咨询与建议

限定检索结果

文献类型

  • 68,042 篇 会议
  • 32,068 篇 期刊文献
  • 833 册 图书

馆藏范围

  • 100,943 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 62,221 篇 工学
    • 44,092 篇 计算机科学与技术...
    • 35,703 篇 软件工程
    • 17,188 篇 信息与通信工程
    • 10,083 篇 控制科学与工程
    • 7,557 篇 电气工程
    • 7,373 篇 电子科学与技术(可...
    • 7,062 篇 生物工程
    • 4,971 篇 生物医学工程(可授...
    • 4,692 篇 机械工程
    • 4,417 篇 光学工程
    • 3,452 篇 仪器科学与技术
    • 3,157 篇 动力工程及工程热...
    • 2,917 篇 化学工程与技术
    • 2,616 篇 网络空间安全
    • 2,529 篇 安全科学与工程
    • 2,348 篇 交通运输工程
  • 32,419 篇 理学
    • 17,328 篇 数学
    • 9,045 篇 物理学
    • 7,833 篇 生物学
    • 5,619 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,074 篇 化学
  • 17,439 篇 管理学
    • 10,798 篇 管理科学与工程(可...
    • 7,373 篇 图书情报与档案管...
    • 4,603 篇 工商管理
  • 4,876 篇 医学
    • 4,089 篇 临床医学
    • 3,658 篇 基础医学(可授医学...
    • 2,249 篇 药学(可授医学、理...
    • 2,073 篇 公共卫生与预防医...
  • 2,807 篇 法学
    • 2,195 篇 社会学
  • 1,721 篇 经济学
  • 1,428 篇 农学
  • 1,214 篇 教育学
  • 471 篇 文学
  • 285 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,671 篇 feature extracti...
  • 2,343 篇 accuracy
  • 2,266 篇 deep learning
  • 2,117 篇 computer science
  • 1,985 篇 computational mo...
  • 1,931 篇 training
  • 1,893 篇 machine learning
  • 1,462 篇 data mining
  • 1,324 篇 optimization
  • 1,317 篇 internet of thin...
  • 1,305 篇 support vector m...
  • 1,185 篇 information tech...
  • 1,166 篇 predictive model...
  • 1,102 篇 educational inst...
  • 1,097 篇 wireless sensor ...
  • 983 篇 artificial intel...
  • 962 篇 neural networks
  • 944 篇 real-time system...
  • 939 篇 semantics
  • 937 篇 security

机构

  • 695 篇 school of comput...
  • 516 篇 school of comput...
  • 476 篇 maharishi school...
  • 352 篇 department of co...
  • 275 篇 department of ph...
  • 266 篇 school of comput...
  • 258 篇 faculté des scie...
  • 252 篇 department of ph...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 203 篇 school of comput...
  • 201 篇 department of co...
  • 194 篇 department of ph...
  • 183 篇 department of ph...
  • 175 篇 departamento de ...
  • 175 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 254 篇 m. klein
  • 251 篇 r. ströhmer
  • 243 篇 y. tayalati
  • 240 篇 h. sakamoto
  • 236 篇 niyato dusit
  • 221 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 196 篇 d. guest
  • 190 篇 s. jin

