咨询与建议

限定检索结果

文献类型

  • 67,600 篇 会议
  • 31,567 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 100,000 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 61,414 篇 工学
    • 43,526 篇 计算机科学与技术...
    • 35,397 篇 软件工程
    • 16,980 篇 信息与通信工程
    • 9,811 篇 控制科学与工程
    • 7,401 篇 电气工程
    • 7,277 篇 电子科学与技术(可...
    • 7,034 篇 生物工程
    • 4,936 篇 生物医学工程(可授...
    • 4,648 篇 机械工程
    • 4,362 篇 光学工程
    • 3,435 篇 仪器科学与技术
    • 3,132 篇 动力工程及工程热...
    • 2,892 篇 化学工程与技术
    • 2,570 篇 网络空间安全
    • 2,502 篇 安全科学与工程
    • 2,319 篇 交通运输工程
  • 32,149 篇 理学
    • 17,190 篇 数学
    • 8,959 篇 物理学
    • 7,801 篇 生物学
    • 5,575 篇 统计学(可授理学、...
    • 3,772 篇 系统科学
    • 3,046 篇 化学
  • 17,302 篇 管理学
    • 10,714 篇 管理科学与工程(可...
    • 7,320 篇 图书情报与档案管...
    • 4,554 篇 工商管理
  • 4,823 篇 医学
    • 4,052 篇 临床医学
    • 3,628 篇 基础医学(可授医学...
    • 2,247 篇 药学(可授医学、理...
    • 2,039 篇 公共卫生与预防医...
  • 2,791 篇 法学
    • 2,185 篇 社会学
  • 1,711 篇 经济学
  • 1,416 篇 农学
  • 1,198 篇 教育学
  • 471 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,644 篇 feature extracti...
  • 2,299 篇 accuracy
  • 2,202 篇 deep learning
  • 2,115 篇 computer science
  • 1,967 篇 computational mo...
  • 1,918 篇 training
  • 1,874 篇 machine learning
  • 1,458 篇 data mining
  • 1,311 篇 optimization
  • 1,307 篇 internet of thin...
  • 1,292 篇 support vector m...
  • 1,188 篇 information tech...
  • 1,148 篇 predictive model...
  • 1,110 篇 educational inst...
  • 1,099 篇 wireless sensor ...
  • 965 篇 artificial intel...
  • 959 篇 neural networks
  • 930 篇 security
  • 929 篇 semantics
  • 924 篇 real-time system...

机构

  • 658 篇 school of comput...
  • 510 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 265 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 220 篇 faculty of scien...
  • 216 篇 physics division...
  • 204 篇 school of comput...
  • 201 篇 department of co...
  • 194 篇 department of ph...
  • 186 篇 department of ph...
  • 180 篇 departamento de ...
  • 169 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 157 篇 department for p...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 255 篇 m. klein
  • 253 篇 r. ströhmer
  • 244 篇 h. sakamoto
  • 243 篇 y. tayalati
  • 232 篇 niyato dusit
  • 228 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 197 篇 d. guest
  • 192 篇 s. jin

