咨询与建议

限定检索结果

文献类型

  • 10,097 篇 会议
  • 5,849 篇 期刊文献
  • 252 册 图书

馆藏范围

  • 16,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,653 篇 工学
    • 7,008 篇 计算机科学与技术...
    • 5,645 篇 软件工程
    • 2,248 篇 信息与通信工程
    • 1,573 篇 控制科学与工程
    • 1,096 篇 电气工程
    • 1,035 篇 生物工程
    • 941 篇 电子科学与技术(可...
    • 736 篇 机械工程
    • 720 篇 生物医学工程(可授...
    • 540 篇 光学工程
    • 446 篇 仪器科学与技术
    • 410 篇 动力工程及工程热...
    • 346 篇 化学工程与技术
    • 346 篇 安全科学与工程
    • 318 篇 交通运输工程
  • 4,839 篇 理学
    • 2,563 篇 数学
    • 1,228 篇 物理学
    • 1,161 篇 生物学
    • 857 篇 统计学(可授理学、...
    • 691 篇 系统科学
    • 370 篇 化学
  • 2,980 篇 管理学
    • 1,882 篇 管理科学与工程(可...
    • 1,237 篇 图书情报与档案管...
    • 1,014 篇 工商管理
  • 865 篇 医学
    • 739 篇 临床医学
    • 607 篇 基础医学(可授医学...
    • 369 篇 公共卫生与预防医...
    • 335 篇 药学(可授医学、理...
  • 523 篇 法学
    • 417 篇 社会学
  • 349 篇 经济学
    • 347 篇 应用经济学
  • 291 篇 教育学
  • 189 篇 农学
  • 79 篇 文学
  • 35 篇 军事学
  • 35 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 394 篇 computer science
  • 378 篇 deep learning
  • 291 篇 information syst...
  • 262 篇 information tech...
  • 256 篇 computational mo...
  • 240 篇 machine learning
  • 219 篇 internet of thin...
  • 204 篇 data mining
  • 204 篇 feature extracti...
  • 183 篇 computer archite...
  • 180 篇 optimization
  • 177 篇 artificial intel...
  • 165 篇 laboratories
  • 155 篇 support vector m...
  • 148 篇 educational inst...
  • 147 篇 neural networks
  • 139 篇 routing
  • 137 篇 application soft...
  • 135 篇 quality of servi...
  • 134 篇 predictive model...

机构

  • 99 篇 school of comput...
  • 76 篇 information syst...
  • 65 篇 school of comput...
  • 54 篇 department of co...
  • 47 篇 pillar of inform...
  • 45 篇 department of la...
  • 44 篇 department of co...
  • 43 篇 department of in...
  • 42 篇 school of inform...
  • 41 篇 ieee
  • 40 篇 department of sy...
  • 38 篇 department of el...
  • 35 篇 school of comput...
  • 33 篇 department of sy...
  • 32 篇 the school of co...
  • 31 篇 department of co...
  • 29 篇 school of comput...
  • 29 篇 school of electr...
  • 29 篇 department of in...
  • 27 篇 department of in...

作者

  • 112 篇 niyato dusit
  • 43 篇 xiong zehui
  • 41 篇 sun maosong
  • 41 篇 david lo
  • 39 篇 guo hong
  • 37 篇 huang minlie
  • 31 篇 arjan durresi
  • 30 篇 abdelwahed motwa...
  • 30 篇 shen xuemin
  • 27 篇 xiaohong jiang
  • 24 篇 liu yang
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 kang jiawen
  • 22 篇 soni mukesh
  • 22 篇 gyongyosi laszlo
  • 22 篇 tao dacheng
  • 21 篇 xu minrui
  • 20 篇 pedrycz witold
  • 20 篇 quek tony q.s.
  • 19 篇 tao yang

