咨询与建议

限定检索结果

文献类型

  • 91,605 篇 会议
  • 47,143 篇 期刊文献
  • 924 册 图书
  • 2 篇 科技报告

馆藏范围

  • 139,674 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,071 篇 工学
    • 53,571 篇 计算机科学与技术...
    • 43,771 篇 软件工程
    • 21,233 篇 信息与通信工程
    • 13,968 篇 控制科学与工程
    • 12,387 篇 电气工程
    • 12,074 篇 电子科学与技术(可...
    • 9,226 篇 生物工程
    • 7,089 篇 光学工程
    • 6,911 篇 机械工程
    • 6,541 篇 生物医学工程(可授...
    • 5,049 篇 仪器科学与技术
    • 4,964 篇 化学工程与技术
    • 4,736 篇 动力工程及工程热...
    • 3,667 篇 材料科学与工程(可...
    • 3,214 篇 交通运输工程
    • 3,180 篇 网络空间安全
    • 3,035 篇 安全科学与工程
  • 46,841 篇 理学
    • 23,218 篇 数学
    • 15,299 篇 物理学
    • 10,357 篇 生物学
    • 7,716 篇 统计学(可授理学、...
    • 5,241 篇 系统科学
    • 5,239 篇 化学
  • 21,464 篇 管理学
    • 13,731 篇 管理科学与工程(可...
    • 8,625 篇 图书情报与档案管...
    • 5,690 篇 工商管理
  • 6,264 篇 医学
    • 5,091 篇 临床医学
    • 4,578 篇 基础医学(可授医学...
    • 2,802 篇 药学(可授医学、理...
  • 3,437 篇 法学
    • 2,813 篇 社会学
  • 2,319 篇 经济学
  • 1,668 篇 农学
  • 1,291 篇 教育学
  • 593 篇 文学
  • 329 篇 军事学
  • 246 篇 艺术学
  • 11 篇 哲学
  • 7 篇 历史学

主题

  • 3,513 篇 accuracy
  • 3,504 篇 feature extracti...
  • 3,088 篇 deep learning
  • 3,004 篇 computational mo...
  • 2,999 篇 training
  • 2,376 篇 machine learning
  • 2,157 篇 computer science
  • 2,040 篇 optimization
  • 1,889 篇 predictive model...
  • 1,586 篇 semantics
  • 1,581 篇 neural networks
  • 1,537 篇 real-time system...
  • 1,530 篇 internet of thin...
  • 1,490 篇 data models
  • 1,476 篇 support vector m...
  • 1,458 篇 data mining
  • 1,436 篇 convolutional ne...
  • 1,217 篇 wireless sensor ...
  • 1,212 篇 artificial intel...
  • 1,142 篇 robustness

机构

  • 3,275 篇 school of electr...
  • 2,443 篇 school of comput...
  • 1,525 篇 school of comput...
  • 1,353 篇 school of comput...
  • 1,083 篇 cavendish labora...
  • 996 篇 department of ph...
  • 968 篇 school of comput...
  • 947 篇 physikalisches i...
  • 921 篇 oliver lodge lab...
  • 846 篇 university of ch...
  • 683 篇 school of comput...
  • 615 篇 school of electr...
  • 555 篇 chitkara univers...
  • 535 篇 horia hulubei na...
  • 534 篇 school of comput...
  • 532 篇 school of comput...
  • 524 篇 school of physic...
  • 517 篇 department of ph...
  • 515 篇 school of physic...
  • 515 篇 fakultät physik ...

