咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,423 篇 期刊文献
  • 757 册 图书

馆藏范围

  • 82,061 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,015 篇 工学
    • 36,693 篇 计算机科学与技术...
    • 29,783 篇 软件工程
    • 13,881 篇 信息与通信工程
    • 8,177 篇 控制科学与工程
    • 6,003 篇 电气工程
    • 5,997 篇 生物工程
    • 5,711 篇 电子科学与技术(可...
    • 4,127 篇 生物医学工程(可授...
    • 3,804 篇 机械工程
    • 3,632 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,382 篇 化学工程与技术
    • 2,278 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,958 篇 交通运输工程
  • 26,701 篇 理学
    • 14,356 篇 数学
    • 7,341 篇 物理学
    • 6,653 篇 生物学
    • 4,653 篇 统计学(可授理学、...
    • 3,040 篇 系统科学
    • 2,500 篇 化学
  • 14,635 篇 管理学
    • 9,001 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,109 篇 医学
    • 3,439 篇 临床医学
    • 3,088 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,795 篇 公共卫生与预防医...
  • 2,380 篇 法学
    • 1,867 篇 社会学
  • 1,417 篇 经济学
  • 1,159 篇 农学
  • 974 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,215 篇 feature extracti...
  • 2,083 篇 computer science
  • 2,011 篇 accuracy
  • 1,985 篇 deep learning
  • 1,632 篇 computational mo...
  • 1,619 篇 machine learning
  • 1,568 篇 training
  • 1,225 篇 data mining
  • 1,097 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,066 篇 optimization
  • 1,013 篇 predictive model...
  • 889 篇 educational inst...
  • 876 篇 wireless sensor ...
  • 864 篇 semantics
  • 861 篇 artificial intel...
  • 859 篇 real-time system...
  • 806 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 694 篇 school of comput...
  • 542 篇 school of comput...
  • 475 篇 maharishi school...
  • 353 篇 department of co...
  • 276 篇 department of ph...
  • 262 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 222 篇 department of ph...
  • 222 篇 departamento de ...
  • 218 篇 physics division...
  • 216 篇 department of co...
  • 210 篇 department of ph...
  • 202 篇 school of comput...
  • 199 篇 department of ph...
  • 186 篇 department of ph...
  • 173 篇 college of compu...
  • 171 篇 department for p...
  • 168 篇 department of ph...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 261 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 234 篇 niyato dusit
  • 228 篇 d. guest
  • 227 篇 s. jin
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 71,183 篇 英文
  • 9,666 篇 其他
  • 1,294 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science Engineering and Information Technology"
82061 条 记 录,以下是4581-4590 订阅
排序:
Research on the Transient Potential Rise Characteristics of High - speed Railway Rail Lightning Strike and Its Impact on Trackside Signal Equipment  37
Research on the Transient Potential Rise Characteristics of ...
收藏 引用
37th International Conference on Lightning Protection, ICLP 2024
作者: Wang, Shulai Xiang, Nianwen Wang, Chaoqun Lyu, Zengwei Chen, Zhiwei School of Electrical Engineering and Automation Hefei University of Technology Hefei China Institute of Energy Hefei Comprehensive National Science Center Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Lightning strikes on the catenary will cause a sharp rise in rail potential, which directly threatens the safety of the signal equipment connected to the rail along the trackside. It is urgent to carry out research on... 详细信息
来源: 评论
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2497-2513页
作者: Mohammad Alamgeer Fahd N.Al-Wesabi Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi Department of Information Systems King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Department of Computer Science King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen School of Computing Faculty of EngineeringUniversiti Teknologi MalaysiaMalaysia Department of Electrical Engineering University of Engineering and Technology PeshawarPakistan Department of Computer Science College of ComputerQassim UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaKSA
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero... 详细信息
来源: 评论
Innovative Approaches in Microstrip Antennas: A Comparative Study of Enhanced Designs for 5G Communication Systems  5
Innovative Approaches in Microstrip Antennas: A Comparative ...
