咨询与建议

限定检索结果

文献类型

  • 82,927 篇 会议
  • 46,701 篇 期刊文献
  • 879 册 图书
  • 5 篇 科技报告
  • 1 篇 专利

馆藏范围

  • 130,513 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 78,718 篇 工学
    • 53,386 篇 计算机科学与技术...
    • 43,272 篇 软件工程
    • 17,859 篇 信息与通信工程
    • 13,101 篇 控制科学与工程
    • 9,090 篇 电气工程
    • 8,572 篇 生物工程
    • 8,273 篇 电子科学与技术(可...
    • 6,446 篇 生物医学工程(可授...
    • 6,201 篇 机械工程
    • 5,561 篇 光学工程
    • 4,626 篇 化学工程与技术
    • 4,258 篇 仪器科学与技术
    • 3,985 篇 动力工程及工程热...
    • 3,325 篇 网络空间安全
    • 3,263 篇 材料科学与工程(可...
    • 3,010 篇 安全科学与工程
    • 2,877 篇 交通运输工程
  • 45,464 篇 理学
    • 22,495 篇 数学
    • 13,985 篇 物理学
    • 10,036 篇 生物学
    • 6,910 篇 统计学(可授理学、...
    • 4,896 篇 系统科学
    • 4,888 篇 化学
  • 22,254 篇 管理学
    • 14,003 篇 管理科学与工程(可...
    • 9,203 篇 图书情报与档案管...
    • 5,893 篇 工商管理
  • 6,811 篇 医学
    • 5,578 篇 临床医学
    • 4,868 篇 基础医学(可授医学...
    • 2,901 篇 药学(可授医学、理...
  • 3,597 篇 法学
    • 2,902 篇 社会学
  • 2,359 篇 经济学
  • 2,086 篇 农学
  • 1,553 篇 教育学
  • 555 篇 文学
  • 366 篇 军事学
  • 254 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 3,450 篇 accuracy
  • 3,352 篇 feature extracti...
  • 3,249 篇 computer science
  • 3,182 篇 deep learning
  • 3,136 篇 educational inst...
  • 2,649 篇 computational mo...
  • 2,606 篇 training
  • 2,549 篇 machine learning
  • 1,798 篇 support vector m...
  • 1,763 篇 predictive model...
  • 1,759 篇 internet of thin...
  • 1,732 篇 data mining
  • 1,700 篇 optimization
  • 1,653 篇 convolutional ne...
  • 1,637 篇 real-time system...
  • 1,472 篇 data models
  • 1,435 篇 artificial intel...
  • 1,365 篇 neural networks
  • 1,326 篇 semantics
  • 1,229 篇 security

机构

  • 2,539 篇 college of compu...
  • 2,454 篇 college of compu...
  • 1,150 篇 college of compu...
  • 1,050 篇 college of compu...
  • 1,014 篇 department of ph...
  • 997 篇 cavendish labora...
  • 948 篇 oliver lodge lab...
  • 944 篇 physikalisches i...
  • 846 篇 university of ch...
  • 614 篇 infn sezione di ...
  • 595 篇 infn sezione di ...
  • 577 篇 infn laboratori ...
  • 550 篇 department of ph...
  • 541 篇 fakultät physik ...
  • 540 篇 imperial college...
  • 537 篇 infn sezione di ...
  • 536 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 531 篇 school of physic...
  • 515 篇 h.h. wills physi...

作者

  • 253 篇 barter w.
  • 244 篇 a. gomes
  • 237 篇 j. wang
  • 229 篇 c. alexa
  • 229 篇 j. m. izen
  • 229 篇 blake t.
  • 226 篇 beiter a.
  • 226 篇 s. chen
  • 225 篇 bellee v.
  • 222 篇 g. bella
  • 222 篇 j. strandberg
  • 221 篇 d. calvet
  • 221 篇 c. amelung
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.

