咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,423 篇 期刊文献
  • 757 册 图书

馆藏范围

  • 82,061 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,015 篇 工学
    • 36,693 篇 计算机科学与技术...
    • 29,783 篇 软件工程
    • 13,881 篇 信息与通信工程
    • 8,177 篇 控制科学与工程
    • 6,003 篇 电气工程
    • 5,997 篇 生物工程
    • 5,711 篇 电子科学与技术(可...
    • 4,127 篇 生物医学工程(可授...
    • 3,804 篇 机械工程
    • 3,632 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,382 篇 化学工程与技术
    • 2,278 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,958 篇 交通运输工程
  • 26,701 篇 理学
    • 14,356 篇 数学
    • 7,341 篇 物理学
    • 6,653 篇 生物学
    • 4,653 篇 统计学(可授理学、...
    • 3,040 篇 系统科学
    • 2,500 篇 化学
  • 14,635 篇 管理学
    • 9,001 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,109 篇 医学
    • 3,439 篇 临床医学
    • 3,088 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,795 篇 公共卫生与预防医...
  • 2,380 篇 法学
    • 1,867 篇 社会学
  • 1,417 篇 经济学
  • 1,159 篇 农学
  • 974 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,215 篇 feature extracti...
  • 2,083 篇 computer science
  • 2,011 篇 accuracy
  • 1,985 篇 deep learning
  • 1,632 篇 computational mo...
  • 1,619 篇 machine learning
  • 1,568 篇 training
  • 1,225 篇 data mining
  • 1,097 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,066 篇 optimization
  • 1,013 篇 predictive model...
  • 889 篇 educational inst...
  • 876 篇 wireless sensor ...
  • 864 篇 semantics
  • 861 篇 artificial intel...
  • 859 篇 real-time system...
  • 806 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 694 篇 school of comput...
  • 542 篇 school of comput...
  • 475 篇 maharishi school...
  • 353 篇 department of co...
  • 276 篇 department of ph...
  • 262 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 222 篇 department of ph...
  • 222 篇 departamento de ...
  • 218 篇 physics division...
  • 216 篇 department of co...
  • 210 篇 department of ph...
  • 202 篇 school of comput...
  • 199 篇 department of ph...
  • 186 篇 department of ph...
  • 173 篇 college of compu...
  • 171 篇 department for p...
  • 168 篇 department of ph...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 261 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 234 篇 niyato dusit
  • 228 篇 d. guest
  • 227 篇 s. jin
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 71,183 篇 英文
  • 9,666 篇 其他
  • 1,294 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science and Engineering and Information Technology"
82061 条 记 录,以下是601-610 订阅
排序:
Innovative Approaches to Task Scheduling in Cloud Computing Environments Using an Advanced Willow Catkin Optimization Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2495-2520页
作者: Jeng-Shyang Pan Na Yu Shu-Chuan Chu An-Ning Zhang Bin Yan Junzo Watada College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China Department of Information Management Chaoyang University of TechnologyTaichung41349Taiwan College of Electronics Communication and PhysicsShandong University of Science and TechnologyQingdao266590China Graduate School of Information Production and SystemsWaseda UniversityKitakyushu808-0135Japan
The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resource... 详细信息
来源: 评论
Liver Tumors Segmentation Using 3D SegNet Deep Learning Approach
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1655-1677页
作者: G.Nallasivan V.Ramachandran Roobaea Alroobaea Jasem Almotiri Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveli627152Tamil NaduIndia Department of Computer Science and Engineering Gokaraju Rangaraju Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21974Saudi Arabia
An ultrasonic filter detects signs of malignant tumors by analysing the image’s pixel quality fluctuations caused by a liver *** of malignant growth proximity are identified in an ultrasound filter through image pixe... 详细信息
来源: 评论
CompressionShield: Architectural Adaptations towards Enhancing InceptionV3 for Image Forgery Detection
CompressionShield: Architectural Adaptations towards Enhanci...
