咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,302 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 81,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,013 篇 工学
    • 36,684 篇 计算机科学与技术...
    • 29,779 篇 软件工程
    • 13,878 篇 信息与通信工程
    • 8,169 篇 控制科学与工程
    • 6,011 篇 电气工程
    • 5,997 篇 生物工程
    • 5,721 篇 电子科学与技术(可...
    • 4,128 篇 生物医学工程(可授...
    • 3,802 篇 机械工程
    • 3,623 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,380 篇 化学工程与技术
    • 2,275 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,957 篇 交通运输工程
  • 26,693 篇 理学
    • 14,360 篇 数学
    • 7,335 篇 物理学
    • 6,652 篇 生物学
    • 4,658 篇 统计学(可授理学、...
    • 3,039 篇 系统科学
    • 2,500 篇 化学
  • 14,629 篇 管理学
    • 8,996 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,107 篇 医学
    • 3,438 篇 临床医学
    • 3,086 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,794 篇 公共卫生与预防医...
  • 2,379 篇 法学
    • 1,868 篇 社会学
  • 1,414 篇 经济学
  • 1,159 篇 农学
  • 973 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,214 篇 feature extracti...
  • 2,084 篇 computer science
  • 2,000 篇 accuracy
  • 1,981 篇 deep learning
  • 1,637 篇 computational mo...
  • 1,622 篇 machine learning
  • 1,547 篇 training
  • 1,215 篇 data mining
  • 1,098 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,070 篇 optimization
  • 1,004 篇 predictive model...
  • 895 篇 educational inst...
  • 891 篇 wireless sensor ...
  • 867 篇 semantics
  • 860 篇 real-time system...
  • 836 篇 artificial intel...
  • 801 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 687 篇 school of comput...
  • 559 篇 school of comput...
  • 478 篇 maharishi school...
  • 351 篇 department of co...
  • 275 篇 department of ph...
  • 261 篇 department of ph...
  • 257 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 223 篇 departamento de ...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 217 篇 department of co...
  • 210 篇 school of comput...
  • 206 篇 department of ph...
  • 198 篇 department of ph...
  • 192 篇 department of ph...
  • 170 篇 department of co...
  • 168 篇 department for p...
  • 165 篇 department of ph...
  • 163 篇 college of compu...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 248 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 231 篇 niyato dusit
  • 227 篇 d. guest
  • 225 篇 s. jin
  • 206 篇 g. gaudio
  • 202 篇 f. pastore

语言

  • 71,072 篇 英文
  • 9,658 篇 其他
  • 1,285 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science Engineering and Information Technology"
81933 条 记 录,以下是4641-4650 订阅
排序:
A power allocation strategy to maximize CR-NOMA throughput  7
A power allocation strategy to maximize CR-NOMA throughput
收藏 引用
7th IEEE information technology and Mechatronics engineering Conference, ITOEC 2023
作者: Ma, Xiaolin Peng, Yi Yang, Qingqing Kunming University of Science and Technology College of Information Engineering and Automation Kunming China Kunming University of Science and Technology Yunnan Key Laboratory of Computer Science Kunming China
Aiming at the problem that the total throughput of secondary users is not maximized, considering the fairness between secondary users and the interference of primary users to secondary users, a power allocation strate... 详细信息
来源: 评论
Multi-channel CNN to classify Nepali COVID-19 related tweets using hybrid features
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第3期15卷 2047-2056页
作者: Sitaula, Chiranjibi Shahi, Tej Bahadur Department of Electrical and Computer Systems Engineering Monash University Wellington Rd ClaytonVIC3800 Australia Earth Observation and AI Research Group Department of Infrastructure Engineering The University of Melbourne ParkvilleVIC3010 Australia School of Engineering and Technology Central Queensland University Rockhampton Australia Central Department of Computer Science and Information Technology Tribhuvan University TU Rd Kathmandu Kirtipur44618 Nepal
Because of the current COVID-19 pandemic’s increasing fears among people, it has triggered several health complications such as depression and anxiety. Such complications have not only affected developed countries bu... 详细信息
来源: 评论
An Overview of Deployment of information and Communications technology (ICT) in Disaster Risk Management
An Overview of Deployment of Information and Communications ...
收藏 引用
2023 International Conference on Advances in Computation, Communication and information technology, ICAICCIT 2023
作者: Nachappa, M.N. Sharma, Himanshu Pal, Ritu Department of Computer Science and Information Technology Bangalore India Noida Institute of Engineering and Technology Department of Electronics and Communication Engineering Uttar Pradesh Greater Noida India Tula's Institute Department of Computer Science and Engineering Dehradun India
Efficient disaster management necessitates the prompt and timely distribution of information to provide quick provision of emergency assistance to the affected population. The rapid growth of "information and com... 详细信息
来源: 评论
LayOut Loud: An AI-Powered Augmented Reality and Mobile Application for Room Interior Design and Layout Optimization  4
LayOut Loud: An AI-Powered Augmented Reality and Mobile Appl...
