咨询与建议

限定检索结果

文献类型

  • 53,788 篇 会议
  • 27,587 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 82,125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,220 篇 工学
    • 36,952 篇 计算机科学与技术...
    • 29,894 篇 软件工程
    • 13,989 篇 信息与通信工程
    • 8,336 篇 控制科学与工程
    • 6,114 篇 电气工程
    • 6,006 篇 生物工程
    • 5,748 篇 电子科学与技术(可...
    • 4,143 篇 生物医学工程(可授...
    • 3,815 篇 机械工程
    • 3,669 篇 光学工程
    • 2,711 篇 仪器科学与技术
    • 2,521 篇 动力工程及工程热...
    • 2,379 篇 化学工程与技术
    • 2,291 篇 网络空间安全
    • 2,137 篇 安全科学与工程
    • 1,968 篇 交通运输工程
  • 26,826 篇 理学
    • 14,394 篇 数学
    • 7,374 篇 物理学
    • 6,666 篇 生物学
    • 4,633 篇 统计学(可授理学、...
    • 3,047 篇 系统科学
    • 2,503 篇 化学
  • 14,702 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,270 篇 图书情报与档案管...
    • 3,805 篇 工商管理
  • 4,144 篇 医学
    • 3,464 篇 临床医学
    • 3,106 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,805 篇 公共卫生与预防医...
  • 2,378 篇 法学
    • 1,861 篇 社会学
  • 1,418 篇 经济学
  • 1,171 篇 农学
  • 966 篇 教育学
  • 373 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,206 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,992 篇 deep learning
  • 1,971 篇 accuracy
  • 1,632 篇 machine learning
  • 1,609 篇 computational mo...
  • 1,566 篇 training
  • 1,225 篇 data mining
  • 1,078 篇 internet of thin...
  • 1,076 篇 support vector m...
  • 1,052 篇 optimization
  • 1,000 篇 predictive model...
  • 891 篇 educational inst...
  • 874 篇 wireless sensor ...
  • 871 篇 semantics
  • 843 篇 artificial intel...
  • 828 篇 real-time system...
  • 802 篇 security
  • 774 篇 neural networks
  • 729 篇 image segmentati...

