咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,302 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 81,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,013 篇 工学
    • 36,684 篇 计算机科学与技术...
    • 29,779 篇 软件工程
    • 13,878 篇 信息与通信工程
    • 8,169 篇 控制科学与工程
    • 6,011 篇 电气工程
    • 5,997 篇 生物工程
    • 5,721 篇 电子科学与技术(可...
    • 4,128 篇 生物医学工程(可授...
    • 3,802 篇 机械工程
    • 3,623 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,380 篇 化学工程与技术
    • 2,275 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,957 篇 交通运输工程
  • 26,693 篇 理学
    • 14,360 篇 数学
    • 7,335 篇 物理学
    • 6,652 篇 生物学
    • 4,658 篇 统计学(可授理学、...
    • 3,039 篇 系统科学
    • 2,500 篇 化学
  • 14,629 篇 管理学
    • 8,996 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,107 篇 医学
    • 3,438 篇 临床医学
    • 3,086 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,794 篇 公共卫生与预防医...
  • 2,379 篇 法学
    • 1,868 篇 社会学
  • 1,414 篇 经济学
  • 1,159 篇 农学
  • 973 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,214 篇 feature extracti...
  • 2,084 篇 computer science
  • 2,000 篇 accuracy
  • 1,981 篇 deep learning
  • 1,637 篇 computational mo...
  • 1,622 篇 machine learning
  • 1,547 篇 training
  • 1,215 篇 data mining
  • 1,098 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,070 篇 optimization
  • 1,004 篇 predictive model...
  • 895 篇 educational inst...
  • 891 篇 wireless sensor ...
  • 867 篇 semantics
  • 860 篇 real-time system...
  • 836 篇 artificial intel...
  • 801 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 687 篇 school of comput...
  • 559 篇 school of comput...
  • 478 篇 maharishi school...
  • 351 篇 department of co...
  • 275 篇 department of ph...
  • 261 篇 department of ph...
  • 257 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 223 篇 departamento de ...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 217 篇 department of co...
  • 210 篇 school of comput...
  • 206 篇 department of ph...
  • 198 篇 department of ph...
  • 192 篇 department of ph...
  • 170 篇 department of co...
  • 168 篇 department for p...
  • 165 篇 department of ph...
  • 163 篇 college of compu...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 248 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 231 篇 niyato dusit
  • 227 篇 d. guest
  • 225 篇 s. jin
  • 206 篇 g. gaudio
  • 202 篇 f. pastore

语言

  • 71,072 篇 英文
  • 9,658 篇 其他
  • 1,285 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science Engineering and Information Technology"
81933 条 记 录,以下是601-610 订阅
排序:
Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 133-150页
作者: Ali Haider Khan Hassaan Malik Wajeeha Khalil Sayyid Kamran Hussain Tayyaba Anees Muzammil Hussain Department of Software Engineering Faculty of Computer SciencesLahore Garrison UniversityLahorePakistan Department of Computer Science School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan Department of Computer Science&Information Technology University of Engineering and Technology(UET)PeshawarPakistan Department of Computer Science TIMES InstituteMultan60000Pakistan Department of Software Engineering School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d... 详细信息
来源: 评论
A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 471-501页
作者: Chandraumakantham Om Kumar Sudhakaran Gajendran Suguna Marappan Mohammed Zakariah Abdulaziz S.Almazyad School of Computer Science&Engineering Vellore Institute of TechnologyChennai CampusChennai600127India School of Electronics&Engineering Vellore Institute of TechnologyChennai CampusChennai600127India Department of Computer Sciences and Engineering College of Applied ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
The security of the wireless sensor network-Internet of Things(WSN-IoT)network is more challenging due to its randomness and self-organized *** detection is one of the key methodologies utilized to ensure the security... 详细信息
来源: 评论
A Lightweight, Secure, and Scalable Blockchain-Fog-IoMT Healthcare Framework with IPFS Data Storage for Healthcare 4.0
收藏 引用
SN computer science 2024年 第1期5卷 1-11页
作者: Mallick, Soubhagya Ranjan Lenka, Rakesh Kumar Tripathy, Pradyumna Kumar Rao, D. Chandrasekhar Sharma, Suraj Ray, Niranjan Kumar Computer Science and Engineering International Institute of Information Technology Odisha Bhubaneswar 751003 India Computer Science and Engineering Silicon Institute of Technology Odisha Bhubaneswar 751024 India Information Technology Veer Surendra Sai University of Technology Odisha Burla 768018 India Computer Science and Engineering Guru Ghasidas Vishwavidyalaya Chhattisgarh Bilaspur 495009 India School of Computer Science and Engineering Kalinga Institute of Industrial Technology Odisha Bhubaneswar 751024 India
