咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,423 篇 期刊文献
  • 757 册 图书

馆藏范围

  • 82,061 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,015 篇 工学
    • 36,693 篇 计算机科学与技术...
    • 29,783 篇 软件工程
    • 13,881 篇 信息与通信工程
    • 8,177 篇 控制科学与工程
    • 6,003 篇 电气工程
    • 5,997 篇 生物工程
    • 5,711 篇 电子科学与技术(可...
    • 4,127 篇 生物医学工程(可授...
    • 3,804 篇 机械工程
    • 3,632 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,382 篇 化学工程与技术
    • 2,278 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,958 篇 交通运输工程
  • 26,701 篇 理学
    • 14,356 篇 数学
    • 7,341 篇 物理学
    • 6,653 篇 生物学
    • 4,653 篇 统计学(可授理学、...
    • 3,040 篇 系统科学
    • 2,500 篇 化学
  • 14,635 篇 管理学
    • 9,001 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,109 篇 医学
    • 3,439 篇 临床医学
    • 3,088 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,795 篇 公共卫生与预防医...
  • 2,380 篇 法学
    • 1,867 篇 社会学
  • 1,417 篇 经济学
  • 1,159 篇 农学
  • 974 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,215 篇 feature extracti...
  • 2,083 篇 computer science
  • 2,011 篇 accuracy
  • 1,985 篇 deep learning
  • 1,632 篇 computational mo...
  • 1,619 篇 machine learning
  • 1,568 篇 training
  • 1,225 篇 data mining
  • 1,097 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,066 篇 optimization
  • 1,013 篇 predictive model...
  • 889 篇 educational inst...
  • 876 篇 wireless sensor ...
  • 864 篇 semantics
  • 861 篇 artificial intel...
  • 859 篇 real-time system...
  • 806 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 694 篇 school of comput...
  • 542 篇 school of comput...
  • 475 篇 maharishi school...
  • 353 篇 department of co...
  • 276 篇 department of ph...
  • 262 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 222 篇 department of ph...
  • 222 篇 departamento de ...
  • 218 篇 physics division...
  • 216 篇 department of co...
  • 210 篇 department of ph...
  • 202 篇 school of comput...
  • 199 篇 department of ph...
  • 186 篇 department of ph...
  • 173 篇 college of compu...
  • 171 篇 department for p...
  • 168 篇 department of ph...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 261 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 234 篇 niyato dusit
  • 228 篇 d. guest
  • 227 篇 s. jin
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 71,183 篇 英文
  • 9,666 篇 其他
  • 1,294 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science Engineering and Information Technology"
82061 条 记 录,以下是611-620 订阅
排序:
Multiview EEG signal analysis for diagnosis of schizophrenia: an optimized deep learning approach
收藏 引用
Multimedia Tools and Applications 2024年 1-32页
作者: Bhadra, Sweta Kumar, Chandan Jyoti Bhattacharyya, Dhruba Kr Department of Computer Science and Information Technology Cotton University Assam Guwahati781001 India Department of Computer Science and Engineering Tezpur University Assam Tezpur784028 India
Schizophrenia (SZ) is a complex neuropsychiatric disorder affecting approximately 1% of the global population. The early diagnosis of SZ, with electroencephalograph (EEG) signals using deep learning (DL), can help in ... 详细信息
来源: 评论
Indirect: invertible and discrete noisy image rescaling with enhancement from case-dependent textures
收藏 引用
Multimedia Systems 2024年 第2期30卷 1-17页
作者: Do, Huu-Phu Chen, Yan-An Do-Tran, Nhat-Tuong Hua, Kai-Lung Peng, Wen-Hsiao Huang, Ching-Chun Department of Computer Science National Yang Ming Chiao Tung University Hsinchu City300093 Taiwan Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei City106335 Taiwan
Rescaling digital images for display on various devices, while simultaneously removing noise, has increasingly become a focus of attention. However, limited research has been done on a unified framework that can effic... 详细信息
来源: 评论
Blockchain-enabled IoT access control model for sharing electronic healthcare data
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8127-8148页
作者: Ilyas, Benkhaddra Kumar, Abhishek Ali, Setitra Mohamed Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Chandigarh University Gharuan Mohali Punjab140413 India School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ... 详细信息
来源: 评论
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1631-1657页
作者: Maria Gul Imran Ali Khan Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi Abdullah AlTurkey31Department of Computer Science COMSATS University IslamabadAbbottabad CampusAbbottabad22010Pakistan Department of Computer Science Abbottabad University of Science and TechnologyAbbottabad22010Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Science and Technology Unit Umm Al-Qura UniversityMakkah21955Saudi Arabia Deanship of Scientific Research Umm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyOmdurman Islamic UniversityOmdurman14415Sudan Business Analytic Program Department of Management and MarketingCollege of Business AdministrationUniversity of BahrainSakhir32038Bahrain
