咨询与建议

限定检索结果

文献类型

  • 68,042 篇 会议
  • 32,068 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 100,943 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 62,221 篇 工学
    • 44,092 篇 计算机科学与技术...
    • 35,703 篇 软件工程
    • 17,188 篇 信息与通信工程
    • 10,083 篇 控制科学与工程
    • 7,557 篇 电气工程
    • 7,373 篇 电子科学与技术(可...
    • 7,062 篇 生物工程
    • 4,971 篇 生物医学工程(可授...
    • 4,692 篇 机械工程
    • 4,417 篇 光学工程
    • 3,452 篇 仪器科学与技术
    • 3,157 篇 动力工程及工程热...
    • 2,917 篇 化学工程与技术
    • 2,616 篇 网络空间安全
    • 2,529 篇 安全科学与工程
    • 2,348 篇 交通运输工程
  • 32,419 篇 理学
    • 17,328 篇 数学
    • 9,045 篇 物理学
    • 7,833 篇 生物学
    • 5,619 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,074 篇 化学
  • 17,439 篇 管理学
    • 10,798 篇 管理科学与工程(可...
    • 7,373 篇 图书情报与档案管...
    • 4,603 篇 工商管理
  • 4,876 篇 医学
    • 4,089 篇 临床医学
    • 3,658 篇 基础医学(可授医学...
    • 2,249 篇 药学(可授医学、理...
    • 2,073 篇 公共卫生与预防医...
  • 2,807 篇 法学
    • 2,195 篇 社会学
  • 1,721 篇 经济学
  • 1,428 篇 农学
  • 1,214 篇 教育学
  • 471 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,671 篇 feature extracti...
  • 2,343 篇 accuracy
  • 2,266 篇 deep learning
  • 2,117 篇 computer science
  • 1,985 篇 computational mo...
  • 1,931 篇 training
  • 1,893 篇 machine learning
  • 1,462 篇 data mining
  • 1,324 篇 optimization
  • 1,317 篇 internet of thin...
  • 1,305 篇 support vector m...
  • 1,185 篇 information tech...
  • 1,166 篇 predictive model...
  • 1,102 篇 educational inst...
  • 1,097 篇 wireless sensor ...
  • 983 篇 artificial intel...
  • 962 篇 neural networks
  • 944 篇 real-time system...
  • 939 篇 semantics
  • 937 篇 security

机构

  • 695 篇 school of comput...
  • 516 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 266 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 203 篇 school of comput...
  • 201 篇 department of co...
  • 194 篇 department of ph...
  • 183 篇 department of ph...
  • 175 篇 departamento de ...
  • 175 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 254 篇 m. klein
  • 251 篇 r. ströhmer
  • 243 篇 y. tayalati
  • 240 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 221 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 196 篇 d. guest
  • 190 篇 s. jin

