咨询与建议

限定检索结果

文献类型

  • 92,655 篇 会议
  • 46,660 篇 期刊文献
  • 934 册 图书

馆藏范围

  • 140,249 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,067 篇 工学
    • 53,376 篇 计算机科学与技术...
    • 43,671 篇 软件工程
    • 20,971 篇 信息与通信工程
    • 13,905 篇 控制科学与工程
    • 12,020 篇 电子科学与技术(可...
    • 11,942 篇 电气工程
    • 9,214 篇 生物工程
    • 7,025 篇 光学工程
    • 6,829 篇 机械工程
    • 6,547 篇 生物医学工程(可授...
    • 5,013 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,677 篇 材料科学与工程(可...
    • 3,159 篇 交通运输工程
    • 3,065 篇 网络空间安全
    • 2,992 篇 安全科学与工程
  • 46,529 篇 理学
    • 23,091 篇 数学
    • 15,175 篇 物理学
    • 10,302 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,225 篇 系统科学
    • 5,194 篇 化学
  • 21,358 篇 管理学
    • 13,679 篇 管理科学与工程(可...
    • 8,554 篇 图书情报与档案管...
    • 5,693 篇 工商管理
  • 6,215 篇 医学
    • 5,080 篇 临床医学
    • 4,545 篇 基础医学(可授医学...
    • 2,794 篇 药学(可授医学、理...
  • 3,425 篇 法学
    • 2,810 篇 社会学
  • 2,307 篇 经济学
  • 1,666 篇 农学
  • 1,298 篇 教育学
  • 588 篇 文学
  • 329 篇 军事学
  • 248 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,635 篇 accuracy
  • 3,572 篇 feature extracti...
  • 3,130 篇 deep learning
  • 3,060 篇 computational mo...
  • 3,023 篇 training
  • 2,367 篇 machine learning
  • 2,155 篇 computer science
  • 2,090 篇 optimization
  • 1,935 篇 predictive model...
  • 1,617 篇 real-time system...
  • 1,578 篇 neural networks
  • 1,573 篇 semantics
  • 1,542 篇 internet of thin...
  • 1,539 篇 data models
  • 1,495 篇 support vector m...
  • 1,472 篇 convolutional ne...
  • 1,462 篇 data mining
  • 1,238 篇 artificial intel...
  • 1,225 篇 wireless sensor ...
  • 1,191 篇 robustness

机构

  • 3,282 篇 school of electr...
  • 2,473 篇 school of comput...
  • 1,531 篇 school of comput...
  • 1,370 篇 school of comput...
  • 1,085 篇 cavendish labora...
  • 1,000 篇 department of ph...
  • 985 篇 school of comput...
  • 948 篇 physikalisches i...
  • 921 篇 oliver lodge lab...
  • 856 篇 university of ch...
  • 683 篇 school of comput...
  • 621 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 531 篇 horia hulubei na...
  • 530 篇 school of comput...
  • 527 篇 fakultät physik ...
  • 521 篇 school of physic...
  • 520 篇 school of physic...
  • 514 篇 department of ph...

作者

  • 278 篇 niyato dusit
  • 268 篇 a. gomes
  • 264 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 c. amelung
  • 237 篇 blake t.
  • 236 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 228 篇 bellee v.
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 215 篇 bencivenni g.

