咨询与建议

限定检索结果

文献类型

  • 86,683 篇 会议
  • 40,994 篇 期刊文献
  • 1,137 册 图书
  • 2 篇 学位论文

馆藏范围

  • 128,816 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 79,031 篇 工学
    • 58,428 篇 计算机科学与技术...
    • 47,305 篇 软件工程
    • 19,887 篇 信息与通信工程
    • 11,655 篇 控制科学与工程
    • 8,844 篇 生物工程
    • 8,145 篇 电气工程
    • 7,643 篇 电子科学与技术(可...
    • 6,085 篇 生物医学工程(可授...
    • 5,602 篇 机械工程
    • 5,165 篇 光学工程
    • 3,795 篇 仪器科学与技术
    • 3,508 篇 化学工程与技术
    • 3,333 篇 动力工程及工程热...
    • 3,113 篇 网络空间安全
    • 2,999 篇 安全科学与工程
    • 2,685 篇 交通运输工程
  • 41,247 篇 理学
    • 22,401 篇 数学
    • 11,155 篇 物理学
    • 9,846 篇 生物学
    • 7,072 篇 统计学(可授理学、...
    • 4,657 篇 系统科学
    • 3,645 篇 化学
  • 23,537 篇 管理学
    • 13,877 篇 管理科学与工程(可...
    • 10,688 篇 图书情报与档案管...
    • 6,075 篇 工商管理
  • 5,900 篇 医学
    • 4,960 篇 临床医学
    • 4,468 篇 基础医学(可授医学...
    • 2,689 篇 药学(可授医学、理...
    • 2,524 篇 公共卫生与预防医...
  • 3,782 篇 法学
    • 2,976 篇 社会学
  • 2,192 篇 经济学
  • 1,821 篇 教育学
  • 1,760 篇 农学
  • 649 篇 文学
  • 367 篇 军事学
  • 294 篇 艺术学
  • 38 篇 哲学
  • 24 篇 历史学

主题

  • 3,982 篇 computer science
  • 3,458 篇 feature extracti...
  • 2,890 篇 accuracy
  • 2,741 篇 deep learning
  • 2,659 篇 computational mo...
  • 2,467 篇 training
  • 2,320 篇 machine learning
  • 2,183 篇 data mining
  • 1,745 篇 information tech...
  • 1,658 篇 semantics
  • 1,651 篇 support vector m...
  • 1,503 篇 internet of thin...
  • 1,491 篇 predictive model...
  • 1,478 篇 educational inst...
  • 1,468 篇 optimization
  • 1,325 篇 data models
  • 1,316 篇 artificial intel...
  • 1,230 篇 security
  • 1,215 篇 neural networks
  • 1,192 篇 wireless sensor ...

机构

  • 950 篇 department of co...
  • 689 篇 school of comput...
  • 480 篇 school of comput...
  • 476 篇 maharishi school...
  • 368 篇 college of compu...
  • 350 篇 department of co...
  • 327 篇 school of comput...
  • 273 篇 department of ph...
  • 262 篇 school of comput...
  • 257 篇 faculté des scie...
  • 247 篇 department of co...
  • 244 篇 school of comput...
  • 220 篇 department of ph...
  • 218 篇 department of ph...
  • 216 篇 physics division...
  • 204 篇 school of comput...
  • 201 篇 school of comput...
  • 196 篇 department of co...
  • 193 篇 department of ph...
  • 186 篇 college of compu...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 262 篇 g. spigo
  • 261 篇 f. siegert
  • 259 篇 h. a. gordon
  • 257 篇 a. c. könig
  • 240 篇 y. tayalati
  • 238 篇 niyato dusit
  • 234 篇 m. klein
  • 218 篇 r. ströhmer
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 196 篇 h. sakamoto
  • 174 篇 m. rijssenbeek
  • 162 篇 s. veneziano
  • 159 篇 s. jin

