咨询与建议

限定检索结果

文献类型

  • 4,040 篇 会议
  • 3,169 篇 期刊文献
  • 26 册 图书

馆藏范围

  • 7,235 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,451 篇 工学
    • 3,231 篇 计算机科学与技术...
    • 2,616 篇 软件工程
    • 1,217 篇 信息与通信工程
    • 804 篇 控制科学与工程
    • 634 篇 电气工程
    • 492 篇 生物工程
    • 490 篇 电子科学与技术(可...
    • 350 篇 光学工程
    • 344 篇 网络空间安全
    • 339 篇 机械工程
    • 334 篇 生物医学工程(可授...
    • 236 篇 仪器科学与技术
    • 219 篇 动力工程及工程热...
    • 218 篇 交通运输工程
    • 196 篇 安全科学与工程
    • 191 篇 化学工程与技术
  • 2,515 篇 理学
    • 1,161 篇 数学
    • 874 篇 物理学
    • 567 篇 生物学
    • 363 篇 统计学(可授理学、...
    • 250 篇 化学
    • 238 篇 系统科学
  • 1,317 篇 管理学
    • 825 篇 管理科学与工程(可...
    • 573 篇 图书情报与档案管...
    • 283 篇 工商管理
  • 459 篇 医学
    • 348 篇 临床医学
    • 286 篇 基础医学(可授医学...
    • 211 篇 公共卫生与预防医...
    • 164 篇 药学(可授医学、理...
  • 238 篇 法学
    • 186 篇 社会学
  • 165 篇 教育学
  • 109 篇 农学
  • 88 篇 经济学
  • 56 篇 文学
  • 15 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 230 篇 deep learning
  • 212 篇 accuracy
  • 187 篇 feature extracti...
  • 186 篇 machine learning
  • 143 篇 computational mo...
  • 136 篇 training
  • 131 篇 semantics
  • 114 篇 internet of thin...
  • 112 篇 real-time system...
  • 106 篇 data mining
  • 94 篇 optimization
  • 93 篇 convolutional ne...
  • 90 篇 support vector m...
  • 89 篇 security
  • 87 篇 predictive model...
  • 87 篇 artificial intel...
  • 83 篇 visualization
  • 76 篇 computer science
  • 74 篇 neural networks
  • 72 篇 data models

机构

  • 287 篇 department of ph...
  • 286 篇 faculty of scien...
  • 286 篇 department for p...
  • 279 篇 departamento de ...
  • 277 篇 department of ph...
  • 275 篇 kirchhoff-instit...
  • 273 篇 institute of phy...
  • 269 篇 department of ph...
  • 264 篇 department of ph...
  • 261 篇 institute of phy...
  • 260 篇 faculté des scie...
  • 257 篇 fakultät für phy...
  • 243 篇 institut für ast...
  • 235 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 216 篇 department of ph...
  • 215 篇 department of ph...
  • 210 篇 instituto de fís...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 264 篇 y. nagasaka
  • 262 篇 s. guindon
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 260 篇 a. kaczmarska

