咨询与建议

限定检索结果

文献类型

  • 68,042 篇 会议
  • 32,068 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 100,943 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 62,221 篇 工学
    • 44,092 篇 计算机科学与技术...
    • 35,703 篇 软件工程
    • 17,188 篇 信息与通信工程
    • 10,083 篇 控制科学与工程
    • 7,557 篇 电气工程
    • 7,373 篇 电子科学与技术(可...
    • 7,062 篇 生物工程
    • 4,971 篇 生物医学工程(可授...
    • 4,692 篇 机械工程
    • 4,417 篇 光学工程
    • 3,452 篇 仪器科学与技术
    • 3,157 篇 动力工程及工程热...
    • 2,917 篇 化学工程与技术
    • 2,616 篇 网络空间安全
    • 2,529 篇 安全科学与工程
    • 2,348 篇 交通运输工程
  • 32,419 篇 理学
    • 17,328 篇 数学
    • 9,045 篇 物理学
    • 7,833 篇 生物学
    • 5,619 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,074 篇 化学
  • 17,439 篇 管理学
    • 10,798 篇 管理科学与工程(可...
    • 7,373 篇 图书情报与档案管...
    • 4,603 篇 工商管理
  • 4,876 篇 医学
    • 4,089 篇 临床医学
    • 3,658 篇 基础医学(可授医学...
    • 2,249 篇 药学(可授医学、理...
    • 2,073 篇 公共卫生与预防医...
  • 2,807 篇 法学
    • 2,195 篇 社会学
  • 1,721 篇 经济学
  • 1,428 篇 农学
  • 1,214 篇 教育学
  • 471 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,671 篇 feature extracti...
  • 2,343 篇 accuracy
  • 2,266 篇 deep learning
  • 2,117 篇 computer science
  • 1,985 篇 computational mo...
  • 1,931 篇 training
  • 1,893 篇 machine learning
  • 1,462 篇 data mining
  • 1,324 篇 optimization
  • 1,317 篇 internet of thin...
  • 1,305 篇 support vector m...
  • 1,185 篇 information tech...
  • 1,166 篇 predictive model...
  • 1,102 篇 educational inst...
  • 1,097 篇 wireless sensor ...
  • 983 篇 artificial intel...
  • 962 篇 neural networks
  • 944 篇 real-time system...
  • 939 篇 semantics
  • 937 篇 security

机构

  • 695 篇 school of comput...
  • 516 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 266 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 203 篇 school of comput...
  • 201 篇 department of co...
  • 194 篇 department of ph...
  • 183 篇 department of ph...
  • 175 篇 departamento de ...
  • 175 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 254 篇 m. klein
  • 251 篇 r. ströhmer
  • 243 篇 y. tayalati
  • 240 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 221 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 196 篇 d. guest
  • 190 篇 s. jin