作者

  • 287 篇 niyato dusit
  • 269 篇 a. gomes
  • 258 篇 barter w.
  • 251 篇 c. alexa
  • 249 篇 j. m. izen
  • 244 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 c. amelung
  • 240 篇 d. calvet
  • 234 篇 s. chen
  • 233 篇 blake t.
  • 231 篇 beiter a.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 223 篇 betancourt c.
  • 222 篇 amato s.
  • 220 篇 boettcher t.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 131,939 篇 英文
  • 5,354 篇 其他
  • 2,316 篇 中文
  • 138 篇 日文
  • 16 篇 德文
  • 16 篇 法文
  • 11 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Engineering and Technology"
139674 条 记 录,以下是441-450 订阅
排序:
Measurement of Alkali Metal Vapor Number Density Based on Surface Plasmon Resonance
收藏 引用
IEEE Photonics technology Letters 2025年 第14期37卷 757-760页
作者: Liang, Jiehao Li, Yuhan Wang, Yangtao Li, Yang Liu, Xuejing University of Shanghai for Science and Technology School of Optica-Electrical and Computer Engineering Shanghai200093 China
Alkali metal vapor cells are essential components of atomic magnetometers for magnetic field measurements. In this letter, a novel measurement method based on the surface plasmon resonance (SPR) effect to determine th... 详细信息
来源: 评论
Average AoI Minimization With Directional Charging for Wireless-Powered Network Edge
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4889-4906页
作者: Chen, Quan Guo, Song Xu, Wenchao Li, Jing Shi, Tuo Gao, Hong Cai, Zhipeng Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Hong Kong University of Science and Technology Department of Computer Science and Engineering 999077 Hong Kong Hong Kong Polytechnic University Department of Computing 999077 Hong Kong City University of Hong Kong Department of Computer Science Hong Kong Zhejiang Normal University School of Computer Science and Technology Jinhua321017 China Georgia State University Department of Computer Science AtlantaGA30303 United States
Age of Information (AoI) has been proposed as a new performance metric to capture the freshness of data. At wireless-powered network edge, the source nodes first need to be charged ready for update transmissions, whic... 详细信息
来源: 评论
kProtoClust:Towards Adaptive k-Prototype Clustering without Known k
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4949-4976页
作者: Yuan Ping Huina Li Chun Guo Bin Hao School of Information Engineering Xuchang UniversityXuchang461000China Henan Province Engineering Technology Research Center of Big Data Security andApplications Xuchang461000China College of Computer Science and Technology Guizhou UniversityGuiyang550025China Here Data Technology Shenzhen518000China
Towards optimal k-prototype discovery,k-means-like algorithms give us inspirations of central samples collection,yet the unstable seed samples selection,the hypothesis of a circle-like pattern,and the unknown K are st... 详细信息
来源: 评论
Live Audio Recognition and Text Conversion System  2
Live Audio Recognition and Text Conversion System
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Sharma, Pratyaksha Gupta, Sumita Bhavya, Boddu Asmitha Sharma, Khushi Dhir, Saru Gambhir, Sapna Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University UP India Department of Information Technology Amity School of Engineering & Technology Amity University UP India Dept. of Computer Science College of Engineering and Computing George Mason University United States
With the advancement of technologies, different methods are currently being used for converting spoken language into text. These systems offer a hands-free alternative to traditional input methods, especially for indi... 详细信息
来源: 评论
Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 917-933页
作者: Zeric Tabekoueng Njitacke Louai A.Maghrabi Musheer Ahmad Turki Althaqafi Department of Electrical and Electronic Engineering College of Technology(COT)University of BueaBueaP.O.Box 63Cameroon Department of Software Engineering College of EngineeringUniversity of Business and TechnologyJeddah22246Saudi Arabia Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Computer Science School of EngineeringComputing and DesignDar Al-Hekma UniversityJeddah22246Saudi Arabia
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t... 详细信息
来源: 评论
Characterizing the app recommendation relationships in the iOS app store: a complex network's perspective
收藏 引用
Science China(Information Sciences) 2025年 第4期68卷 284-299页
作者: Gang HUANG Fuqi LIN Yun MA Haoyu WANG Qingxiang WANG Gareth TYSON Xuanzhe LIU Key Lab of High Confidence Software Technologies (Peking University) Ministry of Education School of Computer Science Peking University Institute for Artificial Intelligence Peking University School of Cyber Science and Engineering Huazhong University of Science and Technology Alibaba Group Hong Kong University of Science and Technology (Guangzhou)
Mobile apps have become widely adopted in our daily lives. To facilitate app discovery, most app markets provide recommendations for users, which may significantly impact how apps are accessed. However, little has bee... 详细信息
来源: 评论
Network Traffic Anomaly Detection Based on DGBi-SA Model
收藏 引用
engineering Letters 2025年 第3期33卷 612-619页
作者: Wang, Xin Dai, Hong Huang, Zheng Han, Yue University of Science and Technology Liaoning Liaoning CO Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Liaoning CO Anshan114051 China
Network traffic anomaly detection plays a crucial role in today's network security and performance management. In response to the challenges in current network traffic data processing, such as insufficient structu... 详细信息
来源: 评论
A Framework for Flood Disaster Detection From Remote Sensing Images Using Spatiotemporal Fusion With Digital Twin technology
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 11547-11560页
作者: Lim, Se-Jung Sankaran, K. Sakthidasan Haldorai, Anandakumar Chonnam National University School of Electrical and Computer Engineering Yeosu Campus Yeosu-si59626 Korea Republic of Hindustan Institute of Technology and Science Department of Electronics and Communication Engineering Chennai603103 India Sri Eshwar College of Engineering Department of Computer Science and Engineering Coimbatore641202 India
Flood is regarded as common disaster which could cause serious devastation in any country. Typically, it is caused due to precipitation & river runoffs, specifically at the time of excessive rainfall season. The t... 详细信息
来源: 评论
ClipArtGAN: An Application of Pix2Pix Generative Adversarial Network for Clip Art Generation
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Elnabawy, Reham H. Abdennadher, Slim Hellwich, Olaf Eldawlatly, Seif Technische Universität Berlin Berlin Germany Computer Science and Engineering Department Faculty of Media Engineering and Technology German University in Cairo Cairo Egypt Computer Science Department Faculty of Informatics and Computer Science German International University New Administrative Capital Egypt Computer and Systems Engineering Department Faculty of Engineering Ain Shams University 1 El-sarayat st. Abbassia Cairo Egypt Computer Science and Engineering Department The American University in Cairo Cairo Egypt School of Information Technology New Giza University Giza Egypt
An image can convey a thousand words. This statement emphasizes the importance of illustrating ideas visually rather than writing them down. Although detailed image representation is typically instructive, there are s... 详细信息
来源: 评论
CAST: Contrastive Analysis of Spatial and Temporal Features for QIM-Based VoIP Steganalysis
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 1935-1939页
作者: Zhang, Cheng Yan, Yue Jiang, Shujuan Chen, Zhong China University of Mining and Technology School of Computer Science and Technology Engineering Research Center of Mine Digitalization Ministry of Education Xuzhou221116 China Swinburne College of Shandong University of Science and Technology Shandong 250031 China China University of Mining and Technology School of Information and Control Engineering Xuzhou221116 China
QIM(quantization index modulation)-based VoIP steganography is an information-hiding technology that malicious users could misuse to engage in illegal activities. Its countermeasure, commonly known as the QIM-based Vo... 详细信息
来源: 评论