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... 详细信息
来源: 评论
A manipulator control method based on deep deterministic policy gradient with parameter noise
收藏 引用
Neural Computing and Applications 2024年 第4期37卷 1729-1739页
作者: Zhang, Haifei Xu, Jian Lei, Liting Wu, Fang Qian, Lanmei Qiu, Jianlin School of Computer and Information Engineering Nantong Institute of Technology Yongxing Road 211 Nantong226002 China School of Information Science and Technology Nantong University Seyuan Road 9 Nantong226019 China
Focusing on the motion control problem of two link manipulator, three deep reinforcement learning models named the deep deterministic policy gradient (DDPG), asynchronous advantage actor-critic(A3C) and distributed pr... 详细信息
来源: 评论
Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 801-815页
作者: Yongjie Yang Shanshan Tu Raja Hashim Ali Hisham Alasmary Muhammad Waqas Muhammad Nouman Amjad Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Information Security and Cybersecurity Unit King Khalid UniversityAbhaSaudi Arabia Computer Engineering Department College of Information TechnologyUniversity of Bahrain32038Bahrain School of Engineering Edith Cowan UniversityJoondalup PerthWA6027Australia School of Engineering University of Management and TechnologyLahorePakistan
With the recent developments in the Internet of Things(IoT),the amount of data collected has expanded tremendously,resulting in a higher demand for data storage,computational capacity,and real-time processing *** comp... 详细信息
来源: 评论
"affectAlchemy": An Affective Dataset Based on Plutchik's Psychological Model for Text-Based Emotion Recognition and its Analysis Using ML Techniques  8
"affectAlchemy": An Affective Dataset Based on Plutchik's Ps...
收藏 引用
8th IEEE International Conference on Computing, Communication, Control and Automation, ICCUBEA 2024
作者: Kapase, Ajay Uke, Nilesh Savant, Jatin Desai, Mrunali Ghatage, Shravani Rahangdale, Atul Vishwakarma Institute of Information Technology Computer Science & Engineering Pune India Trinity Academy of Engineering Computer Science & Engineering Pune India KITs College of Engineering Computer Science & Engineering Kolhapur India
A technique to identify people's attitudes, and sentiments towards specified targets such as things, services, and subjects, is called sentiment analysis. As a dedicated subset of NLP, it deals with predicting spe... 详细信息
来源: 评论
Digital twin empowered cooperative trajectory planning of platoon vehicles for collision avoidance with unexpected obstacles
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1666-1676页
作者: Hao Du Supeng Leng Jianhua He Kai Xiong Longyu Zhou School of Information&Communication Engineering University of Electronic Science and Technology of ChinaChengdu 611731China School of Computer Science and Electronic Engineering University of EssexColchester CO43SQUnited Kingdom Shenzhen Institute for Advanced Study University of Electronic Science and Technology of ChinaShenzhen 518110China
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sen... 详细信息
来源: 评论
A Novel Framework for Gauging information Extracted from Smartphones Using Neutrosophic Logic
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 154-171页
作者: Abou Alzahab, R.M. Ismail, Amr Abd Elkhalik, S.H. Shams, M.Y. El-Bakry, H.M. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Department. of Communication and Computer Engineering Air Defense University Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Department of Information Systems. Faculty of Computer and Information Science Mansoura University Egypt
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and... 详细信息
来源: 评论
Web Scraping and Job Recommender System  2
Web Scraping and Job Recommender System
收藏 引用
2nd International Conference on Informatics, ICI 2023
作者: Sinha, Koustubh Sharma, Priyansh Sharma, Harshit Asawa, Krishna Jaypee Institute of Information Technology Computer Science Engineering Delhi India Jaypee Institute of Information Technology Computer Science Engineering Noida India
Web scraping is the process of autonomously obtaining data from webpages using computer software or tools. It has grown in popularity in recent years because of the volume of data available on the internet and the nec... 详细信息
来源: 评论