咨询与建议

限定检索结果

文献类型

  • 67,454 篇 会议
  • 31,512 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 98,991 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 61,394 篇 工学
    • 43,516 篇 计算机科学与技术...
    • 35,452 篇 软件工程
    • 17,008 篇 信息与通信工程
    • 9,817 篇 控制科学与工程
    • 7,416 篇 电气工程
    • 7,244 篇 电子科学与技术(可...
    • 7,035 篇 生物工程
    • 4,941 篇 生物医学工程(可授...
    • 4,648 篇 机械工程
    • 4,375 篇 光学工程
    • 3,433 篇 仪器科学与技术
    • 3,139 篇 动力工程及工程热...
    • 2,897 篇 化学工程与技术
    • 2,570 篇 网络空间安全
    • 2,511 篇 安全科学与工程
    • 2,329 篇 交通运输工程
  • 32,161 篇 理学
    • 17,211 篇 数学
    • 8,947 篇 物理学
    • 7,804 篇 生物学
    • 5,593 篇 统计学(可授理学、...
    • 3,774 篇 系统科学
    • 3,047 篇 化学
  • 17,324 篇 管理学
    • 10,727 篇 管理科学与工程(可...
    • 7,328 篇 图书情报与档案管...
    • 4,567 篇 工商管理
  • 4,826 篇 医学
    • 4,056 篇 临床医学
    • 3,643 篇 基础医学(可授医学...
    • 2,248 篇 药学(可授医学、理...
    • 2,051 篇 公共卫生与预防医...
  • 2,799 篇 法学
    • 2,189 篇 社会学
  • 1,715 篇 经济学
  • 1,413 篇 农学
  • 1,200 篇 教育学
  • 472 篇 文学
  • 287 篇 军事学
  • 220 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 2,628 篇 feature extracti...
  • 2,275 篇 accuracy
  • 2,187 篇 deep learning
  • 2,112 篇 computer science
  • 1,955 篇 computational mo...
  • 1,896 篇 training
  • 1,808 篇 machine learning
  • 1,455 篇 data mining
  • 1,306 篇 internet of thin...
  • 1,301 篇 optimization
  • 1,290 篇 support vector m...
  • 1,193 篇 information tech...
  • 1,140 篇 predictive model...
  • 1,112 篇 educational inst...
  • 1,106 篇 wireless sensor ...
  • 954 篇 neural networks
  • 929 篇 semantics
  • 919 篇 real-time system...
  • 918 篇 security
  • 876 篇 image segmentati...

机构

  • 653 篇 school of comput...
  • 511 篇 school of comput...
  • 474 篇 maharishi school...
  • 341 篇 department of co...
  • 277 篇 department of ph...
  • 262 篇 school of comput...
  • 259 篇 faculté des scie...
  • 252 篇 department of ph...
  • 224 篇 faculty of scien...
  • 220 篇 department of ph...
  • 214 篇 physics division...
  • 202 篇 department of co...
  • 201 篇 school of comput...
  • 192 篇 department of ph...
  • 187 篇 department of ph...
  • 185 篇 departamento de ...
  • 167 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department for p...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 261 篇 h. a. gordon
  • 256 篇 m. klein
  • 255 篇 r. ströhmer
  • 247 篇 h. sakamoto
  • 244 篇 y. tayalati
  • 233 篇 niyato dusit
  • 228 篇 m. rijssenbeek
  • 202 篇 f. pastore
  • 202 篇 n. orlando
  • 199 篇 d. guest
  • 191 篇 s. jin

