咨询与建议

限定检索结果

文献类型

  • 6,062 篇 会议
  • 5,136 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,323 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,286 篇 工学
    • 5,245 篇 计算机科学与技术...
    • 4,334 篇 软件工程
    • 1,734 篇 信息与通信工程
    • 1,039 篇 控制科学与工程
    • 900 篇 生物工程
    • 866 篇 电气工程
    • 668 篇 电子科学与技术(可...
    • 590 篇 生物医学工程(可授...
    • 571 篇 光学工程
    • 538 篇 机械工程
    • 360 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 320 篇 动力工程及工程热...
    • 312 篇 网络空间安全
    • 266 篇 交通运输工程
    • 244 篇 安全科学与工程
  • 4,080 篇 理学
    • 2,014 篇 数学
    • 1,296 篇 物理学
    • 1,007 篇 生物学
    • 674 篇 统计学(可授理学、...
    • 413 篇 系统科学
    • 374 篇 化学
  • 2,046 篇 管理学
    • 1,208 篇 管理科学与工程(可...
    • 917 篇 图书情报与档案管...
    • 563 篇 工商管理
  • 603 篇 医学
    • 518 篇 临床医学
    • 457 篇 基础医学(可授医学...
    • 283 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 394 篇 法学
    • 307 篇 社会学
  • 187 篇 经济学
  • 149 篇 教育学
  • 139 篇 农学
  • 37 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 292 篇 deep learning
  • 268 篇 machine learning
  • 259 篇 feature extracti...
  • 216 篇 computational mo...
  • 192 篇 accuracy
  • 184 篇 semantics
  • 168 篇 internet of thin...
  • 167 篇 predictive model...
  • 163 篇 training
  • 142 篇 real-time system...
  • 116 篇 data mining
  • 110 篇 support vector m...
  • 110 篇 neural networks
  • 110 篇 artificial intel...
  • 108 篇 optimization
  • 107 篇 computer science
  • 107 篇 security
  • 96 篇 visualization
  • 89 篇 cloud computing
  • 87 篇 data models

机构

  • 172 篇 university of ch...
  • 121 篇 key laboratory o...
  • 112 篇 university of sc...
  • 96 篇 tianfu cosmic ra...
  • 90 篇 hebei normal uni...
  • 88 篇 state key labora...
  • 88 篇 school of comput...
  • 88 篇 school of comput...
  • 86 篇 department of ph...
  • 85 篇 yunnan observato...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 53 篇 school of inform...
  • 53 篇 school of comput...
  • 52 篇 school of comput...
  • 52 篇 college of intel...
  • 48 篇 school of physic...
  • 47 篇 institute for nu...
  • 46 篇 department of co...

作者

  • 89 篇 niyato dusit
  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 70 篇 kuleshov d.
  • 70 篇 li cheng
  • 69 篇 li xin
  • 69 篇 liu d.
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 66 篇 dai h.l.
  • 62 篇 min z.
  • 60 篇 guo y.q.
  • 57 篇 liu b.
  • 56 篇 heller m.
  • 56 篇 bao y.w.
  • 55 篇 hu h.b.

