咨询与建议

限定检索结果

文献类型

  • 6,029 篇 会议
  • 924 篇 期刊文献
  • 53 册 图书

馆藏范围

  • 7,006 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,327 篇 工学
    • 3,362 篇 计算机科学与技术...
    • 2,843 篇 软件工程
    • 1,180 篇 信息与通信工程
    • 652 篇 控制科学与工程
    • 482 篇 生物工程
    • 475 篇 电气工程
    • 448 篇 电子科学与技术(可...
    • 377 篇 生物医学工程(可授...
    • 290 篇 光学工程
    • 259 篇 机械工程
    • 201 篇 动力工程及工程热...
    • 185 篇 仪器科学与技术
    • 183 篇 化学工程与技术
    • 183 篇 安全科学与工程
    • 168 篇 交通运输工程
    • 134 篇 建筑学
  • 2,137 篇 理学
    • 1,166 篇 数学
    • 549 篇 物理学
    • 515 篇 生物学
    • 371 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 177 篇 化学
  • 1,201 篇 管理学
    • 730 篇 管理科学与工程(可...
    • 532 篇 图书情报与档案管...
    • 381 篇 工商管理
  • 320 篇 医学
    • 279 篇 临床医学
    • 266 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 157 篇 公共卫生与预防医...
  • 206 篇 法学
    • 148 篇 社会学
  • 131 篇 教育学
  • 124 篇 经济学
  • 114 篇 农学
  • 32 篇 文学
  • 15 篇 军事学
  • 5 篇 艺术学

主题

  • 222 篇 accuracy
  • 187 篇 feature extracti...
  • 146 篇 deep learning
  • 140 篇 computational mo...
  • 136 篇 machine learning
  • 120 篇 training
  • 113 篇 predictive model...
  • 108 篇 internet of thin...
  • 105 篇 support vector m...
  • 101 篇 real-time system...
  • 100 篇 cloud computing
  • 91 篇 visualization
  • 88 篇 data mining
  • 82 篇 semantics
  • 82 篇 security
  • 81 篇 artificial intel...
  • 80 篇 software
  • 79 篇 monitoring
  • 78 篇 neural networks
  • 78 篇 optimization

机构

  • 51 篇 dept. of compute...
  • 26 篇 dept. of compute...
  • 24 篇 dept. of informa...
  • 23 篇 dept. of compute...
  • 22 篇 school of automa...
  • 20 篇 university of th...
  • 18 篇 school of comput...
  • 17 篇 institute of inf...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of informa...
  • 14 篇 school of comput...
  • 14 篇 dept. of informa...
  • 14 篇 dept. of compute...
  • 14 篇 research center ...
  • 14 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 13 篇 tsinghua nationa...
  • 13 篇 dept. of informa...
  • 13 篇 dept. of compute...
  • 13 篇 chitkara univers...

作者

  • 22 篇 huang minlie
  • 19 篇 yen-lin chen
  • 18 篇 xiaojiang du
  • 15 篇 fotiadis dimitri...
  • 14 篇 chen yen-lin
  • 14 篇 jiwani nasmin
  • 14 篇 nasmin jiwani
  • 14 篇 chang chih-hung
  • 13 篇 guru prasad m.s.
  • 13 篇 horng shi-jinn
  • 13 篇 mohammad s. obai...
  • 13 篇 lee trong-yen
  • 12 篇 hossain shahriar
  • 12 篇 lorenzo bruzzone
  • 12 篇 sudip misra
  • 11 篇 nikumani choudhu...
  • 11 篇 ketan gupta
  • 11 篇 jian-jhih kuo
  • 11 篇 sanjaikanth e va...
  • 11 篇 lu chih-wei

