咨询与建议

限定检索结果

文献类型

  • 53,774 篇 会议
  • 27,402 篇 期刊文献
  • 754 册 图书

馆藏范围

  • 81,930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,039 篇 工学
    • 36,796 篇 计算机科学与技术...
    • 29,921 篇 软件工程
    • 13,916 篇 信息与通信工程
    • 8,206 篇 控制科学与工程
    • 6,060 篇 电气工程
    • 6,001 篇 生物工程
    • 5,701 篇 电子科学与技术(可...
    • 4,141 篇 生物医学工程(可授...
    • 3,806 篇 机械工程
    • 3,686 篇 光学工程
    • 2,710 篇 仪器科学与技术
    • 2,506 篇 动力工程及工程热...
    • 2,369 篇 化学工程与技术
    • 2,279 篇 网络空间安全
    • 2,131 篇 安全科学与工程
    • 1,962 篇 交通运输工程
  • 26,785 篇 理学
    • 14,387 篇 数学
    • 7,349 篇 物理学
    • 6,661 篇 生物学
    • 4,635 篇 统计学(可授理学、...
    • 3,046 篇 系统科学
    • 2,488 篇 化学
  • 14,691 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,260 篇 图书情报与档案管...
    • 3,812 篇 工商管理
  • 4,128 篇 医学
    • 3,458 篇 临床医学
    • 3,107 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,806 篇 公共卫生与预防医...
  • 2,382 篇 法学
    • 1,865 篇 社会学
  • 1,418 篇 经济学
  • 1,169 篇 农学
  • 977 篇 教育学
  • 372 篇 文学
  • 241 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,197 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,967 篇 deep learning
  • 1,966 篇 accuracy
  • 1,618 篇 machine learning
  • 1,605 篇 computational mo...
  • 1,560 篇 training
  • 1,224 篇 data mining
  • 1,075 篇 internet of thin...
  • 1,074 篇 support vector m...
  • 1,049 篇 optimization
  • 1,002 篇 predictive model...
  • 891 篇 educational inst...
  • 870 篇 wireless sensor ...
  • 867 篇 semantics
  • 836 篇 artificial intel...
  • 823 篇 real-time system...
  • 789 篇 security
  • 773 篇 neural networks
  • 730 篇 image segmentati...

机构

  • 689 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 259 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 220 篇 department of ph...
  • 220 篇 departamento de ...
  • 216 篇 physics division...
  • 216 篇 department of co...
  • 206 篇 department of ph...
  • 201 篇 school of comput...
  • 197 篇 department of ph...
  • 186 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 167 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 253 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 243 篇 y. tayalati
  • 234 篇 niyato dusit
  • 226 篇 d. guest
  • 226 篇 s. jin
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,091 篇 英文
  • 4,603 篇 其他
  • 1,248 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering and Information Technology"
81930 条 记 录,以下是361-370 订阅
排序:
An object detection approach with residual feature fusion and second-order term attention mechanism
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 411-424页
作者: Cuijin Li Zhong Qu Shengye Wang College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqingChina College of Electronic Information Chongqing Institute of EngineeringChongqingChina
Automatically detecting and locating remote occlusion small objects from the images of complex traffic environments is a valuable and challenging *** the boundary box location is not sufficiently accurate and it is di... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Oppositional Red Fox Optimization Based Task Scheduling Scheme for Cloud Environment
收藏 引用
computer Systems science & engineering 2023年 第4期45卷 483-495页
作者: B.Chellapraba D.Manohari K.Periyakaruppan M.S.Kavitha Department of Information Technology Karpagam Institute of TechnologyCoimbatore641032TamilnaduIndia Department of Computer Science and Engineering St.Joseph’s Institute of TechnologyChennai600119India Department of Computer Science&Engineering SNS College of EngineeringCoimbatore641107India Department of Computer Science&Engineering SNS College of TechnologyCoimbatore641035India
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various re... 详细信息
来源: 评论
Improved Harris Hawks Algorithm and Its Application in Feature Selection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1251-1273页
作者: Qianqian Zhang Yingmei Li Jianjun Zhan Shan Chen School of Computer Science and Information Engineering Harbin Normal UniversityHarbin150025China College of Systems Engineering National University of Defense TechnologyChangsha410073China
This research focuses on improving the Harris’Hawks Optimization algorithm(HHO)by tackling several of its shortcomings,including insufficient population diversity,an imbalance in exploration ***,and a lack of thoroug... 详细信息
来源: 评论
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论
Arduino-Powered Sonar Radar MOKSH: Design, Implementation, and Applications  1
Arduino-Powered Sonar Radar MOKSH: Design, Implementation, a...
收藏 引用
1st International Conference on Advanced Computing and Emerging Technologies, ACET 2024
作者: Seejal, Seejal Kumar, Harish Taluja, Anuradha Gandotra, Ekta Gupta, P.K. Computer Science and Engineering Jaypee University of Information Technology Himachal India Computer Science and Engineering Sdgi University Ghaziabad India Computer Science and Engineering Aktu Lucknow Ghaziabad India Computer Science and Engineering Jaypee University of Information Technology India Computer Science and Engineering Mohan Babu University Tirupati India
The Arduino-controlled radar systems constituting the fundamental elements of this RADAR system, an ultrasonic sensor and servo motor are employed. The fundamental operation of the system is to detect objects within t... 详细信息
来源: 评论
A geometric-approach based Combinatorial Transformative Scalogram analysis for multiclass identification of pathologies in a voice signal
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Khumukcham, Ranita Nongmeikapam, Kishorjit Department of Electronics and Communication Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India Department of Computer Science and Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from th... 详细信息
来源: 评论
An Advanced Dynamic Scheduling for Achieving Optimal Resource Allocation
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 281-295页
作者: R.Prabhu S.Rajesh Department of Computer Science and Engineering AAA College of Engineering and TechnologySivakasiTamilnaduIndia Department of Information Technology Mepco Schlenk Engineering College SivakasiTamilnadu India
Cloud computing distributes task-parallel among the various *** with self-service supported and on-demand service have rapid *** these applications,cloud computing allocates the resources dynami-cally via the internet... 详细信息
来源: 评论
A Cascaded Dynamic Attention-Based Deep Learning Model Segments Brain Tumors  12
A Cascaded Dynamic Attention-Based Deep Learning Model Segme...
收藏 引用
12th International Conference on Current Trends in Advanced Computing, ICCTAC 2024
作者: Choudhary, Kartik Singh, Kaptan Saxena, Amit Computer Science & Engineering Truba Institute of Engineering & Information Technology Bhopal India
Brain tumor diagnosis and treatment need segmentation, Precision automated segmentation of brain tumors is difficult due to their size, shape, unexpected placements, and fuzzy boundaries. U-Net is a popular medical pi... 详细信息
来源: 评论
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1311-1328页
作者: Arslan Akram Imran Khan Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni Faculty of Computer Science and Information Technology Department of Computer ScienceSuperior UniversityLahore54000Pakistan Machine Learning Code(MLC)Lab Meharban HouseHouse Number 209Zafar ColonyOkara56300Pakistan Information Technology Services University of OkaraOkara56310Pakistan Department of Computer Science&Engineering University of Engineering&Technology LahoreNarowal CampusNarowal51601Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain11671Abu Dhabi Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information... 详细信息
来源: 评论