咨询与建议

限定检索结果

文献类型

  • 53,774 篇 会议
  • 27,402 篇 期刊文献
  • 754 册 图书

馆藏范围

  • 81,930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,039 篇 工学
    • 36,796 篇 计算机科学与技术...
    • 29,921 篇 软件工程
    • 13,916 篇 信息与通信工程
    • 8,206 篇 控制科学与工程
    • 6,060 篇 电气工程
    • 6,001 篇 生物工程
    • 5,701 篇 电子科学与技术(可...
    • 4,141 篇 生物医学工程(可授...
    • 3,806 篇 机械工程
    • 3,686 篇 光学工程
    • 2,710 篇 仪器科学与技术
    • 2,506 篇 动力工程及工程热...
    • 2,369 篇 化学工程与技术
    • 2,279 篇 网络空间安全
    • 2,131 篇 安全科学与工程
    • 1,962 篇 交通运输工程
  • 26,785 篇 理学
    • 14,387 篇 数学
    • 7,349 篇 物理学
    • 6,661 篇 生物学
    • 4,635 篇 统计学(可授理学、...
    • 3,046 篇 系统科学
    • 2,488 篇 化学
  • 14,691 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,260 篇 图书情报与档案管...
    • 3,812 篇 工商管理
  • 4,128 篇 医学
    • 3,458 篇 临床医学
    • 3,107 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,806 篇 公共卫生与预防医...
  • 2,382 篇 法学
    • 1,865 篇 社会学
  • 1,418 篇 经济学
  • 1,169 篇 农学
  • 977 篇 教育学
  • 372 篇 文学
  • 241 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,197 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,967 篇 deep learning
  • 1,966 篇 accuracy
  • 1,618 篇 machine learning
  • 1,605 篇 computational mo...
  • 1,560 篇 training
  • 1,224 篇 data mining
  • 1,075 篇 internet of thin...
  • 1,074 篇 support vector m...
  • 1,049 篇 optimization
  • 1,002 篇 predictive model...
  • 891 篇 educational inst...
  • 870 篇 wireless sensor ...
  • 867 篇 semantics
  • 836 篇 artificial intel...
  • 823 篇 real-time system...
  • 789 篇 security
  • 773 篇 neural networks
  • 730 篇 image segmentati...

