department of Computer Science National University of TechnologyIslamabadPakistan Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Saudi Arabia Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia Department of Information Systems Faculty of Computer and Information SciencesIslamic University of MadinahMadinah42351Saudi Arabia
In computer vision,convolutional neural networks have a wide range of *** representmost of today’s data,so it’s important to know how to handle these large amounts of data *** neural networks have been shown to solv... 详细信息
来源: 评论
A Secure Communication Protocol for Unmanned Aerial Vehicles
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 601-618页
作者: Navid Ali Khan N.Z.Jhanjhi Sarfraz Nawaz Brohi Abdulwahab Ali Almazroi Abdulaleem Ali Almazroi School of Computer Science and Engineering(SCE) Taylor’s University Lake-side CampusSubang Jaya47500Malaysia School of Information and Technology Monash UniversityMalaysia University of Jeddah College of Computing and Information Technology at KhulaisDepartment of Information TechnologyJeddahSaudi Arabia Department of Computer Science Rafha Community CollegeNorthern Border UniversityArar91431Saudi Arabia
Mavlink is a lightweight and most widely used open-source communication protocol used for Unmanned Aerial *** UAVs and autopilot systems support it,and it provides bi-directional communication between the UAV and Grou... 详细信息
来源: 评论
'User AR' - Leveraging AI Based Augmented Reality for User Manuals  15
'User AR' - Leveraging AI Based Augmented Reality for User M...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Shanmugam, Thirumurugan Chandrashekar, Chirag Bhati, Vipin Subburaj, Maheswari Sivaraman, Arun Kumar Sultana, Ajmery University of Technology and Applied Sciences College of Computing and Information Sciences Suhar Oman Vellore Institute of Technology School of Computer Science and Engineering Chennai India Photon Interactive Inc Digital Engineering Solution Center TorontoON Canada Algoma University School of Computer Science and Technology BramptonON Canada
The objective of this research is to propose an AI based novel augmented reality (AR) software to assist users in operating a wide range of technical and non-technical devices. The project's aim is to make this AR... 详细信息
来源: 评论
GIRP: Energy-Efficient QoS-Oriented Microservice Resource Provisioning via Multi-Objective Multi-Task Reinforcement Learning
收藏 引用
IEEE Transactions on Mobile computing 2025年 第7期24卷 5793-5807页
作者: Yuan, Honggang Wang, Ting Fu, Min Shi, Yuanming East China Normal University MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Laboratory of Trustworthy Computing Shanghai200062 China National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore ShanghaiTech University School of Information Science and Technology Shanghai201210 China
Microservice architecture has revolutionized web service development by facilitating loosely coupled and independently developable components distributed as containers or virtual machines. While existing studies empha... 详细信息
来源: 评论
An embedded vertical‐federated feature selection algorithm based on particle swarm optimisation
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 734-754页
作者: Yong Zhang Ying Hu Xiaozhi Gao Dunwei Gong Yinan Guo Kaizhou Gao Wanqiu Zhang School of Information and Control Engineering China University of Mining and TechnologyXuzhouChina The Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchunChina School of Computing University of Eastern FinlandKuopioFinland The Macao Institute of Systems Engineering Macao University of Science and TechnologyTaipaChina
In real life,a large amount of data describing the same learning task may be stored in different institutions(called participants),and these data cannot be shared among par-ticipants due to privacy *** case that diffe... 详细信息
来源: 评论
Automatic Feature Extraction from Satellite Imagery for Remote Sensing  7
Automatic Feature Extraction from Satellite Imagery for Remo...
收藏 引用
7th International Conference on Trends in Electronics and Informatics, ICOEI 2023
作者: Mary, D Diya Nair, Nandana S. Mohana Revathy, S. Gladence, L. Mary Bernatin, T. Sathyabama Institute of Science and Technology Department of Information Technology Chennai India Centre for Remote Sensing and Geoinformatics Sathyabama Institute of Science and Technology Chennai India School of Computing Sathyabama Institute of Science and Technology Chennai India Sathyabama Institute of Science and Technology Department of Ece Chennai India
Feature extraction from satellite images has steadily but progressively grown in recent years. Numerous feature extraction techniques have been created as a result of the increase. The loss of certain features is one ... 详细信息
来源: 评论
FedHKD: A Hierarchical Federated Learning Approach Integrating Clustering and Knowledge Distillation for Non-IID Data  1
收藏 引用
2nd International Conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Hu, Shiwen Wang, Changji Li, Yuan Liu, Zhen Liu, Ning Gan, Qingqing School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou China Guangdong Engineering Research Center of Data Security Governance and Privacy Computing Guangzhou China
Federated learning allows decentralized model training while preserving data privacy. However, Non-IID data poses significant challenges, leading to performance degradation and increased communication overhead. This p... 详细信息
来源: 评论
An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart Grid  9
An Efficient and Privacy-Preserving Load Monitoring and Bill...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Ding, Yong Yuan, Enchang Yang, Changsong Liang, Hai Wang, Huiyong Peng, Xinyong Guilin University of Electronic Technology Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin541004 China Guangxi Zhuang Autonomous Region Information Center Guangxi Key Laboratory of Digital Infrastructure Nanning530000 China Guilin University of Electronic Technology School of Mathematics and Computing Science Guilin541004 China
The smart grid is widely recognized as a highly efficient solution for mitigating carbon emissions and addressing energy crises. Within this framework, the collection of metering data from users is crucial for improvi... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-Indistinguishable Approach
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan Kunming650221 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250316 China Ministry of Education Key Laboratory of Equipment Data Security and Guarantee Technology Guilin541004 China Beijing University of Posts and Telecommunications Beijing100876 China Zhejiang University School of Computer Science and Technology Hangzhou310027 China Nanjing University of Aeronautics and Astronautics School of Computer Science and Technology Nanjing210016 China University of Southern Queensland School of Mathematics Physics and Computing ToowoombaQLD4350 Australia
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Visual simulation of bone cement blending and dynamic flow
Visual simulation of bone cement blending and dynamic flow
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Shen, Long Zhang, Yalan Frey, Steffen Telea, Alex Kosinka, Jiri Wang, Xiaokun Ban, Xiaojuan University of Science and Technology Beijing School of Intelligence Science and Technology Beijing China University of Groningen Bernoulli Institute Groningen Netherlands Utrecht University Department of Information and Computing Sciences Utrecht Netherlands University of Science and Technology Beijing Beijing Key Laboratory of Knowledge Engineeringfor Materials Science Beijing China
Bone cement filling is an important method for preventing osteoporosis and treating fractures. In bone cement filling surgery, the preparation and dosage of the cement usually depend on specific product manuals and th... 详细信息
来源: 评论