机构

  • 695 篇 school of comput...
  • 537 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 258 篇 faculté des scie...
  • 258 篇 department of ph...
  • 256 篇 faculty of scien...
  • 221 篇 departamento de ...
  • 220 篇 department of ph...
  • 217 篇 department of co...
  • 216 篇 physics division...
  • 205 篇 department of ph...
  • 203 篇 school of comput...
  • 197 篇 department of ph...
  • 184 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 166 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 259 篇 r. ströhmer
  • 251 篇 h. sakamoto
  • 243 篇 y. tayalati
  • 243 篇 m. rijssenbeek
  • 234 篇 niyato dusit
  • 228 篇 s. jin
  • 225 篇 d. guest
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,164 篇 英文
  • 4,730 篇 其他
  • 1,249 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering and Information Technology"
82125 条 记 录,以下是4981-4990 订阅
排序:
Crop Classification using Convolutional Neural Network  15
Crop Classification using Convolutional Neural Network
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Kavitha, K. Gopalakrishnan, K. Balaji, S. Jeevanantham, J. Aakhila Hayathunisa, M. Department of Information Technology Velalar College of Engineering Erode India Department of Computer Science and Engineering Kongu Engineering College Erode India Department of Electronics and Communication Kongu Engineering College Erode India
Deep learning is a powerful machine learning technique that has the potential to revolutionize agriculture. By leveraging deep learning models, we can develop innovative solutions to critical agricultural challenges, ... 详细信息
来源: 评论
Efficient Lightweight Intrusion Detection Method for IoT OS: A Study on the Application of Multi-Teacher Distillation  8
Efficient Lightweight Intrusion Detection Method for IoT OS:...
收藏 引用
8th International Conference on Data science in Cyberspace, DSC 2023
作者: Zhang, Pengyu Xiao, Kun Luo, Lei Li, Yun Chen, Lirong School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Guangdong Weichen Information Technology Co. Ltd Dongguan China
As the second important security measure behind the firewall, network intrusion detection provides effective assurance for computer network security. In recent years, deep learning (DL) has emerged as a promising appr... 详细信息
来源: 评论
Open-Source Simulators for Drone-Assisted Vehicular Ad Hoc Networks
Open-Source Simulators for Drone-Assisted Vehicular Ad Hoc N...
收藏 引用
International Conference on Data Analytics and Management, ICDAM 2022
作者: Kumar, Santosh Vasudeva, Amol Sood, Manu Department of Computer Science Himachal Pradesh University Shimla India Department of Computer Science and Engineering Jaypee University of Information Technology Himachal Pradesh Solan Waknaghat India
Intelligent transportation systems (ITS) are a collection of cutting-edge technologies that are intended to offer a variety of road traffic management and safety services. The number of automobiles on the road and fly... 详细信息
来源: 评论
Data Reduction Algorithm: Identification and Elimination of Erroneous rows
Data Reduction Algorithm: Identification and Elimination of ...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Katale, Tejaswini Mahalle, Parikshit N. Gautam, Waidehi Shinde, Gitanjali R. Computer Engineering Vishwakarma Institute of Technology Pune India Artificial Intelligence and Data Science Vishwakarma Institute of Information Technology Pune India
Data Reduction without the removal of exact, correct rows is a crucial pre-processing step. Large Datasets make it difficult to model data effectively or forecast results accurately. Additionally, they demand lengthy ... 详细信息
来源: 评论
Secured Authentication Scheme for E-Healthcare in SIoT Using ECC and Improved Hash Function  4th
Secured Authentication Scheme for E-Healthcare in SIoT Using...
收藏 引用
4th International Conference on Frontiers in Computing and Systems, COMSYS 2023
作者: Arpitha, T. Chouhan, Dharamendra Shreyas, J. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bengaluru India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
The convergence of Smart Internet of Things (IoT) and security is a new study topic. In this context, a new IoT trend known as Social IoT (SIoT) was examined for this study. The Social IoT has the advantage of connect... 详细信息
来源: 评论
A Blockchain-empowered Federated Learning Framework Supprting GDPR-compliance  10
A Blockchain-empowered Federated Learning Framework Supprtin...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Xiao, Lijun Han, Dezhi Zhou, Sisi Xu, Nengxiang Chen, Lin Xie, Siqi College of Information Engineering Shanghai Maritime University Shanghai200135 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China
In recent years, data privacy security has been widely and highly valued by countries around the world. In the context of European Union's General Data Protection Regulation (GDPR), the regulatory requirements of ... 详细信息
来源: 评论
GL-GAN: Perceiving and Integrating Global and Local Styles for Handwritten Text Generation with Mamba  31
GL-GAN: Perceiving and Integrating Global and Local Styles f...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Yiming Wei, Hongxi Wang, Heng Sun, Shiwen He, Chao School of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Mongolian Information Processing Technology Hohhot China
Handwritten text generation (HTG) aims to synthesize handwritten samples by imitating a specific writer, which has a wide range of applications and thus has significant research value. However, current studies on HTG ... 详细信息
来源: 评论
Comments on 'V2G-Auth: Lightweight Authentication and Key Agreement Protocol for V2G Environment Leveraging Physically Unclonable Functions'
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2024年 2卷 69-70页
作者: Wu, Tsu-Yang Wu, Haozhi Kong, Fangfang Kumari, Saru Khan, Muhammad Khurram Chen, Chien-Ming Shandong University of Science and Technology College of Computer Science and Engineering Qingdao266590 China Nanjing University of Information Science and Technology School of Artificial Intelligence School of Future Technology Nanjing210044 China Chaudhary Charan Singh University Department of Mathematics Meerut250004 India Riyadh11495 Saudi Arabia
Recently, Reddy et al. (IEEE Transactions on Industrial Cyber-Physical Systems, 2023, DOI: 10.1109/TICPS.2023. 3290539) proposed a lightweight authentication and key agreement protocol for V2G environments that uses h... 详细信息
来源: 评论
D2R: Dual-Branch Dynamic Routing Network for Multimodal Sentiment Detection
D2R: Dual-Branch Dynamic Routing Network for Multimodal Sent...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Yifan Li, Kuntao Mai, Weixing Wu, Qiaofeng Xue, Yun Li, Fenghuan Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials School of Electronics and Information Engineering South China Normal University China School of Computer Science and Technology Guangdong University of Technology China
Multimodal sentiment detection aims to classify the sentiment polarity of a given image-text pair. Existing approaches apply the same fixed framework to all input samples, lacking the flexibility to adapt to different... 详细信息
来源: 评论
New Optimization Method Based on Binary Tumbleweed Algorithm  1
收藏 引用
18th International Conference on Intelligent information Hiding and Multimedia Signal Processing, IIH-MSP 2022
作者: Pan, Jeng-Shyang Wang, Gui-Ling Yang, Dongqiang Chu, Shu-Chuan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China School of Computer Science and Technology Shandong Jianzhu University Jinan China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Tumbleweed algorithm (TA) is a meta-heuristic algorithm that simulates the growth of Tumbleweed. Compared with other advanced meta-heuristic algorithms, TA has strong optimization performance and competitiveness. Howe... 详细信息
来源: 评论