机构

  • 689 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 259 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 220 篇 department of ph...
  • 220 篇 departamento de ...
  • 216 篇 physics division...
  • 216 篇 department of co...
  • 206 篇 department of ph...
  • 201 篇 school of comput...
  • 197 篇 department of ph...
  • 186 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 167 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 253 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 243 篇 y. tayalati
  • 234 篇 niyato dusit
  • 226 篇 d. guest
  • 226 篇 s. jin
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,091 篇 英文
  • 4,603 篇 其他
  • 1,248 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Engineering and Information Technology"
81930 条 记 录,以下是171-180 订阅
排序:
COVID-19 Pandemic: A Worldwide Critical Review with the Machine Learning Model-Based Prediction
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第1期106卷 339-349页
作者: Misra, Neeraj Kumar Das, Sanchali Satpathy, Sambit Addula, Santosh Reddy Trivedi, Munesh Chandra School of Electronics Engineering VIT-AP University Andhra Pradesh Amaravathi522237 India School of Computer Science Engineering and Technology Bennett University Greater Noida India Computer Science and Engineering Galgotias College of Engineering and Technology Greater Noida India Information Technology University of the Cumberlands Williamsburg United States Computer Science and Engineering PSSCIVE Bhopal Bhopal India
Machine learning (ML) with data analysis has many successful applications and is widely employed daily. Additionally, they have played a significant role in combating the global coronavirus (COVID-19) outbreak. Intern... 详细信息
来源: 评论
Video forgery localization using inter-frame denoising and intra-frame segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Banerjee, Debanik Chittaragi, Nagaratna B. Koolagudi, Shashidhar G. Department of Computer Science and Engineering National Institute of Technology Karnataka Karnataka Surathkal575025 India Department of Information Science and Engineering Siddaganaga Institute of Technology Karnataka Tumkur572103 India
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video... 详细信息
来源: 评论
Tensor Factorization for Accurate Anomaly Detection in Dynamic Networks
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 439-450页
作者: Li, Xiaocan Wen, Jigang Xie, Kun Xie, Gaogang Liang, Wei Hunan University College of Computer Science and Electronics Engineering Changsha China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Chinese Academy of Sciences Computer Network Information Center China
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ... 详细信息
来源: 评论
Robust Stability of Discrete-time Genetic Regulatory Networks with Reaction Diffusion
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第9期54卷 1756-1764页
作者: Zou, Chengye Yang, Yongwei Li, Haifeng Shang, Yubao Liu, Yunong Information Science and Engineering Yanshan University Qinhuangdao066004 China School of Mathematics and Computer Science Tongling University Anhui Tongling244000 China Computer and Information Science Qinghai Institute of Technology Xining810016 China Information Science and Engineering Yanshan University Qinhuangdao066004 China
In the realm of discrete-time modeling for gene regulatory networks, significant focus has been placed on addressing the time lags inherent in the process of DNA transcription to RNA and the subsequent translation of ... 详细信息
来源: 评论
FMeAR: FACS Driven Ensemble Model for Micro-Expression Action Unit Recognition
收藏 引用
SN computer science 2024年 第5期5卷 598页
作者: Chauhan, Anjaly Jain, Shikha Department of Computer Science & amp Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Micro-expressions (MEs) are fleeting involuntary facial movements, which occur frequently when people attempt to conceal their emotions. Since human eyesight cannot detect fleeting and slight changes in facial express... 详细信息
来源: 评论
Exploring Personalized Internet of Things(PIoT),social connectivity,and Artificial Social Intelligence(ASI):A survey
收藏 引用
High-Confidence Computing 2024年 第3期4卷 136-162页
作者: Bisma Gulzar Shabir Ahmad Sofi Sahil Sholla Department of Information Technology National Institute of TechnologySrinagar 190001India Department of Computer Science and Engineering Islamic University of Science and TechnologyGazipur 1700India
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ... 详细信息
来源: 评论
Constructing multi-modal emotion recognition model based on convolutional neural network
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Kuo, Jong-Yih Hsieh, Ti-Feng Lin, Ta-Yu Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan
As society advances, an increasing number of individuals spend significant time interacting with computers daily. To enhance the human-computer interaction experience, it has become crucial to augment the computer’s ... 详细信息
来源: 评论
Multispectral point cloud superpoint segmentation
收藏 引用
science China(Technological sciences) 2024年 第4期67卷 1270-1281页
作者: WANG QingWang WANG MingYe ZHANG ZiFeng SONG Jian ZENG Kai SHEN Tao GU YanFeng Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming 650500China Yunnan Key Laboratory of Computer Technologies Application Kunming 650500China School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150001China
The multitude of airborne point clouds limits the point cloud processing *** are grouped based on similar points,which can effectively alleviate the demand for computing resources and improve processing ***,existing s... 详细信息
来源: 评论
Multiclass Classification for Cyber Threats Detection on Twitter
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3853-3866页
作者: Adnan Hussein Abdulwahab Ali Almazroi College of Computer Science and Engineering Department of Computer ScienceAL-Ahgaff UniversityMukallaYemen College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddahSaudi Arabia
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ... 详细信息
来源: 评论
Security Threats to xApps Access Control and E2 Interface in O-RAN
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 1197-1203页
作者: Hung, Cheng-Feng Chen, You-Run Tseng, Chi-Heng Cheng, Shin-Ming National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106335 Taiwan
Open Radio Access Networks (O-RANs) represent a novel wireless access network architecture that decomposes traditional RAN functions and makes them openly accessible. O-RANs enable real-time coordination, RAN performa... 详细信息
来源: 评论