咨询与建议

限定检索结果

文献类型

  • 6,065 篇 会议
  • 5,664 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 11,841 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 7,338 篇 工学
    • 4,733 篇 计算机科学与技术...
    • 3,832 篇 软件工程
    • 1,632 篇 信息与通信工程
    • 1,082 篇 电气工程
    • 1,038 篇 控制科学与工程
    • 994 篇 电子科学与技术(可...
    • 905 篇 生物工程
    • 845 篇 光学工程
    • 783 篇 生物医学工程(可授...
    • 502 篇 化学工程与技术
    • 457 篇 仪器科学与技术
    • 425 篇 机械工程
    • 414 篇 材料科学与工程(可...
    • 349 篇 动力工程及工程热...
    • 334 篇 网络空间安全
    • 268 篇 安全科学与工程
  • 4,694 篇 理学
    • 2,071 篇 物理学
    • 1,799 篇 数学
    • 1,035 篇 生物学
    • 621 篇 统计学(可授理学、...
    • 607 篇 化学
    • 324 篇 系统科学
    • 270 篇 地球物理学
  • 1,803 篇 管理学
    • 1,112 篇 管理科学与工程(可...
    • 767 篇 图书情报与档案管...
    • 477 篇 工商管理
  • 783 篇 医学
    • 636 篇 临床医学
    • 559 篇 基础医学(可授医学...
    • 351 篇 药学(可授医学、理...
    • 326 篇 公共卫生与预防医...
  • 292 篇 法学
  • 189 篇 农学
  • 178 篇 经济学
  • 107 篇 教育学
  • 26 篇 文学
  • 20 篇 艺术学
  • 14 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 382 篇 deep learning
  • 306 篇 accuracy
  • 265 篇 machine learning
  • 263 篇 feature extracti...
  • 219 篇 computational mo...
  • 204 篇 real-time system...
  • 199 篇 predictive model...
  • 188 篇 internet of thin...
  • 159 篇 training
  • 148 篇 optimization
  • 144 篇 semantics
  • 136 篇 computer science
  • 136 篇 support vector m...
  • 135 篇 artificial intel...
  • 102 篇 image segmentati...
  • 100 篇 data mining
  • 99 篇 visualization
  • 97 篇 security
  • 96 篇 neural networks
  • 96 篇 convolutional ne...

机构

  • 340 篇 department of ph...
  • 237 篇 faculty of scien...
  • 234 篇 university of ch...
  • 232 篇 department of mo...
  • 231 篇 department for p...
  • 228 篇 department of ph...
  • 225 篇 infn e laborator...
  • 225 篇 west university ...
  • 219 篇 department of ph...
  • 213 篇 department of ph...
  • 200 篇 kirchhoff-instit...
  • 191 篇 cavendish labora...
  • 189 篇 research center ...
  • 164 篇 fakultät für phy...
  • 160 篇 department physi...
  • 153 篇 infn sezione di ...
  • 152 篇 graduate school ...
  • 151 篇 physikalisches i...
  • 150 篇 oliver lodge lab...
  • 141 篇 institute of phy...

作者

  • 173 篇 d. calvet
  • 167 篇 c. alexa
  • 167 篇 g. bella
  • 167 篇 c. amelung
  • 165 篇 j. strandberg
  • 165 篇 n. orlando
  • 165 篇 y. tayalati
  • 165 篇 v. chiarella
  • 164 篇 j. m. izen
  • 164 篇 g. spigo
  • 164 篇 f. siegert
  • 159 篇 a. dimitrievska
  • 159 篇 f. deliot
  • 157 篇 r. ströhmer
  • 155 篇 m. rijssenbeek
  • 154 篇 s. jin
  • 154 篇 g. gaudio
  • 152 篇 y. tu
  • 152 篇 y. abulaiti
  • 151 篇 s. mohapatra

