咨询与建议

限定检索结果

文献类型

  • 162,250 篇 会议
  • 89,591 篇 期刊文献
  • 1,640 册 图书
  • 1 篇 学位论文

馆藏范围

  • 253,482 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 157,292 篇 工学
    • 97,681 篇 计算机科学与技术...
    • 79,481 篇 软件工程
    • 38,322 篇 信息与通信工程
    • 24,996 篇 控制科学与工程
    • 22,254 篇 电子科学与技术(可...
    • 21,278 篇 电气工程
    • 15,977 篇 生物工程
    • 13,279 篇 机械工程
    • 13,176 篇 光学工程
    • 11,520 篇 生物医学工程(可授...
    • 10,817 篇 化学工程与技术
    • 10,074 篇 仪器科学与技术
    • 8,531 篇 动力工程及工程热...
    • 8,295 篇 材料科学与工程(可...
    • 5,473 篇 交通运输工程
    • 5,282 篇 安全科学与工程
    • 5,265 篇 网络空间安全
  • 89,342 篇 理学
    • 43,605 篇 数学
    • 30,455 篇 物理学
    • 18,079 篇 生物学
    • 13,930 篇 统计学(可授理学、...
    • 10,918 篇 化学
    • 9,450 篇 系统科学
  • 39,088 篇 管理学
    • 24,729 篇 管理科学与工程(可...
    • 15,855 篇 图书情报与档案管...
    • 10,163 篇 工商管理
  • 10,995 篇 医学
    • 9,105 篇 临床医学
    • 7,959 篇 基础医学(可授医学...
    • 4,875 篇 药学(可授医学、理...
  • 6,064 篇 法学
    • 4,900 篇 社会学
  • 4,068 篇 经济学
  • 3,355 篇 农学
  • 2,626 篇 教育学
  • 1,054 篇 文学
  • 721 篇 军事学
  • 483 篇 艺术学
  • 32 篇 哲学
  • 25 篇 历史学

主题

  • 6,327 篇 feature extracti...
  • 5,677 篇 accuracy
  • 5,029 篇 deep learning
  • 4,969 篇 training
  • 4,722 篇 computational mo...
  • 4,681 篇 computer science
  • 3,923 篇 machine learning
  • 3,372 篇 optimization
  • 3,073 篇 data mining
  • 3,004 篇 predictive model...
  • 2,878 篇 semantics
  • 2,685 篇 data models
  • 2,668 篇 support vector m...
  • 2,658 篇 neural networks
  • 2,507 篇 educational inst...
  • 2,493 篇 real-time system...
  • 2,464 篇 internet of thin...
  • 2,423 篇 convolutional ne...
  • 2,189 篇 artificial intel...
  • 2,167 篇 wireless sensor ...

机构

  • 2,477 篇 school of comput...
  • 1,858 篇 school of inform...
  • 1,549 篇 university of ch...
  • 1,507 篇 school of comput...
  • 1,333 篇 school of comput...
  • 1,052 篇 cavendish labora...
  • 1,032 篇 physikalisches i...
  • 973 篇 department of ph...
  • 943 篇 school of comput...
  • 851 篇 oliver lodge lab...
  • 774 篇 school of comput...
  • 617 篇 department of co...
  • 595 篇 school of inform...
  • 560 篇 school of comput...
  • 559 篇 chitkara univers...
  • 534 篇 school of inform...
  • 523 篇 infn laboratori ...
  • 521 篇 university of sc...
  • 511 篇 nikhef national ...
  • 497 篇 school of comput...

作者

  • 325 篇 niyato dusit
  • 303 篇 yang yang
  • 248 篇 barter w.
  • 235 篇 wang wei
  • 221 篇 s. chen
  • 217 篇 blake t.
  • 217 篇 a. gomes
  • 214 篇 bellee v.
  • 213 篇 bowcock t.j.v.
  • 209 篇 betancourt c.
  • 207 篇 borsato m.
  • 205 篇 brundu d.
  • 203 篇 liu yang
  • 199 篇 beiter a.
  • 198 篇 amato s.
  • 195 篇 y. li
  • 194 篇 c. alexa
  • 190 篇 boettcher t.
  • 188 篇 j. m. izen
  • 184 篇 c. amelung

