咨询与建议

限定检索结果

文献类型

  • 33,854 篇 会议
  • 17,991 篇 期刊文献
  • 631 册 图书

馆藏范围

  • 52,476 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32,277 篇 工学
    • 23,428 篇 计算机科学与技术...
    • 18,784 篇 软件工程
    • 9,084 篇 信息与通信工程
    • 5,558 篇 控制科学与工程
    • 4,075 篇 电气工程
    • 3,894 篇 生物工程
    • 3,737 篇 电子科学与技术(可...
    • 2,924 篇 生物医学工程(可授...
    • 2,323 篇 光学工程
    • 2,282 篇 机械工程
    • 1,740 篇 仪器科学与技术
    • 1,732 篇 动力工程及工程热...
    • 1,697 篇 网络空间安全
    • 1,571 篇 安全科学与工程
    • 1,429 篇 化学工程与技术
    • 1,330 篇 交通运输工程
  • 17,290 篇 理学
    • 9,084 篇 数学
    • 4,951 篇 物理学
    • 4,394 篇 生物学
    • 2,942 篇 统计学(可授理学、...
    • 2,060 篇 系统科学
    • 1,597 篇 化学
  • 9,408 篇 管理学
    • 5,930 篇 管理科学与工程(可...
    • 3,860 篇 图书情报与档案管...
    • 2,655 篇 工商管理
  • 3,193 篇 医学
    • 2,645 篇 临床医学
    • 2,333 篇 基础医学(可授医学...
    • 1,461 篇 公共卫生与预防医...
    • 1,379 篇 药学(可授医学、理...
  • 1,631 篇 法学
    • 1,304 篇 社会学
  • 964 篇 经济学
  • 787 篇 农学
  • 620 篇 教育学
  • 290 篇 文学
  • 147 篇 军事学
  • 104 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 1,592 篇 computer science
  • 1,387 篇 deep learning
  • 1,373 篇 accuracy
  • 1,226 篇 machine learning
  • 1,215 篇 feature extracti...
  • 977 篇 computational mo...
  • 874 篇 training
  • 869 篇 internet of thin...
  • 717 篇 support vector m...
  • 714 篇 artificial intel...
  • 696 篇 data mining
  • 617 篇 predictive model...
  • 582 篇 convolutional ne...
  • 579 篇 optimization
  • 566 篇 wireless sensor ...
  • 540 篇 real-time system...
  • 511 篇 cloud computing
  • 509 篇 security
  • 468 篇 information tech...
  • 414 篇 educational inst...

机构

  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 283 篇 faculty of scien...
  • 279 篇 department of co...
  • 275 篇 department of ph...
  • 273 篇 departamento de ...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 258 篇 department for p...
  • 255 篇 department of ph...
  • 250 篇 department of ph...
  • 221 篇 department of ph...
  • 221 篇 department of ph...
  • 216 篇 physics division...
  • 197 篇 department of ph...
  • 162 篇 department of co...
  • 162 篇 department of co...
  • 157 篇 department of co...
  • 156 篇 maharishi school...
  • 154 篇 centre de calcul...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 265 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 261 篇 m. rijssenbeek
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 257 篇 s. jin
  • 256 篇 g. gaudio
  • 248 篇 d. guest
  • 245 篇 s. mohapatra
  • 243 篇 y. tayalati
  • 217 篇 y. nagasaka

