咨询与建议

限定检索结果

文献类型

  • 42,265 篇 会议
  • 20,833 篇 期刊文献
  • 695 册 图书

馆藏范围

  • 63,793 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 38,727 篇 工学
    • 27,563 篇 计算机科学与技术...
    • 22,097 篇 软件工程
    • 11,054 篇 信息与通信工程
    • 6,592 篇 控制科学与工程
    • 4,996 篇 电气工程
    • 4,761 篇 电子科学与技术(可...
    • 4,560 篇 生物工程
    • 3,488 篇 生物医学工程(可授...
    • 2,798 篇 光学工程
    • 2,770 篇 机械工程
    • 2,193 篇 仪器科学与技术
    • 2,100 篇 动力工程及工程热...
    • 1,916 篇 网络空间安全
    • 1,816 篇 安全科学与工程
    • 1,739 篇 化学工程与技术
    • 1,529 篇 交通运输工程
  • 20,611 篇 理学
    • 10,786 篇 数学
    • 5,963 篇 物理学
    • 5,140 篇 生物学
    • 3,510 篇 统计学(可授理学、...
    • 2,513 篇 系统科学
    • 1,927 篇 化学
  • 10,981 篇 管理学
    • 6,977 篇 管理科学与工程(可...
    • 4,448 篇 图书情报与档案管...
    • 3,156 篇 工商管理
  • 3,725 篇 医学
    • 3,101 篇 临床医学
    • 2,733 篇 基础医学(可授医学...
    • 1,669 篇 公共卫生与预防医...
    • 1,648 篇 药学(可授医学、理...
  • 1,899 篇 法学
    • 1,509 篇 社会学
  • 1,172 篇 经济学
  • 925 篇 农学
  • 756 篇 教育学
  • 353 篇 文学
  • 176 篇 军事学
  • 117 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 1,637 篇 accuracy
  • 1,604 篇 computer science
  • 1,561 篇 deep learning
  • 1,472 篇 feature extracti...
  • 1,425 篇 machine learning
  • 1,232 篇 computational mo...
  • 1,056 篇 training
  • 974 篇 internet of thin...
  • 866 篇 information tech...
  • 860 篇 data mining
  • 839 篇 artificial intel...
  • 830 篇 support vector m...
  • 770 篇 optimization
  • 760 篇 wireless sensor ...
  • 743 篇 predictive model...
  • 686 篇 real-time system...
  • 643 篇 security
  • 631 篇 convolutional ne...
  • 593 篇 protocols
  • 586 篇 cloud computing

机构

  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 280 篇 faculty of scien...
  • 275 篇 department of ph...
  • 264 篇 department of ph...
  • 262 篇 department of co...
  • 261 篇 departamento de ...
  • 259 篇 faculté des scie...
  • 241 篇 department of ph...
  • 225 篇 department for p...
  • 221 篇 department of ph...
  • 219 篇 department of ph...
  • 216 篇 physics division...
  • 216 篇 department of ph...
  • 197 篇 department of ph...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 162 篇 department of co...
  • 157 篇 department of co...
  • 154 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 260 篇 m. rijssenbeek
  • 254 篇 s. jin
  • 252 篇 g. gaudio
  • 244 篇 d. guest
  • 243 篇 y. tayalati
  • 217 篇 s. mohapatra
  • 207 篇 f. marroquim