语言

  • 5,652 篇 英文
  • 1,473 篇 其他
  • 130 篇 中文
  • 4 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer and Information Technology and Engineering Education"
7235 条 记 录,以下是751-760 订阅
排序:
Multidomain Object Detection Framework Using Feature Domain Knowledge Distillation
收藏 引用
IEEE Transactions on Cybernetics 2024年 第8期54卷 4643-4651页
作者: Jaw, Da-Wei Huang, Shih-Chia Lu, Zhi-Hui Fung, Benjamin C. M. Kuo, Sy-Yen National Taiwan University Department of Electrical Engineering Taipei106 Taiwan National Taipei University of Technology Department of Electronic Engineering Taipei106 Taiwan Fudan University School of Computer Science The Engineering Research Center of Cyber Security Auditing and Monitoring Ministry of Education Shanghai200433 China McGill University School of Information Studies MontrealQCH3A 1X1 Canada
Object detection techniques have been widely studied, utilized in various works, and have exhibited robust performance on images with sufficient luminance. However, these approaches typically struggle to extract valua... 详细信息
来源: 评论
Privacy protection and data security in intelligent recommendation systems
收藏 引用
Neural Computing and Applications 2025年 1-18页
作者: Zheng, Donghua Alkawaz, Mohammed Hazim Johar, Md Gapar Md School of Information Technology and Engineering Guangzhou College of Commerce Guangdong Guangzhou511363 China School of Graduate Studies Management and Science University Selangor Shah Alam40100 Malaysia Department of Computer Science College of Education for Pure Science University of Mosul Nineveh Mosul41002 Iraq Software Engineering and Digital Innovation Centre Management and Science University Selangor Shah Alam40100 Malaysia
Data security and privacy have emerged as major areas of study for recommendation systems. This is crucial for enhancing system security given the quick advancement of Internet technology and its increased use. Howeve... 详细信息
来源: 评论
CNN-Based Deep Learning Model for Early Identification and Categorization of Melanoma Skin Cancer Using Medical Imaging
收藏 引用
SN computer Science 2024年 第7期5卷 911页
作者: Pandimurugan, V. Ahmad, Sultan Prabu, A.V. Rahmani, Mohammad Khalid Imam Abdeljaber, Hikmat A. M. Eswaran, Malathi Nazeer, Jabeen Computer Science and Engineering Acharya Institute of Technology Bangalore India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India Department of Electronics and Communication Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram AP Guntur 522502 India College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science Faculty of Information Technology Applied Science Private University Amman Jordan MEU Research Unit Middle East University Amman 11831 Jordan Department of Computer Technology Kongu Engineering College Perundurai Tamil Nadu Erode India
In human life, skin cancer is a curse. If not appropriately diagnosed, it spreads around all body parts in the earlier stage. The melanoma skin cancer death rate is 75% all over the world. There is an urgent need for ... 详细信息
来源: 评论
Adaptive Varying Contention Window MAC Protocol Based on Underwater Acoustic Propagation Delay
收藏 引用
IEEE Sensors Journal 2023年 第13期23卷 15019-15031页
作者: Guo, Yongan Obaidat, Mohammad S. Guo, Jing Wu, Tin-Yu Tey, Fu Jie Engineering Research Center of Health Service System Based on Ubiquitous Wireless Networks Ministry of Education College of Telecommunications and Information Engineering Nanjing210003 China The King Abdullah II School of Information Technology University of Jordan Amman11942 Jordan The School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China Amity University UP Noida201301 India Nanjing University of Posts and Telecommunications College of Telecommunications and Information Engineering Nanjing210003 China National Pingtung University of Science and Technology Department of Management Information Systems Pingtung912301 Taiwan National Taiwan University of Science and Technology Department of Electrical Engineering Taipei106335 Taiwan
Underwater acoustic wave propagation time delay and fluctuations are much greater than radio waves. However, many of the protocols used for underwater acoustic networking and communication are designed according to th... 详细信息
来源: 评论
Real-Time Web Application to Classify Diabetic Foot Ulcer  14
Real-Time Web Application to Classify Diabetic Foot Ulcer
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Nandi, Souhrid Anurag, Apoorva Mayya, Veena Jeganathan, Jayakumar Manipal Academy of Higher Education Manipal Institute of Technology Department of Computer Science & Engineering Technology Karnataka Manipal India Manipal Academy of Higher Education Manipal Institute of Technology Department of Information & Communication Technology Karnataka Manipal India Manipal Academy of Higher Education Kasturba Medical College Dept. of Medicine Karnataka Mangalore India
