咨询与建议

限定检索结果

文献类型

  • 54,258 篇 会议
  • 27,728 篇 期刊文献
  • 758 册 图书

馆藏范围

  • 82,744 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,547 篇 工学
    • 37,187 篇 计算机科学与技术...
    • 30,029 篇 软件工程
    • 14,217 篇 信息与通信工程
    • 8,468 篇 控制科学与工程
    • 6,315 篇 电气工程
    • 6,024 篇 生物工程
    • 5,825 篇 电子科学与技术(可...
    • 4,165 篇 生物医学工程(可授...
    • 3,889 篇 机械工程
    • 3,702 篇 光学工程
    • 2,755 篇 仪器科学与技术
    • 2,557 篇 动力工程及工程热...
    • 2,440 篇 网络空间安全
    • 2,407 篇 化学工程与技术
    • 2,191 篇 安全科学与工程
    • 2,031 篇 交通运输工程
  • 26,959 篇 理学
    • 14,442 篇 数学
    • 7,432 篇 物理学
    • 6,691 篇 生物学
    • 4,665 篇 统计学(可授理学、...
    • 3,046 篇 系统科学
    • 2,572 篇 化学
  • 14,842 篇 管理学
    • 9,162 篇 管理科学与工程(可...
    • 6,321 篇 图书情报与档案管...
    • 3,815 篇 工商管理
  • 4,201 篇 医学
    • 3,489 篇 临床医学
    • 3,115 篇 基础医学(可授医学...
    • 1,875 篇 药学(可授医学、理...
    • 1,848 篇 公共卫生与预防医...
  • 2,409 篇 法学
    • 1,891 篇 社会学
  • 1,435 篇 经济学
  • 1,171 篇 农学
  • 993 篇 教育学
  • 375 篇 文学
  • 241 篇 军事学
  • 183 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,239 篇 feature extracti...
  • 2,084 篇 computer science
  • 2,055 篇 accuracy
  • 2,048 篇 deep learning
  • 1,651 篇 computational mo...
  • 1,650 篇 machine learning
  • 1,577 篇 training
  • 1,225 篇 data mining
  • 1,112 篇 internet of thin...
  • 1,092 篇 support vector m...
  • 1,085 篇 optimization
  • 1,017 篇 predictive model...
  • 889 篇 educational inst...
  • 883 篇 real-time system...
  • 881 篇 wireless sensor ...
  • 878 篇 artificial intel...
  • 862 篇 semantics
  • 814 篇 security
  • 780 篇 neural networks
  • 743 篇 image segmentati...

