咨询与建议

限定检索结果

文献类型

  • 3,977 篇 会议
  • 3,121 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 7,123 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,381 篇 工学
    • 3,180 篇 计算机科学与技术...
    • 2,594 篇 软件工程
    • 1,181 篇 信息与通信工程
    • 769 篇 控制科学与工程
    • 594 篇 电气工程
    • 490 篇 生物工程
    • 481 篇 电子科学与技术(可...
    • 351 篇 光学工程
    • 334 篇 生物医学工程(可授...
    • 330 篇 机械工程
    • 328 篇 网络空间安全
    • 230 篇 仪器科学与技术
    • 218 篇 动力工程及工程热...
    • 209 篇 交通运输工程
    • 186 篇 化学工程与技术
    • 186 篇 安全科学与工程
  • 2,483 篇 理学
    • 1,143 篇 数学
    • 864 篇 物理学
    • 563 篇 生物学
    • 360 篇 统计学(可授理学、...
    • 241 篇 化学
    • 237 篇 系统科学
  • 1,289 篇 管理学
    • 804 篇 管理科学与工程(可...
    • 563 篇 图书情报与档案管...
    • 279 篇 工商管理
  • 446 篇 医学
    • 342 篇 临床医学
    • 288 篇 基础医学(可授医学...
    • 202 篇 公共卫生与预防医...
    • 164 篇 药学(可授医学、理...
  • 234 篇 法学
    • 183 篇 社会学
  • 160 篇 教育学
  • 108 篇 农学
  • 85 篇 经济学
  • 55 篇 文学
  • 16 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 222 篇 deep learning
  • 202 篇 accuracy
  • 183 篇 feature extracti...
  • 180 篇 machine learning
  • 138 篇 computational mo...
  • 135 篇 training
  • 131 篇 semantics
  • 110 篇 internet of thin...
  • 107 篇 data mining
  • 105 篇 real-time system...
  • 95 篇 convolutional ne...
  • 89 篇 support vector m...
  • 87 篇 predictive model...
  • 86 篇 optimization
  • 84 篇 artificial intel...
  • 83 篇 security
  • 81 篇 visualization
  • 77 篇 computer science
  • 71 篇 neural networks
  • 70 篇 data models

机构

  • 285 篇 department of ph...
  • 284 篇 faculty of scien...
  • 284 篇 department for p...
  • 277 篇 departamento de ...
  • 275 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 272 篇 institute of phy...
  • 269 篇 department of ph...
  • 264 篇 department of ph...
  • 261 篇 institute of phy...
  • 259 篇 faculté des scie...
  • 257 篇 fakultät für phy...
  • 241 篇 institut für ast...
  • 233 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 216 篇 department of ph...
  • 215 篇 department of ph...
  • 212 篇 instituto de fís...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 263 篇 y. nagasaka
  • 261 篇 s. guindon
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 258 篇 a. kaczmarska

