咨询与建议

限定检索结果

文献类型

  • 42,507 篇 会议
  • 21,002 篇 期刊文献
  • 695 册 图书

馆藏范围

  • 64,204 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 39,083 篇 工学
    • 27,810 篇 计算机科学与技术...
    • 22,249 篇 软件工程
    • 11,164 篇 信息与通信工程
    • 6,711 篇 控制科学与工程
    • 5,049 篇 电气工程
    • 4,814 篇 电子科学与技术(可...
    • 4,578 篇 生物工程
    • 3,511 篇 生物医学工程(可授...
    • 2,824 篇 光学工程
    • 2,787 篇 机械工程
    • 2,205 篇 仪器科学与技术
    • 2,106 篇 动力工程及工程热...
    • 1,947 篇 网络空间安全
    • 1,831 篇 安全科学与工程
    • 1,750 篇 化学工程与技术
    • 1,543 篇 交通运输工程
  • 20,733 篇 理学
    • 10,844 篇 数学
    • 6,000 篇 物理学
    • 5,152 篇 生物学
    • 3,526 篇 统计学(可授理学、...
    • 2,511 篇 系统科学
    • 1,945 篇 化学
  • 11,045 篇 管理学
    • 7,016 篇 管理科学与工程(可...
    • 4,473 篇 图书情报与档案管...
    • 3,179 篇 工商管理
  • 3,749 篇 医学
    • 3,120 篇 临床医学
    • 2,748 篇 基础医学(可授医学...
    • 1,690 篇 公共卫生与预防医...
    • 1,649 篇 药学(可授医学、理...
  • 1,905 篇 法学
    • 1,513 篇 社会学
  • 1,178 篇 经济学
  • 934 篇 农学
  • 764 篇 教育学
  • 352 篇 文学
  • 175 篇 军事学
  • 116 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 1,662 篇 accuracy
  • 1,605 篇 computer science
  • 1,600 篇 deep learning
  • 1,481 篇 feature extracti...
  • 1,437 篇 machine learning
  • 1,240 篇 computational mo...
  • 1,062 篇 training
  • 974 篇 internet of thin...
  • 869 篇 information tech...
  • 865 篇 data mining
  • 846 篇 artificial intel...
  • 837 篇 support vector m...
  • 776 篇 optimization
  • 761 篇 wireless sensor ...
  • 752 篇 predictive model...
  • 697 篇 real-time system...
  • 650 篇 convolutional ne...
  • 648 篇 security
  • 593 篇 protocols
  • 590 篇 cloud computing

机构

  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 279 篇 faculty of scien...
  • 275 篇 department of ph...
  • 264 篇 department of ph...
  • 263 篇 departamento de ...
  • 261 篇 department of co...
  • 259 篇 faculté des scie...
  • 240 篇 department of ph...
  • 222 篇 department for p...
  • 221 篇 department of ph...
  • 219 篇 department of ph...
  • 217 篇 department of ph...
  • 216 篇 physics division...
  • 197 篇 department of ph...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 161 篇 department of co...
  • 159 篇 department of co...
  • 154 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 260 篇 m. rijssenbeek
  • 252 篇 s. jin
  • 251 篇 g. gaudio
  • 244 篇 d. guest
  • 243 篇 y. tayalati
  • 217 篇 s. mohapatra
  • 207 篇 f. marroquim

