咨询与建议

限定检索结果

文献类型

  • 6,177 篇 会议
  • 5,177 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,400 篇 工学
    • 5,325 篇 计算机科学与技术...
    • 4,384 篇 软件工程
    • 1,744 篇 信息与通信工程
    • 1,063 篇 控制科学与工程
    • 900 篇 生物工程
    • 868 篇 电气工程
    • 679 篇 电子科学与技术(可...
    • 600 篇 生物医学工程(可授...
    • 551 篇 光学工程
    • 538 篇 机械工程
    • 366 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 318 篇 动力工程及工程热...
    • 314 篇 网络空间安全
    • 264 篇 交通运输工程
    • 249 篇 安全科学与工程
  • 4,098 篇 理学
    • 2,037 篇 数学
    • 1,293 篇 物理学
    • 1,008 篇 生物学
    • 683 篇 统计学(可授理学、...
    • 415 篇 系统科学
    • 376 篇 化学
  • 2,055 篇 管理学
    • 1,213 篇 管理科学与工程(可...
    • 920 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 610 篇 医学
    • 526 篇 临床医学
    • 463 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 392 篇 法学
    • 306 篇 社会学
  • 188 篇 经济学
  • 155 篇 教育学
  • 141 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 303 篇 deep learning
  • 266 篇 feature extracti...
  • 261 篇 machine learning
  • 224 篇 computational mo...
  • 213 篇 accuracy
  • 190 篇 semantics
  • 175 篇 predictive model...
  • 174 篇 internet of thin...
  • 167 篇 training
  • 150 篇 real-time system...
  • 117 篇 data mining
  • 115 篇 artificial intel...
  • 114 篇 support vector m...
  • 113 篇 neural networks
  • 113 篇 optimization
  • 113 篇 security
  • 106 篇 computer science
  • 96 篇 visualization
  • 93 篇 cloud computing
  • 92 篇 federated learni...

机构

  • 172 篇 university of ch...
  • 123 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 96 篇 hebei normal uni...
  • 96 篇 school of comput...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 88 篇 school of comput...
  • 87 篇 department of ph...
  • 77 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 56 篇 school of inform...
  • 55 篇 school of comput...
  • 55 篇 school of physic...
  • 54 篇 institute for nu...
  • 53 篇 school of comput...
  • 52 篇 college of compu...
  • 52 篇 college of intel...

作者

  • 97 篇 niyato dusit
  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 75 篇 bastieri d.
  • 74 篇 jiang k.
  • 69 篇 kuleshov d.
  • 68 篇 li xin
  • 68 篇 liu d.
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 67 篇 huang d.h.
  • 67 篇 dai h.l.
  • 66 篇 li cheng
  • 64 篇 liu b.
  • 62 篇 guo y.q.
  • 60 篇 min z.
  • 60 篇 bao y.w.
  • 60 篇 hu h.b.
  • 58 篇 liu h.d.

