咨询与建议

限定检索结果

文献类型

  • 53,788 篇 会议
  • 27,587 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 82,125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,220 篇 工学
    • 36,952 篇 计算机科学与技术...
    • 29,894 篇 软件工程
    • 13,989 篇 信息与通信工程
    • 8,336 篇 控制科学与工程
    • 6,114 篇 电气工程
    • 6,006 篇 生物工程
    • 5,748 篇 电子科学与技术(可...
    • 4,143 篇 生物医学工程(可授...
    • 3,815 篇 机械工程
    • 3,669 篇 光学工程
    • 2,711 篇 仪器科学与技术
    • 2,521 篇 动力工程及工程热...
    • 2,379 篇 化学工程与技术
    • 2,291 篇 网络空间安全
    • 2,137 篇 安全科学与工程
    • 1,968 篇 交通运输工程
  • 26,826 篇 理学
    • 14,394 篇 数学
    • 7,374 篇 物理学
    • 6,666 篇 生物学
    • 4,633 篇 统计学(可授理学、...
    • 3,047 篇 系统科学
    • 2,503 篇 化学
  • 14,702 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,270 篇 图书情报与档案管...
    • 3,805 篇 工商管理
  • 4,144 篇 医学
    • 3,464 篇 临床医学
    • 3,106 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,805 篇 公共卫生与预防医...
  • 2,378 篇 法学
    • 1,861 篇 社会学
  • 1,418 篇 经济学
  • 1,171 篇 农学
  • 966 篇 教育学
  • 373 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,206 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,992 篇 deep learning
  • 1,971 篇 accuracy
  • 1,632 篇 machine learning
  • 1,609 篇 computational mo...
  • 1,566 篇 training
  • 1,225 篇 data mining
  • 1,078 篇 internet of thin...
  • 1,076 篇 support vector m...
  • 1,052 篇 optimization
  • 1,000 篇 predictive model...
  • 891 篇 educational inst...
  • 874 篇 wireless sensor ...
  • 871 篇 semantics
  • 843 篇 artificial intel...
  • 828 篇 real-time system...
  • 802 篇 security
  • 774 篇 neural networks
  • 729 篇 image segmentati...

机构

  • 695 篇 school of comput...
  • 537 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 258 篇 faculté des scie...
  • 258 篇 department of ph...
  • 256 篇 faculty of scien...
  • 221 篇 departamento de ...
  • 220 篇 department of ph...
  • 217 篇 department of co...
  • 216 篇 physics division...
  • 205 篇 department of ph...
  • 203 篇 school of comput...
  • 197 篇 department of ph...
  • 184 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 166 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 259 篇 r. ströhmer
  • 251 篇 h. sakamoto
  • 243 篇 y. tayalati
  • 243 篇 m. rijssenbeek
  • 234 篇 niyato dusit
  • 228 篇 s. jin
  • 225 篇 d. guest
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,164 篇 英文
  • 4,730 篇 其他
  • 1,249 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering and Information Technology"
82125 条 记 录,以下是71-80 订阅
排序:
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 20219-20247页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论
Utilizing attention mechanism with exemplar memory for improving domain adaptive person re-identification
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 16809-16834页
作者: Bhunia, Sugam Kr. Bakshi, Sambit Mukherjee, Imon Computer Science and Engineering Indian Institute of Information Technology Kalyani West Bengal Kalyani741235 India Computer Science and Engineering National Institute of Technology Rourkela Odisha Rourkela769008 India
In an Unsupervised Domain Adaptation (UDA) task, extracted features from the entire image lead to a negative transfer of irrelevant knowledge. An attention mechanism may highlight the suitable transferable region of a... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing Algorithm
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
A systematic review on deep learning implementation in brain tumor segmentation, classification and prediction
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Abid, Muhammad Adeel Munir, Kashif Institute of Computer Science Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan Pakistan Institute of Information Technology Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan Pakistan
The brain is the central part of the body that controls the overall functionality of the human body. The formulation of abnormal cells in the brain may lead to a brain tumor. Manual examination of a brain tumor is cha... 详细信息
来源: 评论
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1383-1398页
作者: Xueqing YAN Yongming LI Sanjiang LI School of Computer Science Shaanxi Normal University School of Mathematics and Statistics Shaanxi Normal University Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile... 详细信息
来源: 评论
Leveraging Concise Concepts With Probabilistic Modeling for Interpretable Visual Recognition
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3117-3131页
作者: Zhang, Yixuan Liu, Chuanbin Liu, Yizhi Gao, Yifan Lu, Zhiying Xie, Hongtao Zhang, Yongdong University of Science and Technology of China School of Information Science and Technology Hefei230027 China Hunan University of Science and Technology Department of Computer Science and Engineering Hunan411199 China
Interpretable visual recognition is essential for decision-making in high-stakes situations. Recent advancements have automated the construction of interpretable models by leveraging Visual Language Models (VLMs) and ... 详细信息
来源: 评论
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3467-3497页
作者: Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya Department of Computer Engineering College of Computer ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... 详细信息
来源: 评论
Enhancing aviation safety: Machine learning for real-time ADS-B injection detection through advanced data analysis
收藏 引用
Alexandria engineering Journal 2025年 126卷 262-276页
作者: Rahman, Md. Atiqur Bhuiyan, Touhid Ali, M. Ameer Department of Computer Science and Engineering East West university Dhaka Bangladesh School of Information Technology Washington University of Science and Technology Alexandria United States Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th... 详细信息
来源: 评论
An enhanced AMBTC for color image compression using color palette
收藏 引用
Multimedia Tools and Applications 2024年 第11期83卷 31783-31803页
作者: Xiong, Lizhi Zhang, Mengtao Yang, Ching-Nung Kim, Cheonshik School of Computer Science Nanjing University of Information Science and Technology Nanjing China Department of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan Department of Computer Engineering Sejong University Seoul Korea Republic of
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T... 详细信息
来源: 评论