语言

  • 95,180 篇 英文
  • 3,222 篇 其他
  • 1,602 篇 中文
  • 77 篇 日文
  • 13 篇 斯洛文尼亚文
  • 11 篇 德文
  • 11 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 荷兰文
  • 3 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Information Technology"
100000 条 记 录,以下是371-380 订阅
排序:
Energy Efficient Unequal Fault Tolerance Clustering Approach
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1971-1983页
作者: Sowjanya Ramisetty Divya Anand Kavita Sahil Verma NZ Jhanjhi Mehedi Masud Mohammed Baz Department of Computer Science and Engineering KG Reddy College of Engineering and TechnologyHyderabadIndia School of Computer Science and Engineering Lovely Professional UniversityPhagwaraIndia Department of Computer Science and Engineering Chandigarh UniversityMohaliIndia Department of Computer Science and Engineering Tailor’s UniversityMalaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21994Saudi Arabia
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... 详细信息
来源: 评论
Early-stage stroke prediction based on Parkinson and wrinkles using deep learning
收藏 引用
Neural Computing and Applications 2024年 第30期36卷 18781-18805页
作者: Haritha, T. Babu, A. V. Santhosh Department of Information Technology Vivekanandha College of Engineering for Women Tamilnadu Tiruchengode India Department of Computer Science and Engineering Vivekanandha College of Engineering for Women Tamilnadu Tiruchengode India
The application of noninvasive methods to enhance healthcare systems has been facilitated by the development of new technology. Among the four major cardiovascular diseases, stroke is one of the deadliest and potentia... 详细信息
来源: 评论
A survey of video violence detection
收藏 引用
Cyber-Physical Systems 2023年 第1期9卷 1-24页
作者: Yao, Huiling Hu, Xing School of Optical-Electrical Information and Computer Engineering University of Shanghai for Science and Technology Shanghai China
As one of the important applications of intelligent video surveillance, violent behaviour detection (VioBD) plays a crucial role in public security and safety. As a particular type of behaviour recognition, VioBD aims... 详细信息
来源: 评论
Exploring diversity and time-aware recommendations: an LSTM-DNN model with novel bidirectional dynamic time warping algorithm
收藏 引用
Soft Computing 2025年 第4期29卷 2003-2013页
作者: Li, Te Chen, Liqiong Sun, Huaiying Hou, Mengxia Lei, Yunjie Zhi, Kaiwen School of Computer and Engineering East China University of Science and Technology Meilong road Shanghai200237 China School of Computer Science and Information Engineering Shanghai Institute of Technology Haiquan road Shanghai201400 China School of Chemistry and Environmental Engineering Shanghai Institute of Technology Haiquan road Shanghai201400 China
With the advent of the Web 3.0 era, the amount and types of data in the network have sharply increased, and the application scenarios of recommendation algorithms are continuously expanding. Location recommendation ha... 详细信息
来源: 评论
Leveraging Journaling File System for Prompt Secure Deletion on Interlaced Recording Drives
收藏 引用
IEEE Transactions on Emerging Topics in Computing 2023年 第3期11卷 619-634页
作者: Chen, Shuo-Han Huang, Kuo-Hao National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan
With the growing awareness of secure computation, more and more users want to make their digital footprints securely deleted and irrecoverable after updating or removing files on storage devices. To achieve the effect... 详细信息
来源: 评论
Multi‐feature fusion and memory‐based mobile robot target tracking system
收藏 引用
IET Cyber-Systems and Robotics 2024年 第3期6卷 62-73页
作者: Hanqing Sun Shijie Zhang Qingle Quan College of Information Engineering Henan University of Animal Husbandry and EconomyZhengzhouHenanChina College of Information Technology and Computer Science University of the CordillerasBaguioPhilippines College of Electrical Engineering Henan University of TechnologyZhengzhouHenanChina
In crowded settings,mobile robots face challenges like target disappearance and occlusion,impacting tracking *** existing optimisations,tracking in complex environments remains *** address this issue,the authors propo... 详细信息
来源: 评论
Designing an Ultrasonic-Assisted Machining System by Using a Network Mapping Fusion–Convolutional Neuro-Fuzzy Network Model
收藏 引用
IEEE Transactions on Industrial Informatics 2024年 第7期20卷 1-12页
作者: Lin, Cheng-Jian Jhang, Jyun-Yu Lin, Xue-Qian the Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung 411030 Taiwan the Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung 404336 Taiwan
In the field of machining, product quality must meet customer specifications. In general, surface roughness is an essential indicator of machining quality. Low surface roughness correlates with increased fatigue stren... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
Computation of Graph Fourier Transform Centrality Using Graph Filter
IEEE Open Journal of Circuits and Systems
收藏 引用
IEEE Open Journal of Circuits and Systems 2024年 5卷 69-80页
作者: Tseng, Chien-Cheng Lee, Su-Ling National Kaohsiung University of Science and Technology Department of Computer and Communication Engineering Kaohsiung824005 Taiwan Chang Jung Christian University Department of Computer Science and Information Engineering Tainan711301 Taiwan
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g... 详细信息
来源: 评论
A Computational Model for Driver Risk Evaluation and Crash Prediction Using Contextual Data from On-board Telematics
收藏 引用
Recent Advances in computer Science and Communications 2022年 第4期15卷 620-635页
作者: Jain, Neetika Mittal, Sangeeta Department of Computer Science & Engineering and Information Technology Faculty of Engineering Jaypee Institute of Information Technology Noida India
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the Wo... 详细信息
来源: 评论