语言

  • 49,848 篇 英文
  • 2,017 篇 其他
  • 614 篇 中文
  • 44 篇 日文
  • 10 篇 斯洛文尼亚文
  • 8 篇 法文
  • 6 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science Engineering&Information Technology"
52476 条 记 录,以下是4971-4980 订阅
排序:
TTST: A Top-k Token Selective Transformer for Remote Sensing Image Super-Resolution
收藏 引用
IEEE Transactions on Image Processing 2024年 33卷 738-752页
作者: Xiao, Yi Yuan, Qiangqiang Jiang, Kui He, Jiang Lin, Chia-Wen Zhang, Liangpei Wuhan University School of Geodesy and Geomatics Wuhan430079 China Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China National Tsing Hua University Department of Electrical Engineering The Institute of Communications Engineering Hsinchu300 Taiwan Wuhan University State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan430079 China
Transformer-based method has demonstrated promising performance in image super-resolution tasks, due to its long-range and global aggregation capability. However, the existing Transformer brings two critical challenge... 详细信息
来源: 评论
Anomaly Detection in Univariate Time Series: HOT SAX vesus LSTM-Based Method  12th
Anomaly Detection in Univariate Time Series: HOT SAX vesus L...
收藏 引用
12th EAI International Conference on Context-Aware Systems and Applications, ICCASA 2023
作者: Anh, Duong Tuan Hoai, Tran Long Department of Information Technology HCMC University of Foreign Languages and Information Technology Ho Chi Minh City Viet Nam Faculty of Computer Science and Engineering Ho Chi Minh City University of Technology Ho Chi Minh City Viet Nam
Anomaly detection in time series has been an important and challenging research topic. There have been several methods proposed for detecting anomaly subsequences in a time series. The majority of these methods is cla... 详细信息
来源: 评论
Moving Towards Nano-Devices in the Context of Smart Bio-Tech Wearables
Moving Towards Nano-Devices in the Context of Smart Bio-Tech...
收藏 引用
2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Ranganathaswamy, M.K. Srivastav, Vaibhav Choudhary, Deeksha Department of Mechanical Engineering Faculty of Engineering and Technology Bangalore India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Maharishi School of Engineeing & Technology Maharishi University of Information Technology Uttar Pradesh India
Because of the development of wireless capabilities, the network and, in specific, data centers have become a significant problem in our everyday lives. In order to maximize miniaturization and lower the opportunity b... 详细信息
来源: 评论
Detection and Prevention of Malicious Activities in Vulnerable Network Security Using Deep Learning
Detection and Prevention of Malicious Activities in Vulnerab...
收藏 引用
2024 International Conference on Innovations and Challenges in Emerging Technologies, ICICET 2024
作者: Wadibhasme, Rashmi Nilesh Chaudhari, Arpit U. Khobragade, Prashant Mehta, Hina D. Agrawal, Rahul Dhule, Chetan Yeshwantrao Chavan College of Engineering Departemnt of Information Technology Nagpur India Prof. Ram Meghe Institute of Research Badnera Department of Computer Science and Engineering Amravati India G H Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India Nagpur College of Pharmacy Nagpur India Nagpur India
In the digital age, network security is very important because bad people are always coming up with new ways to break into systems that are weak. Most of the time, standard security methods aren't good enough to f... 详细信息
来源: 评论
Automated Detection of Type 2 Diabetes with Imbalanced and Machine Learning Methods  3rd
Automated Detection of Type 2 Diabetes with Imbalanced and M...
收藏 引用
3rd International Conference on Machine Learning, Image Processing, Network Security and Data sciences, MIND 2021
作者: Anirudh, G. Talukdar, Upasana Department of Data Science and Analytics Central University of Rajasthan Rajasthan Ajmer India Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati Guwahati India
Diabetes mellitus is an abominable disease, if left untreated, may turn fatal. This paper presents rigorous experimentation to ascertain a machine learning model that can implement an accurate diagnosis of diabetes me... 详细信息
来源: 评论
Research and Innovation in Next Generation Security and Privacy in Industry 5.0 Iot  6