语言

  • 10,577 篇 英文
  • 617 篇 其他
  • 122 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11323 条 记 录,以下是81-90 订阅
排序:
A Competent Medical Image Steganography using Improved Optimization Algorithm with Huffman Encoding Techniques  7
A Competent Medical Image Steganography using Improved Optim...
收藏 引用
7th International Conference on computing Methodologies and Communication, ICCMC 2023
作者: Ramapriya, B. Kalpana, Y. School of Computing Science Department of Information Technology VISTAS Chennai India
Steganography is considered a reliable solution for avoiding third-party attacks. It is the process of embedding confidential information in another image. So that, they can be sent to the user's end with full sec... 详细信息
来源: 评论
Deep Learning for Wind Speed Forecasting Using Bi-LSTM with Selected Features
收藏 引用
Intelligent Automation & Soft computing 2023年 第3期35卷 3829-3844页
作者: Siva Sankari Subbiah Senthil Kumar Paramasivan Karmel Arockiasamy Saminathan Senthivel Muthamilselvan Thangavel Department of Computer Science and Engineering Sreenivasa Institute of Technology and Management StudiesChittoor517127India School of Information Technology&Engineering Vellore Institute of TechnologyVellore632014India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India School of Computing College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India
Wind speed forecasting is important for wind energy *** the modern era,the increase in energy demand can be managed effectively by fore-casting the wind speed *** main objective of this research is to improve the perf... 详细信息
来源: 评论
An indoor delivery robot based on YOLOv8 and ROS  7
An indoor delivery robot based on YOLOv8 and ROS
收藏 引用
2024 7th International Conference on Intelligent Manufacturing and Automation, IMA 2024
作者: Sun, Zhijin Fan, Jianan Lu, Jialin Zhang, Lei Li, Xiaoyang Deng, Baoru School of Electronic Information Engineering Zhuhai College of Science and Technology Zhuhai China School of Mechanical Engineering Zhuhai College of Science and Technology Zhuhai China School of Computing Zhuhai College of Science and Technology Zhuhai China
Aiming at the problems of inflexible movement, poor operation efficiency, low space utilization in the storage area and poor compatibility of placed items, intelligent route planning ability and weak intelligent obsta... 详细信息
来源: 评论
SketchBoard: Sketch-Guided Storyboard Generation for Game Characters in the Game Industry  22
SketchBoard: Sketch-Guided Storyboard Generation for Game Ch...
收藏 引用
22nd IEEE International Conference on Industrial Informatics, INDIN 2024
作者: Chan, Elicia Min Yi Seow, Chee Kiat Tan, Esther Su Wee Wang, Min Yau, Peter Chunyu Cao, Qi School of Computing Science University of Glasgow Singapore School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou China
Research outcomes have been reported to various industrial applications of Artificial Intelligence generated content (AIGC). This paper explores AI assisted creative production of storyboard and game characters in the... 详细信息
来源: 评论
Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge computing Environments
收藏 引用
Tsinghua science and technology 2023年 第1期28卷 93-104页
作者: Huanhuan Xu Jingya Zhou Wenqi Wei Baolei Cheng School of Computer Science and Technology Soochow UniversitySuzhou 215006China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China School of Computer Science Georgia Institute of TechnologyAtlantaGA 30332USA
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n... 详细信息
来源: 评论
An Explainable Intelligent Intrusion Detection System
An Explainable Intelligent Intrusion Detection System
收藏 引用
2024 International Symposium on Networks, Computers and Communications, ISNCC 2024
作者: Mahmoud, Maiada Youssef, Yasser Omar Abdel-Hamid, Ayman College of Computing and Information Technology Arab Academy for Science Technology and Maritime Transport Egypt School of Library and Information Studies University of Oklahoma United States
In the rapidly evolving field of cybersecurity, sophisticated cyber threats pose significant challenges to Intrusion Detection Systems (IDS). Machine learning (ML) models have become increasingly integral to IDS, leve... 详细信息
来源: 评论
Predicting software vulnerability based on software metrics: a deep learning approach
收藏 引用
Iran Journal of Computer science 2024年 第4期7卷 801-812页
作者: Agbenyegah, Francis Kwadzo Asante, Micheal Chen, Jinfu Akpaku, Ernest Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Department of Information Technology Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit... 详细信息
来源: 评论
Multiple moving object classification and tracking using DenCNN classifier
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第5-6期46卷 11311-11329页
作者: Premanand, V. Arulalan, V. Kumar, Dhananjay School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Chengalpattu District Tamil Nadu Kattankulathur India Department of Information Technology Anna University Madras Institute of Technology Campus Tamil Nadu Chennai India
A Multiple moving object detection, tracking, and counting algorithm is mainly designed exclusively suitable for congested areas. The counting system can alleviate the betrayal performance in the crowded areas. Most o... 详细信息
来源: 评论
Two-step Runge–Kutta methods for Volterra integro-differential equations
收藏 引用
International Journal of Computer Mathematics 2024年 第1期101卷 37-55页
作者: Wen, Jiao Huang, Chengming Guan, Hongbo College of Mathematics and Information Science Zhengzhou University of Light Industry Zhengzhou China School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan China
In this paper, we investigate two-step Runge–Kutta methods to solve Volterra integro-differential equations. Two-step Runge–Kutta methods increase the order of convergence in comparing the classical Runge–Kutta met... 详细信息
来源: 评论
Industrial Control Anomaly Detection Based on Distributed Linear Deep Learning
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1129-1150页
作者: Shijie Tang Yong Ding Huiyong Wang School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China School of Electronic Engineering and Automation Guilin University of Electronic TechnologyGuilin541004China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic TechnologyGuilin541004China Institute of Cyberspace Technology HKCT Institute for Higher EducationHong Kong999077China School of Mathematics&Computing Science Guilin University of Electronic TechnologyGuilin541004China
As more and more devices in Cyber-Physical Systems(CPS)are connected to the Internet,physical components such as programmable logic controller(PLC),sensors,and actuators are facing greater risks of network attacks,and... 详细信息
来源: 评论