咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,302 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 81,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,013 篇 工学
    • 36,684 篇 计算机科学与技术...
    • 29,779 篇 软件工程
    • 13,878 篇 信息与通信工程
    • 8,169 篇 控制科学与工程
    • 6,011 篇 电气工程
    • 5,997 篇 生物工程
    • 5,721 篇 电子科学与技术(可...
    • 4,128 篇 生物医学工程(可授...
    • 3,802 篇 机械工程
    • 3,623 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,380 篇 化学工程与技术
    • 2,275 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,957 篇 交通运输工程
  • 26,693 篇 理学
    • 14,360 篇 数学
    • 7,335 篇 物理学
    • 6,652 篇 生物学
    • 4,658 篇 统计学(可授理学、...
    • 3,039 篇 系统科学
    • 2,500 篇 化学
  • 14,629 篇 管理学
    • 8,996 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,107 篇 医学
    • 3,438 篇 临床医学
    • 3,086 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,794 篇 公共卫生与预防医...
  • 2,379 篇 法学
    • 1,868 篇 社会学
  • 1,414 篇 经济学
  • 1,159 篇 农学
  • 973 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,214 篇 feature extracti...
  • 2,084 篇 computer science
  • 2,000 篇 accuracy
  • 1,981 篇 deep learning
  • 1,637 篇 computational mo...
  • 1,622 篇 machine learning
  • 1,547 篇 training
  • 1,215 篇 data mining
  • 1,098 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,070 篇 optimization
  • 1,004 篇 predictive model...
  • 895 篇 educational inst...
  • 891 篇 wireless sensor ...
  • 867 篇 semantics
  • 860 篇 real-time system...
  • 836 篇 artificial intel...
  • 801 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 687 篇 school of comput...
  • 559 篇 school of comput...
  • 478 篇 maharishi school...
  • 351 篇 department of co...
  • 275 篇 department of ph...
  • 261 篇 department of ph...
  • 257 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 223 篇 departamento de ...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 217 篇 department of co...
  • 210 篇 school of comput...
  • 206 篇 department of ph...
  • 198 篇 department of ph...
  • 192 篇 department of ph...
  • 170 篇 department of co...
  • 168 篇 department for p...
  • 165 篇 department of ph...
  • 163 篇 college of compu...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 248 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 231 篇 niyato dusit
  • 227 篇 d. guest
  • 225 篇 s. jin
  • 206 篇 g. gaudio
  • 202 篇 f. pastore

语言

  • 71,072 篇 英文
  • 9,658 篇 其他
  • 1,285 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science and Engineering and Information Technology"
81933 条 记 录,以下是271-280 订阅
排序:
Advanced Semantic Communication Techniques for IoT Using Disentangled information Bottleneck
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20122-20137页
作者: Xie, Wenwu Xiong, Ming Yang, Liang Wang, Ji Li, Xingwang Yang, Zhihe School of Information Science and Engineering Hunan Institute of Science and Technology Yueyang414006 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China Central China Normal University College of Physical Science and Technology Department of Electronics and Information Engineering Wuhan430079 China Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454003 China
This paper explores the impact of source data compression on the performance of task execution at the receiver side of a communication system, and investigates the interference and impact of channel environment variat... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
A study of learning models for COVID-19 disease prediction
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第4期15卷 2581-2600页
作者: Jain, Sakshi Roy, Pradeep Kumar School of Information Technology Vellore Institute of Technology TN Vellore632014 India Department of Computer Science and Engineering Indian Institute of Information Technology Surat Gujarat Surat394190 India
Coronavirus belongs to the family of Coronaviridae. It is responsible for COVID-19 communicable disease, which has affected 213 countries and territories worldwide. Researchers in computational fields have been active... 详细信息
来源: 评论
DAUNet: Detail-Aware U-Shaped Network for 2D Human Pose Estimation
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3325-3349页
作者: Xi Li Yuxin Li Zhenhua Xiao Zhenghua Huang Lianying Zou College of Information and Artificial Intelligence Nanchang Institute of Science and TechnologyNanchang330108China School of Electrical and Information Engineering Wuhan Institute of TechnologyWuhan430205China School of Computer Science and Technology Hubei Business CollegeWuhan430079China
Human pose estimation is a critical research area in the field of computer vision,playing a significant role in applications such as human-computer interaction,behavior analysis,and action *** this paper,we propose a ... 详细信息
来源: 评论
High Utility Periodic Frequent Pattern Mining in Multiple Sequences
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 733-759页
作者: Chien-Ming Chen Zhenzhou Zhang Jimmy Ming-Tai Wu Kuruva Lakshmanna College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China Department of Information Technology Vellore Institute of TechnologyVellore632014India
Periodic patternmining has become a popular research subject in recent years;this approach involves the discoveryof frequently recurring patterns in a transaction sequence. However, previous algorithms for periodic pa... 详细信息
来源: 评论
Many-Objective Optimization-Based Task Scheduling in Hybrid Cloud Environments
收藏 引用
computer Modeling in engineering & sciences 2023年 第9期136卷 2425-2450页
作者: Mengkai Zhao Zhixia Zhang Tian Fan Wanwan Guo Zhihua Cui The School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan030024China The School of Electronic Information Engineering Taiyuan University of Science and TechnologyTaiyuan030024China
Due to the security and scalability features of hybrid cloud architecture,it can bettermeet the diverse requirements of users for cloud *** a reasonable resource allocation solution is the key to adequately utilize th... 详细信息
来源: 评论
Deep Learning-Driven Edge-Enabled Serverless Architectures for Animal Emotion Detection
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第7期49卷 33-48页
作者: Benedict, Shajulin Subair, Rubiya Department of Computer Science and Engineering Indian Institute of Information Technology Kottayam Kerala India Technical University Munich Garching Germany
Animal emotion detection, including elephant emotions, is highly possible, but what the traditional emotion detection approaches highlight is their blatant ignorance of adopting edge-enabled intelligence and serverles... 详细信息
来源: 评论
A secured internet of robotic things (IoRT) for long-term care services in a smart building
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5276-5290页
作者: Chang, Shih-Hao Hsia, Chih-Hsien Hong, Wei-Zhi Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Department of Computer Science and Information Engineering National Ilan University Yilan Taiwan Department of Business Administration Chaoyang University of Technology Taichung Taiwan Department of Computer Science and Information Engineering Tamkang University New Taipei Taiwan
Long-term care refers to any support, both medical and non-medical, provided to the elderly with a chronic illness or disability due to physical or mental conditions. Since the cost of long-term care insurance is not ... 详细信息
来源: 评论
On the Security of Key-Aggregate Searchable Encryption
收藏 引用
Journal of Cyber Security and Mobility 2024年 第3期13卷 565-584页
作者: Wen, Jing Li, Haifeng Lan, Caihui School of Information Engineering Lanzhou City University Lanzhou730070 China School of Computer and Information Science Qinghai University of Science and Technology Xining810016 China Department of Information Technology Qinghai University Xining810016 China
The sharing of encrypted data in cloud computing is an essential functionality with countless applications in our everyday life. However, the issue of how to securely, efficiently and flexibly share encrypted data in ... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论