咨询与建议

限定检索结果

文献类型

  • 91,740 篇 会议
  • 46,545 篇 期刊文献
  • 932 册 图书
  • 2 篇 科技报告

馆藏范围

  • 139,219 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 83,346 篇 工学
    • 53,087 篇 计算机科学与技术...
    • 43,524 篇 软件工程
    • 20,911 篇 信息与通信工程
    • 13,740 篇 控制科学与工程
    • 11,942 篇 电气工程
    • 11,903 篇 电子科学与技术(可...
    • 9,206 篇 生物工程
    • 7,025 篇 光学工程
    • 6,789 篇 机械工程
    • 6,516 篇 生物医学工程(可授...
    • 5,002 篇 仪器科学与技术
    • 4,917 篇 化学工程与技术
    • 4,700 篇 动力工程及工程热...
    • 3,553 篇 材料科学与工程(可...
    • 3,151 篇 交通运输工程
    • 3,039 篇 网络空间安全
    • 2,992 篇 安全科学与工程
  • 46,440 篇 理学
    • 23,032 篇 数学
    • 15,119 篇 物理学
    • 10,302 篇 生物学
    • 7,644 篇 统计学(可授理学、...
    • 5,234 篇 系统科学
    • 5,179 篇 化学
  • 21,318 篇 管理学
    • 13,660 篇 管理科学与工程(可...
    • 8,524 篇 图书情报与档案管...
    • 5,673 篇 工商管理
  • 6,206 篇 医学
    • 5,063 篇 临床医学
    • 4,544 篇 基础医学(可授医学...
    • 2,796 篇 药学(可授医学、理...
  • 3,424 篇 法学
    • 2,808 篇 社会学
  • 2,304 篇 经济学
  • 1,664 篇 农学
  • 1,280 篇 教育学
  • 592 篇 文学
  • 329 篇 军事学
  • 244 篇 艺术学
  • 11 篇 哲学
  • 7 篇 历史学

主题

  • 3,536 篇 accuracy
  • 3,507 篇 feature extracti...
  • 3,054 篇 deep learning
  • 3,015 篇 training
  • 3,012 篇 computational mo...
  • 2,348 篇 machine learning
  • 2,158 篇 computer science
  • 2,045 篇 optimization
  • 1,889 篇 predictive model...
  • 1,587 篇 semantics
  • 1,576 篇 neural networks
  • 1,553 篇 real-time system...
  • 1,521 篇 internet of thin...
  • 1,504 篇 data models
  • 1,477 篇 support vector m...
  • 1,453 篇 data mining
  • 1,426 篇 convolutional ne...
  • 1,218 篇 wireless sensor ...
  • 1,197 篇 artificial intel...
  • 1,155 篇 robustness

机构

  • 3,276 篇 school of electr...
  • 2,450 篇 school of comput...
  • 1,535 篇 school of comput...
  • 1,348 篇 school of comput...
  • 1,080 篇 cavendish labora...
  • 994 篇 department of ph...
  • 966 篇 school of comput...
  • 940 篇 physikalisches i...
  • 920 篇 oliver lodge lab...
  • 849 篇 university of ch...
  • 682 篇 school of comput...
  • 616 篇 school of electr...
  • 557 篇 chitkara univers...
  • 534 篇 school of comput...
  • 534 篇 horia hulubei na...
  • 532 篇 school of comput...
  • 524 篇 school of physic...
  • 516 篇 school of physic...
  • 516 篇 department of ph...
  • 515 篇 fakultät physik ...

作者

  • 280 篇 niyato dusit
  • 270 篇 a. gomes
  • 256 篇 barter w.
  • 250 篇 c. alexa
  • 248 篇 j. m. izen
  • 242 篇 g. bella
  • 240 篇 c. amelung
  • 239 篇 j. strandberg
  • 238 篇 d. calvet
  • 233 篇 s. chen
  • 231 篇 beiter a.
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 218 篇 boettcher t.
  • 212 篇 bencivenni g.