语言

  • 6,764 篇 英文
  • 135 篇 其他
  • 70 篇 中文
  • 30 篇 日文
  • 7 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer and Information Technology"
7006 条 记 录,以下是21-30 订阅
排序:
A Comprehensive Review on Lunar Crater Detection using Image Processing
A Comprehensive Review on Lunar Crater Detection using Image...
收藏 引用
Intelligent Systems (ETIS), Emerging Technologies for
作者: Omkar Mane Prathamesh Nagawade Mann Pathak Sahil Phadtare Deepak Uplaonkar Dept. of Computer Engineering International Institute of Information Technology (IIT) Pune India
This review investigates the application of machine learning techniques, particularly the YOLO algorithm, and proposes a better alternative to the existing models for automated lunar crater detection. It addresses the... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Methods in Climate Data Extraction and Forecasting
Comparative Analysis of Machine Learning Methods in Climate ...
收藏 引用
Intelligent Systems (ETIS), Emerging Technologies for
作者: Parth Ajit Khajgiwale Atul Naveen Nishtha Jethani Ajitkumar Shitole Dept. of Computer Engineering International Institute of Information Technology Hinjewadi Pune India
Climate forecasting plays a critical role in understanding and mitigating the impacts of climate change. Advances in machine learning (ML) have significantly enhanced the accuracy of climate projections, particularly ... 详细信息
来源: 评论
Zero-Trust Architecture for Smart City Healthcare Systems
Zero-Trust Architecture for Smart City Healthcare Systems
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), International Conference on
作者: Shahd Alsofyani Mohammad Ishaque Mostafa Nofal Dept. of Computer Science and Information Technology Jedah International College Jeddah Saudi Arabia
This paper introduces a tailored Zero-Trust Architecture (ZTA) for healthcare systems in smart cities, addressing the security challenges posed by interconnected infrastructures. The model enforces continuous access v... 详细信息
来源: 评论
Monocular UAV Motion Planning Method Based on Deep Reinforcement Learning
Monocular UAV Motion Planning Method Based on Deep Reinforce...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Man-Chen Hsueh Chun Ku Xiu-Zhi Chen Yen-Lin Chen Dept. of Computer Science & Information Engineering National Taipei University of Technology Taipei Taiwan
This paper presents a monocular UAV motion planning method based on the DRL method SDDPG. By processing image data with the self-proposed lightweight dept. estimation model and a pretrained encoder, the information is... 详细信息
来源: 评论
Quantum Cryptography and Post-Quantum Security: Safeguarding Cryptographic Protocols Against Quantum Threats
Quantum Cryptography and Post-Quantum Security: Safeguarding...
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), International Conference on
作者: Muhammad Ishaq Bushra Al-Anesi Computer Science & Information Technology Dept. Jeddah International College Jeddah Saudi Arabia
As quantum computing progresses towards practical realization, the security of existing cryptographic protocols, such as RSA and Elliptic Curve Cryptography (ECC), faces unprecedented risks. Quantum algorithms like Sh... 详细信息
来源: 评论
Enhancing Train Transportation in Sri Lanka: A Smart IOT based Multi-Subsystem Approach using MQTT
arXiv
收藏 引用
arXiv 2025年
作者: Balasingham, Dhanushka Samarathunga, Sadeesha Bandara, Anuththara Arachchige, Gayantha Godakanda Gamage, Narmada Wijayaraja, Jaliya L. Dept. of Computer Systems Engineering Sri Lanka Institute of Information Technology Sri Lanka
This research proposes a system as a solution for the challenges faced by Sri Lanka’s historic railway system, such as scheduling delays, overcrowding, manual ticketing, and management inefficiencies. It proposes a m... 详细信息
来源: 评论
CAM-Based High Efficient Weakly Supervised Multi-Object Multi-Class Detection Method
CAM-Based High Efficient Weakly Supervised Multi-Object Mult...
收藏 引用
IEEE International Conference on Consumer Electronics (ICCE)
作者: Xiu-Zhi Chen Hsiao-Wei Huang Yen-Lin Chen Dept. of Computer Science & Information Engineering National Taipei University of Technology Taipei Taiwan
Two approaches are available for WSOD: MIL and CAM. MIL-based methods are capable of addressing multiple targets and multiple class problems. However, these methods require the input of region proposals. In contrast, ... 详细信息
来源: 评论
J-NECORA: A Framework for Optimal Resource Allocation in Cloud-Edge-Things Continuum for Industrial Applications With Mobile Nodes
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Pettorali, Marco Righetti, Francesca Vallati, Carlo Das, Sajal K. Anastasi, Giuseppe Univ. of Pisa Dept. of Information Engineering Italy Missouri Univ. of Science and Technology Dept. of Computer Science RollaMO United States
In the Industrial Internet of Things (IIoT) landscape, where the Cloud-to-Things Continuum (C2TC) paradigm is now a reality, industrial applications need to cope with highly heterogeneous network and computing resourc... 详细信息
来源: 评论
Transforming Classification with Federated Learning on Blockchain: A Unique Model Integration Approach
Transforming Classification with Federated Learning on Block...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Hao, Zhihao Zhang, Bob Li, Haisheng School of Computer Science and Artificial Intelligence Beijing Technology and Business University Beijing China Dept. of Computer and Information Science Faculty of Science and Technology University of Macau Taipa China Centre for Artificial Intelligence and Robotics Institute of Collaborative Innovation University of Macau Taipa China
The need for robust machine learning models is particularly evident in the realm of biological pattern recognition. Traditional centralized methods often struggle, as they frequently depend on large datasets that are ... 详细信息
来源: 评论
Artificial Intelligence Techniques for the Ransomware Detection: Current Methods and Challenges  1
Artificial Intelligence Techniques for the Ransomware Detect...
收藏 引用
1st International Conference on AIML-Applications for Engineering and technology, ICAET 2025
作者: Rakibe, Priya Jawale, Madhuri Computer Engineering Research Centre Sanjivani College of Engineering Kopargaon Savitribai Phule Pune University Pune India Sanjivani College of Engineering Kopargaon Savitribai Phule Pune University Dept. of Information Technology Pune India
Recently, Artificial Intelligence (AI) Techniques have received significant interest across the different fields for data analysis and decision-making. Ransomware detection using AI has been a challenging research pro... 详细信息
来源: 评论