Research and Innovation in Next Generation Security and Priv...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Navale, Geeta S. Madala, Ravikiran Managuli, Manjunath Jayalakshmi, N. Kadiravan, G. Rawat, Ruchira Sinhgad Institute of Technology and Science Department of Computer Engineering Maharashtra Pune India Ph.D Information Technology Network and Data Center Engineer University of Cumberlands DurhamNC United States KLS Gogte Institute of Technology Department of Electronics and Communication Engineering Karnataka Belagavi India PSNA College of Engineering and Technology Master of Computer Applications Tamilnadu Dindigul India KL Deemed to Be University Department of Computer Science and Information Technology Andhra Pradsh India Graphic Era Deemed to Be University Department of Computer Science and Engineering Uttrakhand Dehradun India
The objective of the newest manufacturing paradigm, known as 'Industry 5.0,'is to combine human intelligence with cutting-edge technology like the Internet of Things (IoT), artificial intelligence (AI), and ro... 详细信息
来源: 评论
RvXmBlendNet: A Multi-architecture Hybrid Model for Improved Skin Cancer Detection
收藏 引用
Human-Centric Intelligent Systems 2024年 第4期4卷 545-570页
作者: Prity, Farida Siddiqi Hasan, Ahmed Jabid Anik, Md Mehedi Hassan Hossain, Rakib Hossain, Md. Maruf Bhuiyan, Sazzad Hossain Islam, Md. Ariful Lavlu, Md Tousif Hasan Department of Computer Science and Engineering Shanto-Mariam University of Creative Technology Dhaka Bangladesh Department of Information and Communication Engineering Noakhali Science and Technology University Noakhali Bangladesh Department of Information and Communication Engineering Pabna University of Science and Technology Pabna Bangladesh Institute of Information and Communication Technology Bangladesh University of Engineering and Technology Dhaka Bangladesh
Skin cancer, one of the most dangerous cancers, poses a significant global threat. While early detection can substantially improve survival rates, traditional dermatologists often face challenges in accurate diagnosis...
来源: 评论
Enhancing Data Security and Privacy in Cloud Computing: A Survey of Modern Techniques  3
Enhancing Data Security and Privacy in Cloud Computing: A Su...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Suganya, N. Gouthami, P. Sathiya, R. Sivaranjani, S. Murugesan, M. Department of Computer Science and Business Systems Dr. N.G.P. Institute of Technology Coimbatore India Department of Information Technology Thangavelu Engineering College Chennai India Departement of Electrical and Electronics Engineering Sri Krishna College of Engineering and Technology Coimbatore India Departement of Electrical and Electronics Engineering Karpagam Institute of Technology Coimbatore India
A computing system that is based on the internet and offers users all resources as on-demand services. Servers, storage, databases, software, and networking are among these on-demand services. Usually, the user must p... 详细信息
来源: 评论
Assessing a BERT-based model for analyzing subjectivity and classifying academic articles
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90511-90532页
作者: Mehmood, Atif Shahid, Farah Khan, Rizwan Ahmed, Shahzad Ibrahim, Mostafa M. Zheng, Zhonglong School of Computer Science and Technology Zhejiang Normal University Jinhua321002 China Zhejiang Institute of Photoelectronics & Zhejiang Institute for Advanced Light Source Zhejiang Normal University Zhejiang Jinhua321004 China Faculty of Information Technology Beijing University of Technology Beijing100024 China Department of Electrical Engineering Faculty of Engineering Minia University Minia61519 Egypt
The metaverse concept extends beyond virtual worlds and can be applied to collaborative analysis environments. Data analysts worldwide may read academic article extracts in real-time in a shared digital workplace to m... 详细信息
来源: 评论
Customer Prioritization for Medical Supply Chain During COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 59-72页
作者: Iram Mushtaq Muhammad Umer Muhammad Imran Inzamam Mashood Nasir Ghulam Muhammad Mohammad Shorfuzzaman Department of Management Sciences Sir Syed CASE Institute of Technology45230IslamabadPakistan Department of Operation&Supply Chain Management NUST Business SchoolNational University of Sciences&Technology45200IslamabadPakistan Department of Computer Science HITEC University TaxilaTaxilaPakistan Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
During COVID-19,the escalated demand for various pharmaceutical products with the existing production capacity of pharmaceutical companies has stirred the need to prioritize its customers in order to fulfill their ***... 详细信息
来源: 评论