语言

  • 93,965 篇 英文
  • 5,350 篇 其他
  • 1,647 篇 中文
  • 77 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 德文
  • 10 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Information Technology"
100943 条 记 录,以下是491-500 订阅
排序:
An Algorithm to Reduce Compression Ratio in Multimedia Applications
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 539-557页
作者: Dur-e-Jabeen Tahmina Khan Rumaisa Iftikhar Ali Akbar Siddique Samiya Asghar Department of Electronic Engineering Sir Syed University of Engineering&TechnologyKarachiPakistan Department of Information&Computer Science Sir Syed University of Engineering&TechnologyKarachiPakistan
In recent years,it has been evident that internet is the most effective means of transmitting information in the form of documents,photographs,or videos around the *** purpose of an image compression method is to enco... 详细信息
来源: 评论
Virtual surface mining based on Cesium  9
Virtual surface mining based on Cesium
收藏 引用
9th International Symposium on Energy Science and Chemical engineering, ISESCE 2024
作者: Lin, Zewei Xu, Huarong Xiamen University of Technology College of Computer and Information Engineering Xiamen China
Mining excavation refers to the process of extracting metals, coal, diamonds, oil, natural gas, and other rare geological substances from the underground. The mining industry involves many aspects of safety and enviro... 详细信息
来源: 评论
Advancements in Depression Severity Prediction: A Multi-Modal Machine Learning Approach Integrating MCQs and Audio Data  2
Advancements in Depression Severity Prediction: A Multi-Moda...
收藏 引用
2nd IEEE International Conference on Advances in information technology, ICAIT 2024
作者: Pimpalkar, Shilpa P. Chavan, Anish Avinash Gawali, Sadhana Vijay Dalvi, Shreya Sanjay Department of Computer Engineering AISSMS Institute of Information Technology Pune India
This research presents a machine-learning framework for predicting depression severity by leveraging Multiple-Choice Questions (MCQs) and transcribed audio data. Two distinct data sources are employed, with regression... 详细信息
来源: 评论
Optimizing Intrusion Detection with a Dual-Archive Approach Using DAPS-XG  19
Optimizing Intrusion Detection with a Dual-Archive Approach ...
收藏 引用
19th Iranian Conference on Intelligent Systems, ICIS 2024
作者: Faryabi, Sadegh Afzali, Mahboubeh Naji, Hamid Reza Graduate University of Advanced Technology Department of Computer Engineering and Information Technology Kerman Iran
Intrusion Detection Systems are essential for protecting industrial networks, critical infrastructure, and corporate environments against deliberate cyber-Attacks. Nevertheless, a notable obstacle in contemporary intr... 详细信息
来源: 评论
Deep Reinforcement Learning With Heterogeneous Graph Neural Network for Flexible Job Shop Scheduling Problem  10
Deep Reinforcement Learning With Heterogeneous Graph Neural ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Liu, Boyan Yin, Huayi Xiamen University of Technology School of Computer and Information Engineering Xiamen China
Job Shop Scheduling Problem (JSP) is common in modern factories, but traditional dispatching rules (DR) and heuristic algorithms (HA) struggle with the increasing complexity of manufacturing processes. In this paper, ... 详细信息
来源: 评论
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
收藏 引用
Chinese Physics B 2024年 第7期33卷 233-243页
作者: 苏静明 方士辉 洪炎 温言 Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center Anhui University of Science and TechnologyHuainan 232001China School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... 详细信息
来源: 评论
Research on Pedestrian Fall Detection Based on YOLOv8n  18
Research on Pedestrian Fall Detection Based on YOLOv8n
收藏 引用
18th IEEE International Conference on Anti-Counterfeiting, Security, and Identification, ASID 2024
作者: Xu, HuaRong Liu, Wei Xiamen University of Technology Department of Computer and Information Engineering Xiamen China
To address the challenges of finding an ideal balance between computational redundancy, accuracy, parameter count, and computational complexity in existing pedestrian fall detection algorithms, this paper proposes a l... 详细信息
来源: 评论
MSF-A2: Improving 3D Object Detection with Multi-Scale Feature Integration  9
MSF-A2: Improving 3D Object Detection with Multi-Scale Featu...
收藏 引用
9th International Conference on Intelligent Informatics and BioMedical Sciences, ICIIBMS 2024
作者: Liu, Yunxiang Yang, Shibo Shanghai Institute of Technology School of Computer Information and Engineering Shanghai China
To address the limitations of the Part-A2 3D point cloud object detection model in multi-scale feature extraction and global feature fusion, which hinder the simultaneous capture of fine-grained and coarse-grained fea... 详细信息
来源: 评论
API Completion Recommendation Algorithm Based on Programming Site Context  10
API Completion Recommendation Algorithm Based on Programming...
收藏 引用
10th International Symposium on System Security, Safety, and Reliability, ISSSR 2024
作者: Chen, Jun Xiao, Lei Shen, Yuxiang Xiamen University of Technology School of Computer and Information Engineering Xiamen China
In the process of software development, developers often face a large number of APIs. However, due to the numerous APIs and issues such as missing or incorrect documentation, developers find it difficult to learn and ... 详细信息
来源: 评论
An Essay on Detailed Performance Assessment Ensemble-Based Predictive Modelling in Network Intrusion Detection Systems
An Essay on Detailed Performance Assessment Ensemble-Based P...
收藏 引用
2024 IEEE Students Conference on engineering and Systems, SCES 2024
作者: Khajgiwale, Parth International Institute of Information Technology Department of Computer Engineering Pune India
Network Intrusion Detection Systems (NIDS) play a critical role in safeguarding computer networks against malicious activities and cyber threats. To improve the accuracy and robustness of NIDS, this research explores ... 详细信息
来源: 评论