咨询与建议

限定检索结果

文献类型

  • 201,413 篇 会议
  • 98,228 篇 期刊文献
  • 2,370 册 图书

馆藏范围

  • 302,011 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,921 篇 工学
    • 116,802 篇 计算机科学与技术...
    • 94,063 篇 软件工程
    • 45,139 篇 信息与通信工程
    • 27,880 篇 控制科学与工程
    • 25,144 篇 电子科学与技术(可...
    • 24,576 篇 电气工程
    • 19,385 篇 生物工程
    • 15,128 篇 生物医学工程(可授...
    • 14,728 篇 光学工程
    • 13,010 篇 机械工程
    • 11,113 篇 化学工程与技术
    • 10,583 篇 仪器科学与技术
    • 9,642 篇 动力工程及工程热...
    • 8,960 篇 材料科学与工程(可...
    • 6,543 篇 网络空间安全
    • 6,412 篇 安全科学与工程
    • 6,035 篇 交通运输工程
  • 102,585 篇 理学
    • 49,523 篇 数学
    • 35,733 篇 物理学
    • 22,068 篇 生物学
    • 15,830 篇 统计学(可授理学、...
    • 11,564 篇 化学
    • 11,153 篇 系统科学
  • 45,941 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,438 篇 图书情报与档案管...
    • 12,900 篇 工商管理
  • 14,792 篇 医学
    • 12,382 篇 临床医学
    • 10,878 篇 基础医学(可授医学...
    • 6,776 篇 药学(可授医学、理...
  • 7,981 篇 法学
    • 6,437 篇 社会学
  • 5,121 篇 经济学
  • 4,114 篇 农学
  • 3,261 篇 教育学
  • 1,413 篇 文学
  • 761 篇 军事学
  • 445 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,102 篇 accuracy
  • 6,762 篇 feature extracti...
  • 6,039 篇 deep learning
  • 5,865 篇 computational mo...
  • 5,334 篇 machine learning
  • 5,244 篇 training
  • 4,119 篇 data mining
  • 3,880 篇 support vector m...
  • 3,681 篇 optimization
  • 3,533 篇 predictive model...
  • 3,441 篇 wireless sensor ...
  • 3,405 篇 internet of thin...
  • 3,151 篇 real-time system...
  • 3,146 篇 artificial intel...
  • 3,130 篇 convolutional ne...
  • 3,029 篇 neural networks
  • 2,875 篇 bandwidth
  • 2,868 篇 computer archite...
  • 2,861 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,346 篇 department of co...
  • 1,157 篇 university of ch...
  • 1,050 篇 physikalisches i...
  • 1,041 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 810 篇 department of el...
  • 783 篇 infn sezione di ...
  • 715 篇 school of comput...
  • 629 篇 department of el...
  • 617 篇 department of co...
  • 612 篇 infn sezione di ...
  • 552 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 503 篇 school of comput...
  • 488 篇 university of sc...