语言

  • 6,529 篇 英文
  • 482 篇 其他
  • 121 篇 中文
  • 4 篇 日文
  • 2 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer and Information Technology and Engineering Education"
7123 条 记 录,以下是131-140 订阅
排序:
DTQFL: A Digital Twin-Assisted Quantum Federated Learning Algorithm for Intelligent Diagnosis in 5G Mobile Network
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2023年 第5期29卷 1-10页
作者: Qu, Zhiguo Li, Yang Liu, Bo Gupta, Deepak Tiwari, Prayag Engineering Research Center of Digital Foren-sics Ministry of Education Jiangsu Collaborative Innovation Center of Atmospheric Environment the Equipment Technology and the School of Computer Science Nanjing University of Information Science and Technology Nanjing China School of Computer Science Nanjing University of Information Science and Technology Nanjing China Hubei University of Science and Technology Xianning China Department of Computer Science & Engi-neering Maharaja Agrasen Institute of Technology Delhi India School of Information Technology Halmstad University Sweden
Smart healthcare aims to revolutionize med-ical services by integrating artificial intelligence (AI). The limitations of classical machine learning include privacy concerns that prevent direct data sharing among medic... 详细信息
来源: 评论
A survey on textual emotion cause extraction in social networks
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 524-536页
作者: Sancheng Peng Lihong Cao Guojun Wang Zhouhao Ouyang Yongmei Zhou Shui Yu Laboratory of Language Engineering and Computing Center for Linguistics and Applied LinguisticsGuangdong University of Foreign StudiesGuangzhou510006China School of English Education Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou510006China South China University of Technology Guangzhou510006China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science University of Technology SydneySydneyNSW 2007Australia
With the rapid development of web technology,Social Networks(SNs)have become one of the most popular platforms for users to exchange views and to express their *** and more people are used to commenting on a certain h... 详细信息
来源: 评论
Design of Chest Visual Based Image Reclamation Method Using Dual Tree Complex Wavelet Transform and Edge Preservation Smoothing Algorithm
收藏 引用
SN computer Science 2024年 第4期5卷 352页
作者: Kumar, B. P. Pradeep Darshan, S. L. Shiva Naresh, E. Srinidhi, N.N. Shreyas, J. Department of ECE HKBKCE Karnataka Bangalore 560045 India Department of Computer Science and Engineering National Institute of Technology Warangal Warangal 506004 India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
The proposed article put forward a new scheme for image reclamation using second phase discrete symlet transform for medical images. The current medical image reclamation approaches have limitations in providing accur... 详细信息
来源: 评论
Design of Cost Efficient VBIR Technique Using ICA and IVCA
收藏 引用
SN computer Science 2024年 第5期5卷 560页
作者: Pradeep Kumar, B.P. Srinidhi, N.N. Shiva Darshan, S.L. Naresh, E. Department of ECE HKBKCE Karnataka Bangalore 560045 India Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Computer Science and Engineering National Institute of Technology Warangal Warangal 506004 India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
With an emphasis on early-stage contrast agent transit through tumour vasculature, this study presents Adaptive Complex Independent Components Analysis (ACICA) as a unique method for evaluating intravascular responsiv... 详细信息
来源: 评论
Negative Itemset Tree for Discovering Rare Patterns with Periodicity from Static Databases
收藏 引用
engineering Letters 2023年 第3期31卷 882-895页
作者: Jyothi Upadhya, K. Bolisetty, Thanishka Rao, B. Dinesh Geetha, M. Department of Computer Science and Engineering Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Manipal School of Information Sciences Manipal Academy of Higher Education Karnataka Manipal576104 India
Periodic patterns assist in the discovery of crucial information in the fields, including fraud detection, telecommu-nications, retail marketing, research, and medicine. Numerous methods have been developed for the ex... 详细信息
来源: 评论
Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 899-914页
作者: Chengsheng Yuan Baojie Cui Zhili Zhou Xinting Li Qingming Jonathan Wu Engineering Research Center of Digital Forensics Ministry of EducationNanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Institute of Artificial Intelligence and Blockchain Guangzhou UniversityGuangzhou510006China School of International Relations National University of Defense TechnologyNanjing210039China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada
In recent years,deep learning has been the mainstream technology for fingerprint liveness detection(FLD)tasks because of its remarkable ***,recent studies have shown that these deep fake fingerprint detection(DFFD)mod... 详细信息
来源: 评论
Reversible Data Hiding in Shared Images with Separate Cover Image Reconstruction and Secret Extraction
收藏 引用
IEEE Transactions on Cloud Computing 2024年 第1期12卷 186-199页
作者: Xiong, Lizhi Han, Xiao Yang, Ching-Nung Shi, Yun-Qing Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai200240 China National Dong Hwa University Department of Computer Science & Information Engineering Hualien974301 Taiwan New Jersey Institute of Technology ECE Department NewarkNJ07102 United States
Reversible data hiding is widely utilized for secure communication and copyright protection. Recently, to improve embedding capacity and visual quality of stego-images, some Partial Reversible Data Hiding (PRDH) schem... 详细信息
来源: 评论
A Topic Modeling Approach to Characterizing Colombian Teachers' Conceptions of Computational Thinking  53
A Topic Modeling Approach to Characterizing Colombian Teache...
收藏 引用
53rd IEEE ASEE Frontiers in education International Conference, FIE 2023
作者: Castellanos, Hugo Vieira, Camilo Magana, Alejandra Computer and Information Technology Purdue University West LafayetteIN United States Education Studies Institute Universidad Del Norte Barranquilla Colombia Computer and Information Technology and Engineering Education Purdue University West LafayetteIN United States
This work-in-progress paper will explore the effectiveness of topic modeling to support the analysis of Colombian teachers' conceptions of computational thinking (in Spanish) in an online professional development ... 详细信息
来源: 评论
A stacked ensemble approach to detect cyber attacks based on feature selection techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 316-331页
作者: Urmi, Wahida Ferdose Uddin, Mohammed Nasir Uddin, Md Ashraf Talukder, Md. Alamin Hasan, Md. Rahat Paul, Souvik Chanda, Moumita Ayoade, John Khraisat, Ansam Hossen, Rakib Imran, Faisal Department of Computer Science and Engineering Jagannath University Dhaka Bangladesh Department of Computer Science and Engineering International University of Business Agriculture and Technology Dhaka Bangladesh School of Information Technology Deakin University Waurn Ponds Campus Geelong Australia School of Information Technology Crown Institute of Higher Education 116 Pacific Highway North SydneyNSW2060 Australia Department of Cyber Security Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakoir Gazipur1750 Bangladesh Department of Electrical and Computer Engineering University of Ottawa Canada
The exponential growth of data and increased reliance on interconnected systems have heightened the need for robust network security. Cyber-Attack Detection Systems (CADS) are essential for identifying and mitigating ... 详细信息
来源: 评论
Metaheuristic Optimization of Time Series Models for Predicting Networks Traffic
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 427-442页
作者: Reem Alkanhel El-Sayed M.El-kenawy D.L.Elsheweikh Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh 11671Saudi Arabia
Traffic prediction of wireless networks attracted many researchersand practitioners during the past decades. However, wireless traffic frequentlyexhibits strong nonlinearities and complicated patterns, which makes it ... 详细信息
来源: 评论