语言

  • 121,379 篇 英文
  • 16,502 篇 其他
  • 2,427 篇 中文
  • 138 篇 日文
  • 25 篇 德文
  • 22 篇 法文
  • 13 篇 斯洛文尼亚文
  • 11 篇 朝鲜文
  • 5 篇 土耳其文
  • 3 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=School of Computer Engineering and Technology"
140249 条 记 录,以下是1821-1830 订阅
排序:
Recommendation Algorithm Based on Social Influence Diffusion  17
Recommendation Algorithm Based on Social Influence Diffusion
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: Jin, Xin Chen, Shiyu Nanjing University of Science and Technology School of Mechanical Engineering Nanjing China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
Social influence is everywhere in people's lives. It controls users' activities in social networks. Understanding the mechanism of interactions between users in social networks can benefit various applications... 详细信息
来源: 评论
Virtual Reality Applications for Social Anxiety Treatment: A Comprehensive Literature Review  2
Virtual Reality Applications for Social Anxiety Treatment: A...
收藏 引用
2nd International Conference on Computational Intelligence and Network Systems, CINS 2024
作者: Agarwal, Prerna Arya, Pradeep Kumar Gupta, Bharat Shrivastava, Pranav Tuli, Kareena Hussain, Saquib School of Computer Science Engineering and Technology Bennett University UP Greater Noida201310 India Department of Computer Science & Engineering Galgotias College of Engineering and Technology Greater Noida India
Social anxiety is a psychological disorder distinguished by a profound apprehension of social environments, leading to irrational anxiety among individuals. This excessive fear of social situations affects a considera... 详细信息
来源: 评论
Deep Learning Approach to Emotion Recognition by Facial Expressions: A Review Paper  5
Deep Learning Approach to Emotion Recognition by Facial Expr...
收藏 引用
5th IEEE International Conference on Advances in Computing, Communication Control and Networking, ICAC3N 2023
作者: Singh, Shubhanshi Shukla, Shipra Amity School Of Engineering And Technology Computer Science And Engineering Noida India
Emotion recognition by facial expression is a challenging task that has gotten much attention in recent years. Deep neural networks are used to extract pertinent information from facial photographs and categorise them... 详细信息
来源: 评论
Automatic Motorcyclist Helmet Rule Violation Detection using YOLOv5
Automatic Motorcyclist Helmet Rule Violation Detection using...
收藏 引用
2024 Asian Conference on Intelligent Technologies, ACOIT 2024
作者: Chheda, Meet Kapoor, Nupur Desai, Khushi Gupta, Rajeev Kumar School of Technology Computer Engineering Pandit Deendayal Energy University Gandhinagar India
Road traffic injuries rank among the leading causes of death worldwide, with motorcyclists accounting for a significant proportion of these fatalities. According to the World Health Organization, helmets are effective... 详细信息
来源: 评论
DNN-STACK: a stacking technique based on deep neural network for detecting copy-move forgery
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4989-5004页
作者: Krishnalal, G. Jagathy Raj, V.P. Madhu, G. Arun, K.S. School of Engineering Cochin University of Science and Technology Kerala Cochin682022 India School of Management Studies Cochin University of Science and Technology Kerala Cochin682022 India Department of Computer Applications Cochin University of Science and Technology Kerala Cochin682022 India
In recent years, detecting image forgery has become an important topic because of the availability of efficient and sophisticated image-editing software. Copy-move forgery, which involves copying a section of an image... 详细信息
来源: 评论
Blockchain-Based Trust Model for Inter-Domain Routing
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4821-4839页
作者: Qiong Yang Li Ma Sami Ullah Shanshan Tu Hisham Alasmary Muhammad Waqas Faculty of Information Technology Beijing University of TechnologyBeijing100124China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science Shaheed Benazir Bhutto UniversitySheringal18050Pakistan Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia School of Computing andMathematical Sciences Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUK School of Engineering Edith Cowan UniversityPerthWA 6027Australia
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... 详细信息
来源: 评论
Biological Template Protection Based on Multikey Cryptographic Decomposition Features  9
Biological Template Protection Based on Multikey Cryptograph...
收藏 引用
9th International Conference on Systems and Informatics, ICSAI 2023
作者: Wang, Jing Jiang, Haowen Yang, Yuqi Xin, Rundong University of Science and Technology School of Computer and Communication Engineering School of Civil Engineering Changsha410114 China University of Science and Technology School of Computer and Communication Engineering Changsha410114 China
As more and more privacy protection mechanisms are introduced, facial recognition is gradually being optimized in terms of homo-morphic computing power. However, certain aspects have been overlooked, such as the rever... 详细信息
来源: 评论
Wi-SFDAGR: WiFi-Based Cross-Domain Gesture Recognition via Source-Free Domain Adaptation
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24159-24173页
作者: Yan, Huan Zhang, Xiang Huang, Jinyang Feng, Yuanhao Li, Meng Wang, Anzhi Ou, Weihua Wang, Hongbing Liu, Zhi Guizhou Normal University School of Big Data and Computer Science Guiyang550025 China University of Science and Technology of China CAS Key Laboratory of Electromagnetic Space Information Hefei230026 China Hefei University of Technology School of Computer and Information Hefei230601 China The University of Electro-Communications Department of Computer and Network Engineering Tokyo1828585 Japan
WiFi Channel State Information (CSI)-based gesture recognition offers unique advantages, including cost-effectiveness and enhanced privacy protection, and has garnered significant attention in recent years. However, e... 详细信息
来源: 评论
DeepFakeGuard: Safeguarding Digital Platforms Against Fake Profiles Using AI  4
DeepFakeGuard: Safeguarding Digital Platforms Against Fake P...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Swarna Sudha, M. Manjula, S. Bharathi, Indira Krishnasamy, Valarmathi Vijayalakshmi, K. Ramco Institute of Technology Department of Computer Science and Engineering Rajapalayam India School of Computer Science and Engineering Vellore Institute of Technology Chennai India PSR Engineering College Department of Electronics and Communication Engineering Sivakasi India
This research introduces DeepFakeGuard, a hybrid deep learning framework designed to detect fake profiles on social media platforms, addressing the growing threat of fraudulent accounts online. DeepFakeGuard integrate... 详细信息
来源: 评论
Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals
收藏 引用
computer Systems Science & engineering 2023年 第5期45卷 1851-1867页
作者: V.Harshini T.Dhanwin A.Shahina N.Safiyyah A.Nayeemulla Khan Department of Information Technology Sri Sivasubramaniya Nadar College of EngineeringChennai603110India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the huma... 详细信息
来源: 评论