咨询与建议

限定检索结果

文献类型

  • 25,769 篇 会议
  • 15,149 篇 期刊文献
  • 438 册 图书

馆藏范围

  • 41,356 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23,565 篇 工学
    • 13,157 篇 计算机科学与技术...
    • 10,677 篇 软件工程
    • 5,079 篇 信息与通信工程
    • 4,005 篇 控制科学与工程
    • 3,664 篇 电气工程
    • 3,528 篇 电子科学与技术(可...
    • 2,353 篇 生物工程
    • 2,267 篇 机械工程
    • 2,052 篇 生物医学工程(可授...
    • 1,971 篇 化学工程与技术
    • 1,862 篇 仪器科学与技术
    • 1,832 篇 光学工程
    • 1,571 篇 动力工程及工程热...
    • 1,448 篇 材料科学与工程(可...
    • 851 篇 交通运输工程
    • 823 篇 安全科学与工程
    • 810 篇 土木工程
    • 799 篇 建筑学
  • 15,061 篇 理学
    • 6,488 篇 物理学
    • 6,262 篇 数学
    • 2,667 篇 生物学
    • 2,002 篇 化学
    • 1,996 篇 统计学(可授理学、...
    • 1,547 篇 系统科学
  • 5,807 篇 管理学
    • 3,772 篇 管理科学与工程(可...
    • 2,226 篇 图书情报与档案管...
    • 1,749 篇 工商管理
  • 2,048 篇 医学
    • 1,693 篇 临床医学
    • 1,417 篇 基础医学(可授医学...
    • 893 篇 药学(可授医学、理...
  • 866 篇 法学
  • 772 篇 经济学
  • 599 篇 农学
  • 532 篇 教育学
  • 148 篇 文学
  • 82 篇 军事学
  • 69 篇 艺术学
  • 6 篇 历史学
  • 5 篇 哲学

主题

  • 681 篇 feature extracti...
  • 662 篇 deep learning
  • 620 篇 accuracy
  • 610 篇 information tech...
  • 541 篇 training
  • 470 篇 machine learning
  • 469 篇 computational mo...
  • 420 篇 artificial intel...
  • 405 篇 support vector m...
  • 364 篇 internet of thin...
  • 347 篇 optimization
  • 313 篇 predictive model...
  • 289 篇 mathematical mod...
  • 260 篇 data mining
  • 254 篇 data models
  • 235 篇 reliability
  • 225 篇 simulation
  • 213 篇 neural networks
  • 206 篇 computer science
  • 193 篇 wireless communi...

机构

  • 659 篇 faculty of infor...
  • 417 篇 department of ph...
  • 407 篇 institute of hig...
  • 348 篇 university of sc...
  • 342 篇 faculty of infor...
  • 281 篇 budker institute...
  • 276 篇 indian institute...
  • 272 篇 dipartimento di ...
  • 253 篇 department of ph...
  • 253 篇 infn laboratori ...
  • 250 篇 faculty of elect...
  • 247 篇 china institute ...
  • 244 篇 kto karatay univ...
  • 243 篇 osaka city unive...
  • 240 篇 faculty of engin...
  • 236 篇 department of ph...
  • 234 篇 faculty of scien...
  • 230 篇 departamento de ...
  • 226 篇 faculté des scie...
  • 216 篇 department of ph...

作者

  • 232 篇 j. m. izen
  • 228 篇 s. h. kim
  • 226 篇 c. alexa
  • 226 篇 g. bella
  • 226 篇 j. strandberg
  • 226 篇 d. calvet
  • 226 篇 c. amelung
  • 220 篇 g. spigo
  • 218 篇 h. a. gordon
  • 213 篇 f. siegert
  • 209 篇 a. c. könig
  • 201 篇 y. tayalati
  • 201 篇 m. klein
  • 198 篇 r. ströhmer
  • 195 篇 h. sakamoto
  • 189 篇 m. rijssenbeek
  • 186 篇 a. ishikawa
  • 183 篇 s. jin
  • 175 篇 g. gaudio
  • 174 篇 y. unno