机构

  • 708 篇 school of comput...
  • 545 篇 school of comput...
  • 475 篇 maharishi school...
  • 353 篇 department of co...
  • 277 篇 department of ph...
  • 260 篇 department of ph...
  • 259 篇 faculté des scie...
  • 257 篇 faculty of scien...
  • 220 篇 department of ph...
  • 218 篇 departamento de ...
  • 216 篇 physics division...
  • 214 篇 department of co...
  • 207 篇 department of ph...
  • 204 篇 school of comput...
  • 197 篇 department of ph...
  • 181 篇 department of ph...
  • 174 篇 college of compu...
  • 169 篇 department for p...
  • 168 篇 department of ph...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 252 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 237 篇 niyato dusit
  • 226 篇 s. jin
  • 225 篇 d. guest
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 68,361 篇 英文
  • 13,191 篇 其他
  • 1,341 篇 中文
  • 67 篇 日文
  • 27 篇 斯洛文尼亚文
  • 18 篇 德文
  • 18 篇 法文
  • 6 篇 朝鲜文
  • 5 篇 俄文
  • 3 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 波兰文
检索条件"机构=Computer Science Engineering and Information Technology"
82744 条 记 录,以下是771-780 订阅
排序:
Blockchain-based User Management System  9
Blockchain-based User Management System
收藏 引用
9th International Conference on Intelligent Informatics and BioMedical sciences, ICIIBMS 2024
作者: Xue, Qingshui She, Huitong Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China
As the Internet and information technology advance, safeguarding user personal data is critical. Traditional registration and key storage methods pose security risks like data breaches and centralized vulnerabilities.... 详细信息
来源: 评论
Security and Privacy Preserving GDPR-Compliant Scheme Resisting in Rendering False Data  15
Security and Privacy Preserving GDPR-Compliant Scheme Resist...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Dutta, Mou Dhal, Subhasish Indian Institute of Information Technology Guwahati Computer Science and Engineering Guwahati India
The protection of personal data has grown to be a top priority around the world. The General Data Protection Regulation (GDPR) enables the data subjects (DS) to get back the control of their personal information, whic... 详细信息
来源: 评论
Self-attention Handwriting Generative Model  24
Self-attention Handwriting Generative Model
收藏 引用
2024 SIGGRAPH Asia 2024 Posters, SA 2024
作者: Wang, Yu-Chiao Hsieh, Tung-Ju Chiang, Pei-Ying Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan
Recent advancements in font generation models include GANs, diffusion models, and transformers. This study introduces a GAN-based model, zi2zi self-attention, which enhances the zi2zi model by incorporating Residual B... 详细信息
来源: 评论
A new framework for GNSS spoofing detection based on signal phase and structure  4
A new framework for GNSS spoofing detection based on signal ...
收藏 引用
4th International Conference on Electronic information engineering and computer Communication, EIECC 2024
作者: Xia, Na Li, Jiacheng Du, Huazheng Jing, Shuhao Hefei University of Technology School of Computer Science and Information Engineering Hefei China
Spoofing interference casts significant threat to the GNSS receivers making the enhancement of spoofing detection capability a crucial issue. Detection performance of traditional SQM method encounters evident degradat... 详细信息
来源: 评论
Bipolar interval-valued fuzzy set in graph and hypergraph settings
收藏 引用
Journal of Intelligent and Fuzzy Systems 2023年 第2期44卷 1755-1767页
作者: Gong, Shu Hua, Gang School of Information and Control Engineering China University of Mining and Technology Xuzhou China Department of Computer Science Guangdong University Science and Technology Dongguan China
Graphs and hypergraphs are popular models for data structured representation. For example, traffic data, weather data, and animal skeleton data are all described by graph structures. Interval-valued fuzzy sets change ... 详细信息
来源: 评论
Predicting Genetic Disorders: A Link Mining Approach  2
Predicting Genetic Disorders: A Link Mining Approach
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Sen, Madhura Rajasekaran, Rajkumar Jayaram Reddy, A. Govinda, K. Vellore Institute of Technology School of Computer Science and Engineering Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India
Genetic diseases are conditions caused by a spontaneous alteration or mutation in an individual's DNA. People can inherit genetic disorders from parents, which means they are born with them, even if they are not i... 详细信息
来源: 评论
Biological Profile Estimation of the Human Skeleton Based Forensic Identification Using Deep Learning Image Classification  5
Biological Profile Estimation of the Human Skeleton Based Fo...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Dutta, Sriparna Keerthana, R. Shekar, D Chandra Kumar, S. Satheesh Institute of Aeronautical Engineering Computer Science and Information Technology Hyderabad Dundigal India
This research study proposes an innovative methodology for the automated estimation of biological profiles through deep learning techniques, with a particular focus on the classification of age and gender derived from... 详细信息
来源: 评论
A Dehazing Method Based on Fog Density Fusion of Dark and Bright Channel Images  9
A Dehazing Method Based on Fog Density Fusion of Dark and Br...
收藏 引用
9th International Conference on Intelligent Informatics and BioMedical sciences, ICIIBMS 2024
作者: Yang, Delong Shanghai Institute of Technology School of computer science and Information Engineering Shanghai China
To address issues of imprecise transmission fusion and unsmooth transitions in regions with varying depths of field, as well as color distortion in large white areas after dehazing, this paper proposes a dehazing meth... 详细信息
来源: 评论
AR-Light: Enabling Fast and Lightweight Multi-User Augmented Reality via Semantic Segmentation and Collaborative View Synchronization
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2073-2086页
作者: Wen, Yu Shah, Aamir Bader Cao, Ruizhi Zhang, Chen Chen, Jiefu Wu, Xuqing Xie, Chenhao Fu, Xin University of Houston Department of Electrical and Computer Engineering HoustonTX77204 United States Beihang University School of Computer Science and Engineering Beijing100191 China University of Houston Department of Information Science Technology HoustonTX77204 United States
Multi-user Augmented Reality (MuAR) allows multiple users to interact with shared virtual objects, facilitated by exchanging environment information. Current MuAR systems rely on 3D point clouds for real-world analysi... 详细信息
来源: 评论
Ramp Progressive Secret Image Sharing using Ensemble of Simple Methods  14
Ramp Progressive Secret Image Sharing using Ensemble of Simp...
收藏 引用
14th International Conference on computer and Knowledge engineering, ICCKE 2024
作者: Mokhtari, Atieh Taheri, Mohammad Department of Computer Science and Engineering and Information Technology Shiraz University Shiraz Iran
This paper reviews the limitations of traditional Secret Image Sharing (SIS) methods and recent advancements such as PSIS, RPSIS, and SSIS, and presents an optimized and practical combinatorial method for secret image... 详细信息
来源: 评论