语言

  • 8,979 篇 英文
  • 2,744 篇 其他
  • 152 篇 中文
  • 4 篇 法文
  • 4 篇 日文
  • 3 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=The Institute of Advanced Computing Technology School of Computer Science and Engineering"
11841 条 记 录,以下是391-400 订阅
排序:
Exploring Text Summarization Techniques: A Review of Current Challenges and Future Directions  2
Exploring Text Summarization Techniques: A Review of Current...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Kaushik, Abha Attri, Shree Harsh Jha, Ravi Shankar Computer Science and Engineering Gl Bajaj Institute of Technology and Management Greater Noida India Computer Science and Engineering Sharda University Greater Noida India School of Computing Dit University Dehradun India
Text summarization is a significant task in natural language processing (NLP) since it seeks to reduce massive amount of textual information into concise and logical summaries. The rapid expansion of digital content h... 详细信息
来源: 评论
Optimizing high-utility item mining using hybrid dolphin echolocation and Boolean grey wolf optimization
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第3期14卷 2327-2339页
作者: Pazhaniraja, N. Sountharrajan, S. Suganya, E. Karthiga, M. School of Computing and Science VIT Bhopal University Madhya Pradesh Bhopal India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Information Technology Sri Sivasubramaniya Nadar College of Engineering Tamil Nadu Chennai India Bannari Amman Institute of Technology Tamilnadu Sathyamangalam India
High-utility item-set mining has become a very crucial topic of research in recent times. It is used to find profitable products utilizing both profit factors and the quantity as opposed to the association rule mining... 详细信息
来源: 评论
Multi-model ensemble framework for analysis of psychopathic traits in heinous crime convicts
收藏 引用
Journal of Computational Social science 2025年 第3期8卷 1-28页
作者: Singh, Aman Mohapatra, Subrajeet Department of CSE School of Computing MIT-ADT University Pune 412001 India Department of Computer Science and Engineering Birla Institute of Technology Mesra Jharkhand Ranchi 835215 India
The correlation between psychiatric disorder and criminality has been the subject of intense debate and scrutiny in recent years, in light of multiple violent incidents in India and other nations. To determine the sev... 详细信息
来源: 评论
Dynamic Visible Light Positioning Based on Enhanced Visual Target Tracking
收藏 引用
China Communications 2023年 第10期20卷 276-291页
作者: Xiangyu Liu Jingyu Hao Lei Guo Song Song School of Information Science and Engineering Shenyang Ligong UniversityShenyang 110158China Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 518055China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Hangzhou Institute of Advanced Technology Hangzhou 310056China Institute of Intelligent Communications and Network Security Chongqing University of Posts and TelecommunicationsChongqing 400065China
In visible light positioning systems,some scholars have proposed target tracking algorithms to balance the relationship among positioning accuracy,real-time performance,and ***,there are still two problems:(1)When the... 详细信息
来源: 评论
From Static to Dynamic: Adapting Landmark-Aware Image Models for Facial Expression Recognition in Videos
收藏 引用
IEEE Transactions on Affective computing 2025年 第2期16卷 624-638页
作者: Chen, Yin Li, Jia Shan, Shiguang Wang, Meng Hong, Richang Hefei University of Technology School of Computer Science and Information Engineering Hefei230601 China Chinese Academy of Sciences Key Laboratory of Intelligent Information Processing Institute of Computing Technology Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China
Dynamic facial expression recognition (DFER) in the wild is still hindered by data limitations, e.g., insufficient quantity and diversity of pose, occlusion and illumination, as well as the inherent ambiguity of facia... 详细信息
来源: 评论
A Real-Time P2P Bot Host Detection in a Large-Scale Network Using Statistical Network Traffic Features and Apache Spark Streaming Platform  8
A Real-Time P2P Bot Host Detection in a Large-Scale Network ...
收藏 引用
8th IEEE International Conference for Convergence in technology, I2CT 2023
作者: Saravanan, S. Prakash, G. Uma Maheswari, B. Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham Dept. of Computer Science and Engineering India Vellore Institute of Technology School of Computer Science and Engineering Vellore India
Nowadays, Peer-to-Peer (P2P) bots play a significant role in launching attacks such as phishing, distributed denial-of-service (DDoS), email spam, click fraud, cryptocurrency mining, etc. The analysis of statistical n... 详细信息
来源: 评论
A Group-Based Many-Task Collaborative Optimization Framework for Evolutionary Robots Design
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3492-3505页
作者: Hou, Yaqing Yu, Zhaoping Guo, Zheng Pei, Wenbin Wu, Yaoxin Ge, Hongwei Xue, Bing Zhang, Mengjie Dalian University of Technology College of Computer Science and Technology Dalian116024 China Avic Xi'an Aeronautics Computing Technique Research Institute 18th Research Department Xi'an710068 China Eindhoven University of Technology Department of Industrial Engineering and Innovation Sciences Eindhoven5612 AZ Netherlands Victoria University of Wellington School of Engineering and Computer Science Wellington6140 New Zealand
In evolutionary robotics (ER), the evolution of a robot's morphology (i.e., physical structure) or controller (i.e., control algorithm or instruction sequence) often entails tackling an extensive number of tasks. ... 详细信息
来源: 评论
Ensemble Learning Based Social engineering Fraud Detection Module for Cryptocurrency Transactions  9th
Ensemble Learning Based Social Engineering Fraud Detection M...
收藏 引用
9th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2023
作者: Pathak, Vishvesh Uma Maheswari, B. Geetha, S. Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidyapeetham Bengaluru India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The practical applications of blockchains can far supersede the widely known trading and cryptocurrency realm. If any service provider is looking for a consistent, immutable, and multitenancy-supported ledger, then bl... 详细信息
来源: 评论
Mitigating Malware Propagation in Social Internet of Things Using an Exact Markov Chain-Based Epidemic Method
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24104-24118页
作者: Zhang, Hong Hu, Xinyi Shen, Yizhou Xu, Huibin Shen, Shigen Li, Ruidong Donghua University School of Computer Science and Technology Shanghai201620 China Newcastle University School of Computing Newcastle upon TyneNE1 7RU United Kingdom Huzhou University School of Information Engineering Huzhou313000 China Kanazawa University Institute of Science and Engineering Kakuma Kanazawa920-1192 Japan
In the Social Internet of Things (SIoT) environment, malware propagation is attracting more and more attention due to increasing damages. Markov chain models have been used to predict epidemic behavior qualitatively a... 详细信息
来源: 评论
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12621-12630页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The rise of smart cities is directly connected to the increasing use of vehicles. The growing vehicle utilization has driven the emergence of Vehicular Ad-hoc Networks (VANETs), facilitating instant information exchan... 详细信息
来源: 评论