语言

  • 39,765 篇 英文
  • 999 篇 其他
  • 434 篇 中文
  • 188 篇 日文
  • 34 篇 法文
  • 31 篇 德文
  • 6 篇 俄文
  • 4 篇 荷兰文
  • 2 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Engineering and Information Technology"
41356 条 记 录,以下是11-20 订阅
排序:
Ray Launching-Based Computation of Exact Paths with Noisy Dense Point Clouds
收藏 引用
IEEE Transactions on Antennas and Propagation 2025年 第5期73卷 3270-3283页
作者: Vaara, Niklas Sangi, Pekka Lopez, Miguel Bordallo Heikkila, Janne University of Oulu Faculty of Information Technology and Electrical Engineering Center for Machine Vision and Signal Analysis Finland
Point clouds have been a recent interest for ray tracing-based radio channel characterization, as sensors such as RGB-D cameras and laser scanners can be utilized to generate an accurate virtual copy of a physical env... 详细信息
来源: 评论
Cumulative histogram as a feature selection technique for anomaly detection
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10095-10107页
作者: Nassar, Mostafa Salama, Rania A. Saleeb, Adel A. El-bahnasawy, Nirmeen A. Ahmed, Hossam Eldin H. Abd El-Samie, Fathi E. Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology Faculty of Computers and Information Suez University Suez Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia
The enhancement of Intrusion Detection Systems (IDS) is required to ensure protection of network resources and services. This is a hot research topic, especially in the presence of advanced intrusions and at... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
Science China(information Sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
A plaintext-related image encryption scheme based on key generation using generative adversarial networks
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 6873-6897页
作者: Zhang, Ruihu Kang, Xiaobing Lu, Qiao Miao, Yalin Chen, Yajun Department of Information Science Faculty of Printing Packaging Engineering and Digital Media Technology Xi’an University of Technology Shaanxi Xi’an710048 China
Image encryption based on chaotic systems is a hot research topic in recent decade. However, the existing methods have shortcomings in key generation techniques such as insufficient randomness and limited key space. F... 详细信息
来源: 评论
Diffusion Models Meet Network Management: Improving Traffic Matrix Analysis with Diffusion-Based Approach
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 1259-1275页
作者: Yuan, Xinyu Qiao, Yan Wei, Zhenchun Zhang, Zeyu Li, Minyue Zhao, Pei Hu, Rongyao Li, Wenjing Hefei University of Technology School of Computer Science and Information Engineering China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology China Macau University of Science and Technology Faculty of Information Technology China
Due to network operation and maintenance relying heavily on network traffic monitoring, traffic matrix analysis has been one of the most crucial issues for network management related tasks. However, it is challenging ... 详细信息
来源: 评论
SGGAA: a robust adversarial generation based on synthesizing point cloud and mesh space
收藏 引用
Neural Computing and Applications 2025年 1-23页
作者: Hu, Ruihan Yang, Rui Faculty of Computing Harbin Institute of Technology Harbin China School of Electrical and Information Engineering Tianjin University Tianjin China
3D vision recognition offers a significantly more robust tool for achieving machine cognition compared to traditional 2D vision techniques. However, similar to the vulnerabilities present in 2D vision, many 3D vision ... 详细信息
来源: 评论
On Suitability of Renko Charts for Algorithmic Trading  15th
On Suitability of Renko Charts for Algorithmic Trading
收藏 引用
15th International Scientific Conference on Distance Learning in Applied Informatics, DiVAI 2024
作者: Drozda, Martin Cavojsky, Maros Sebes, Patrik Faculty of Electrical Engineering and Information Technology Slovak University of Technology Bratislava Slovakia
Are Renko charts suitable for algorithmic trading? What are their advantages and disadvantages? How can they be represented for convolutional neural networks (CNNs)? We contrast a classical trading approach (Renko cha... 详细信息
来源: 评论
Comparisons of{100}texture improvement and formability in hot-rolled non-oriented electrical steel by austenite-ferrite phase transformation and shear deformation
收藏 引用
Journal of Iron and Steel Research International 2025年 第1期32卷 171-185页
作者: Chi-hao Yu Hong-jiang Pan Yan-ping Zhao De-ting Tang Hai-jun Wang Faculty of Materials Science and Engineering Kunming University of Science and TechnologyKunming650093YunnanChina School of Electronics and Information Engineering Anshun UniversityAnshun561000GuizhouChina School of Metallurgical Engineering Anhui University of TechnologyMa’anshan243032AnhuiChina
Over the years,the high magnetic induction of industrial Mn-added electrical steel is assumed to be the enhancement of{100}texture derived from its austenite-ferrite phase transformation during hot rolling(phase trans... 详细信息
来源: 评论
Comparative Analysis of SVM, Naïve Bayes, and Logistic Regression in Detecting IoT Botnet Attacks
收藏 引用
International Journal of Advanced Computer Science and Applications 2025年 第4期16卷 338-343页
作者: Siswanto, Apri Aji, Luhur Bayu Efendi, Akmar Alfaruqi, Dhafin Azriansyah, M. Rafli Raihan, Yefrianda Informatics Department Faculty of Engineering Universitas Islam Riau Pekanbaru Indonesia Faculty Data Science and Information Technology INTI International University Malaysia
The rapid proliferation of Internet of Things (IoT) devices has significantly increased the risk of cyberattacks, particularly botnet intrusions, which pose serious security threats to IoT networks. Machine learning-b... 详细信息
来源: 评论