语言

  • 94,111 篇 英文
  • 3,279 篇 其他
  • 1,604 篇 中文
  • 77 篇 日文
  • 13 篇 斯洛文尼亚文
  • 11 篇 德文
  • 11 篇 法文
  • 10 篇 朝鲜文
  • 3 篇 荷兰文
  • 3 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Information Technology"
98991 条 记 录,以下是71-80 订阅
排序:
ElHBiAt: Electra pre-training network Hybrid of BiLSTM, the Attention layer to Aspect-Based Sentiment Analysis
收藏 引用
IEEE Access 2025年 13卷 88342-88370页
作者: Ghanee, Amin Jahanbin, Kia Yamchi, Abolfazl Razzaghi Shahid Beheshti University Department of Computer Engineering Tehran Iran Yazd University Department of Computer Engineering Yazd Iran Shiraz University Department of Computer Science Engineering and Information Technology Shiraz Iran
Aspect-based sentiment analysis is one of the famous and practical subjects in natural language processing. Traditional sentiment analysis assigns a polarity to the whole text or document and does not consider the asp... 详细信息
来源: 评论
VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain
收藏 引用
ACM Transactions on Sensor Networks 2024年 第2期20卷 1-22页
作者: Tian, Siben Bai, Fenhua Shen, Tao Zhang, Chi Gong, Bei Faculty of Information Engineering and Automation Kunming University of Science and Technology Yunnan Key Laboratory of Computer Technology Applications China Faculty of Information Technology Beijing University of Technology China
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus alg... 详细信息
来源: 评论
Multispectral point cloud superpoint segmentation
收藏 引用
Science China(Technological Sciences) 2024年 第4期67卷 1270-1281页
作者: WANG QingWang WANG MingYe ZHANG ZiFeng SONG Jian ZENG Kai SHEN Tao GU YanFeng Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming 650500China Yunnan Key Laboratory of Computer Technologies Application Kunming 650500China School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150001China
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing s... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12837-12856页
作者: Porwal, Shardha Mittal, Sangeeta Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key... 详细信息
来源: 评论
Adversarial attacks and defenses for digital communication signals identification
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 756-764页
作者: Qiao Tian Sicheng Zhang Shiwen Mao Yun Lin College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China College of Information and Communication Engineering Harbin Engineering UniversityHarbin150000China Department of Electrical and Computer Engineering Auburn UniversityAuburnAL36849USA
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi... 详细信息
来源: 评论
CVTD: A Robust Car-Mounted Video Text Detector
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1821-1842页
作者: Di Zhou Jianxun Zhang Chao Li Yifan Guo Bowen Li Department of Computer Science and Engineering Chongqing University of TechnologyChongqingChina College of Information and Engineering Jingdezhen Ceramic UniversityJingdezhenChina
Text perception is crucial for understanding the semantics of outdoor scenes,making it a key requirement for building intelligent systems for driver assistance or autonomous *** information in car-mounted videos can a... 详细信息
来源: 评论
A Deep Learning Approach to Industrial Corrosion Detection
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2587-2605页
作者: Mehwash Farooqui Atta Rahman Latifa Alsuliman Zainab Alsaif Fatimah Albaik Cadi Alshammari Razan Sharaf Sunday Olatunji Sara Waslallah Althubaiti Hina Gull Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Information Systems(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have... 详细信息
来源: 评论
An Experimental Study on Dynamic Lifelong Learning with GPT for Mitigating Catastrophic Forgetting in Aspect-Based Sentiment Analysis
收藏 引用
IEEE Access 2025年 13卷 90316-90332页
作者: Huang, Huang Asemi, Adeleh Universiti Malaya Faculty of Computer Science Information Technology Department of Software Engineering Kuala Lumpur Malaysia
GPT is widely recognized as one of the most versatile and powerful large language models, excelling across diverse domains. However, its significant computational demands often render it economically unfeasible for in... 详细信息
来源: 评论
Monitoring COVID-19 environment: a real-time facial mask detection using YOLO models
收藏 引用
Research on Biomedical engineering 2025年 第1期41卷 1-18页
作者: Pandiyan, P. Thangaraj, Rajasekaran V, Balasubramanian V. K, Manavalasundaram S, Balakrishnan Department of Electrical and Electronics Engineering KPR Institute of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Nandha Engineering College Erode India Department of Information Technology Velalar College of Engineering and Technology Erode India Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Chennai India Department of Computer Science and Engineering Sri Ramakrishna Institute of Technology Coimbatore India
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ... 详细信息
来源: 评论