语言

  • 120,673 篇 英文
  • 6,211 篇 其他
  • 1,948 篇 中文
  • 102 篇 日文
  • 23 篇 斯洛文尼亚文
  • 12 篇 德文
  • 9 篇 法文
  • 7 篇 朝鲜文
  • 5 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Information Technology and Computer Science"
128816 条 记 录,以下是81-90 订阅
排序:
Multi-radio fast routing recovery protocol based on spectrum situation awareness
收藏 引用
Chinese Journal of Aeronautics 2025年 第3期38卷 435-446页
作者: Chuanxin ZHOU Chao DONG Xiaojun ZHU Fuhui ZHOU Qihui WU Zhengrui QIN Ministry of Industry and Information Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 211106China School of Computer Science and Information Systems Northwest Missouri State UniversityMaryville 64468USA
UAV networks often encounter jamming attacks, under which multi-radio protocols have to switch radios to accelerate communication recovery. However, the existing protocols rely on exchange of hello messages to detect ... 详细信息
来源: 评论
Faster AMEDA-A Hybrid Mesoscale Eddy Detection Algorithm
收藏 引用
computer Modeling in Engineering & sciences 2024年 第11期141卷 1827-1846页
作者: Xinchang Zhang Xiaokang Pan Rongjie Zhu Runda Guan Zhongfeng Qiu Biao Song Organization Department Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Teacher Education Nanjing University of Information Science and TechnologyNanjing210044China School of Electronics&Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China School of Software Nanjing University of Information Science and TechnologyNanjing210044China
Identification of ocean eddies from a large amount of ocean data provided by satellite measurements and numerical simulations is crucial,while the academia has invented many traditional physical methods with accurate ... 详细信息
来源: 评论
Metaheuristic task offloading approaches for minimization of energy consumption on edge computing: a systematic review
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-30页
作者: Latip, Rohaya Aminu, Jafar Hanafi, Zurina Mohd Kamarudin, Shafinah Gabi, Danlami Faculty of Computer Science and Information Technology Universiti Putra Serdang Malaysia Department of Computer Science Kebbi State University of Science and Technology Aleiro Aleiro Nigeria
A systematic review of metaheuristic Algorithms for energy-efficient task offloading in edge computing is provided. The Grey Wolf Optimizer (GWO) is explored as a promising approach for reducing energy consumption. Fu... 详细信息
来源: 评论
Multi-view stereo algorithms based on deep learning: a survey
收藏 引用
Multimedia Tools and Applications 2025年 第6期84卷 2877-2908页
作者: Huang, Hongbo Yan, Xiaoxu Zheng, Yaolin He, Jiayu Xu, Longfei Qin, Dechun Computer School Beijing Information Science & Technology University Beijing China Institute of Computing Intelligence Beijing Information Science & Technology University Beijing China Foreign Languages School Beijing Information Science & Technology University Beijing China
Multi-View Stereo (MVS) is a long-standing and fundamental task in computer vision, which aims to reconstruct the 3D geometry of a scene from a set of overlapping images. With known camera parameters, MVS matches pixe... 详细信息
来源: 评论
Enhancing User Experience in AI-Powered Human-computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2909-2929页
作者: Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim51911Saudi Arabia
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... 详细信息
来源: 评论
Adversarial-Learning-Based Taguchi Convolutional Fuzzy Neural Classifier for Images of Lung Cancer
收藏 引用
IEEE Access 2024年 12卷 72766-72776页
作者: Lin, Cheng-Jian Lin, Xue-Qian Jhang, Jyun-Yu National Chin-Yi University of Technology Department of Computer Science and Information Engineering Taichung41170 Taiwan National Taichung University of Science and Technology Department of Computer Science and Information Engineering Taichung40401 Taiwan
Deep learning technology has extensive application in the classification and recognition of medical images. However, several challenges persist in such application, such as the need for acquiring large-scale labeled d... 详细信息
来源: 评论
Advanced Machine Learning Approaches for Breast Cancer Detection with Neutrosophic Sets
收藏 引用
Neutrosophic Sets and Systems 2025年 81卷 273-284页
作者: Elbehiery, Hussam Fathi, Hanaa Eassa, Mohamed Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Mahmoud, Hadeer Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt College of Information Technology Amman Arab University Amman Jordan Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Artificial Intelligence Faculty of Computers and Artificial Intelligence Modern University for Technology & Information Cairo Egypt
Breast Cancer (BC) remains a significant health challenge for women and is one of the leading causes of mortality worldwide. Accurate diagnosis is critical for successful therapy and increased survival rates. Recent a... 详细信息
来源: 评论
Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques:A Comprehensive Review and Open Challenges
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1167-1202页
作者: Samina Amin Muhammad Ali Zeb Hani Alshahrani Mohammed Hamdi Mohammad Alsulami Asadullah Shaikh Institute of Computing Kohat University of Science and TechnologyKohat26000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information System College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv... 详细信息
来源: 评论
A Latency-Aware and Fault-Tolerant Framework for Resource Scheduling and Data Management in Fog-Enabled Smart City Transportation Systems
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1377-1399页
作者: Ibrar Afzal Noor ul Amin Zulfiqar Ahmad Abdulmohsen Algarni Department of Computer Science and Information Technology Hazara UniversityMansehra21300Pakistan Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Thedeployment of the Internet of Things(IoT)with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses,smart cities,and ... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing Algorithm
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论