收藏 引用
2024 IEEE Calcutta Conference, CALCON 2024
作者: Bhowal, Arundhati Naskar, Ruchira Neogy, Sarmistha Jadavpur University Computer Science and Engineering Kolkata India Indian Institute of Engineering Science and Technology Information Technology Shibpur India
The most popular methods for tampering with visual data integrity are copy-move forgery and splicing. These techniques can be used for several malicious purposes, including the production of false or misleading images... 详细信息
来源: 评论
Chinese Relation Extraction Based on Cross-Attention and Multi-feature Perception
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1837-1853页
作者: Xu, Shiao Sun, Shuihua Zhang, Zhiyuan Zhou, Huan School of Electronics and Information Engineering Jingchu University of Technology Jingmen448000 China School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China
Relation extraction aims at extracting semantic relations between given pairs of entities from unstructured textual data and is a critical task in information extraction. A relation extraction model based on cross-att... 详细信息
来源: 评论
A Lightweight, Secure, and Scalable Blockchain-Fog-IoMT Healthcare Framework with IPFS Data Storage for Healthcare 4.0
收藏 引用
SN computer science 2024年 第1期5卷 198页
作者: Mallick, Soubhagya Ranjan Lenka, Rakesh Kumar Tripathy, Pradyumna Kumar Rao, D. Chandrasekhar Sharma, Suraj Ray, Niranjan Kumar Computer Science and Engineering International Institute of Information Technology Odisha Bhubaneswar 751003 India Computer Science and Engineering Silicon Institute of Technology Odisha Bhubaneswar 751024 India Information Technology Veer Surendra Sai University of Technology Odisha Burla 768018 India Computer Science and Engineering Guru Ghasidas Vishwavidyalaya Chhattisgarh Bilaspur 495009 India School of Computer Science and Engineering Kalinga Institute of Industrial Technology Odisha Bhubaneswar 751024 India
The gathering, processing, transmission, sharing, and storage of healthcare data was the core idea behind Healthcare 4.0. Currently, most of the existing solutions for offering smart healthcare services rely on cloud-... 详细信息
来源: 评论
Preserving friendly stacking and weighted shadows in selective scalable secret image sharing
收藏 引用
Multimedia Tools and Applications 2023年 第19期82卷 29283-29305页
作者: Lee, Jung-San Chen, Yin-Chin Hsieh, Yun-Hao Chang, Shih-Hao Huynh, Ngoc-Tu Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Department of Information Technology Ton Duc Thang University Ho Chi Minh City Viet Nam
With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of secret image sharing. The region of interest (ROI) in the protected s... 详细信息
来源: 评论
Enhanced MADM Strategy with Heptapartitioned Neutrosophic Distance Metrics
收藏 引用
Neutrosophic Sets and Systems 2025年 78卷 74-96页
作者: Eassa, Mohamed Myvizhi, M. Elkholy, Mohamed Abdelhafeez, Ahmed Elbehiery, Hussam Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Mathematics KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Faculty of Computer Science& Engineering Alamein International University Egypt
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent... 详细信息
来源: 评论
Prior detection of Melanoma skin cancer using Deep Learning  4
Prior detection of Melanoma skin cancer using Deep Learning
收藏 引用
4th International Conference on Advancement in Electronics and Communication engineering, AECE 2024
作者: Kathuria, Kajol Sahoo, Anita Jain, Chakresh Kumar Jaypee Institute of Information Technology Computer Science & Engineering and Information Technology Noida India Biotechnology Jaypee Institute of Information Technology Noida India
Anomalous growth of skin cells caused due to harmful Sun's rays is predominant form of cancer. According to WHO skin cancer is the fifth most common cancer across the world. In 2020, 324635 new cases were accounte... 详细信息
来源: 评论
Asynchronous Energy-to-peak Control for 2D Roesser-type Markov Jump Systems
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第11期51卷 1761-1768页
作者: Chen, Qing Zhang, Yu Han, Chengyi Chen, Ling Zhou, Jianping The School of Computer Science and Technology Anhui University of Technology Ma’anshan243032 China The School of Electrical and Information Engineering Wanjiang University of Technology Ma’anshan243032 China
This paper studies asynchronous energy-to-peak control for 2D Roesser-type Markov jump systems (RTMJSs). Given the practical challenge of obtaining the system state, output-feedback is utilized for closing the control... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论