咨询与建议

限定检索结果

文献类型

  • 92,494 篇 会议
  • 46,970 篇 期刊文献
  • 934 册 图书
  • 2 篇 科技报告

馆藏范围

  • 140,400 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 84,431 篇 工学
    • 53,828 篇 计算机科学与技术...
    • 43,847 篇 软件工程
    • 21,144 篇 信息与通信工程
    • 14,208 篇 控制科学与工程
    • 12,062 篇 电气工程
    • 12,034 篇 电子科学与技术(可...
    • 9,252 篇 生物工程
    • 7,081 篇 光学工程
    • 6,844 篇 机械工程
    • 6,583 篇 生物医学工程(可授...
    • 5,034 篇 仪器科学与技术
    • 4,954 篇 化学工程与技术
    • 4,735 篇 动力工程及工程热...
    • 3,628 篇 材料科学与工程(可...
    • 3,189 篇 交通运输工程
    • 3,099 篇 网络空间安全
    • 3,019 篇 安全科学与工程
  • 46,793 篇 理学
    • 23,181 篇 数学
    • 15,253 篇 物理学
    • 10,335 篇 生物学
    • 7,689 篇 统计学(可授理学、...
    • 5,250 篇 化学
    • 5,240 篇 系统科学
  • 21,459 篇 管理学
    • 13,749 篇 管理科学与工程(可...
    • 8,586 篇 图书情报与档案管...
    • 5,715 篇 工商管理
  • 6,287 篇 医学
    • 5,133 篇 临床医学
    • 4,581 篇 基础医学(可授医学...
    • 2,794 篇 药学(可授医学、理...
  • 3,435 篇 法学
    • 2,814 篇 社会学
  • 2,312 篇 经济学
  • 1,674 篇 农学
  • 1,290 篇 教育学
  • 591 篇 文学
  • 329 篇 军事学
  • 244 篇 艺术学
  • 10 篇 哲学
  • 7 篇 历史学

主题

  • 3,578 篇 accuracy
  • 3,539 篇 feature extracti...
  • 3,129 篇 deep learning
  • 3,029 篇 computational mo...
  • 3,029 篇 training
  • 2,368 篇 machine learning
  • 2,160 篇 computer science
  • 2,066 篇 optimization
  • 1,915 篇 predictive model...
  • 1,588 篇 semantics
  • 1,578 篇 neural networks
  • 1,572 篇 real-time system...
  • 1,520 篇 internet of thin...
  • 1,512 篇 data models
  • 1,489 篇 support vector m...
  • 1,473 篇 convolutional ne...
  • 1,465 篇 data mining
  • 1,228 篇 artificial intel...
  • 1,216 篇 wireless sensor ...
  • 1,162 篇 robustness

机构

  • 3,277 篇 school of electr...
  • 2,477 篇 school of comput...
  • 1,551 篇 school of comput...
  • 1,384 篇 school of comput...
  • 1,082 篇 cavendish labora...
  • 994 篇 department of ph...
  • 975 篇 school of comput...
  • 938 篇 physikalisches i...
  • 920 篇 oliver lodge lab...
  • 859 篇 university of ch...
  • 681 篇 school of comput...
  • 616 篇 school of electr...
  • 568 篇 school of comput...
  • 566 篇 chitkara univers...
  • 534 篇 school of comput...
  • 533 篇 horia hulubei na...
  • 522 篇 school of physic...
  • 518 篇 school of physic...
  • 517 篇 fakultät physik ...
  • 516 篇 department of ph...

作者

  • 282 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 239 篇 g. bella
  • 239 篇 c. amelung
  • 238 篇 j. strandberg
  • 237 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 210 篇 bencivenni g.