语言

  • 15,579 篇 英文
  • 478 篇 其他
  • 145 篇 中文
  • 16 篇 日文
  • 5 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Information Systems"
16198 条 记 录,以下是11-20 订阅
排序:
Domain generalization with semi-supervised learning for people-centric activity recognition
收藏 引用
Science China(information Sciences) 2025年 第1期68卷 171-188页
作者: Jing LIU Wei ZHU Di LI Xing HU Liang SONG Academy for Engineering & Technology Fudan University Shanghai East-bund Research Institute on Networking Systems of AI School of Optoelectronic Information and Computer Engineering University of Shanghai for Science & Technology
People-centric activity recognition is one of the most critical technologies in a wide range of real-world applications,including intelligent transportation systems, healthcare services, and brain-computer interfaces.... 详细信息
来源: 评论
Multi-radio fast routing recovery protocol based on spectrum situation awareness
收藏 引用
Chinese Journal of Aeronautics 2025年 第3期38卷 435-446页
作者: Chuanxin ZHOU Chao DONG Xiaojun ZHU Fuhui ZHOU Qihui WU Zhengrui QIN Ministry of Industry and Information Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China School of Computer Science and Information Systems Northwest Missouri State UniversityMaryville 64468USA
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ... 详细信息
来源: 评论
Classifying distinct emotions from parents of ASD child using EEG source data by combining Bernoulli–Laplace Prior and graph neural networks
收藏 引用
Neural Computing and Applications 2025年 第12期37卷 7877-7895页
作者: ArulDass, Stephen Dass Jayagopal, Prabhu School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore632014 India
Emotion recognition using biological brain signals needs to be reliable to attain effective signal processing and feature extraction techniques. The impact of emotions in interpretations, conversations, and decision-m... 详细信息
来源: 评论
Employing cross-domain modelings for robust object detection in dynamic environment of autonomous vehicles
收藏 引用
Multimedia Tools and Applications 2024年 1-47页
作者: Rawlley, Oshin Gupta, Shashank Kathera, Hardik Katyal, Siddharth Batwara, Yashvardhan Department of Computer Science & amp Information Systems Birla Institute of Technology and Science Rajasthan Pilani India
Object detection (OD) in Advanced Driver Assistant systems (ADAS) has been a fundamental problem especially when complex unseen cross-domain adaptations occur in real driving scenarios of autonomous Vehicles (AVs). Du... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
A Deep Learning Approach to Industrial Corrosion Detection
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2587-2605页
作者: Mehwash Farooqui Atta Rahman Latifa Alsuliman Zainab Alsaif Fatimah Albaik Cadi Alshammari Razan Sharaf Sunday Olatunji Sara Waslallah Althubaiti Hina Gull Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Information Systems(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have... 详细信息
来源: 评论
A Robust Tuned Random Forest Classifier Using Randomized Grid Search to Predict Coronary Artery Diseases
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4633-4648页
作者: Sameh Abd El-Ghany A.A.Abd El-Aziz Department of Information Systems College of Computer and Information SciencesJouf UniversityKSA Department of Information Systems Faculty of Computers and InformationMansoura UniversityEgypt Department of Information Systems and Technology Faculty of Graduate Studies for Statistical ResearchCairo UniversityEgypt
Coronary artery disease(CAD)is one of themost authentic cardiovascular afflictions because it is an uncommonly overwhelming heart *** breakdown of coronary cardiovascular disease is one of the principal sources of dea... 详细信息
来源: 评论
Modern Standard Arabic speech disorders corpus for digital speech processing applications
收藏 引用
International Journal of Speech technology 2024年 第1期27卷 157-170页
作者: Alqudah, Assal A. M. Alshraideh, Mohammad A. M. Abushariah, Mohammad A. M. Sharieh, Ahmad A. S. Department of Computer Science King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan
Digital speech processing applications including automatic speech recognition (ASR), speaker recognition, speech translation, and others, essentially require large volumes of speech data for training and testing purpo... 详细信息
来源: 评论
Interaction-aware Trust Management Scheme for IoT systems With Machine Learning-Based Attack Detection
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17169-17182页
作者: Farhat, Ali Eldosouky, Abdelrahman Ibnkahla, Mohamed Matrawy, Ashraf Carleton University Department of Systems and Computer Engineering OttawaON Canada Carleton University School of Information Technology OttawaON Canada
The recent Internet of Things (IoT) adoption has revolutionized various applications while introducing significant security and privacy challenges. Traditional security solutions are unsuitable for IoT systems due to ... 详细信息
来源: 评论