咨询与建议

限定检索结果

文献类型

  • 113,818 篇 会议
  • 52,364 篇 期刊文献
  • 1,512 册 图书

馆藏范围

  • 167,694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,670 篇 工学
    • 65,671 篇 计算机科学与技术...
    • 53,181 篇 软件工程
    • 25,404 篇 信息与通信工程
    • 16,349 篇 控制科学与工程
    • 14,492 篇 电气工程
    • 13,814 篇 电子科学与技术(可...
    • 11,796 篇 生物工程
    • 9,390 篇 生物医学工程(可授...
    • 8,407 篇 光学工程
    • 6,948 篇 机械工程
    • 5,944 篇 化学工程与技术
    • 5,839 篇 动力工程及工程热...
    • 5,609 篇 仪器科学与技术
    • 4,932 篇 材料科学与工程(可...
    • 4,510 篇 网络空间安全
    • 4,161 篇 安全科学与工程
  • 56,726 篇 理学
    • 27,071 篇 数学
    • 19,452 篇 物理学
    • 13,389 篇 生物学
    • 8,828 篇 统计学(可授理学、...
    • 6,392 篇 化学
    • 6,322 篇 系统科学
  • 25,902 篇 管理学
    • 16,142 篇 管理科学与工程(可...
    • 10,795 篇 图书情报与档案管...
    • 7,588 篇 工商管理
  • 9,366 篇 医学
    • 7,800 篇 临床医学
    • 7,051 篇 基础医学(可授医学...
    • 4,365 篇 药学(可授医学、理...
    • 4,086 篇 公共卫生与预防医...
  • 4,910 篇 法学
    • 3,999 篇 社会学
  • 3,019 篇 经济学
  • 2,432 篇 农学
  • 1,609 篇 教育学
  • 864 篇 文学
  • 361 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,963 篇 accuracy
  • 4,245 篇 deep learning
  • 3,954 篇 feature extracti...
  • 3,595 篇 machine learning
  • 3,537 篇 computational mo...
  • 3,112 篇 training
  • 2,518 篇 support vector m...
  • 2,403 篇 convolutional ne...
  • 2,365 篇 internet of thin...
  • 2,301 篇 real-time system...
  • 2,299 篇 predictive model...
  • 2,138 篇 optimization
  • 1,960 篇 artificial intel...
  • 1,905 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,690 篇 neural networks
  • 1,608 篇 computer archite...
  • 1,574 篇 security
  • 1,537 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 928 篇 department of co...
  • 840 篇 department of el...
  • 740 篇 university of ch...
  • 680 篇 department of el...
  • 676 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 557 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 211 篇 g. spigo

语言

  • 155,812 篇 英文
  • 10,056 篇 其他
  • 1,867 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering and Infotmation Technology"
167694 条 记 录,以下是191-200 订阅
排序:
Automatic Transportation Mode Classification Using a Deep Reinforcement Learning Approach With Smartphone Sensors
收藏 引用
IEEE Access 2024年 12卷 514-533页
作者: Taherinavid, Siavash Moravvej, Seyed Vahid Chen, Yen-Lin Yang, Jing Ku, Chin Soon Yee, Por Lip Iran University of Science and Technology School of Civil Engineering Tehran13114-16846 Iran Isfahan University of Technology Department of Electrical and Computer Engineering Isfahan84156-83111 Iran National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The increasing dependence on smartphones with advanced sensors has highlighted the imperative of precise transportation mode classification, pivotal for domains like health monitoring and urban planning. This research... 详细信息
来源: 评论
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1205-1222页
作者: Jungpil Shin Md.AlMehedi Hasan Md.Maniruzzaman Taiki Watanabe Issei Jozume School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... 详细信息
来源: 评论
Aggregated Relative Similarity (ARS): a novel similarity measure for improved personalised learning recommendation using hybrid filtering approach
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 18733-18780页
作者: Pal, Saurabh Dutta Pramanik, Pijush Kanti Choudhury, Prasenjit Department of Computer Science and Engineering National Institute of Technology Durgapur West Bengal Durgapur India School of Computer Applications and Technology Galgotias University Uttar Pradesh Greater Noida India Department of Computer Science and Engineering School of Engineering Brainware University Kolkata India
To improve the effectiveness of online learning, the learning materials recommendation is required to be personalised to the learner material recommendations must be personalized to learners. The existing approaches a... 详细信息
来源: 评论
Deep Learning Based Signal Detection for Quadrature Spatial Modulation System
收藏 引用
China Communications 2024年 第10期21卷 78-85页
作者: Shu Dingyun Peng Yuyang Yue Ming Fawaz AL-Hazemi Mohammad Meraj Mirza School of Computer Science and Engineering Macao University of Science and TechnologyMacaoChina Department of Computer and Network Engineering University of JeddahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning
收藏 引用
Journal of Internet technology 2024年 第3期25卷 455-463页
作者: Ho, Wen-Jen Hsieh, Hsin-Yuan Tsai, Chia-Wei Software Technology Institute Institute for Information Industry Taiwan Department of Computer Science and Information Engineering National Taitung University Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taiwan
In Taiwan, the current electricity prices for residential users remain relatively low. This results in a diminished incentive for these users to invest in energy-saving improvements. Consequently, devising strategies ... 详细信息
来源: 评论
Artificial Intelligence and Natural Language Processing Inspired Chabot Technologies
收藏 引用
Recent Advances in computer science and Communications 2024年 第1期17卷 11-20页
作者: Singh, Deepti Manju Jatain, Aman Netaji Subhash Institute of Technology New Delhi India Department of Computer Science and Engineering & Information Technology Jaypee Institute of Information Technology Noida India Department of Computer Science and Engineering Amity University Haryana India
Chatbots use artificial intelligence (AI) and natural language processing (NLP) algorithms to construct a clever system. By copying human connections in the most helpful way possi-ble, chatbots emulate individuals and... 详细信息
来源: 评论
Power synchronization: taming massive diversified serverless functions under power constraints
收藏 引用
science China(Information sciences) 2025年 第3期68卷 47-65页
作者: Du LIU Lu ZHANG Yechen XU Xinkai WANG Lingyu SUN Yifei PU Xiaofeng HOU Chao LI Minyi GUO Department of Computer Science and Engineering Shanghai Jiao Tong University AI Chip Center for Emerging Smart Systems The Hong Kong University of Science and Technology
Carbon neutrality has become an important design objective worldwide. However, the on-going shift to cloud-naive era does not necessarily mean energy efficiency. From the perspective of power management, co-hosted ser... 详细信息
来源: 评论
A moment-based pooling approach in convolutional neural networks for breast cancer histopathology image classification
收藏 引用
Neural Computing and Applications 2025年 第2期37卷 1127-1156页
作者: Kumar, Arvind Singh, Chandan Sachan, Manoj Kumar Department of Computer Science and Engineering Sant Longowal Institute of Engineering and Technology Longowal Punjab Sangrur148106 India Department of Computer Science Punjabi University Punjab Patiala147002 India
Automated analysis of breast cancer (BC) histopathology images is a challenging task due to the high resolution, multiple magnifications, color variations, the presence of image artifacts, and morphological variabilit... 详细信息
来源: 评论
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 20219-20247页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论