咨询与建议

限定检索结果

文献类型

  • 67,454 篇 会议
  • 31,512 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 98,991 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 61,394 篇 工学
    • 43,516 篇 计算机科学与技术...
    • 35,452 篇 软件工程
    • 17,008 篇 信息与通信工程
    • 9,817 篇 控制科学与工程
    • 7,416 篇 电气工程
    • 7,244 篇 电子科学与技术(可...
    • 7,035 篇 生物工程
    • 4,941 篇 生物医学工程(可授...
    • 4,648 篇 机械工程
    • 4,375 篇 光学工程
    • 3,433 篇 仪器科学与技术
    • 3,139 篇 动力工程及工程热...
    • 2,897 篇 化学工程与技术
    • 2,570 篇 网络空间安全
    • 2,511 篇 安全科学与工程
    • 2,329 篇 交通运输工程
  • 32,161 篇 理学
    • 17,211 篇 数学
    • 8,947 篇 物理学
    • 7,804 篇 生物学
    • 5,593 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,047 篇 化学
  • 17,324 篇 管理学
    • 10,727 篇 管理科学与工程(可...
    • 7,328 篇 图书情报与档案管...
    • 4,567 篇 工商管理
  • 4,826 篇 医学
    • 4,056 篇 临床医学
    • 3,643 篇 基础医学(可授医学...
    • 2,248 篇 药学(可授医学、理...
    • 2,051 篇 公共卫生与预防医...
  • 2,799 篇 法学
    • 2,189 篇 社会学
  • 1,715 篇 经济学
  • 1,413 篇 农学
  • 1,200 篇 教育学
  • 472 篇 文学
  • 287 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 2,628 篇 feature extracti...
  • 2,275 篇 accuracy
  • 2,187 篇 deep learning
  • 2,112 篇 computer science
  • 1,955 篇 computational mo...
  • 1,896 篇 training
  • 1,808 篇 machine learning
  • 1,455 篇 data mining
  • 1,306 篇 internet of thin...
  • 1,301 篇 optimization
  • 1,290 篇 support vector m...
  • 1,193 篇 information tech...
  • 1,140 篇 predictive model...
  • 1,112 篇 educational inst...
  • 1,106 篇 wireless sensor ...
  • 954 篇 neural networks
  • 929 篇 semantics
  • 919 篇 real-time system...
  • 918 篇 security
  • 876 篇 image segmentati...

机构

  • 653 篇 school of comput...
  • 511 篇 school of comput...
  • 474 篇 maharishi school...
  • 341 篇 department of co...
  • 277 篇 department of ph...
  • 262 篇 school of comput...
  • 259 篇 faculté des scie...
  • 252 篇 department of ph...
  • 224 篇 faculty of scien...
  • 220 篇 department of ph...
  • 214 篇 physics division...
  • 202 篇 department of co...
  • 201 篇 school of comput...
  • 192 篇 department of ph...
  • 187 篇 department of ph...
  • 185 篇 departamento de ...
  • 167 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department for p...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 261 篇 h. a. gordon
  • 256 篇 m. klein
  • 255 篇 r. ströhmer
  • 247 篇 h. sakamoto
  • 244 篇 y. tayalati
  • 233 篇 niyato dusit
  • 228 篇 m. rijssenbeek
  • 202 篇 f. pastore
  • 202 篇 n. orlando
  • 199 篇 d. guest
  • 191 篇 s. jin

