咨询与建议

限定检索结果

文献类型

  • 86,683 篇 会议
  • 40,994 篇 期刊文献
  • 1,137 册 图书
  • 2 篇 学位论文

馆藏范围

  • 128,816 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 79,031 篇 工学
    • 58,428 篇 计算机科学与技术...
    • 47,305 篇 软件工程
    • 19,887 篇 信息与通信工程
    • 11,655 篇 控制科学与工程
    • 8,844 篇 生物工程
    • 8,145 篇 电气工程
    • 7,643 篇 电子科学与技术(可...
    • 6,085 篇 生物医学工程(可授...
    • 5,602 篇 机械工程
    • 5,165 篇 光学工程
    • 3,795 篇 仪器科学与技术
    • 3,508 篇 化学工程与技术
    • 3,333 篇 动力工程及工程热...
    • 3,113 篇 网络空间安全
    • 2,999 篇 安全科学与工程
    • 2,685 篇 交通运输工程
  • 41,247 篇 理学
    • 22,401 篇 数学
    • 11,155 篇 物理学
    • 9,846 篇 生物学
    • 7,072 篇 统计学(可授理学、...
    • 4,657 篇 系统科学
    • 3,645 篇 化学
  • 23,537 篇 管理学
    • 13,877 篇 管理科学与工程(可...
    • 10,688 篇 图书情报与档案管...
    • 6,075 篇 工商管理
  • 5,900 篇 医学
    • 4,960 篇 临床医学
    • 4,468 篇 基础医学(可授医学...
    • 2,689 篇 药学(可授医学、理...
    • 2,524 篇 公共卫生与预防医...
  • 3,782 篇 法学
    • 2,976 篇 社会学
  • 2,192 篇 经济学
  • 1,821 篇 教育学
  • 1,760 篇 农学
  • 649 篇 文学
  • 367 篇 军事学
  • 294 篇 艺术学
  • 38 篇 哲学
  • 24 篇 历史学

主题

  • 3,982 篇 computer science
  • 3,458 篇 feature extracti...
  • 2,890 篇 accuracy
  • 2,741 篇 deep learning
  • 2,659 篇 computational mo...
  • 2,467 篇 training
  • 2,320 篇 machine learning
  • 2,183 篇 data mining
  • 1,745 篇 information tech...
  • 1,658 篇 semantics
  • 1,651 篇 support vector m...
  • 1,503 篇 internet of thin...
  • 1,491 篇 predictive model...
  • 1,478 篇 educational inst...
  • 1,468 篇 optimization
  • 1,325 篇 data models
  • 1,316 篇 artificial intel...
  • 1,230 篇 security
  • 1,215 篇 neural networks
  • 1,192 篇 wireless sensor ...

机构

  • 950 篇 department of co...
  • 689 篇 school of comput...
  • 480 篇 school of comput...
  • 476 篇 maharishi school...
  • 368 篇 college of compu...
  • 350 篇 department of co...
  • 327 篇 school of comput...
  • 273 篇 department of ph...
  • 262 篇 school of comput...
  • 257 篇 faculté des scie...
  • 247 篇 department of co...
  • 244 篇 school of comput...
  • 220 篇 department of ph...
  • 218 篇 department of ph...
  • 216 篇 physics division...
  • 204 篇 school of comput...
  • 201 篇 school of comput...
  • 196 篇 department of co...
  • 193 篇 department of ph...
  • 186 篇 college of compu...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 262 篇 g. spigo
  • 261 篇 f. siegert
  • 259 篇 h. a. gordon
  • 257 篇 a. c. könig
  • 240 篇 y. tayalati
  • 238 篇 niyato dusit
  • 234 篇 m. klein
  • 218 篇 r. ströhmer
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 196 篇 h. sakamoto
  • 174 篇 m. rijssenbeek
  • 162 篇 s. veneziano
  • 159 篇 s. jin

