咨询与建议

限定检索结果

文献类型

  • 60,784 篇 会议
  • 27,107 篇 期刊文献
  • 961 册 图书
  • 1 篇 学位论文

馆藏范围

  • 88,853 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 53,197 篇 工学
    • 36,325 篇 计算机科学与技术...
    • 28,966 篇 软件工程
    • 16,150 篇 信息与通信工程
    • 8,807 篇 控制科学与工程
    • 8,158 篇 电子科学与技术(可...
    • 7,722 篇 电气工程
    • 5,958 篇 生物工程
    • 4,766 篇 生物医学工程(可授...
    • 4,071 篇 光学工程
    • 3,763 篇 机械工程
    • 3,365 篇 仪器科学与技术
    • 3,122 篇 动力工程及工程热...
    • 2,602 篇 网络空间安全
    • 2,515 篇 化学工程与技术
    • 2,437 篇 安全科学与工程
    • 2,108 篇 材料科学与工程(可...
    • 2,050 篇 交通运输工程
  • 28,374 篇 理学
    • 14,414 篇 数学
    • 9,084 篇 物理学
    • 6,718 篇 生物学
    • 4,712 篇 统计学(可授理学、...
    • 3,202 篇 系统科学
    • 2,785 篇 化学
  • 14,128 篇 管理学
    • 9,109 篇 管理科学与工程(可...
    • 5,616 篇 图书情报与档案管...
    • 4,155 篇 工商管理
  • 4,973 篇 医学
    • 4,125 篇 临床医学
    • 3,651 篇 基础医学(可授医学...
    • 2,261 篇 公共卫生与预防医...
    • 2,183 篇 药学(可授医学、理...
  • 2,490 篇 法学
  • 1,558 篇 经济学
  • 1,220 篇 农学
  • 973 篇 教育学
  • 469 篇 文学
  • 253 篇 军事学
  • 141 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 2,433 篇 accuracy
  • 2,118 篇 deep learning
  • 2,024 篇 feature extracti...
  • 1,842 篇 computer science
  • 1,806 篇 machine learning
  • 1,684 篇 computational mo...
  • 1,520 篇 internet of thin...
  • 1,424 篇 training
  • 1,234 篇 real-time system...
  • 1,170 篇 support vector m...
  • 1,166 篇 wireless sensor ...
  • 1,163 篇 optimization
  • 1,116 篇 artificial intel...
  • 1,064 篇 predictive model...
  • 1,020 篇 data mining
  • 1,018 篇 wireless communi...
  • 983 篇 information tech...
  • 965 篇 convolutional ne...
  • 860 篇 bandwidth
  • 834 篇 security

机构

  • 624 篇 maharishi school...
  • 351 篇 department of co...
  • 275 篇 department of ph...
  • 263 篇 department of ph...
  • 257 篇 faculté des scie...
  • 253 篇 faculty of scien...
  • 249 篇 department of in...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 210 篇 department of ph...
  • 207 篇 departamento de ...
  • 207 篇 department of co...
  • 198 篇 department of ph...
  • 195 篇 maharishi school...
  • 186 篇 department of co...
  • 181 篇 department of el...
  • 171 篇 department of ph...
  • 170 篇 department of co...
  • 161 篇 department for p...
  • 158 篇 department of ph...