语言

  • 60,716 篇 英文
  • 2,276 篇 其他
  • 797 篇 中文
  • 51 篇 日文
  • 11 篇 斯洛文尼亚文
  • 9 篇 法文
  • 8 篇 德文
  • 4 篇 朝鲜文
  • 3 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Department of Information Engineering and Computer Technology"
63793 条 记 录,以下是111-120 订阅
排序:
A geometric-approach based Combinatorial Transformative Scalogram analysis for multiclass identification of pathologies in a voice signal
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Khumukcham, Ranita Nongmeikapam, Kishorjit Department of Electronics and Communication Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India Department of Computer Science and Engineering Indian Institute of Information Technology Mantripukhri Manipur Imphal795002 India
Many researchers have preferred non-invasive techniques for recognizing the exact type of physiological abnormality in the vocal tract by training machine learning algorithms with feature descriptors extracted from th... 详细信息
来源: 评论
Hybrid Sampling Technique for Imbalanced Android Malware Family Classification
收藏 引用
SN computer Science 2025年 第3期6卷 1-16页
作者: Chauhan, Kshamta Gandotra, Ekta Department of Computer Science and Engineering and Information Technology Jaypee University of Information Technology Waknaghat Himachal Pradesh Solan India
The rapid explosion of Android-based devices has led to a disturbing surge in the volume and sophistication of Android malware. Effective classification of these malicious applications is essential for safeguarding us... 详细信息
来源: 评论
Multiclass Classification for Cyber Threats Detection on Twitter
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3853-3866页
作者: Adnan Hussein Abdulwahab Ali Almazroi College of Computer Science and Engineering Department of Computer ScienceAL-Ahgaff UniversityMukallaYemen College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddahSaudi Arabia
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ... 详细信息
来源: 评论
Hybrid Approach for Cost Efficient Application Placement in Fog-Cloud Computing Environments
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4127-4148页
作者: Abdulelah Alwabel Chinmaya Kumar Swain Department of Computer Sciences College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Engineering Institute of Management and Information TechnologyCuttackBPUTOdishaIndia
Fog computing has recently developed as a new paradigm with the aim of addressing time-sensitive applications better than with cloud computing by placing and processing tasks in close proximity to the data ***,the maj... 详细信息
来源: 评论
Hybrid Deep Learning Approach for Automating App Review Classification:Advancing Usability Metrics Classification with an Aspect-Based Sentiment Analysis Framework
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 949-976页
作者: Nahed Alsaleh Reem Alnanih Nahed Alowidi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computer Science and EngineeringUniversity of HailHail81451Saudi Arabia
App reviews are crucial in influencing user decisions and providing essential feedback for developers to improve their *** the analysis of these reviews is vital for efficient review *** traditional machine learning(M... 详细信息
来源: 评论
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
收藏 引用
computer Modeling in engineering & Sciences 2024年 第5期139卷 2117-2137页
作者: Ahmed Barnawi Krishan Kumar Neeraj Kumar Bander Alzahrani Amal Almansour Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyDeemed to be UniversityPatialaIndia
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w... 详细信息
来源: 评论
An Ophthalmic Evaluation of Central Serous Chorioretinopathy
收藏 引用
computer Systems Science & engineering 2023年 第1期44卷 613-628页
作者: L.K.Shoba P.Mohan Kumar Department of Information Technology Jeppiaar Engineering CollegeChennai600119India Department of Computer Science and Engineering Sri Krishna College of Engineering and TechnologyCoimbatore641008India
Nowadays in the medicalfield,imaging techniques such as Optical Coherence Tomography(OCT)are mainly used to identify retinal *** this paper,the Central Serous Chorio Retinopathy(CSCR)image is analyzed for various stag... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Video forgery localization using inter-frame denoising and intra-frame segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Banerjee, Debanik Chittaragi, Nagaratna B. Koolagudi, Shashidhar G. Department of Computer Science and Engineering National Institute of Technology Karnataka Karnataka Surathkal575025 India Department of Information Science and Engineering Siddaganaga Institute of Technology Karnataka Tumkur572103 India
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video... 详细信息
来源: 评论
An Advanced Dynamic Scheduling for Achieving Optimal Resource Allocation
收藏 引用
computer Systems Science & engineering 2023年 第1期44卷 281-295页
作者: R.Prabhu S.Rajesh Department of Computer Science and Engineering AAA College of Engineering and TechnologySivakasiTamilnaduIndia Department of Information Technology Mepco Schlenk Engineering College SivakasiTamilnadu India
Cloud computing distributes task-parallel among the various *** with self-service supported and on-demand service have rapid *** these applications,cloud computing allocates the resources dynami-cally via the internet... 详细信息
来源: 评论