语言

  • 93,965 篇 英文
  • 5,350 篇 其他
  • 1,647 篇 中文
  • 77 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 德文
  • 10 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Information Technology"
100943 条 记 录,以下是521-530 订阅
排序:
MCFusion: Frequency Domain Characteristics Enhancement and Feature Compensation Fusion Network for RGB-T Object Detection
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 20880-20893页
作者: Gao, Yinbo Liao, Zhuhua Liu, Yizhi Yi, Aiping Zhang, Guoqiang Hunan University of Science and Technology China Hunan University of Science and Technology Department of Computer Science and Engineering Xiangtan China Hainan Normal University Department of Information Science and Technology Haikou China
The multi-modal object detection technology based on visible-thermal vision sensors has drawn significant attention as it is capable of achieving reliable object detection in complex scenes with challenging lighting c... 详细信息
来源: 评论
A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 471-501页
作者: Chandraumakantham Om Kumar Sudhakaran Gajendran Suguna Marappan Mohammed Zakariah Abdulaziz S.Almazyad School of Computer Science&Engineering Vellore Institute of TechnologyChennai CampusChennai600127India School of Electronics&Engineering Vellore Institute of TechnologyChennai CampusChennai600127India Department of Computer Sciences and Engineering College of Applied ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security... 详细信息
来源: 评论
Review on use of Immersive Technologies in Tourism
Review on use of Immersive Technologies in Tourism
收藏 引用
2024 IEEE International Conference on Intelligent Computing and Emerging Communication Technologies, ICEC 2024
作者: Kulkarni, Simantinee Kulkarni, Anagha Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Cummins College of Engineering for Women Department of Information Technology Pune India
Nowadays immersive technologies play a very important role in different industries like automotive, manufacturing, marketing and advertising, travel, education, health care etc. Augmented Reality, Virtual Reality and ... 详细信息
来源: 评论
Smart Retail: Utilizing Machine Learning for Demand Prediction, Price Strategy, and Inventory Management  16
Smart Retail: Utilizing Machine Learning for Demand Predicti...
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Singhal, Krish Singh, Vaibhav Kaul, Amrita Computer Science Engineering Jaypee Institute of Information Technology Noida India Electronics and Communication Engineering Jaypee Institute of Information Technology Noida India
This research demonstrates the ability of Artificial Intelligence (AI) to enhance real-time demand forecasting, price prediction, and inventory management by analyzing key factors such as competitor prices, customer p... 详细信息
来源: 评论
Data Secure Storage Mechanism for IIoT Based on Blockchain
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4029-4048页
作者: Jin Wang Guoshu Huang R.Simon Sherratt Ding Huang Jia Ni School of Computer Science and Mathematics Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Systems Engineering The University of ReadingReadingRG66AYUK School of Computer Nanjing University of Information Science and TechnologyNanjing210044China
With the development of Industry 4.0 and big data technology,the Industrial Internet of Things(IIoT)is hampered by inherent issues such as privacy,security,and fault tolerance,which pose certain challenges to the rapi... 详细信息
来源: 评论
Secure blockchain bidding auction protocol against malicious adversaries
收藏 引用
High-Confidence Computing 2024年 第3期4卷 58-63页
作者: Xiaobing Dai Jiajing Liu Xin Liu Xiaofen Tu Ruexue Wang Department of Computer and Information Engineering Baotou Vocational&Technical CollegeBaotou 014010China Department of Computer Tianjin Ren’ai CollegeTianjin 301636China School of Information Engineering Inner Mongolia University of Science and TechnologyBaotou 014010China
In recent years,with the development of blockchain,electronic bidding auction has received more and more *** at the possible problems of privacy leakage in the current electronic bidding and auction,this paper propose... 详细信息
来源: 评论
Analysis of Employee Attrition using Statistical and Machine Learning Approaches  1st
Analysis of Employee Attrition using Statistical and Machine...
收藏 引用
1st International Conference on Artificial Intelligence of Things, ICAIoT 2023
作者: Singh, Akash Kumar Thakral, Prateek Department of Computer Science and Engineering and Information Technology Jaypee University of Information Technology Waknaghat Himachal Pradesh Solan India
Attrition means exit of employees from an organization due to any reason. The exit may be voluntary or involuntary in nature. Increased rate of employee attrition leads to loss of an organization’s resources in terms... 详细信息
来源: 评论
Network Anomaly Detection using Autoencoder on Various Datasets: A Comprehensive Review
收藏 引用
Recent Patents on engineering 2024年 第9期18卷 63-77页
作者: Singh, Richa Srivastava, Nidhi Kumar, Ashwani Amity Institute of Information Technology Amity University Lucknow Campus Uttar Pradesh Lucknow India Department of Computer Science and Engineering School of Engineering and Technology Sharda University Greater Noida India
The scientific community is currently very concerned about information and communication technology security because any assault or network anomaly can have a remarkable collision on a number of areas, including natio... 详细信息
来源: 评论
Inductive Lottery Ticket Learning for Graph Neural Networks
收藏 引用
Journal of computer Science & technology 2024年 第6期39卷 1223-1237页
作者: Yong-Duo Sui Xiang Wang Tianlong Chen Meng Wang Xiang-Nan He Tat-Seng Chua School of Data Science University of Science and Technology of ChinaHefei 230027China Department of Electrical and Computer Engineering The University of Texas at AustinAustin 78712U.S.A School of Computer Science and Information Engineering Hefei University of TechnologyHefei 230009China School of Computing National University of SingaporeSingapore
Graph neural networks (GNNs) have gained increasing popularity, while usually suffering from unaffordable computations for real-world large-scale applications. Hence, pruning GNNs is of great need but largely unexplor... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论