咨询与建议

限定检索结果

文献类型

  • 19,577 篇 会议
  • 10,806 篇 期刊文献
  • 459 册 图书

馆藏范围

  • 30,842 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,734 篇 工学
    • 13,767 篇 计算机科学与技术...
    • 11,075 篇 软件工程
    • 5,062 篇 信息与通信工程
    • 3,213 篇 控制科学与工程
    • 2,378 篇 电气工程
    • 2,223 篇 生物工程
    • 2,125 篇 电子科学与技术(可...
    • 1,707 篇 生物医学工程(可授...
    • 1,470 篇 光学工程
    • 1,290 篇 机械工程
    • 1,047 篇 网络空间安全
    • 1,004 篇 仪器科学与技术
    • 953 篇 动力工程及工程热...
    • 852 篇 化学工程与技术
    • 838 篇 安全科学与工程
    • 656 篇 交通运输工程
  • 10,101 篇 理学
    • 5,061 篇 数学
    • 3,067 篇 物理学
    • 2,529 篇 生物学
    • 1,577 篇 统计学(可授理学、...
    • 1,150 篇 系统科学
    • 1,038 篇 化学
  • 5,448 篇 管理学
    • 3,429 篇 管理科学与工程(可...
    • 2,259 篇 图书情报与档案管...
    • 1,576 篇 工商管理
  • 2,007 篇 医学
    • 1,635 篇 临床医学
    • 1,459 篇 基础医学(可授医学...
    • 984 篇 公共卫生与预防医...
    • 830 篇 药学(可授医学、理...
  • 985 篇 法学
    • 790 篇 社会学
  • 608 篇 经济学
  • 471 篇 农学
  • 402 篇 教育学
  • 180 篇 文学
  • 84 篇 军事学
  • 52 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 935 篇 deep learning
  • 917 篇 computer science
  • 839 篇 accuracy
  • 724 篇 machine learning
  • 652 篇 feature extracti...
  • 560 篇 internet of thin...
  • 491 篇 computational mo...
  • 475 篇 support vector m...
  • 462 篇 training
  • 403 篇 artificial intel...
  • 400 篇 convolutional ne...
  • 331 篇 real-time system...
  • 326 篇 data mining
  • 324 篇 predictive model...
  • 276 篇 optimization
  • 274 篇 security
  • 270 篇 routing
  • 266 篇 wireless sensor ...
  • 261 篇 reliability
  • 256 篇 cloud computing

机构

  • 285 篇 faculty of scien...
  • 282 篇 department for p...
  • 281 篇 department of ph...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 217 篇 physics division...
  • 207 篇 yerevan physics ...
  • 204 篇 department of ph...
  • 197 篇 department of ph...
  • 195 篇 kirchhoff-instit...
  • 171 篇 centre de calcul...
  • 163 篇 fakultät für phy...
  • 155 篇 institute of phy...
  • 154 篇 institute of phy...
  • 153 篇 maharishi school...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 259 篇 s. mohapatra
  • 257 篇 y. nagasaka
  • 250 篇 d. guest
  • 243 篇 y. tayalati