语言

  • 129,496 篇 英文
  • 8,498 篇 其他
  • 2,388 篇 中文
  • 138 篇 日文
  • 18 篇 德文
  • 14 篇 法文
  • 11 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 土耳其文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
检索条件"机构=School of Computer Engineering and Technology"
140400 条 记 录,以下是4831-4840 订阅
排序:
Analyzing Weather Patterns and Mosquito Data to Predict West Nile Virus Outbreaks in Chicago  7
Analyzing Weather Patterns and Mosquito Data to Predict West...
收藏 引用
2023 7th International Conference On Computing, Communication, Control And Automation, ICCUBEA 2023
作者: Bachal, Tarush Kumar, Ashwin Shetty, Ansh Pawar, Rajendra School of Computer Engineering & Technology Mit World Peace University Maharashtra Pune India
This paper describes the problem of predicting the occurrence of West Nile Virus (WNV) in mosquitoes in the city of Chicago. Each year, from late May to early October, mosquito traps are set up across the city, and th... 详细信息
来源: 评论
Aerial image matching based on dynamic convolution and adaptive neighborhood consensus network  8
Aerial image matching based on dynamic convolution and adapt...
收藏 引用
8th International Conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Tao, Yu Yu, Wanjun Shanghai Institute of Technology School of Computer Science & Information Engineering Shanghai201418 China
Aerial image matching is the process of geometrically aligning two or more images under different environments (time, angle, sensor changes). Aiming at the problems of low matching accuracy and weak robustness of aeri... 详细信息
来源: 评论
A Distributed Hyperspectral Target Detection Algorithm Based on Background Reconstruction for Cloud Platforms  13
A Distributed Hyperspectral Target Detection Algorithm Based...
收藏 引用
13th Workshop on Hyperspectral Imaging and Signal Processing: Evolution in Remote Sensing, WHISPERS 2023
作者: Xu, Lidan Wu, Zebin Sun, Jin Zhang, Yi Wei, Zhihui Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China
Target detection is an important research direction in the field of hyperspectral image interpretation. This paper proposes a Spark-based distributed and parallel implementation of a hyperspectral target detection met... 详细信息
来源: 评论
iDANSE: Iterative Data-driven Nonlinear State Estimation of Model-free Hidden Sequences
iDANSE: Iterative Data-driven Nonlinear State Estimation of ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qin, Hang Ghosh, Anubhab Chatterjee, Saikat Digital Futures Centre School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Sweden
We introduce a model-free hidden sequence (MHS) estimation problem where the task is to estimate a long sequence of 'model-free' process hidden under additive Gaussian noise. To estimate the posterior of the h... 详细信息
来源: 评论
Discriminatively Constrained Semi-Supervised Multi-View Nonnegative Matrix Factorization with Graph Regularization
收藏 引用
Big Data Mining and Analytics 2024年 第1期7卷 55-74页
作者: Guosheng Cui Ye Li Jianzhong Li Jianping Fan Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518055China Joint Engineering Research Center for Health Big Data Intelligent Analysis Technology Shenzhen 518055China University of Chinese Academy of Sciences Beijing 100049China School of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China
Nonnegative Matrix Factorization(NMF)is one of the most popular feature learning technologies in the field of machine learning and pattern *** has been widely used and studied in the multi-view clustering tasks becaus... 详细信息
来源: 评论
Limited Resources Multi-Object Tracking by Utilizing Motion Cue from the Meanshift Algorithm  9
Limited Resources Multi-Object Tracking by Utilizing Motion ...
收藏 引用
9th International Conference on Systems and Informatics, ICSAI 2023
作者: Chang, Heming Han, Shumin Shi, Zhiguo Hu, Siquan University of Science and Technology Beijing School of Computer and Communication Engineering Beijing10083 China
Multi-object tracking has various applications in intelligent surveillance systems. Substantial advancements have been made to enhance the accuracy of multi-object tracking. Nevertheless, many existing approaches stru... 详细信息
来源: 评论
Similar Image Retrieval Algorithm Based on Feature Fusion and Locality-Sensitive Hash
Similar Image Retrieval Algorithm Based on Feature Fusion an...
收藏 引用
2022 International Symposium on Design Studies and Intelligence engineering, DSIE 2022
作者: Zhang, Kaiqiang Li, Wei Yu, Shaoyong Chen, Shunyi Zeng, Zhiqiang Ma, Xiaoyu Luo, Youmeng School of Computer and Information Engineering Xiamen University of Technology China School of Mathematical and Information Engineering Longyan University China Center of Modern Engineering Training Xiamen University of Technology China
In this paper, we propose a similar image retrieval algorithm based on feature fusion and locality-sensitive hash to address the problems of inadequate representation of image content by individual features and long r... 详细信息
来源: 评论
Adversarial Attacks and Defences of Various Artificial Intelligent Models  2
Adversarial Attacks and Defences of Various Artificial Intel...
收藏 引用
2nd International Conference on Smart Technologies for Smart Nation, SmartTechCon 2023
作者: Singh, Tanmay Rai, Parijat Sood, Saumil Nigam, Siddhant Kumari, Suchi School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India
Adversarial attacks are becoming increasingly common and sophisticated as time passes and new defenses are being researched and developed. Adversarial machine learning is one of the techniques used to attack artificia... 详细信息
来源: 评论
Classification of Malware Using Deep Learning: A Study  56
Classification of Malware Using Deep Learning: A Study
收藏 引用
56th International Carnahan Conference on Security technology, ICCST 2023
作者: Srinu, Inakollu Shanmukha Vidyarthi, Deepti School of Computer Engineering and Mathematical Sciences Defence Institute of Advanced Technology Pune India
Malware, or malicious software, significantly threatens data privacy and system security. This study delves into image-based malware classification, employing deep learning techniques. This research addresses the earl... 详细信息
来源: 评论
Low-Cost Smart Plant Irrigation Control System Using Temperature and Distance Sensors  5th
Low-Cost Smart Plant Irrigation Control System Using Tempera...
收藏 引用
5th International Conference on Soft Computing and Signal Processing, ICSCSP 2022
作者: Malla, Jyotsna Jayashree, J. Vijayashree, J. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
This study revolves around the idea of proposing a smart and low-cost automated irrigation control system. This system attempts to effectively provide an end-to-end solution to irrigation problems by using economical ... 详细信息
来源: 评论