作者

  • 247 篇 j. wang
  • 244 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 209 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 184 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 282,019 篇 英文
  • 15,344 篇 其他
  • 4,490 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 46 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and Engineering & Information Technology"
302011 条 记 录,以下是31-40 订阅
排序:
A Package Level Regression Test Selection Approach for Java Software Systems
收藏 引用
IEEE Access 2025年 13卷 87848-87861页
作者: Al-Refai, Mohammed Hammad, Mahmoud M. Jordan University of Science and Technology Faculty of Computer and Information Technology Computer Science Department Irbid22110 Jordan Faculty of Engineering and Information Technology Ajman United Arab Emirates Jordan University of Science and Technology Faculty of Computer and Information Technology Software Engineering Department Irbid22110 Jordan
Regression testing of software systems is an important and critical activity yet expensive and resource-intensive. An approach to enhance its efficiency is Regression Test Selection (RTS), which selectively re-execute... 详细信息
来源: 评论
Facial Sentiment Analysis Using Convolutional Neural Network and Fuzzy Systems
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第12期48卷 15-32页
作者: Kadhim, Ahmed R. Khudeyer, Raidah S. Alabbas, Maytham Department of Computer Information System College of Computer Science and Information Technology University of Basrah Basrah Iraq Department of Computer Science College of Computer Science and Information Technology University of Basrah Basrah Iraq
This study provides a detailed study of a Сonvolutional Neural Network (СNN) model optimized for facial eхpression recognition with Fuzzy logic using Fuzzy2DPooling and Fuzzy Neural Networks (FNN), and discusses da... 详细信息
来源: 评论
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 20219-20247页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论
Hybrid CatBoost and SVR Model for Earthquake Prediction Using the LANL Earthquake Dataset
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第14期49卷 93-110页
作者: Kaushal, Arush Gupta, Ashok Kumar Sehgal, Vivek Kumar Department of Computer Science and Information Technology Jaypee University of Information Technology Solan171234 India Department of Civil Engineering Jaypee University of Information Technology Solan171234 India
Earthquakes have the potential to cause catastrophic structural and economic damage. This research explores the application of machine learning for earthquake prediction using LANL (Los Alamos National Laboratory) dat... 详细信息
来源: 评论
NeurDB: an AI-powered autonomous data system
收藏 引用
science China(information sciences) 2024年 第10期67卷 129-150页
作者: Beng Chin OOI Shaofeng CAI Gang CHEN Yanyan SHEN Kian-Lee TAN Yuncheng WU Xiaokui XIAO Naili XING Cong YUE Lingze ZENG Meihui ZHANG Zhanhao ZHAO School of Computing National University of Singapore College of Computer Science and Technology Zhejiang University Department of Computer Science and Engineering Shanghai Jiao Tong University School of Information Renmin University of China School of Computer Science and Technology Beijing Institute of Technology
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,... 详细信息
来源: 评论
Vision-based Robotic Arm in Defect Detection and Object Classification Applications
收藏 引用
Sensors and Materials 2024年 第2期36卷 655-670页
作者: Lin, Cheng-Jian Jhang, Jyun-Yu Gao, Yi-Jyun Huang, Hsiu-Mei Department of Computer Science & Information Engineering National Chin-Yi University of Technology Taichung411 Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung404 Taiwan Department of Information Management National Taichung University of Science and Technology Taichung404 Taiwan
Robotic arms have been widely used in industrial fields. However, researchers have seldom considered the factors affecting the actual factory environment. For example, when objects are conveyed in a factory, conveyor ... 详细信息
来源: 评论
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3467-3497页
作者: Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya Department of Computer Engineering College of Computer ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... 详细信息
来源: 评论
Monitoring COVID-19 environment: a real-time facial mask detection using YOLO models
收藏 引用
Research on Biomedical engineering 2025年 第1期41卷 1-18页
作者: Pandiyan, P. Thangaraj, Rajasekaran V, Balasubramanian V. K, Manavalasundaram S, Balakrishnan Department of Electrical and Electronics Engineering KPR Institute of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Nandha Engineering College Erode India Department of Information Technology Velalar College of Engineering and Technology Erode India Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Chennai India Department of Computer Science and Engineering Sri Ramakrishna Institute of Technology Coimbatore India
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ... 详细信息
来源: 评论
Privacy-preserving filtering, control and optimization for industrial cyber-physical systems
收藏 引用
science China(information sciences) 2025年 第4期68卷 267-283页
作者: Derui DING Qing-Long HAN Xiaohua GE Xian-Ming ZHANG Jun WANG Department of Control Science and Engineering University of Shanghai for Science and Technology School of Engineering Swinburne University of Technology Department of Computer Science City University of Hong Kong
Industrial cyber-physical systems closely integrate physical processes with cyberspace, enabling real-time exchange of various information about system dynamics, sensor outputs, and control decisions. The connection b... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing Algorithm
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论