语言

  • 131,626 篇 英文
  • 5,229 篇 其他
  • 2,314 篇 中文
  • 138 篇 日文
  • 17 篇 德文
  • 16 篇 法文
  • 11 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 1 篇 阿拉伯文
检索条件"机构=School of Computer Engineering and Technology"
139219 条 记 录,以下是701-710 订阅
排序:
A novel approach for image retrieval in remote sensing using vision-language-based image caption generation
收藏 引用
Multimedia Tools and Applications 2025年 第6期84卷 2985-3014页
作者: Yadav, Prem Shanker Tyagi, Dinesh Kumar Vipparthi, Santosh Kumar Department of Computer Science and Engineering Malaviya National Institute of Technology Rajasthan Jaipur302017 India School of Artificial Intelligence and Data Engineering Indian Institute of Technology Ropar Punjab Rupnagar140001 India
Recent advancements in satellite technologies have resulted in the emergence of Remote Sensing (RS) images. Hence, the primary imperative research domain is designing a precise retrieval model for retrieving the most ... 详细信息
来源: 评论
Achieving Physical Layer Security Against Location Unknown Eavesdroppers via Friendly Jammer
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第10期10卷 2038-2040页
作者: Heng Zhang Jianwei Sun Xin Wang Chenglong Gong School of Computer Engineering Jiangsu Ocean UniversityLianyungang 222000China School of Electronic Engineering Jiangsu Ocean UniversityLianyungang 222000China Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science CenterQilu University of TechnologyJinan 250014China
Dear Editor, This letter is concerning friendly jamming unmanned aerial vehicles(UAVs) to assist in the safe communication of UAV base stations. Due to the openness of UAV wireless communication, it is vulnerable to a... 详细信息
来源: 评论
Gaussian Blur Masked ResNet2.0 Architecture for Diabetic Retinopathy Detection
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 927-942页
作者: Swagata Boruah Archit Dehloo Prajul Gupta Manas Ranjan Prusty A.Balasundaram School of Electronics Engineering Vellore Institute of TechnologyChennai600127India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India Centre for Cyber-Physical Systems Vellore Institute of TechnologyChennai600127India
Diabetic Retinopathy (DR) is a serious hazard that can result inirreversible blindness if not addressed in a timely manner. Hence, numeroustechniques have been proposed for the accurate and timely detection ofthis dis... 详细信息
来源: 评论
IoT Threat Mitigation: Machine Learning-Assisted Heavy Hitter Detection in P4-Enabled Networks  5
IoT Threat Mitigation: Machine Learning-Assisted Heavy Hitte...
收藏 引用
5th CPSSI International Symposium on Cyber-Physical Systems (Applications and Theory), CPSAT 2024
作者: Hooshangi-Naghani, Mehrdad Rezaei, Negar Dolati, Mahdi Khonsari, Ahmad Rastegar, Seyed Hamed Sharif University of Technology Department of Computer Engineering Tehran Iran University of Tehran School of Electrical and Computer Engineering Iran School of Computer Science Tehran Iran Shiraz University School of Electrical and Computer Engineering Shiraz Iran
The Internet of Things (IoT) is crucial in various sectors, making IoT networks prime targets for denial of service attacks. Detecting heavy hitters-primary sources of such attacks-is essential for network security. W... 详细信息
来源: 评论
Blockchain Breakthrough: A Review of its Role in Modern technology  2
Blockchain Breakthrough: A Review of its Role in Modern Tech...
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Asthana, Sameer Chaturvedi, Ravi Prakash Mishra, Annu Nayyar, Poorva Shaliyar, Md. Greater Noida Institute of Technology Department of Computer Science and Engineering Greater Noida India Sharda School of Engineering and Technology Department of Computer Science and Applications Greater Noida India Sharda School of Engineering and Technology Department of Computer Science and Engineering Greater Noida India
This article summarizes the Blockchain technology along with the artificial intelligence. The cutting edge technology is described in a elaborated manner along with its advantages, disadvantages and its impact with th... 详细信息
来源: 评论
Refinement of the Existing Mid-Point Circle Generating Algorithm  1
Refinement of the Existing Mid-Point Circle Generating Algor...
收藏 引用
1st International Conference on AIML-Applications for engineering and technology, ICAET 2025
作者: Parmar, Shubh Nayak, Aayush Khare, Pragati Mukesh Patel School of Technology Management and Engineering Mumbai India NMIMS University Mukesh Patel School of Technology Management and Engineering Department of Computer Engineering India
On a computer (PC) producing a circle is a slightly tedious task, this problem was first solved by the Bresenham's circle drawing algorithm, further that same algorithm was again improved by the mid-point circle g... 详细信息
来源: 评论
Improving graph collaborative filtering with network motifs
收藏 引用
Neural Computing and Applications 2025年 1-20页
作者: Zhang, Yuqi Yu, Jian Liu, Zhizhong Wang, Guiling Nguyen, Minh Sheng, Quan Z. Wang, Nancy Department of Computer and Information Sciences Auckland University of Technology Auckland Central1010 New Zealand School of Computer and Control Engineering Yantai University Shandong Yantai264005 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Computing Macquarie University SydneyNSW2109 Australia
Deep learning on graphs, specifically graph convolutional networks (GCNs), has exhibited exceptional efficacy in the domain of recommender systems. Most GCNs have a message-passing architecture that enables nodes to a... 详细信息
来源: 评论
AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 1-12页
作者: WANG Zhibo LIU Kaixin HU Jiahui REN Ju GUO Hengchang YUAN Wei School of Cyber Science and Engineering Wuhan University School of Cyber Science and Technology Zhejiang University Department of Computer Science and Technology Tsinghua University
Collaborative inference(co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive inform... 详细信息
来源: 评论
Revolutionizing wildlife protection: a novel approach combining deep learning and night-time surveillance
收藏 引用
Multimedia Tools and Applications 2024年 1-35页
作者: Madhasu, Nithya Pande, Sagar Dhanraj VIT-AP University Andhra Pradesh India Department of Computer Science and Engineering School of Engineering and Technology Pimpri Chinchwad University Maharashtra Pune India
The increasing instances of animals encroaching on human settlements, as well as the illicit trafficking of wildlife, have prompted immediate actions to protect the natural heritage. In addition to this, the difficult... 详细信息
来源: 评论
A Harmonic Approach to Handwriting Style Synthesis Using Deep Learning
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4063-4080页
作者: Mahatir Ahmed Tusher Saket Choudary Kongara Sagar Dhanraj Pande Seong Ki Kim Salil Bharany School of Computer Science and Engineering VIT-AP UniversityAmaravatiAndhra Pradesh522237India School of Engineering&Technology Pimpri Chinchwad UniversityPuneMaharashtra412106India Department of Computer Engineering Chosun UniversityGwangju61452Republic of Korea Independent Researcher AmritsarPunjab143001India
The challenging task of handwriting style synthesis requires capturing the individuality and diversity of human *** majority of currently available methods use either a generative adversarial network(GAN)or a recurren... 详细信息
来源: 评论