语言

  • 120,673 篇 英文
  • 6,211 篇 其他
  • 1,948 篇 中文
  • 102 篇 日文
  • 23 篇 斯洛文尼亚文
  • 12 篇 德文
  • 9 篇 法文
  • 7 篇 朝鲜文
  • 5 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Information Technology and Computer Science"
128816 条 记 录,以下是111-120 订阅
排序:
A novel binary quantizer for variational autoencoder-based image compressor
收藏 引用
International Journal of computers and Applications 2024年 第8期46卷 604-620页
作者: Thulasidharan, Pillai Praveen Nath, Keshab Department of Computer Science and Engineering Indian Institute of Information Technology Kottayam India
Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t... 详细信息
来源: 评论
Feature Selection Techniques for Enhancing App User Review Analysis
收藏 引用
IEEE Access 2025年 13卷 85279-85293页
作者: Salleh, Amran Osman, Mohd Hafeez Hassan, Sa'Adah Said, Mar Yah Universiti Putra Malaysia Faculty of Computer Science and Information Technology Serdang43400 Malaysia
The rapid growth of user-generated content, particularly app user reviews, presents a significant challenge in analyzing and extracting useful insights. The unstructured nature, inconsistent quality, and large volume ... 详细信息
来源: 评论
A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Robust tube-based MPC with smooth computation for dexterous robot manipulation
收藏 引用
science China(information sciences) 2024年 第11期67卷 252-268页
作者: Yu LUO Tianying JI Fuchun SUN Qie SIMA Huaping LIU Mingxuan JING Jianwei ZHANG Department of Computer Science and Technology Tsinghua University Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Department of Informatics University of Hamburg
Dexterous robot manipulation has shone in complex industrial scenarios, where multiple manipulators, or fingers, cooperate to grasp and manipulate objects. When encountering multi-objective optimization with system co... 详细信息
来源: 评论
Leveraging Concise Concepts With Probabilistic Modeling for Interpretable Visual Recognition
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3117-3131页
作者: Zhang, Yixuan Liu, Chuanbin Liu, Yizhi Gao, Yifan Lu, Zhiying Xie, Hongtao Zhang, Yongdong University of Science and Technology of China School of Information Science and Technology Hefei230027 China Hunan University of Science and Technology Department of Computer Science and Engineering Hunan411199 China
Interpretable visual recognition is essential for decision-making in high-stakes situations. Recent advancements have automated the construction of interpretable models by leveraging Visual Language Models (VLMs) and ... 详细信息
来源: 评论
Application of the Deep Convolutional Neural Network for the Classification of Auto Immune Diseases
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 647-664页
作者: Fayaz Muhammad Jahangir Khan Asad Ullah Fasee Ullah Razaullah Khan Inayat Khan Mohammed ElAffendi Gauhar Ali Department of Computer Science and Information Technology Sarhad University of Science and Information TechnologyPeshawar25000Pakistan Department of Computer Science University of Engineering and TechnologyMardan23200Pakistan EIAS Data Science and Blockchain Lab College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
IIF(Indirect Immune Florescence)has gained much attention recently due to its importance in medical *** primary purpose of this work is to highlight a step-by-step methodology for detecting autoimmune *** use of IIF f... 详细信息
来源: 评论
Vision-based Robotic Arm in Defect Detection and Object Classification Applications
收藏 引用
Sensors and Materials 2024年 第2期36卷 655-670页
作者: Lin, Cheng-Jian Jhang, Jyun-Yu Gao, Yi-Jyun Huang, Hsiu-Mei Department of Computer Science & Information Engineering National Chin-Yi University of Technology Taichung411 Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung404 Taiwan Department of Information Management National Taichung University of Science and Technology Taichung404 Taiwan
Robotic arms have been widely used in industrial fields. However, researchers have seldom considered the factors affecting the actual factory environment. For example, when objects are conveyed in a factory, conveyor ... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Advancing Bankruptcy Forecasting With Hybrid Machine Learning Techniques: Insights From an Unbalanced Polish Dataset
收藏 引用
IEEE Access 2024年 12卷 9369-9381页
作者: Ainan, Ummey Hany Por, Lip Yee Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论