语言

  • 94,111 篇 英文
  • 3,279 篇 其他
  • 1,604 篇 中文
  • 77 篇 日文
  • 13 篇 斯洛文尼亚文
  • 11 篇 德文
  • 11 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 荷兰文
  • 3 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Information Technology"
98991 条 记 录,以下是171-180 订阅
排序:
Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1977-1993页
作者: Zhiqing Dong Zhao Zhang Hongyan Zhou Xuebo Chen School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China School of Electronic and Information Engineering University of Science and Technology LiaoningAnshan114051China
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat... 详细信息
来源: 评论
Learning-based user association and dynamic resource allocation in multi-connectivity enabled unmanned aerial vehicle networks
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 53-62页
作者: Zhipeng Cheng Minghui Liwang Ning Chen Lianfen Huang Nadra Guizani Xiaojiang Du Department of Information and Communication Engineering Xiamen UniversityXiamen361005China School of Electrical and Computer Engineering University of Texas at ArlingtonArlingtonTX76019USA Department of Electrical and Computer Engineering Stevens Institute of TechnologyHobokenNJ07030USA
Unmanned Aerial Vehicles(UAvs)as aerial base stations to provide communication services for ground users is a flexible and cost-effective paradigm in ***,dynamic resource allocation and multi-connectivity can be adopt... 详细信息
来源: 评论
Quadratic and Lagrange interpolation-based butterfly optimization algorithm for numerical optimization and engineering design problem
收藏 引用
Soft Computing 2025年 第1期29卷 157-194页
作者: Sharma, Sushmita Saha, Apu Kumar Chakraborty, Sanjoy Deb, Suman Sahoo, Saroj Kumar Department of Computer Science and Engineering Indian Institute of Information Technology Tripura Agartala India Department of Computer Science and Engineering National Institute of Technology Tripura Agartala India Department of Mathematics National Institute of Technology Agartala Tripura Agartala India Department of Information Technology Bir Bikram Memorial College Tripura Agartala India
This work proposes a novel and improved Butterfly Optimization Algorithm (BOA), known as LQBOA, to solve BOA’s inherent limitations. The LQBOA uses Lagrange interpolation and simple quadratic interpolation techniques... 详细信息
来源: 评论
Contract-Based Incentive Mechanisms for UAV Networks in Covert Communications
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 7378-7391页
作者: Tian, Wen Fan, Hao Liu, Guangjie Du, Miao Liu, Yinqiu Niyato, Dusit Han, Zhu Nanjing University of Information Science and Technology School of Electronic and Information Engineering Nanjing University of Information Science and Technology Key Laboratory of Intelligent Support Technology In Complex Environment Ministry of Education Nanjing210044 China Southeat University School of Computer Science and Engineering China Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
Covert communication is considered a promising technology for hiding transmission processes and activities from malicious eavesdropping. With the development of detection technology, the traditional point-to-point cov... 详细信息
来源: 评论
HOOD: Real-Time Human Presence and Out-of-Distribution Detection Using FMCW Radar
IEEE Transactions on Radar Systems
收藏 引用
IEEE Transactions on Radar Systems 2025年 3卷 44-56页
作者: Kahya, Sabri Mustafa Yavuz, Muhammet Sami Steinbach, Eckehard Technical University of Munich Media Technology School of Computation Information and Technology Department of Computer Engineering Munich80333 Germany
Detecting human presence indoors with millimeter-wave frequency-modulated continuous-wave (FMCW) radar faces challenges from both moving and stationary clutters. This work proposes a robust and real-time capable human... 详细信息
来源: 评论
ESG Investing: A Statistically Valid Approach to Data-Driven Decision Making and the Impact of ESG Factors on Stock Returns and Risk
收藏 引用
IEEE Access 2024年 12卷 69434-69444页
作者: Teja, Kamurthi Ravi Liu, Chuan-Ming National Taipei University of Technology International Program of Electrical Engineering and Computer Science Taipei10608 Taiwan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan
This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne... 详细信息
来源: 评论
Insider Attack Prevention:LAPUP—Lightweight Authentication Protocol Using PUF
收藏 引用
Journal of Communications and information Networks 2024年 第2期9卷 192-206页
作者: Siranjeevi Rajamanickam Satyanarayana Vollala N.Ramasubramanian Department of Computer Engineering Government Polytechnic CollegeTiruchirappalli 620022India Department of Computer Science and Engineering Dr.Shyama Prasad Mukherjee International Institute of Information Technology-Naya RaipurChhattisgarh 493661India Department of Computer Science and Engineering National Institute of TechnologyTiruchirappalli 620015India
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha... 详细信息
来源: 评论
Principle of subtraction ghost imaging in scattering medium
收藏 引用
Chinese Physics B 2023年 第6期32卷 250-254页
作者: 付芹 白艳锋 谭威 黄贤伟 南苏琴 傅喜泉 College of Computer Science and Electronic Engineering Hunan UniversityChangsha 410082China School of Computer and Information Engineering Hunan University of Technology and BusinessChangsha 410205China
Scattering medium in light path will cause distortion of the light field,resulting in poor signal-to-noise ratio(SNR)of ghost *** disturbance is usually eliminated by the method of *** deduce the intensity fluctuation... 详细信息
来源: 评论
Event-Driven Attention Network:A Cross-Modal Framework for Efficient Image-Text Retrieval in Mass Gathering Events
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3277-3301页
作者: Kamil Yasen Heyan Jin Sijie Yang Li Zhan Xuyang Zhang Ke Qin Ye Li School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Kashi Institute of Electronics and Information Industry Kashi844508China
Research on mass gathering events is critical for ensuring public security and maintaining social ***,most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting,and ... 详细信息
来源: 评论
A Novel Trustworthiness Measurement Model Based on Weight and User Feedback
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 612-625页
作者: ZHOU Wei MA Yanfang PAN Haiyu School of Computer Science and Technology Huaibei Normal University School of Computer Science and Information Engineering Changzhou Institute of Technology School of Computer Science and Information Security Guilin University of Electronic Technology
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af... 详细信息
来源: 评论