Diabetic foot ulcers are one of the major complications of type 2 diabetes and can result in gangrene and amputation if left untreated. Early detection and treatment are essential for reducing the risk of amputation. ... 详细信息
来源: 评论
Security Enhancement Using Blockchain for Internet of Things  11th
Security Enhancement Using Blockchain for Internet of Things
收藏 引用
11th International Conference on Intelligent Computing and Applications, ICRTC 2023
作者: Dhamodaran, S. Talukdar, Veera Ramesh, J.V.N. Sardana, Kamal Talukdar, Suryansh Bhaskar Sathappan, S. Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India RNB Global University Rajasthan Bikaner India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Guntur Vaddeswaram India Department of Electronics and Communication Engineering Technological Institute of Textile and Sciences Haryana Bhiwani India School of Computer Science and Engineering VIT Bhopal Madhya Pradesh Bhopal India Department of Information Technology Chaitanya Bharathi Institute of Technology Andhra Pradesh Hyderabad Gandipet India
This research concentrates on the security concerns raised by the IoT. There have been many research conducted on the topic of security;however, the issue with these studies is that they are not particularly effective... 详细信息
来源: 评论
Improving Tomato Disease Diagnosis Through ResNet50: An Innovative Approach  4
Improving Tomato Disease Diagnosis Through ResNet50: An Inno...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Dhamotharan, R. Raj, J. Relin Francis Krishnan, R. Santhana Kavitha, S. Soundiraraj, N. Kumar, V. Vinoth Kalasalingam Academy of Research and Education Department of Computer Science and Information Technology Krishnankoil India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Electronics and Communication Engineering Chennai India Scad College of Engineering and Technology Department of Electronics and Communication Engineering Cheranmahadevi India Velammal College of Engineering and Technology Department of Computer Science and Engineering Madurai India Psna College of Engineering and Technology Department of Electrical and Electronics Engineering Dindigul India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India
Tomato crops are vulnerable to numerous diseases that can severely affect both yield and quality. Early and precise identification of these diseases is indispensable for implementing active management and intervention... 详细信息
来源: 评论
Seastar: A Cache-Efficient and Load-Balanced Key-Value Store on Disaggregated Memory
Seastar: A Cache-Efficient and Load-Balanced Key-Value Store...
收藏 引用
2024 IEEE International Conference on Cluster Computing, CLUSTER 2024
作者: Du, Jingwen Wang, Fang Feng, Dan Zeng, Dexin Yi, Sheng Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System China School of Computer Science and Technology Huazhong University of Science and Technology China Shenzhen Huazhong University of Science and Technology Research Institute China
In modern datacenters, memory disaggregation un-packs monolithic servers to build independent network-connected compute and memory pools, greatly improving resource uti-lization. Existing memory-disaggregated key-valu... 详细信息
来源: 评论
Integrity of Code and IoT Validation of Resource Utilization in Micro Control Unit
Integrity of Code and IoT Validation of Resource Utilization...
收藏 引用
2023 International Conference on New Frontiers in Communication, Automation, Management and Security, ICCAMS 2023
作者: Kushwaha, Ritesh Kumar Ravikumar, Parimi Lvd Mohammed, Muzammil H Sasthi Kumar, C. Chandigarh University Department of Electronics & Communication Engineering Punjab Mohali India Shri Vishnu Engineering College for Women Deparmnent of Information Technology Bhimavaram India Taif University Department of Information Technology Taif Saudi Arabia Karpagam Academy of Higher Education Department of Computer Science Coimbatore India
Cybersecurity for the Internet of Things is gaining more and more attention as the number of IoT devices has increased and the number of attack stargeting these devices continues to grow exponentially. However, the si... 详细信息
来源: 评论
Enforcing Social Distancing with YOLO Algorithm Utilizing Object-to-Object Distance  24
Enforcing Social Distancing with YOLO Algorithm Utilizing Ob...
收藏 引用
24th International Arab Conference on information technology, ACIT 2023
作者: Irsan, Muhamad Hassan, Rosilah Abdali, Taj-Aldeen Naser Ishak, Mohamad Khairi School of Computing Telkom University Bandung Indonesia College of Engineering and Information Technology Ajman University Department of Information Technology United Arab Emirates University of Misan Faculty of Basic Education Misan62001 Iraq Ajman University Department of Electrical and Computer Engineering Ajman United Arab Emirates
Instances of COVID-19 transmission occur daily due to individuals failing to maintain distance or engaging in physical contact with others who may be contaminated with the virus. To mitigate this issue, this study has... 详细信息
来源: 评论