作者

  • 301 篇 leonard barolli
  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 265 篇 f. siegert
  • 265 篇 a. c. könig
  • 261 篇 h. a. gordon
  • 260 篇 m. klein
  • 260 篇 r. ströhmer
  • 255 篇 h. sakamoto
  • 245 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 225 篇 d. guest
  • 223 篇 s. jin
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 76,838 篇 英文
  • 10,826 篇 其他
  • 1,162 篇 中文
  • 118 篇 日文
  • 23 篇 斯洛文尼亚文
  • 21 篇 德文
  • 19 篇 法文
  • 13 篇 朝鲜文
  • 5 篇 俄文
  • 3 篇 土耳其文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 捷克文
检索条件"机构=Department of Computer and Communication Engineering and Department of Information Technology"
88853 条 记 录,以下是651-660 订阅
排序:
A hybrid convolutional neural network and support vector machine classifier for Amharic character recognition
收藏 引用
Neural Computing and Applications 2024年 第27期36卷 16839-16856页
作者: Tsegaye, Muluken Zemed Shashi, Mogalla Department of Information Technology Andhra University College of Engineering AP Visakhapatnam530003 India Department of Computer Science Andhra University College of Engineering AP Visakhapatnam530003 India
Optical character recognition is a way of converting scanned images of printed or handwritten documents into machine-encoded text, making it easier to store, browse, retrieve, and process electronic data. In this rese... 详细信息
来源: 评论
Disparity Computation With Low Intensity Quantization on Stereo Image Pairs
IEEE Transactions on Computational Imaging
收藏 引用
IEEE Transactions on Computational Imaging 2024年 10卷 318-328页
作者: Lin, Huei-Yung Hsu, Tsai-Yu National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan National Chung Cheng University Department of Electrical Engineering Minhsiung621301 Taiwan
From variate bit-rate stereo matching, it is observed that the image pair with a low intensity quantization level is still capable of providing good disparity maps. In this article, a mathematical model representing t... 详细信息
来源: 评论
An efficient Manuka honey purity classification technique with FSVM
An efficient Manuka honey purity classification technique wi...
收藏 引用
2024 IEEE International Conference on Computing, Applications and Systems, COMPAS 2024
作者: Huma, Shafia Nur Akter, Sabrina Akter, Subrina Nafisa, Nuren Patwary, M. Jamshed Alam International Islamic University Chittagong Department of Computer Science and Engineering Chittagong Bangladesh Chittagong University of Engineering and Technology Institute of Information and Communication Technology Chittagong Bangladesh
Manuka honey is renowned for its exceptional medicinal properties in healing wound infections and other conditions. Due to its high cost, this honey is a common target for fraud. Several machine-learning techniques ar... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
Preserving friendly stacking and weighted shadows in selective scalable secret image sharing
收藏 引用
Multimedia Tools and Applications 2023年 第19期82卷 29283-29305页
作者: Lee, Jung-San Chen, Yin-Chin Hsieh, Yun-Hao Chang, Shih-Hao Huynh, Ngoc-Tu Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Department of Information Technology Ton Duc Thang University Ho Chi Minh City Viet Nam
With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of secret image sharing. The region of interest (ROI) in the protected s... 详细信息
来源: 评论
Abnormal Activity Detection and Classification of Bus Passengers with In-Vehicle Image Sensing
收藏 引用
IEEE Access 2024年 12卷 23057-23065页
作者: Lin, Huei-Yung Tseng, Chun-Han National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106 Taiwan National Chung Cheng University Department of Electrical Engineering Chiayi621 Taiwan
As the self-driving technology is getting mature for public transportation applications, the safety concern of onboard passengers has become an important issue. It is essential to identify inappropriate or hazardous b... 详细信息
来源: 评论
Design and Analysis of a UWB Slotted Vivaldi Antenna for Microwave Imaging Applications
收藏 引用
IEIE Transactions on Smart Processing and Computing 2023年 第4期12卷 350-357页
作者: Paul, Liton Chandra Majumder, Akash Rani, Tithi Hossain, Md. Najmul Rahim, Md. Abdur Shin, Jungpil Yun, Keun Soo Department of Electrical Electronic and Communication Engineering Faculty of Engineering and Technology Pabna University of Science and Technology Pabna6600 Bangladesh Department of Electronics & Telecommunication Engineering Faculty of Electrical & Computer Engineering Rajshahi University of Engineering & Technology Rajshahi6204 Bangladesh Department of Computer Science and Engineering Faculty of Engineering and Technology Pabna University of Science and Technology Pabna6600 Bangladesh School of Computer Science and Engineering The University of Aizu / Fukushima Aizuwakamatsu965-8580 Japan School of Computer and Information Technology Ulsan College / Dong-gu Ulsan44610 Korea Republic of
An ultra-wideband (UWB) slotted compact Vivaldi antenna with a microstrip line feed was evaluated for microwave imaging (MI) applications. The recommended FR4 substrate-based Vivaldi antenna is 50×50×1.5 mm3... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Speech cryptography algorithms: utilizing frequency and time domain techniques merging
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第10期15卷 3617-3649页
作者: Faragallah, Osama S. Farouk, M. El-sayed, Hala S. El-bendary, Mohsen A. M. Department of Information Technology College of Computers and Information Technology Taif University Al- Hawiya21974 Saudi Arabia Department of Computer Science and Engineering Menoufia University Menouf32952 Egypt Department of Electrical Engineering Menoufia University Shebin El-kom32511 Egypt Department of Electronics Technology Faculty of Technology and Education Helwan University Cairo Egypt
Due to the importance security of sensitive speech and audio signals such as the countries president’s call phone, this research work presents an efficient audio cryptosystem. Audio speech communications play main an... 详细信息
来源: 评论
Progressive secret image sharing based on Boolean operations and polynomial interpolations
收藏 引用
Multimedia Systems 2024年 第4期30卷 1-14页
作者: Chen, Hao Xiong, Lizhi Yang, Ching-Nung School of Computer Science Nanjing University of Information Science and Technology Jiangsu Nanjing China Department of Computer Science & amp Information Engineering National Dong Hwa University Hualien Taiwan
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image sharing... 详细信息
来源: 评论