语言

  • 28,492 篇 英文
  • 1,970 篇 其他
  • 383 篇 中文
  • 35 篇 日文
  • 5 篇 斯洛文尼亚文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
检索条件"机构=Software Engineering & Information Technology Institute Computer Science Department"
30842 条 记 录,以下是131-140 订阅
排序:
DyPSS: Dynamic Priority Signalling System for Emergency Vehicles using Fog and YOLOv8  17
DyPSS: Dynamic Priority Signalling System for Emergency Vehi...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Kakde, Anuj Nath, Shubha Brata Ghosh, Soumya K. Indian Institute of Technology Department of Computer Science and Engineering Kharagpur India Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India
Efficient navigation of emergency response vehicles (ERVs) through urban congestion is crucial to life-saving efforts, yet traditional traffic systems often slow down their swift passage. In this work, we introduce Dy... 详细信息
来源: 评论
OptiFog: A Framework for Acquiring State information and Predicting Resource Availability for Task Offloading in Cooperative Fog-Networks
收藏 引用
IEEE Transactions on Services Computing 2024年 1-13页
作者: Alam, Mehbub Ahmed, Nurzaman Ghosh, Shyamal Matam, Rakesh Barbhuiya, Ferdous Ahmed Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India Department of Computer Science Dartmouth College Hanover USA School of Data Science Indian Institute of Science Education and Research Thiruvananthapuram India
The primary objective of fog computing is to minimize the reliance of IoT devices on the cloud by leveraging the resources of fog network. Typically, IoT devices offload computation tasks to fog to meet different task... 详细信息
来源: 评论
EAMR-Net: A multiscale effective spatial and cross-channel attention network for retinal vessel segmentation
收藏 引用
Mathematical Biosciences and engineering 2024年 第3期21卷 4742-4761页
作者: Prethija, G. Katiravan, Jeevaa School of Computer Science and Engineering Vellore Institute of Technology Chennai600127 India Department of Information Technology Velammal Engineering College Chennai600066 India
Delineation of retinal vessels in fundus images is essential for detecting a range of eye disorders. An automated technique for vessel segmentation can assist clinicians and enhance the efficiency of the diagnostic pr... 详细信息
来源: 评论
Fake News Encoder Classifier (FNEC) for Online Published News Related to COVID-19 Vaccines
收藏 引用
Intelligent Automation & Soft Computing 2023年 第7期37卷 73-90页
作者: Asma Qaiser Saman Hina Abdul Karim Kazi Saad Ahmed Raheela Asif Department of Computer Science and Information Technology NED University of Engineering and TechnologyKarachi75270Pakistan Department of Computer Science Iqra UniversityKarachi76400Pakistan Department of Software Engineering NED University of Engineering and TechnologyKarachi75270Pakistan
In the past few years,social media and online news platforms have played an essential role in distributing news content *** of the authenticity of news has become a major *** the COVID-19 outbreak,misinformation and f... 详细信息
来源: 评论
Trust and QoS-Driven Query Service Provisioning Using Optimization
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 1827-1844页
作者: K.Narmatha K.Karthikeyan Department of Computer Science and Engineering SRM Institute of Engineering and TechnologyRamapuramChennaiIndia Department of Information Technology Coimbatore Institute of TechnologyCoimbatoreIndia
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
Securing Autonomous UAV Cluster With Blockchain-Based Threshold Key Management System Utilizing Crypto-Asset and Multisignature
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5765-5778页
作者: Kharjana, Mebanjop Sahana, Subhas Chandra Saha, Goutam North-Eastern Hill University Department of Information Technology Shillong793022 India National Institute of Technology Department of Computer Science and Engineering Durgapur713209 India
Unmanned aerial vehicles deployed in remote locations rely on self-governed key management for their protection. However, conventional key management depends on a centralized ground-based station or single vehicle. Su... 详细信息
来源: 评论
Falcon Optimization Algorithm-Based Energy Efficient Communication Protocol for Cluster-Based Vehicular Networks
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4243-4262页
作者: Youseef Alotaibi B.Rajasekar R.Jayalakshmi Surendran Rajendran Department of Software Engineering College of ComputingUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Electronics and Communication Engineering Sathyabama Institute of Science and TechnologyChennai600119India Department of Computer Science and Engineering Panimalar Engineering CollegeChennai600123India Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical ScienceChennai602105India
Rapid development in information technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)*** networks give a safe and more effective driving experie... 详细信息
来源: 评论
A Survey of Edge Caching:Key Issues and Challenges
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 818-842页
作者: Hanwen Li Mingtao Sun Fan Xia Xiaolong Xu Muhammad Bilal School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 262700China Reading Academy Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Department of Computer Engineering Hankuk University of Foreign StudiesYongin-si 17035Republic of Korea
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论