咨询与建议

限定检索结果

文献类型

  • 68,042 篇 会议
  • 32,068 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 100,943 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 62,221 篇 工学
    • 44,092 篇 计算机科学与技术...
    • 35,703 篇 软件工程
    • 17,188 篇 信息与通信工程
    • 10,083 篇 控制科学与工程
    • 7,557 篇 电气工程
    • 7,373 篇 电子科学与技术(可...
    • 7,062 篇 生物工程
    • 4,971 篇 生物医学工程(可授...
    • 4,692 篇 机械工程
    • 4,417 篇 光学工程
    • 3,452 篇 仪器科学与技术
    • 3,157 篇 动力工程及工程热...
    • 2,917 篇 化学工程与技术
    • 2,616 篇 网络空间安全
    • 2,529 篇 安全科学与工程
    • 2,348 篇 交通运输工程
  • 32,419 篇 理学
    • 17,328 篇 数学
    • 9,045 篇 物理学
    • 7,833 篇 生物学
    • 5,619 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,074 篇 化学
  • 17,439 篇 管理学
    • 10,798 篇 管理科学与工程(可...
    • 7,373 篇 图书情报与档案管...
    • 4,603 篇 工商管理
  • 4,876 篇 医学
    • 4,089 篇 临床医学
    • 3,658 篇 基础医学(可授医学...
    • 2,249 篇 药学(可授医学、理...
    • 2,073 篇 公共卫生与预防医...
  • 2,807 篇 法学
    • 2,195 篇 社会学
  • 1,721 篇 经济学
  • 1,428 篇 农学
  • 1,214 篇 教育学
  • 471 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,671 篇 feature extracti...
  • 2,343 篇 accuracy
  • 2,266 篇 deep learning
  • 2,117 篇 computer science
  • 1,985 篇 computational mo...
  • 1,931 篇 training
  • 1,893 篇 machine learning
  • 1,462 篇 data mining
  • 1,324 篇 optimization
  • 1,317 篇 internet of thin...
  • 1,305 篇 support vector m...
  • 1,185 篇 information tech...
  • 1,166 篇 predictive model...
  • 1,102 篇 educational inst...
  • 1,097 篇 wireless sensor ...
  • 983 篇 artificial intel...
  • 962 篇 neural networks
  • 944 篇 real-time system...
  • 939 篇 semantics
  • 937 篇 security

机构

  • 695 篇 school of comput...
  • 516 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 266 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 203 篇 school of comput...
  • 201 篇 department of co...
  • 194 篇 department of ph...
  • 183 篇 department of ph...
  • 175 篇 departamento de ...
  • 175 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 254 篇 m. klein
  • 251 篇 r. ströhmer
  • 243 篇 y. tayalati
  • 240 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 221 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 196 篇 d. guest
  • 190 篇 s. jin

