咨询与建议

限定检索结果

文献类型

  • 92,464 篇 会议
  • 46,662 篇 期刊文献
  • 937 册 图书
  • 2 篇 科技报告

馆藏范围

  • 140,065 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,123 篇 工学
    • 53,594 篇 计算机科学与技术...
    • 43,912 篇 软件工程
    • 21,060 篇 信息与通信工程
    • 13,958 篇 控制科学与工程
    • 11,994 篇 电气工程
    • 11,971 篇 电子科学与技术(可...
    • 9,232 篇 生物工程
    • 7,110 篇 光学工程
    • 6,835 篇 机械工程
    • 6,568 篇 生物医学工程(可授...
    • 5,030 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,581 篇 材料科学与工程(可...
    • 3,172 篇 交通运输工程
    • 3,072 篇 网络空间安全
    • 3,007 篇 安全科学与工程
  • 46,710 篇 理学
    • 23,170 篇 数学
    • 15,214 篇 物理学
    • 10,323 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,235 篇 系统科学
    • 5,191 篇 化学
  • 21,451 篇 管理学
    • 13,744 篇 管理科学与工程(可...
    • 8,581 篇 图书情报与档案管...
    • 5,725 篇 工商管理
  • 6,246 篇 医学
    • 5,109 篇 临床医学
    • 4,579 篇 基础医学(可授医学...
    • 2,792 篇 药学(可授医学、理...
  • 3,442 篇 法学
    • 2,819 篇 社会学
  • 2,313 篇 经济学
  • 1,674 篇 农学
  • 1,305 篇 教育学
  • 590 篇 文学
  • 329 篇 军事学
  • 244 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,570 篇 accuracy
  • 3,525 篇 feature extracti...
  • 3,088 篇 deep learning
  • 3,027 篇 computational mo...
  • 3,018 篇 training
  • 2,353 篇 machine learning
  • 2,159 篇 computer science
  • 2,062 篇 optimization
  • 1,915 篇 predictive model...
  • 1,583 篇 semantics
  • 1,578 篇 neural networks
  • 1,566 篇 real-time system...
  • 1,517 篇 internet of thin...
  • 1,508 篇 data models
  • 1,487 篇 support vector m...
  • 1,466 篇 convolutional ne...
  • 1,465 篇 data mining
  • 1,223 篇 artificial intel...
  • 1,214 篇 wireless sensor ...
  • 1,159 篇 robustness

机构

  • 3,276 篇 school of electr...
  • 2,477 篇 school of comput...
  • 1,547 篇 school of comput...
  • 1,383 篇 school of comput...
  • 1,082 篇 cavendish labora...
  • 993 篇 department of ph...
  • 978 篇 school of comput...
  • 938 篇 physikalisches i...
  • 917 篇 oliver lodge lab...
  • 858 篇 university of ch...
  • 681 篇 school of comput...
  • 620 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 534 篇 school of comput...
  • 533 篇 horia hulubei na...
  • 522 篇 school of physic...
  • 518 篇 school of physic...
  • 517 篇 fakultät physik ...
  • 516 篇 department of ph...

作者

  • 281 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 c. amelung
  • 238 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 210 篇 bencivenni g.