收藏 引用
5th IEEE International Conference on Recent Trends in computer science and technology, ICRTCST 2024
作者: Raotole, Atharv Shirodkar, Sailee Shah, Tanish Gwalani, Aryan Joshi, Aaditya Bothra, Aayush Sardar Patel Institute of Technology Information Technology Mumbai India Veermata Jijabai Technological Institute Electronics Engineering Mumbai India Thadomal Shahani Engineering College Computer Science Mumbai India
This study compares microstrip antennas, microstrip antenna arrays, and slotted microstrip antenna arrays for 5G communication. Emphasizing the compact size and compatibility with 5G devices, microstrip antennas are e... 详细信息
来源: 评论
Optimal Deep Convolutional Neural Network for Vehicle Detection in Remote Sensing Images
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3117-3131页
作者: Saeed Masoud Alshahrani Saud S.Alotaibi Shaha Al-Otaibi Mohamed Mousa Anwer Mustafa Hilal Amgad Atta Abdelmageed Abdelwahed Motwakel Mohamed I.Eldesouki Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electrical Engineering Faculty of Engineering&TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia
Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue *** recognition fr... 详细信息
来源: 评论
Impact Estimation of Security Attack and Mitigation Strategy using Goal-Based Threat Modeling in a Peer-to-Peer Cloud System
收藏 引用
Journal of The Institution of Engineers (India): Series B 2022年 第5期103卷 1845-1862页
作者: De, Sanghamitra Barik, Mridul Sankar Banerjee, Indrajit Department of Computer Science and Engineering St. Thomas’ College of Engineering and Technology West Bengal Kolkata700023 India Department of Computer Science Engineering Jadavpur University West Bengal Kolkata700032 India Department of Information Technology Indian Institute of Engineering Science and Technology Shibpur West Bengal Howrah711103 India
Addressing non-functional requirements is essential in Requirements engineering and this also covers security requirements of any system. Threat modeling forms an important way of identifying security requirements. Th... 详细信息
来源: 评论
Mongolian Compound Word Semantic Web Word Vector Evaluation Research  4
Mongolian Compound Word Semantic Web Word Vector Evaluation ...
收藏 引用
4th IEEE International Conference on Pattern Recognition and Machine Learning, PRML 2023
作者: La, Du Hasi Ding, Yang Inner Mongolia Normal University College of Computer Science and Technology Hohhot China College of Computer Science and Information Engineering Hohhot Minzu College Hohhot China
Semantic dictionaries are the basis of natural language processing tasks. With the construction of WordNet, CCD, HowNet and other semantic dictionaries, the semantic resources of Chinese and English have been greatly ... 详细信息
来源: 评论
Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models  8th
Optimizing Content-Based Image Retrieval System Using Convol...
收藏 引用
8th International Conference on information and Communication technology for Intelligent Systems, ICTIS 2024
作者: Kashid, Shraddha S. Takale, Dattatray G. Gawali, Piyush P. Deshmukh, Gopal B. Mahalle, Parikshit N. Sule, Bipin Deshpande, Arati V. Salve, Bhausaheb S. Department of Computer Engineering MIT ADT University Pune India Department of Computer Engineering Vishwakarma Institute of Information Technology SPPU Pune India Department of Artificial Intelligence and Data Science Vishwakarma Institute of Information Technology SPPU Pune India and Humanities Vishwakarma Institute of Technology Pune India Computer Engineering Department Sandip University Mahiravani Trimbak Road Maharashtra Nashik India
This study focuses on improving "Content-Based Image Retrieval" (CBIR) systems through the utilization of optimized convolutional neural network (CNN) models. Traditionally, CBIR relied on text-based approac... 详细信息
来源: 评论
Frequency-informed transformer for real-time water pipeline leak detection
收藏 引用
Autonomous Intelligent Systems 2025年 第1期5卷 1-10页
作者: Liu, Fengnian Wang, Ding Tang, Junya Wang, Lei College of Electronic and Information Engineering Tongji University Shanghai201804 China School of Computer Science and Technology Tongji University Shanghai201804 China Shanghai KARON Eco-valve Manufacturing Co. ltd Shanghai201804 China
Water pipeline leaks pose significant risks to urban infrastructure, leading to water wastage and potential structural damage. Existing leak detection methods often face challenges, such as heavily relying on the manu... 详细信息
来源: 评论
Simplifying Structure and Pattern in Complex Social Networks Using Graph Isomorphism  14
Simplifying Structure and Pattern in Complex Social Networks...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Arunakumari, B.N. Kshama, S.B. Swasti, S. Sameeksha, B.H. Puri, Sonia Rubini, P.A. Bms Institute of Technology and Management Dept. of Computer Science and Engineering Bengaluru India Bms Institute of Technology and Management Dept. of Information Science and Engineering Bengaluru India
In recent years, networks have grown in size and complexity, traditional network testing methods have become time-consuming and inefficient. As a result, there is a need for more efficient and reliable network testing... 详细信息
来源: 评论
A Systematic Review of Intrusion Detection Systems in Internet of Things Using ML and DL  4
A Systematic Review of Intrusion Detection Systems in Intern...
收藏 引用
4th International Conference on Computing, Mathematics and engineering Technologies, iCoMET 2023
作者: Hussain, Ayaz Sharif, Hanan Rehman, Faisal Kirn, Hina Sadiq, Ashina Khan, Muhammad Shahzad Riaz, Amjad Ali, Chaudhry Nouman Chandio, Adil Hussain Lahore Leads University Department of Computer Science & Information Technology Lahore Pakistan Quaid e Awam University of Engineering Science and Technology Department of Electronic Engineering Larkano Pakistan
The rapid expansion of IoT technologies like smart sensors and home appliances is likely to have far-reaching consequences. Connectivity, ubiquitous presence, and low computational power are the hallmarks of IoT gadge... 详细信息
来源: 评论