语言

  • 93,965 篇 英文
  • 5,350 篇 其他
  • 1,647 篇 中文
  • 77 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 德文
  • 10 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Information Technology"
100943 条 记 录,以下是591-600 订阅
排序:
Noise4Denoise:Leveraging noise for unsupervised point cloud denoising
收藏 引用
Computational Visual Media 2024年 第4期10卷 659-669页
作者: Weijia Wang Xiao Liu Hailing Zhou Lei Wei Zhigang Deng Manzur Murshed Xuequan Lu Deakin University GeelongVIC 3216Australia Department of Mechanical Engineering and Product Design Engineering Swinburne University of TechnologyMelbourneVIC 3122Australia Department of Computer Science University of HoustonHoustonTX 77204-3027USA Department of Computer Science and Information Technology La Trobe UniversityMelbourneVIC 3086Australia
Existing deep learning-based point cloud denoising methods are generally trained in a supervised manner that requires clean data as ground-truth ***,in practice,it is not always feasible to obtain clean point *** this... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
ICRM: An intelligent citation recommendation mechanism based on BERT and weighted BoW models
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 10135-10150页
作者: Chang, Chih-Yung Yang, Yu-Ting Zhang, Qiaoyun Lin, Yi-Ti Roy, Diptendu Sinha Department of Computer Science and Information Engineering Tamkang University New Taipei Taiwan Department of English Tamkang University New Taipei Taiwan Department of Computer Science and Engineering National Institute of Technology Shillong India
With the field of technology has witnessed rapid advancements, attracting an ever-growing community of researchers dedicated to developing theories and techniques. This paper proposes an innovative ICRM (Intelligent C... 详细信息
来源: 评论
An intelligent approach for anomaly detection in credit card data using bat optimization algorithm
收藏 引用
Inteligencia Artificial 2023年 第72期26卷 202-222页
作者: Haseena, S. Saroja, S. Suseandhiran, N. Manikandan, B. Department of Information Technology Mepco Schlenk Engineering College India Department of Computer Applications National Institute of Technology Trichy India
As technology advances, many people are utilising credit cards to purchase their necessities, and the number of credit card scams is increasing tremendously. However, illegal card transactions have been on the rise, c... 详细信息
来源: 评论
Performance Improvement: Modulation Recognition Scheme Using CVCNN-LSTM Method  1
Performance Improvement: Modulation Recognition Scheme Using...
收藏 引用
1st International Conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Krishnamoorthy, Ramkumar Agarwal, Trapty Department of Computer Science and Information Technology Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
The process for automatic modulation recognition (AMR) is important to industrial cognitive radio Models. Although they have made significant strides in modulation detection, state-of-the-art real-valued CNNs compromi... 详细信息
来源: 评论
Enhancing Ground Network in UAV Assisted Wireless Communication  1
Enhancing Ground Network in UAV Assisted Wireless Communicat...
收藏 引用
1st International Conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Jebaraj, Solomon Yadav, Dhananjay Kumar Department of Computer Science and Information Technology Karnataka Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
The development of wireless technology for ground communications is being aided by the use of unmanned aerial vehicles (UAVs). It is believed that these technologies will continue to advance in the next years. Traditi... 详细信息
来源: 评论
QR Code-Based Visual Secret Sharing Scheme: A Review
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第4期9卷 2642-2661页
作者: Chu, Shu-Chuan Liu, Tao Pan, Jeng-Shyang Information Engineering College Guangzhou City Construction College Guangzhou510925 China School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Visual secret sharing (VSS) scheme is the technology that divides a secret into shares. The decoding operation on the share is performed to restore the secret image. The quick response (QR) code is an image carrying t... 详细信息
来源: 评论
Examining and Comparing: Performance of OFDM Utilised in 6G Communication  1
Examining and Comparing: Performance of OFDM Utilised in 6G ...
收藏 引用
1st International Conference on Advances in computer Science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Acharjya, Kalyan Suneetha, K. Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Department of Computer Science and Information Technology Karnataka Bangalore India
It is necessary to have a new and enhanced waveform system for transmission that is compatible with the band in order to accommodate the forthcoming 6G mobile network. Due to the fact that orthogonal frequency-divisio... 详细信息
来源: 评论
Generalizable Physics-Guided Convolutional Neural Network for Irregular Terrain Propagation
收藏 引用
IEEE Transactions on Antennas and Propagation 2025年 第6期73卷 3975-3985页
作者: Huang, Siyi Qin, Hao Hou, Weibin Zhang, Xinyue Zhang, Xingqi University of Alberta Department of Electrical and Computer Engineering Canada University College Dublin School of Electrical and Electronic Engineering Ireland China Academy of Information and Communications Technology Beijing China
The application of split-step parabolic equation methods for radio wave propagation across irregular terrains has gained widespread attention. However, the computational intensity of these methods limits their practic... 详细信息
来源: 评论
Deep Learning Approach for Detecting Fake Images Using Texture Variation Network
收藏 引用
Inteligencia Artificial 2023年 第72期26卷 1-14页
作者: Haseena, S. Saroja, S. Shri Dharshini, D. Nivetha, A. Department of Information Technology Mepco Schlenk Engineering College India Department of Computer Applications National Institute of Technology Trichy India
Face manipulation technology is rapidly evolving, making it impossible for human eyes to recognize fake faces in photos. Convolutional Neural Network (CNN) discriminators, on the other hand, can quickly achieve high a... 详细信息
来源: 评论