语言

  • 59,730 篇 英文
  • 3,656 篇 其他
  • 814 篇 中文
  • 51 篇 日文
  • 13 篇 斯洛文尼亚文
  • 8 篇 德文
  • 8 篇 法文
  • 4 篇 朝鲜文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Department of Information Engineering and Computer Technology"
64204 条 记 录,以下是421-430 订阅
排序:
Elevating Image Steganography:A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2923-2943页
作者: Muhammad Zaman Ali Omer Riaz Hafiz Muhammad Hasnain Waqas Sharif Tenvir Ali Gyu Sang Choi Department of Information Technology The Islamia University of BahawalpurBahawalpur63100Pakistan Department of Computer Science The Islamia University of BahawalpurBahawalpur63100Pakistan School of Computer Science and Engineering Yeungnam UniversityGyeongbuk38541Korea
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m... 详细信息
来源: 评论
Implementation of Deep Learning Techniques for Deepfake Classification: A comparative study using ResNet-50 and VGG16  7
Implementation of Deep Learning Techniques for Deepfake Clas...
收藏 引用
7th IEEE Pune Section International Conference, PuneCon 2024
作者: Yesugade, Kiran Jadhav, Rohini College of Engineering Department of Computer Engineering Pune India College of Engineering Department of Information Technology Pune India
This work investigates the use and assessment of ResNet-50 and VGG16 deep learning models for detecting deepfake images using the Labelled Faces in the Wild (LFW) dataset. The methodology encompassed thorough preparat... 详细信息
来源: 评论
WGSDMM+GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding
收藏 引用
Future Generation computer Systems 2023年 第1期145卷 254-266页
作者: Agarwal, Neha Sikka, Geeta Awasthi, Lalit Kumar Computer Science and Engineering Department Indian Institute of Information Technology Karnataka Raichur584135 India Department of Computer Science and Engineering National Institute of Technology Delhi Delhi110036 India 246174 India
Advancement of web 2.0 results in the expeditious growth of services in repositories and service portals, which raises the demand for service management. With the clusters of services, different processes like discove... 详细信息
来源: 评论
SciAR Labs: Exploring Science Through Augmented Reality
收藏 引用
SN computer Science 2025年 第5期6卷 1-14页
作者: Sondagar, Bhavisha Sheth, Dhruvi Kachare, Kaustubh Pawar, Renuka Kalbande, Dhananjay Department of Information Technology Sardar Patel Institute of Technology Mumbai India Department of Computer Science and Engineering Sardar Patel Institute of Technology Mumbai India
SciAR Labs presents a science education Augmented Reality (AR) application in response to the changing landscape of educational technologies. Thorough studies of the research demonstrate how AR can improve student mot... 详细信息
来源: 评论
SiC JFETs Modular Cascaded Method with Active Clamp Control Strategy for DC Solid-state Circuit Breaker
收藏 引用
CSEE Journal of Power and Energy Systems 2023年 第6期9卷 2435-2446页
作者: Hong Duan Wei Wang Zhikang Shuai Dong He Daixin Chen Z.John Shen the College of Electrical and Information Engineering Hunan UniversityChangsha 410006China the Department of Electrical and Computer Engineering Illinois Institute of TechnologyChicagoIL 60616 USA.
Power semiconductor devices cascaded topology is one of the most common solutions for solid-state circuit breakers(SSCBs)working in medium-voltage DC ***,when the number of cascaded devices is large,current series tec... 详细信息
来源: 评论
Identifying Authentic Reviews on Amazon Dataset using Transformer-Based Models
Identifying Authentic Reviews on Amazon Dataset using Transf...
收藏 引用
2024 International Conference on IT and Industrial Technologies, ICIT 2024
作者: Azam, Hadiqa Chaudhry, Hassan Nazeer Majid, Muhammad Computer Department University of Engineering and Technology Taxila Pakistan Computer Science Department Barani Institute of Information Technology Rawalpindi Pakistan
Reviews and ratings significantly impact businesses, either boosting their reputation or harming competitors. To manipulate these outcomes, some businesses falsify product reviews. This paper introduces a transformer-... 详细信息
来源: 评论
Fake News Classification: Past, Current, and Future
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2225-2249页
作者: Muhammad Usman Ghani Khan Abid Mehmood Mourad Elhadef Shehzad Ashraf Chaudhry Department of Computer Science University of Engineering and TechnologyLahore54890Pakistan Department of Computer Science&Information Technology Abu Dhabi UniversityAbu Dhabi59911United Arab Emirates Department of Software Engineering Faculty of Engineering and ArchitectureNisantasi UniversityIstanbulTurkey
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu... 详细信息
来源: 评论
A voting-based trustworthy distributed IoT attack detection model
收藏 引用
Personal and Ubiquitous Computing 2025年 第1期29卷 103-118页
作者: Sharma, Priya Sharma, Sanjay Kumar Dani, Diksha University School of Information & Communication Technology Gautam Buddha University Greater Noida India Department of Computer Engineering SVKM’s NMIMS Mukesh Patel School of Technology Management & Engineering Mumbai India
Besides the enhancement of the Internet of Things (IoT) distributed environment, anomalous activities are also escalating rapidly. Therefore, improving the trustworthiness of distributed networks is required for the e... 详细信息
来源: 评论
Stairdepth: a novel staircase detection through depth maps generated by depth anything V2
收藏 引用
International Journal of information technology (Singapore) 2025年 第4期17卷 2075-2086页
作者: Shekar, Avire Laxmi Chandra Chandrika, Mukkolla Bhuvana Naidu, Vakkalagadda Hemanth Muppalaneni, Naresh Babu Department of Computer Science and Engineering Indian Institute of Information Technology Design and Manufacturing Kurnool Kurnool India
Detection of a staircase is an important task in the fields of both assistive technology and autonomous navigation with an aim to enable substantial improvement in safety and accessibility for both those with limited ... 详细信息
来源: 评论
Fault tolerance challenges in wearable computing for vital applications: a survey
收藏 引用
Journal of Medical engineering and technology 2024年 第2期48卷 48-63页
作者: Sepahvand, Majid Meqdad, Maytham N. Abdali-Mohammadi, Fardin Department of Computer Engineering and Information Technology Razi University Kermanshah Iran Department of Intelligent Medical Systems Al-Mustaqbal University Babil Hillah Iraq
Wearable computers can be used in different domains including healthcare. However, due to suffering from challenges such as faults their applications may be limited in real practice. So, in designing wearable devices,... 详细信息
来源: 评论