收藏 引用
4th International Conference on Intelligent Cybernetics technology and Applications, ICICyTA 2024
作者: Cuevas, John Raphael G. Rili, John Kenneth R. Santillan, Anny Neolicia G. Agustin, Vivien A. Gonzales, Mary Grace N. Centeno, Criselle J. Regala, Richard C. College of Information Systems and Technology Management Pamantasan ng Lungsod ng Maynila Department of Information Technology Manila Philippines College of Information Systems and Technology Management Pamantasan ng Lungsod ng Maynila Department of Computer Science Manila Philippines Pamantasan ng Lungsod ng Maynila Faculty of College of Engineering and Technology Department of Information Technology Manila Philippines College of Information Systems and Technology Management Pamantasan ng Lungsod ng Maynila Department of Information Technology Manila Philippines Pamantasan ng Lungsod ng Maynila College of Engineering and Technology Department of Computer Science Manila Philippines
LayOut Loud is an AI-powered augmented reality (AR) and mobile application designed to revolutionize room interior design by offering tailored, real-time solutions for layout optimization. The primary objective of thi... 详细信息
来源: 评论
IOT and Machine Learning Based Real-Time Protection Against Cyber-Physical Threat Mitigation  4
IOT and Machine Learning Based Real-Time Protection Against ...
收藏 引用
4th IEEE International Conference on Advance Computing and Innovative Technologies in engineering, ICACITE 2024
作者: Saini, Harnit Mohammad, Faz Singh, Manoj Kumar Sharma, Kapil Kumar Shukla, Meenu Singh, Ramendra Ajay Kumar Garg Engineering College Department of Computer Science Ghaziabad India Gl Bajaj Institute of Technology and Management Department of Applied Computational Science and Engineering Greater Noida India Ims Engineering College Department of Computer Science & Engineering Ghaziabad India Ims Engineering College Department of Mca Ghaziabad India Maharishi University of Information Technology School of Engineering and Technology Noida India Ghaziabad India
An investigation is carried out into the dynamic relationship between machine learning algorithms used in IoT security, with detailed scrutiny of performance indicators to give a fuller view of what happens. The study... 详细信息
来源: 评论
Explainable-AI-based two-stage solution for WSN object localization using zero-touch mobile transceivers
收藏 引用
science China(information sciences) 2024年 第7期67卷 27-45页
作者: Kai FANG Junxin CHEN Han ZHU Thippa Reddy GADEKALLU Xiaoping WU Wei WANG School of Mathematics and Computer Science Zhejiang A&F University School of Software Dalian University of Technology Faculty of Applied Sciences Macao Polytechnic University Department of Electrical and Computer Engineering Lebanese American University School of Information Engineering Huzhou University Guangdong-Hong Kong-Macao Joint Laboratory for Emotional Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University
Artificial intelligence technology is widely used in the field of wireless sensor networks(WSN).Due to its inexplicability, the interference factors in the process of WSN object localization cannot be effectively elim... 详细信息
来源: 评论
Accurate detection of fresh and old vertebral compression fractures on CT images using ensemble YOLOR
收藏 引用
Multimedia Tools and Applications 2024年 第41期83卷 89375-89391页
作者: Hsieh, Min-Hong Chang, Chuan-Yu Hsu, Shao-Min Department of Orthopedics Dalin Tzu Chi Hospital Buddhist Tzu Chi Medical Foundation Chiayi Taiwan School of Medicine Tzu Chi University Hualien Taiwan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology Yunlin Taiwan
Vertebral compression fractures resulting from osteoporosis contribute to pain and disability among older people, necessitating early detection and treatment. While MRI provides effective diagnosis, its higher cost po... 详细信息
来源: 评论
Risk Analysis of Android Applications using Static Permissions and Convolutional Neural Network  2023
Risk Analysis of Android Applications using Static Permissio...
收藏 引用
15th International Conference on Contemporary Computing, IC3 2023
作者: Chauhan, Kshamta Gandotra, Ekta Department of Computer Science & Engineering Jaypee University of Information Technology Solan H.P. Waknaghat India
Today, Android is the most popular mobile platform for users, vendors, and developers. As the number of Android applications grows, the risk of malware on these devices also increases. Mobile apps do collect a tonne o... 详细信息
来源: 评论
The Performance Analysis of Distributed Denial of Service Attacks in Wireless Networks  2
The Performance Analysis of Distributed Denial of Service At...
收藏 引用
2nd IEEE International Conference on Futuristic Technologies, INCOFT 2023
作者: Agrawal, Trapty Raghavendra, R. Singh, K. Ranjith Rajiv Gandhi, N. Dhabliya, Dharmesh Katariya, Jitendra Kumar Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Department of Computer Science and Information Technology Karnataka Bangalore India Karpagam Academy of Higher Education Department of Computer Science Coimbatore641021 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Civil Engineering Chennai127 India Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Vivekananda Global University Department of Computer Science & Application Jaipur India
Complete studies paper that examines the outcomes that malicious 0.33-celebration actors will have on Wi-Fi networks via dispensed denial of carrier (DDoS) attacks. This paper explores the available numerous assault m... 详细信息
来源: 评论
Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers
Leveraging a Randomized Key Matrix to Enhance the Security o...
收藏 引用
2023 IEEE Asia-Pacific Conference on computer science and Data engineering, CSDE 2023
作者: Gandhi, Shubham Khare, Om Dravid, Mihika Sanghvi, Mihika Mane, Sunil Gajaralwar, Aadesh Gandhi, Saloni Coep Technological University Department of Computer Science and Engineering India BRACT's Vishwakarma Institute of Information Technology Department of Computer Engineering Maharashtra Pune India
An innovative strategy to enhance the security of symmetric substitution ciphers is presented, through the implementation of a randomized key matrix suitable for various file formats, including but not limited to bina... 详细信息
来源: 评论