语言

  • 93,965 篇 英文
  • 5,350 篇 其他
  • 1,647 篇 中文
  • 77 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 德文
  • 10 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Information Technology"
100943 条 记 录,以下是451-460 订阅
排序:
A topical VAEGAN-IHMM approach for automatic story segmentation
收藏 引用
Mathematical Biosciences and engineering 2024年 第7期21卷 6608-6630页
作者: Yu, Jia Peng, Huiling Wang, Guoqiang Shi, Nianfeng School of Computer and Information Engineering Luoyang Institute of Science and Technology China Software Research Institute Technological University of Shannon Ireland
Feature representations with rich topic information can greatly improve the performance of story segmentation tasks. VAEGAN offers distinct advantages in feature learning by combining variational autoencoder (VAE) and... 详细信息
来源: 评论
An Offline Biotic Stress Recognition Tool for Rice Plants Through Domain Shift
收藏 引用
SN computer Science 2024年 第5期5卷 478页
作者: Pal, Chiranjit Chatterji, Sanjay Pratihar, Sanjoy Computer Science and Engineering Indian Institute of Information Technology Kalyani Kalyani 741235 India
Researchers are investigating deep learning techniques with their automatic feature learning capabilities for automated rice disease recognition from images. The current study has developed an ensamble model exploring... 详细信息
来源: 评论
A learning automata based edge resource allocation approach for IoT-enabled smart cities
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1258-1266页
作者: Sampa Sahoo Kshira Sagar Sahoo Bibhudatta Sahoo Amir H.Gandomi Department of Computer Science and Engineering C.V.Raman Global UniversityBhubaneswarIndia Department of Computer Science and Engineering SRM UniversityAmaravatiIndia Department of Computing Science Umea UniversityUmea90187Sweden Department of Computer Science and Engineering NIT RourkelaIndia Faculty of Engineering and Information Technology University of Technology SydneyAustralia University Research and Innovation Center(EKIK) Obuda University1034 BudapestHungary
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ... 详细信息
来源: 评论
OFDM with Generalized Cascade Index Modulation for Secure Communications
收藏 引用
China Communications 2024年 第10期21卷 210-225页
作者: Hu Zeng Jin Xiaopin Yao Yudong Chen Fangjiong Wan Dehuan Liu Yun College of Information Science and Technology Zhongkai University of Agriculture and EngineeringGuangzhou 510225China College of Information Engineering China Jiliang UniversityHangzhou 310018China Department Electrical and Computer Engineering Stevens Institute of Technology HobokenNJ 07030USA School of Electronic and Information Engineering South China University of TechnologyGuangzhou 510641China Center for Data Science and Artificial Intelligence Guangdong University of FinanceGuangzhou 510521China
Cascade index modulation(CIM) is a recently proposed improvement of orthogonal frequency division multiplexing with index modulation(OFDM-IM) and achieves better error *** CIM, at least two different IM operations con... 详细信息
来源: 评论
Complex Social Networks: Dynamics, Domains, and Dimensions  1
收藏 引用
International Conference on Electrical and Electronics engineering, ICEEE 2023
作者: Gera, Suruchi Sinha, Adwitiya Department of Computer Science and Engineering JSS Academy of Technical Education Noida India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Noida India
The online social platforms witnessed enormous growth in its networked structure as users continue to connect and interact through e-social dialogues. This eventually causes the transformational emergence of online so... 详细信息
来源: 评论
Nonlinear Teager-Kaiser Infomax Boost Clustering Algorithm for Brain Tumor Detection Technique
收藏 引用
computer Systems Science & engineering 2023年 第8期46卷 2589-2599页
作者: P.M.Siva Raja S.Brinthakumari K.Ramanan Computer Science and Engineering Amrita College of Engineering and TechnologyNagercoil629901India Information Technology K.C College of Engineering and Management Studies and ResearchThaneIndia Computer Science and Engineering NPR College of Engineering and TechnologyDindigul629902India
Brain tumor detection and division is a difficult tedious undertaking in clinical image *** it comes to the new technology that enables accurate identification of the mysterious tissues of the brain,magnetic resonance... 详细信息
来源: 评论
Exploring the Impact of Financial News Sentiment on Stock Price Forecasting: A Comparative Deep Learning Approach  1
Exploring the Impact of Financial News Sentiment on Stock Pr...
收藏 引用
1st IEEE International Conference on Communications and computer Science, InCCCS 2024
作者: Rajhans, Abhishek Das, Trinanjan Kumar, Anish Sinha, Bam Bahadur Computer Science and Engineering Indian Institute of Information Technology Ranchi India Computer Science and Engineering National Institute of Technology Sikkim India
The application of Artificial Intelligence (AI) in stock price prediction has demonstrated significant advancements, with Machine Learning and Deep Learning techniques proving highly efficient in this domain. Two wide... 详细信息
来源: 评论
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 评论
A voting-based trustworthy distributed IoT attack detection model
收藏 引用
Personal and Ubiquitous Computing 2025年 第1期29卷 103-118页
作者: Sharma, Priya Sharma, Sanjay Kumar Dani, Diksha University School of Information & Communication Technology Gautam Buddha University Greater Noida India Department of Computer Engineering SVKM’s NMIMS Mukesh Patel School of Technology Management & Engineering Mumbai India
Besides the enhancement of the Internet of Things (IoT) distributed environment, anomalous activities are also escalating rapidly. Therefore, improving the trustworthiness of distributed networks is required for the e... 详细信息
来源: 评论
Joint Watermarking and Encryption for Social Image Sharing
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2927-2946页
作者: Conghuan Ye Shenglong Tan Shi Li Jun Wang Qiankun Zuo Bing Xiong School of Information Engineering Hubei University of EconomicsWuhan430205China School of Computer and Communication Engineering Changsha University of Science&TechnologyChangsha410114China
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima... 详细信息
来源: 评论