咨询与建议

限定检索结果

文献类型

  • 92,655 篇 会议
  • 46,660 篇 期刊文献
  • 934 册 图书

馆藏范围

  • 140,249 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,067 篇 工学
    • 53,376 篇 计算机科学与技术...
    • 43,671 篇 软件工程
    • 20,971 篇 信息与通信工程
    • 13,905 篇 控制科学与工程
    • 12,020 篇 电子科学与技术(可...
    • 11,942 篇 电气工程
    • 9,214 篇 生物工程
    • 7,025 篇 光学工程
    • 6,829 篇 机械工程
    • 6,547 篇 生物医学工程(可授...
    • 5,013 篇 仪器科学与技术
    • 4,932 篇 化学工程与技术
    • 4,710 篇 动力工程及工程热...
    • 3,677 篇 材料科学与工程(可...
    • 3,159 篇 交通运输工程
    • 3,065 篇 网络空间安全
    • 2,992 篇 安全科学与工程
  • 46,529 篇 理学
    • 23,091 篇 数学
    • 15,175 篇 物理学
    • 10,302 篇 生物学
    • 7,699 篇 统计学(可授理学、...
    • 5,225 篇 系统科学
    • 5,194 篇 化学
  • 21,358 篇 管理学
    • 13,679 篇 管理科学与工程(可...
    • 8,554 篇 图书情报与档案管...
    • 5,693 篇 工商管理
  • 6,215 篇 医学
    • 5,080 篇 临床医学
    • 4,545 篇 基础医学(可授医学...
    • 2,794 篇 药学(可授医学、理...
  • 3,425 篇 法学
    • 2,810 篇 社会学
  • 2,307 篇 经济学
  • 1,666 篇 农学
  • 1,298 篇 教育学
  • 588 篇 文学
  • 329 篇 军事学
  • 248 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,635 篇 accuracy
  • 3,572 篇 feature extracti...
  • 3,130 篇 deep learning
  • 3,060 篇 computational mo...
  • 3,023 篇 training
  • 2,367 篇 machine learning
  • 2,155 篇 computer science
  • 2,090 篇 optimization
  • 1,935 篇 predictive model...
  • 1,617 篇 real-time system...
  • 1,578 篇 neural networks
  • 1,573 篇 semantics
  • 1,542 篇 internet of thin...
  • 1,539 篇 data models
  • 1,495 篇 support vector m...
  • 1,472 篇 convolutional ne...
  • 1,462 篇 data mining
  • 1,238 篇 artificial intel...
  • 1,225 篇 wireless sensor ...
  • 1,191 篇 robustness

机构

  • 3,282 篇 school of electr...
  • 2,473 篇 school of comput...
  • 1,531 篇 school of comput...
  • 1,370 篇 school of comput...
  • 1,085 篇 cavendish labora...
  • 1,000 篇 department of ph...
  • 985 篇 school of comput...
  • 948 篇 physikalisches i...
  • 921 篇 oliver lodge lab...
  • 856 篇 university of ch...
  • 683 篇 school of comput...
  • 621 篇 school of electr...
  • 566 篇 school of comput...
  • 565 篇 chitkara univers...
  • 531 篇 horia hulubei na...
  • 530 篇 school of comput...
  • 527 篇 fakultät physik ...
  • 521 篇 school of physic...
  • 520 篇 school of physic...
  • 514 篇 department of ph...

作者

  • 278 篇 niyato dusit
  • 268 篇 a. gomes
  • 264 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 c. amelung
  • 237 篇 blake t.
  • 236 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 228 篇 bellee v.
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 215 篇 bencivenni g.