语言

  • 129,429 篇 英文
  • 8,215 篇 其他
  • 2,388 篇 中文
  • 138 篇 日文
  • 18 篇 德文
  • 14 篇 法文
  • 11 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
检索条件"机构=School of Computer Engineering and Technology"
140065 条 记 录,以下是1261-1270 订阅
排序:
Heterogeneous information alignment and re-ranking for cross-modal pedestrian re-identification
收藏 引用
Multimedia Tools and Applications 2024年 1-24页
作者: Zhao, Tiezhu Liang, Xiaolun He, Kejing Yang, Qiuhong Ren, Ziliang School of Computer Science and Technology Dongguan University of Technology Guangdong Dongguan523808 China School of Computer Science and Engineering South China University of Technology Guangdong Guangzhou510641 China School of Artificial Intelligence and mathematical Dongguan City University Guangdong Dongguan523419 China
Cross-modal pedestrian re-identification, encompassing visible and infrared images, presents a significant challenge owing to inherent disparities in imaging principles, resulting in substantial cross-modal discrepanc... 详细信息
来源: 评论
Blockchain-enabled IoT access control model for sharing electronic healthcare data
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8127-8148页
作者: Ilyas, Benkhaddra Kumar, Abhishek Ali, Setitra Mohamed Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Chandigarh University Gharuan Mohali Punjab140413 India School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ... 详细信息
来源: 评论
Automated face recognition using deep learning technique and center symmetric multivariant local binary pattern
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 263-281页
作者: Sekhar, J.C. Josephson, P. Joel Chinnasamy, A. Maheswari, M. Sankar, S. Kalangi, Ruth Ramya Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Electronics and Communication Engineering Malla Reddy Engineering College Telangana Hyderabad India Department of Data Science and Business Systems School of Computing SRMIST Kattankulathur Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vijayawada India
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,... 详细信息
来源: 评论
Energy Efficient Unequal Fault Tolerance Clustering Approach
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1971-1983页
作者: Sowjanya Ramisetty Divya Anand Kavita Sahil Verma NZ Jhanjhi Mehedi Masud Mohammed Baz Department of Computer Science and Engineering KG Reddy College of Engineering and TechnologyHyderabadIndia School of Computer Science and Engineering Lovely Professional UniversityPhagwaraIndia Department of Computer Science and Engineering Chandigarh UniversityMohaliIndia Department of Computer Science and Engineering Tailor’s UniversityMalaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21994Saudi Arabia
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... 详细信息
来源: 评论
Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 695-712页
作者: Fangjun Luan Xuewen Mu Shuai Yuan Department of Computer Technology School of Computer Science and EngineeringShenyang Jianzhu UniversityShenyang110168China Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Jianzhu UniversityShenyang110168China Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang Jianzhu UniversityShenyang110168China
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toadd... 详细信息
来源: 评论
Formal Modeling and Discovery of Multi-instance Business Processes: A Cloud Resource Management Case Study
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第12期9卷 2151-2160页
作者: Cong Liu IEEE School of Computer Science and Technology Shandong University of TechnologyZibo 255000 College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590China
Process discovery, as one of the most challenging process analysis techniques, aims to uncover business process models from event logs. Many process discovery approaches were invented in the past twenty years;however,... 详细信息
来源: 评论
Optimized Convolutional Neural Network at the IoT edge for image detection using pruning and quantization
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5435-5455页
作者: Naveen, Soumyalatha Kounte, Manjunath R Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India School of Electronics and Communication Engineering REVA University Bangalore India
Most real-time computer vision applications heavily rely on Convolutional Neural Network (CNN) based models, for image classification and recognition. Due to the computationally and memory-intensive nature of the CNN ... 详细信息
来源: 评论
ZVEFusion: Zero-Shot Visual Enhancement Fusion for Infrared and Visible Images in Low Light
ZVEFusion: Zero-Shot Visual Enhancement Fusion for Infrared ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Duo Shi, Yiqi Zhang, Guoyin Li, Sizhao Zhang, Liguo School of Computer Science and Technology Harbin Engineering University China
Infrared and visible image fusion (IVIF) aims to generate fused images with prominent targets and rich scene information. However, in low-light conditions, visible images lose accurate texture and color, reducing thei... 详细信息
来源: 评论
A Novel Approach for Lightweight Sign Language Recognition Leveraging Google Mediapipe and Deep Neural Net  1
A Novel Approach for Lightweight Sign Language Recognition L...
收藏 引用
1st International Conference on Software, Systems and Information technology, SSITCON 2024
作者: Siju, Ijas Selvam, Prabu Vellore Institute of Technology School of Computer Science and Engineering Chennai India Srm Institute of Science and Technology Department of Computer Science and Engineering Tiruchirappalli India
The advent of technologies like Deep Learning has revolutionized human interaction, transcending language and disability barriers. Sign Language Recognition (SLR) systems have emerged as vital tools, facilitating seam... 详细信息
来源: 评论
A Novel Design of Random Number Generators Using Chaos-Based Extremum Coding
收藏 引用
IEEE Access 2024年 12卷 24039-24047页
作者: Araki, Shunsuke Wu, Ji-Han Yan, Jun-Juh Kyushu Institute of Technology Kawazu Iizuka Graduate School of Computer Science and Systems Engineering Fukuoka820 Japan National Chin-Yi University of Technology Department of Electronic Engineering Taichung41107 Taiwan
This paper proposes a new chaos-based extremum coding method to realize a true random number generator (RNG). Based on the chain rule, we innovatively introduce two parameters into the dynamics of chaotic systems to m... 详细信息
来源: 评论