语言

  • 120,453 篇 英文
  • 7,668 篇 其他
  • 2,350 篇 中文
  • 129 篇 日文
  • 16 篇 斯洛文尼亚文
  • 14 篇 德文
  • 14 篇 法文
  • 5 篇 俄文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Technology Systems College of Technology and Computer Science"
130513 条 记 录,以下是4841-4850 订阅
排序:
Electronic health records protection strategy by using blockchain approach
收藏 引用
Multimedia Tools and Applications 2024年 第39期83卷 86883-86894页
作者: Kathole, Atul B. Patil, Sonali D. Kumbhare, Savita Vhatkar, Kapil Kshirsagar, Aniruddha P. Kimbahune, Vinod V. Computer Engineering Dr. D. Y. Patil Institute of Technology Pune India IT Dept. Pimpri Chinchwad College of Engineering Pune India Computer Science and Engineering Department K.B.P College of Engineering Satara Satara India
Electronic health records (EHRs) provide significant challenges for medical organizations due to the digitalization of traditional medical information. When using EHRs, both doctors and patients are accustomed to spen... 详细信息
来源: 评论
A Expectation-Aware Dynamic Pricing Model for Spatial Crowdsourcing Platforms  6
A Expectation-Aware Dynamic Pricing Model for Spatial Crowds...
收藏 引用
6th Annual International Conference on Data science and Business Analytics, ICDSBA 2022
作者: Yuan, Zhanyi Cheng, Yurong Beijing Institute of Technology College of Computer Science and Technology Beijing China
Spatial crowdsourcing software are becoming indispensable to modern people's lives. Among all topics over spatial crowdsourcing platforms, pricing method study is a fundamental one. The pricing strategy largely in... 详细信息
来源: 评论
Boosted Spider Wasp Optimizer for High-dimensional Feature Selection
收藏 引用
Journal of Bionic Engineering 2024年 第5期21卷 2424-2459页
作者: Elfadil A.Mohamed Malik Sh.Braik Mohammed Azmi Al-Betar Mohammed A.Awadallah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman University346AjmanUnited Arab Emirates Department of Computer Science Al-Balqa Applied UniversityAl-Salt19117Jordan Department of Information Technology Al-Balqa Applied UniversityIrbid21510Jordan Department of Computer Science Al-Aqsa UniversityGaza4051Palestine Artificial Intelligence Research Center(AIRC) Ajman University346AjmanUnited Arab Emirates
With the increasing dimensionality of the data,High-dimensional Feature Selection(HFS)becomes an increasingly dif-ficult *** is not simple to find the best subset of features due to the breadth of the search space and... 详细信息
来源: 评论
OTFS-Chirp-Based Dual-Functional Waveform Design for Sensing and Communication  3
OTFS-Chirp-Based Dual-Functional Waveform Design for Sensing...
收藏 引用
3rd International Conference on Intelligent Computing and Next Generation Networks, ICNGN 2024
作者: Zhao, Di Dong, Zhicheng Zhou, Weixi Cai, Donghong College of Information Science and Technology Tibet University Lhasa China College of Computer Science Sichuan Normal University Chengdu China College of Cyber Security Jinan University Guangzhou China
The integrated sensing and communication (ISAC), which enables the same waveform to perform communication and sensing tasks, has increasingly garnered widespread attention in academic and industrial circles. The sidel... 详细信息
来源: 评论
VenomAttack: automated and adaptive activity hijacking in Android
收藏 引用
Frontiers of computer science 2023年 第1期17卷 187-204页
作者: Pu SUN Sen CHEN Lingling FAN Pengfei GAO Fu SONG Min YANG School of Information Science and Technology ShanghaiTech UniversityShanghai 201210China Shanghai Institute of Microsystem and Information Technology Chinese Academy of SciencesShanghai 200050China University of Chinese Academy of Sciences Beijing 100049China College of Intelligence and Computing Tianjin UniversityTianjin 300350China College of Cyber Science Nankai UniversityTianjin 300350China School of Computer Science Fudan UniversityShanghai 200438China
Activity hijacking is one of the most powerful attacks in Android. Though promising, all the prior activity hijacking attacks suffer from some limitations and have limited attack capabilities. They no longer pose secu... 详细信息
来源: 评论
MSFNet: Multi-Modal Semantic Fusion Network for Herb Recommendation  9
MSFNet: Multi-Modal Semantic Fusion Network for Herb Recomme...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Li, Haobo Jia, Pengtao Li, Chaoyang Cui, Kegang Li, Yanjin College of Computer Science and Technology Xi'an University of Science and Technology Xi'an China Xi'an Hospital of Traditional Chinese Medicine Department of Proctology Xi'an China Xi'an Hospital of Traditional Chinese Medicine Department of Information Technology Xi'an China
Graph Neural Networks (GNNs) have been extensively utilized in the field of traditional Chinese medicine (TCM) herb recommendation. Nevertheless, the current TCM herb recommendation algorithms have not adequately harn... 详细信息
来源: 评论
Cross-Chain Asset Trading Scheme Without Trusted Third-Party  2nd
Cross-Chain Asset Trading Scheme Without Trusted Third-Party
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Li, Bo Chen, Yuling Huang, Siyuan Yang, Yuxiang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China
The development of blockchain technology is influenced by user diversity and application scenarios, resulting in limitations on the applicability of assets. Although cloud computing is renowned for faci... 详细信息
来源: 评论
Social Media Fake News Detection Using Machine Learning  5
Social Media Fake News Detection Using Machine Learning
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Gautam, Vandita Singh Katiyar, Shanu Sharma, Kavita Ojha, Rudra Pratap Computer Science And Engineering Galgotias College Of Engineering And Technology Greater Noida India Computer Science And Engineering G.L Bajaj Institute Of Technology And Management Greater Noida India
Nowadays it has become very difficult to tell the legitimacy of news on social media news blogs and online newspaper. Hence there is a need of tools that can check these sources to identify fake news. The automatic de... 详细信息
来源: 评论
Word-Diffusion: Diffusion-Based Handwritten Text Word Image Generation  27th
Word-Diffusion: Diffusion-Based Handwritten Text Word Image ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Gurav, Aniket Krishnan, Narayanan C. Chanda, Sukalpa Department of Computer Science and Communication Østfold University College Halden1757 Norway Department of Data Science Indian Institute of Technology Palakkad Kerala India
Generating realistic handwritten word images that closely resemble a target style remains a challenging task in document image analysis. In recent years, deep learning techniques, such as Latent Diffusion Models (LDM)... 详细信息
来源: 评论
Enhanced Electric Vehicle charging strategy through Graph Convolutional Networks integrated with deep reinforcement learning
收藏 引用
International Journal of Information technology (Singapore) 2025年 1-13页
作者: Ghode, Shilpa Digalwar, Mayuri Computer Science and Engineering Department Indian Institute of Information Technology Maharashtra Nagpur 441108 India Information Technology Department G H Raisoni College of Engineering Hingna Road Maharashtra Nagpur 440016 India
The increasing adoption of Electric Vehicles (EVs) necessitates advanced charging infrastructure. This manuscript presents a novel approach that integrates Graph Convolutional Networks (GCNs) and the Deep Dyna Reinfor... 详细信息
来源: 评论