咨询与建议

限定检索结果

文献类型

  • 1,460 篇 会议
  • 740 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,474 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 873 篇 软件工程
    • 434 篇 信息与通信工程
    • 252 篇 控制科学与工程
    • 166 篇 生物工程
    • 162 篇 电气工程
    • 144 篇 电子科学与技术(可...
    • 126 篇 光学工程
    • 113 篇 机械工程
    • 113 篇 生物医学工程(可授...
    • 104 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 76 篇 仪器科学与技术
    • 76 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 60 篇 化学工程与技术
  • 752 篇 理学
    • 422 篇 数学
    • 192 篇 物理学
    • 184 篇 生物学
    • 147 篇 统计学(可授理学、...
    • 85 篇 系统科学
    • 66 篇 化学
  • 466 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 77 篇 工商管理
  • 114 篇 医学
    • 92 篇 临床医学
    • 91 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 49 篇 公共卫生与预防医...
  • 81 篇 法学
    • 56 篇 社会学
  • 46 篇 农学
  • 30 篇 经济学
  • 18 篇 教育学
  • 16 篇 军事学
  • 11 篇 文学
  • 8 篇 艺术学

主题

  • 61 篇 deep learning
  • 51 篇 accuracy
  • 47 篇 machine learning
  • 44 篇 feature extracti...
  • 43 篇 computational mo...
  • 39 篇 training
  • 38 篇 internet of thin...
  • 37 篇 convolutional ne...
  • 31 篇 data mining
  • 29 篇 real-time system...
  • 27 篇 optimization
  • 27 篇 semantics
  • 27 篇 data models
  • 25 篇 predictive model...
  • 24 篇 cloud computing
  • 22 篇 support vector m...
  • 22 篇 authentication
  • 21 篇 object detection
  • 21 篇 convolution
  • 21 篇 artificial intel...

机构

  • 66 篇 department of co...
  • 59 篇 vivekananda glob...
  • 57 篇 faculty of infor...
  • 50 篇 college of compu...
  • 45 篇 maharishi school...
  • 41 篇 hunan provincial...
  • 39 篇 department of co...
  • 36 篇 department of co...
  • 27 篇 infn e laborator...
  • 27 篇 faculty of scien...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 west university ...
  • 27 篇 research center ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 graduate school ...
  • 27 篇 department physi...
  • 27 篇 institute of phy...
  • 27 篇 deutsches elektr...
  • 27 篇 institute of phy...

作者

  • 23 篇 c. alexa
  • 23 篇 j. m. izen
  • 23 篇 j. gao
  • 23 篇 g. bella
  • 23 篇 j. strandberg
  • 23 篇 d. calvet
  • 23 篇 c. amelung
  • 23 篇 b. konya
  • 23 篇 f. pastore
  • 23 篇 a. grummer
  • 23 篇 k. j. r. cormier
  • 23 篇 n. orlando
  • 23 篇 f. a. förster
  • 23 篇 y. tayalati
  • 23 篇 t. pham
  • 23 篇 g. spigo
  • 23 篇 v. chiarella
  • 23 篇 m. lu
  • 23 篇 f. siegert
  • 23 篇 a. e. c. coimbra