语言

  • 9,607 篇 英文
  • 1,742 篇 其他
  • 130 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11479 条 记 录,以下是901-910 订阅
排序:
Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme
Design of a Secure Machine Learning-Based Malware Detection ...
收藏 引用
2023 IEEE International Conference on Communications, computing, Cybersecurity and Informatics, CCCI 2023
作者: Kumar, Pankaj Obaidat, Mohammad S. Pandey, Piyush Wazid, Mohammad Das, Ashok Kumar Singh, Devesh Pratap Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India King Abdullah Ii School of Information Technology The University of Jordan Amman11942 Jordan School of Computing Srm University Jordan University of Science and Technology Beijing Beijing100083 China School of Computing Srm University TN Kattankulathur603203 India Algorithmic Research International Institute of Information Technology Center for Security Theory Hyderabad India
Today's world is rapidly growing towards the advanced concept of technology. technology nowadays is at its peak of development and has great advantages in all fields of work, whether it is in industrial automation... 详细信息
来源: 评论
Energy-Aware Compression and Consumption Algorithms for Efficient TinyML Model Using Aquila Optimization in Industrial IoT
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 334-342页
作者: Thuppari, Chaitanya Jannu, Srikanth Edla, Damodar Reddy Vidyarthi, Ankit Agarwal, Krishna Kant Alkhayyat, Ahmed Vaagdevi Engineering College Department of CSE Bollikunta Warangal506 005 India National Institute of Technology Department of CSE Goa 403 703 India Jaypee Institute of Information Technology Noida Department of CSE and IT Noida India Galgotias University School of Computing Science and Engineering Greater Noida India Islamic University College of Technical Engineering Najaf Iraq
With the proliferation of Industrial Internet of Things (IIoT) applications, the demand for energy efficient compression and clustering algorithms has escalated along with reliable routing algorithms. This paper propo... 详细信息
来源: 评论
Investigating Naive Bayes Algorithms for Network Time Series Analysis  5th
Investigating Naive Bayes Algorithms for Network Time Series...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Nidhya, M.S. Verma, Sunny Mohamed, H. B. Asif Agarwal, Trapty Karnataka Bangalore India Department of Electronic & Communication Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India
Naive Bayes algorithms are a class of supervised gadget mastering models which are typically used for a variety of obligations, together with statistics mining, textual content category, and regression. This studies e... 详细信息
来源: 评论
HOFD: An Outdated Fact Detector for Knowledge Bases
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2023年 第10期35卷 10775-10789页
作者: Hao, Shuang Chai, Chengliang Li, Guoliang Tang, Nan Wang, Ning Yu, Xiang Beijing Jiaotong University School of Computer and Information Technology Beijing100044 China Beijing Key Laboratory of Traffic Data Analysis and Mining Beijing100044 China Beijing Institute of Technology School of Computer Science and Technology Beijing100811 China Beijing100190 China Qatar Computing Research Institute Hbku Doha34110 Qatar Huawei Company Gauss Department Beijing100031 China
Knowledge bases (KBs), which store high-quality information, are crucial for many applications, such as enhancing search results and serving as external sources for data cleaning. Not surprisingly, there exist outdate... 详细信息
来源: 评论
Multi-features fusion for short-term photovoltaic power prediction
收藏 引用
Intelligent and Converged Networks 2022年 第4期3卷 311-324页
作者: Ming Ma Xiaorun Tang Qingquan Lv Jun Shen Baixue Zhu Jinqiang Wang Binbin Yong State Grid Gansu Electric Power Research Institute Lanzhou 730000China School of Information Science and Engineering Lanzhou UniversityLanzhou 730000China School of Computing and Information Technology University of WollongongWollongong 2522Australia
In recent years,in order to achieve the goal of“carbon peaking and carbon neutralization”,many countries have focused on the development of clean energy,and the prediction of photovoltaic power generation has become... 详细信息
来源: 评论
Implicit Supervision-Assisted Graph Collaborative Filtering for Third-Party Library Recommendation
收藏 引用
IEEE Transactions on Services computing 2025年 第3期18卷 1459-1471页
作者: Lianrong Chen Mingdong Tang Naidan Mei Fenfang Xie Guo Zhong Qiang He School of Information Science and Technology Guangdong University of Foreign Studies Guangzhou China Unicom (Guangdong) Industry Internet Company Guangzhou China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computing Technologies Swinburne University of Technology Melbourne VIC Australia
Third-party libraries (TPLs) play a crucial role in software development. Utilizing TPL recommender systems can aid software developers in promptly finding useful TPLs. A number of TPL recommendation approaches have b... 详细信息
来源: 评论
Multi-Target Distributed Maximum Correntropy Kalman Filter  24
Multi-Target Distributed Maximum Correntropy Kalman Filter
收藏 引用
12th International Conference on Communications and Broadband Networking, ICCBN 2024
作者: Deng, Xingyu Han, Hongyu Zhang, Sheng Xu, Yin College of Computer Science and Visual Computing Virtual Reality Key Laboratory of Sichuan Province Sichuan Normal University Chengdu610066 China The School of Information Science and Technology Southwest Jiaotong University Chengdu611756 China
Multi-target tracking in sensor networks is a challenging problem, especially in scenarios where sensor observations are limited. Conventional centralized Kalman filters and distributed Kalman filters (DKFs) require e... 详细信息
来源: 评论
Double Cancelable Hashing for Protecting Biometrics of Users in Crowd  18
Double Cancelable Hashing for Protecting Biometrics of Users...
收藏 引用
18th INDIAcom;11th International Conference on computing for Sustainable Global Development, INDIACom 2024
作者: Almutairi, Mishaal M. Apostolopoulou, Dimitra Stupples, David Sen, Adnan Ahmed Abi Yamin, Mohammad Halikias, George City University of London School of Science and Technology Dept. of Electrical and Electronic Engg London United Kingdom Islamic University Deanship of Information Technology Madinah Saudi Arabia The Australian National University School of Computing College of Engineering and Computer Science Canberra Australia University of Athens Department of Mathematics Greece
Smart gates are considered one of the most important methods for managing crowds. Often, methods of authentication and verification of users depend on the user's biometric fingerprints, such as hand or eye prints.... 详细信息
来源: 评论
Developing Algorithms for Adaptive Network Coding and Its Impact on Wireless Network Performance  5th
Developing Algorithms for Adaptive Network Coding and Its Im...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Garg, Aanchal Poornima, Selvaraj Savita Nachappa, M.N. Department of Electronic & Communication Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India
Adaptive network coding (ANC) is a recent technique used in Wi-Fi networks that utilizes coded transmissions to boost community performance. The concept at the back of ANC is to find the ideal combination of coded pac... 详细信息
来源: 评论
Remaining Useful Life Prediction of Degraded Systems Based on Multiple Performance Indicators Constructed by Multiple Features
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 19613-19631页
作者: Wu, Bin Shi, Hui Zeng, Jianchao Zhang, Xiaohong Wang, Zhijian Wang, Zuolu Taiyuan University of Science and Technology School of Electronic Information Engineering Taiyuan030024 China North University of China institute for Big Data and Visual Computing Taiyuan030051 China University of Huddersfield Centre for Efficiency and Performance Engineering HuddersfieldHD1 3DH United Kingdom
The health status assessment of industrial equipment is critical to fault prediction and health management technologies. To fully reflect system degradation and accurately predict the remaining useful life (RUL) of a ... 详细信息
来源: 评论