The gathering, processing, transmission, sharing, and storage of healthcare data was the core idea behind Healthcare 4.0. Currently, most of the existing solutions for offering smart healthcare services rely on cloud-... 详细信息
来源: 评论
Chinese Relation Extraction Based on Cross-Attention and Multi-feature Perception
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1837-1853页
作者: Xu, Shiao Sun, Shuihua Zhang, Zhiyuan Zhou, Huan School of Electronics and Information Engineering Jingchu University of Technology Jingmen448000 China School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China
Relation extraction aims at extracting semantic relations between given pairs of entities from unstructured textual data and is a critical task in information extraction. A relation extraction model based on cross-att... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Cluster Based Concurrent Data Collection with Fault Tolerance for Shared IoT Applications  16
Cluster Based Concurrent Data Collection with Fault Toleranc...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Kumar, Arvind Matam, Rakesh Swain, Srinibas Mukherjee, Mithun Indian Institute of Information Technology Guwahati Department of Computer Science and Engineering India Nanjing University of Information Science and Technology Nanjing China
Sharing IoT device infrastructure by multiple entities or applications for their respective sensing and monitoring needs is an effective way to reduce the upfront setup cost, ownership costs, and also to prevent over ... 详细信息
来源: 评论
Liver Tumors Segmentation Using 3D SegNet Deep Learning Approach
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1655-1677页
作者: G.Nallasivan V.Ramachandran Roobaea Alroobaea Jasem Almotiri Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveli627152Tamil NaduIndia Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21974Saudi Arabia
An ultrasonic filter detects signs of malignant tumors by analysing the image’s pixel quality fluctuations caused by a liver *** of malignant growth proximity are identified in an ultrasound filter through image pixe... 详细信息
来源: 评论
Quality Assessment of Selective Laser Melting Components Using Quantitative Ultrasound Measurements and Image Texture Analysis
收藏 引用
IEEE Access 2024年 12卷 71797-71807页
作者: Lin, Chun-Hui Lin, Cheng-Jian Wang, Shyh-Hau National Cheng Kung University Department of Computer Science and Information Engineering Tainan 701 Taiwan National Chin-Yi University of Technology Department of Computer Science and Information Engineering Taichung 411 Taiwan
Successful production of metallic selective laser melting components requires a quality assurance process that can effectively and nondestructively assess internal defects. Ultrasound testing has emerged as a valuable... 详细信息
来源: 评论
Multiview EEG signal analysis for diagnosis of schizophrenia: an optimized deep learning approach
收藏 引用
Multimedia Tools and Applications 2024年 1-32页
作者: Bhadra, Sweta Kumar, Chandan Jyoti Bhattacharyya, Dhruba Kr Department of Computer Science and Information Technology Cotton University Assam Guwahati781001 India Department of Computer Science and Engineering Tezpur University Assam Tezpur784028 India
Schizophrenia (SZ) is a complex neuropsychiatric disorder affecting approximately 1% of the global population. The early diagnosis of SZ, with electroencephalograph (EEG) signals using deep learning (DL), can help in ... 详细信息
来源: 评论
CompressionShield: Architectural Adaptations towards Enhancing InceptionV3 for Image Forgery Detection
CompressionShield: Architectural Adaptations towards Enhanci...
收藏 引用
2024 IEEE Calcutta Conference, CALCON 2024
作者: Bhowal, Arundhati Naskar, Ruchira Neogy, Sarmistha Jadavpur University Computer Science and Engineering Kolkata India Indian Institute of Engineering Science and Technology Information Technology Shibpur India
The most popular methods for tampering with visual data integrity are copy-move forgery and splicing. These techniques can be used for several malicious purposes, including the production of false or misleading images... 详细信息
来源: 评论