语言

  • 2,096 篇 英文
  • 84 篇 其他
  • 41 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Application and Information Technology"
2219 条 记 录,以下是1-10 订阅
排序:
Deep learning-based open API recommendation for Mashup development
收藏 引用
Science China(information Sciences) 2023年 第7期66卷 94-111页
作者: Ye WANG Junwu CHEN Qiao HUANG Xin XIA Bo JIANG School of Computer and Information Engineering Zhejiang Gongshang University Software Engineering Application Technology Lab
Mashup developers often need to find open application programming interfaces(APIs) for their composition application development. Although most enterprises and service organizations have encapsulated their businesses ... 详细信息
来源: 评论
Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts
收藏 引用
International Journal of information technology (Singapore) 2025年 第2期17卷 1207-1223页
作者: Hemani Singh, Dayashankar Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology UP Gorakhpur India
The future of autonomous vehicles is exciting and holds significant potential for transforming transportation. The future is bright, but these vehicles require a high degree of connectivity complex software to functio... 详细信息
来源: 评论
Enabling Security in Healthcare IoT System Using Blockchain with Efficient Consensus Protocols and Smart Contracts  6th
Enabling Security in Healthcare IoT System Using Blockchain ...
收藏 引用
6th International Conference on Recent Innovations in Computing, ICRIC 2023
作者: Shrivastava, Atul Lal Dwivedi, Rajendra Kumar Prakash, Shiva Department of Information Technology and Computer Application MMMUT Gorakhpur India
Electronic Medical Records (EMRs) in hospitals are generally handled by a centralized cloud provider. However, it creates one solitary area of vulnerability, and who are the real owners may lose track of them. To prot... 详细信息
来源: 评论
Multispectral point cloud superpoint segmentation
收藏 引用
Science China(Technological Sciences) 2024年 第4期67卷 1270-1281页
作者: WANG QingWang WANG MingYe ZHANG ZiFeng SONG Jian ZENG Kai SHEN Tao GU YanFeng Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming 650500China Yunnan Key Laboratory of Computer Technologies Application Kunming 650500China School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150001China
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing s... 详细信息
来源: 评论
A Survey of Machine Learning Techniques Related to Understanding Autism Spectrum Disorder  2
A Survey of Machine Learning Techniques Related to Understan...
收藏 引用
2nd International Conference on Disruptive Technologies, ICDT 2024
作者: Kumar, Anil Jaiswal, Umesh Chandra Information Technology & Computer Application Madan Mohan Malaviya University of Technology Gorakhpur India
Speech, social skills, non-verbal communication, and repetitive activities are all indicators of autism spectrum disorder (ASD), a disease classified as a spectrum disorder by the DSM-5. Gender plays a role in the pre... 详细信息
来源: 评论
HRAM-VITON: High-Resolution Virtual Try-On with Attention Mechanism
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2753-2768页
作者: Yue Chen Xiaoman Liang Mugang Lin Fachao Zhang Huihuang Zhao College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The objective of image-based virtual try-on is to seamlessly integrate clothing onto a target image, generating a realistic representation of the character in the specified attire. However, existing virtual try-on met... 详细信息
来源: 评论
application of adaptive guard channel reservation under hard handoff constraint in wireless cellular network
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 170-185页
作者: Sahu, Promod Kumar Pati, Hemanta Kumar Pradha, Sateesh Kumar Department of Computer Science and Application Utkal University Vani Vihar Odisha Bhubaneswar India Department of Computer Science and Engineering International Institute of Information Technology Bhubaneswar Odisha Bhubaneswar India
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp... 详细信息
来源: 评论
Enhancing Scalability in Sharding Blockchain via Interoperability Protocol  5th
Enhancing Scalability in Sharding Blockchain via Interoperab...
收藏 引用
5th International Conference on Trends in Computational and Cognitive Engineering, TCCE 2023
作者: Maurya, Alka Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology Gorakhpur India
Blockchain technology has shown immense promise in revolutionizing various industries by offering secure and open decentralized solutions. Popular blockchain networks still struggle with scalability, which limits thei... 详细信息
来源: 评论
New Proper Reparameterization of Plane Rational Bézier Curves
收藏 引用
Journal of computer Science & technology 2024年 第5期39卷 1193-1206页
作者: Zhen-Fei Wang Xiao-Diao Chen Jun-Hai Yong School of Computer Hangzhou Dianzi UniversityHangzhou 310018China Haihe Laboratory of Information Technology Application Innovation Tianjin 300480China School of Software Tsinghua UniversityBeijing 100084China
Coincidence detection of two curves or two surfaces has wide application in computer-aided design(CAD)and computer-aided geometric design(CAGD).Proper reparameterization is the most complicated part in the *** paper p... 详细信息
来源: 评论
Security Enhancement in Tea Supply Chain using Blockchain with Hyperledger  2
Security Enhancement in Tea Supply Chain using Blockchain wi...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Gupta, Amritesh Kumar Dwivedi, Rajendra Kumar Madan Mohan Malaviya University of Technology Dept. of Information Technology and Computer Application Gorakhpur India
With the advancement of technology and emergence of blockchain, it has become quite a popular tool which is often integrated with systems and processes that require decentralization, traceability, consistency etc. One... 详细信息
来源: 评论