语言

  • 121,379 篇 英文
  • 16,502 篇 其他
  • 2,427 篇 中文
  • 138 篇 日文
  • 25 篇 德文
  • 22 篇 法文
  • 13 篇 斯洛文尼亚文
  • 11 篇 朝鲜文
  • 5 篇 土耳其文
  • 3 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=School of Computer Engineering and Technology"
140249 条 记 录,以下是1861-1870 订阅
排序:
Generating Adversarial Patterns in Facial Recognition with Visual Camouflage
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2024年 1-12页
作者: Bao, Qirui Mei, Haiyang Wei, Huilin Lü, Zheng Wang, Yuxin Yang, Xin Key Laboratory of Social Computing and Cognitive Intelligence of Ministry of Education School of Control Science and EngineeringSchool of Computer Science and Technology Dalian University of Technology Liaoning Dalian116024 China Systems Engineering Institute Academy of Military Sciences Beijing100141 China
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ... 详细信息
来源: 评论
Virtual Keyboard:A Real-Time Hand Gesture Recognition-Based Character Input System Using LSTM and Mediapipe Holistic
收藏 引用
computer Systems Science & engineering 2024年 第2期48卷 555-570页
作者: Bijon Mallik Md Abdur Rahim Abu Saleh Musa Miah Keun Soo Yun Jungpil Shin Department of Computer Science and Engineering Pabna University of Science and TechnologyPabna6600Bangladesh School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan School of Computer and Information Technology Ulsan CollegeDong-guUlsan44610South Korea
In the digital age,non-touch communication technologies are reshaping human-device interactions and raising security concerns.A major challenge in current technology is the misinterpretation of gestures by sensors and... 详细信息
来源: 评论
Beyond boundaries: Unifying classification and segmentation in wildfire detection systems
收藏 引用
Multimedia Tools and Applications 2024年 1-33页
作者: Singh, Swapnil Vazirani, Vidhi Singhania, Sanvika Suroth, Vaishnavi Singh Soni, Vaibhav Biwalkar, Ameyaa Krishnan, Deepa Computer Science Department Virginia Tech BlacksburgVA United States Computer Science Department Northwestern University EvanstonIL United States Computer Engineering Department Mukesh Patel School of Technology Management & ampEngineering NMIMS University Maharashtra Mumbai India
Forest fires, a dangerous natural phenomenon, cause large-scale destruction in forests and nearby communities. In this paper, we leverage the capabilities of classification and fast prediction of machine learning and ... 详细信息
来源: 评论
The Smart and Secured Communication Using Applied Cryptography Algorithms  5th
The Smart and Secured Communication Using Applied Cryptograp...
收藏 引用
5th International Conference on Data Science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Jebakumari, S. Adlin Hemlata Ayesha, Amreen Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Department of Computer Science and Information Technology Jain University Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Manduwala Dehradun Navgaon India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This paper describes the implementation of a at ease communication device the usage of an implemented cryptography algorithm. The gadget is designed to provide comfy statistics and voice communique between endpoints u... 详细信息
来源: 评论
A Comparison of Deep Learning and Machine Learning Methods for Water Quality Prediction  3
A Comparison of Deep Learning and Machine Learning Methods f...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Srinivasa Gupta, N. Valarmathi, B. Hiwanj, Ishaan Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
Predicting water quality is essential to preserving human health and environmental sustainability. Traditional water quality assessment methods often face scalability and real-time monitoring limitations. With accurac... 详细信息
来源: 评论
Document retrieval using clustering-based Aquila hash-Q optimization with query expansion based on pseudo relevance feedback
收藏 引用
International Journal of computers and Applications 2024年 第7期46卷 496-507页
作者: Inje, Bhushan Nagwanshi, Kapil Kumar Rambola, Radhakrishna Amity School of Engineering and Technology Amity University Jaipur India NMIMS University MPSTME Shirpur Shirpur Dist Dhule India Department of Computer Science and Engineering SoS Engineering and Technology Guru Ghasidas Vishwavidyalaya Chhattisgarh Bilaspur495009 India
A document retrieval system helps users to retrieve the relevant documents corresponding to their query quickly and easily. In the real world, document retrieval is a difficult task due to high volumes of data, unstru... 详细信息
来源: 评论
GMTS: GNN-based multi-scale transformer siamese network for remote sensing building change detection
收藏 引用
International Journal of Digital Earth 2023年 第1期16卷 1685-1706页
作者: Xinyang Song Zhen Hua Jinjiang Li School of Infomation and electronic engineering Shandong Technology and Business UniversityInstitute of Network Technology(ICT)YantaiPeople's Republic of China School of Computer Science and Technology Shandong Technology and Business UniversityYantaiPeople's Republic of China
With the remarkable success of change detection(CD)in remote sensing images in the context of deep learning,many convolutional neural network(CNN)based methods have been *** the current research,to obtain a better con... 详细信息
来源: 评论
Modeling of Complex Traffic Interaction Under Uncontrolled Intersection Scenario
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-12页
作者: Li, Jiangkun Deng, Weiwen Wang, Ying Wang, Jian Ding, Juan School of Transportation Science and Engineering Beihang University Beijing China College of Computer Science and Technology Jilin Univerisity Changchun China PanoSim Technology Company Limited Jiaxing China
Complex traffic scenarios at uncontrolled intersections are crucial for the test validation of autonomous driving systems. The core of the test scenario construction lies in the accurate modeling of the complex intera... 详细信息
来源: 评论
Deep Reinforcement Learning Based Reliable Data Transmission Scheme for Internet of Underwater Things in 5G and beyond Networks  2
Deep Reinforcement Learning Based Reliable Data Transmission...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Consul, Prakhar Budhiraja, Ishan Garg, Deepak School of Computer Science Engineering and Technology Bennett University Uttar Pradesh India School of Computer Science Engineering and Technology Bennett University Uttar Pradesh India School of Computer Science and Artificial Intelligence SR University Anandsagar Hansaparthy Hanumakomda Telagana India
The Internet of Underwater Things (IoUT) is an interconnected communication ecosystem for underwater devices in maritime environments. IoUT devices range from seabed sensors to ships and boats in oceans which help in ... 详细信息
来源: 评论
DeBERTa-Based Social Media Sentiment Analysis: A Cryptocurrency Case Study
DeBERTa-Based Social Media Sentiment Analysis: A Cryptocurre...
收藏 引用
2024 IEEE International Conference on Intelligent Computing and Emerging Communication Technologies, ICEC 2024
作者: Ye, Jiarui Biswas, Reetam Mishra, Nilamadhab Nanjing University of Technology School of Computer Science and Engineering Nanjing China Kalinga Institute of Industrial Technology School of Computer Engineering Bhubaneswar India Vit Bhopal University Madhya Pradesh Sehore India
The emergence of cryptocurrencies has dramatically impacted the financial sector, drawing significant attention and sparking widespread debates across platforms like Facebook and Reddit. These discussions offer crucia... 详细信息
来源: 评论