语言

  • 234,393 篇 英文
  • 13,289 篇 其他
  • 5,457 篇 中文
  • 490 篇 日文
  • 42 篇 德文
  • 38 篇 法文
  • 21 篇 朝鲜文
  • 18 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"机构=School of Computer Science Engineering and Information Technology"
253482 条 记 录,以下是4911-4920 订阅
排序:
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3881-3898页
作者: Asma Sajjad Humaira Ashraf NZ Jhanjhi Mamoona Humayun Mehedi Masud Mohammed A.AlZain Department of Computer Science and Software Engineering International Islamic UniversityIslamabadPakistan School of Computer Science SCSTaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubangJaya47500SelangorMalaysia Department of Information Systems College of Computer and Information SciencesJouf UniversityKSA Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia
The most valuable resource on the planet is no longer oil,but *** transmission of this data securely over the internet is another challenge that comes with its ever-increasing *** order to transmit sensitive informati... 详细信息
来源: 评论
Enhancing real time object detection for autonomous driving using YOLO-NAS algorithm with CLEO optimizer
收藏 引用
International Journal of information technology (Singapore) 2025年 第3期17卷 1321-1328页
作者: Nandal, Priyanka Pahal, Sudesh Malik, Sunesh Sehrawat, Neetu Mamta Department of Computer Science and Engineering Maharaja Surajmal Institute of Technology New Delhi India Department of Electronics and Communication Engineering Maharaja Surajmal Institute of Technology New Delhi India Department of Information Technology Maharaja Surajmal Institute of Technology New Delhi India Department of Computer Science and Engineering Panipat Institute of Engineering & Technology New Delhi India
For autonomous driving to operate in a safe and effective manner, efficient and precise object detection is essential. The efficacy of the network model is heavily challenged because of the high-speed movement of vehi... 详细信息
来源: 评论
Diabetic Retinopathy Detection Using PCA-Firefly-DNN Based XAI Framework  12th
Diabetic Retinopathy Detection Using PCA-Firefly-DNN Based X...
收藏 引用
12th International Conference on Recent Trends in Computing, ICRTC 2024
作者: Bhattacharya, Sweta Uppamma, Posham School of Computer Science Engineering and Information Systems VIT Vellore Tamil Nadu Vellore63201 India School of Computer Science and Engineering VIT-AP University Andhra Pradesh Amaravati522237 India
Millions of individuals worldwide are impacted by diabetic retinopathy, which is a leading cause of blindness and vision loss. The early detection of DR is extremely important and machine learning approaches have show... 详细信息
来源: 评论
A Novel 6G Scalable Blockchain Clustering-Based computer Vision Character Detection for Mobile Images
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3041-3070页
作者: Yuejie Li Shijun Li Department of Mathematics and Computer Engineering Ordos Institute of TechnologyOrdos017000China School of Mathematics and Physics North China Electric Power UniversityBeijing102206China School of Electrical Information Hunan University of EngineeringXiangtan411104China
6G is envisioned as the next generation of wireless communication technology,promising unprecedented data speeds,ultra-low Latency,and ubiquitous *** tandem with these advancements,blockchain technology is leveraged t... 详细信息
来源: 评论
Dynamic Charging and Path Planning for UAV-Powered Rechargeable WSNs Using Multi-Agent Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Automation science and engineering 2025年 22卷 15610-15626页
作者: Betalo, Mesfin Leranso Leng, Supeng Seid, Abegaz Mohammed Abishu, Hayla Nahom Erbad, Aiman Bai, Xiaoshan Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Hamad Bin Khalifa University Division of Information and Computing Technology College of Science and Engineering Doha Qatar Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Unmanned Aerial Vehicle (UAV)-powered 5G/6G networks integrated with rechargeable wireless sensor networks (RWSNs) offer promising solutions for extending system lifetime, collecting data, and providing computing serv... 详细信息
来源: 评论
Designing Of Hybrid Intrusion Detection System With Combined Approach Of LightGBM-AE And Double DQN  27
Designing Of Hybrid Intrusion Detection System With Combined...
收藏 引用
27th International Symposium on Wireless Personal Multimedia Communications, WPMC 2024
作者: Sinha, Ditipriya Srivastava, Arpita Singh, Om National Institute of Technology Patna Department of Computer Science and Engineering Patna India Indian Institute of Engineering Science and Technology Shibpur Department of Information Technology Shibpur India
Cyber-attacks are a growing threat to individuals, businesses, and governments. Data science helps improve security by analyzing network traffic and system activities. Intrusion detection systems (IDSs) are essential ... 详细信息
来源: 评论
Exploring the Role of Automated Reasoning in Big Data Analysis  15
Exploring the Role of Automated Reasoning in Big Data Analys...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Neetha, S.S. Sahoo, Girija Shankar Karthigaikuar, P. Jayasudha, S. Shinde, Gitanjali R. Lone, Zeeshan Ahmad Department of Computer Science and Information Technology Karnataka Bangalore India Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Karpagam College of Engineering Department of Electronics and Communication Engineering Coimbatore641032 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Technology Department of Computer Engineering Pune India Vivekananda Global University Department of Computer Science & Engineering Jaipur India
In large-scale data analysis, computer reasoning is an important role. This era can pull significant files from substantial statistics and in a well-timed manner. In this way, through automatic feel, facts scientists ... 详细信息
来源: 评论
Classification-Detection of Metal Surfaces under Lower Edge Sharpness Using a Deep Learning-Based Approach Combined with an Enhanced LoG Operator
收藏 引用
computer Modeling in engineering & sciences 2023年 第11期137卷 1551-1572页
作者: Hong Zhang Jiaming Zhou Qi Wang Chengxi Zhu Haijian Shao School of Electrical Information Engineering Jiangsu University of TechnologyChangzhou213001China Department of Electrical and Computer Engineering University of NevadaLas VegasNV 89154USA
Metal flat surface in-line surface defect detection is notoriously difficult due to obstacles such as high surface reflectivity,pseudo-defect interference,and random elastic *** study evaluates the approach for detect... 详细信息
来源: 评论
Fake review detection using transformer-based enhanced LSTM and RoBERTa
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 250-258页
作者: Mohawesh, Rami Bany Salameh, Haythem Jararweh, Yaser Alkhalaileh, Mohannad Maqsood, Sumbal College of Engineering Al Ain University Al Ain United Arab Emirates Hijjawi Faculty of Engineering Technology Yarmouk University Irbid Jordan Department of Computer Science Jordan University of Science and Technology Jordan College of Education Al Ain University Al Ain United Arab Emirates School of Information Technology University of Tasmania TAS Australia
Internet reviews significantly influence consumer purchase decisions across all types of goods and services. However, fake reviews can mislead both customers and businesses. Many machine learning (ML) techniques have ... 详细信息
来源: 评论
The Politics of Fear and the Experience of Bangladeshi Religious Minority Communities Using Social Media Platforms
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CSCW2期8卷 1-32页
作者: Rifat, Mohammad Rashidujjaman Das, Dipto Podder, Arpon Jannat, Mahiratul Soden, Robert Semaan, Bryan Ahmed, Syed Ishtiaque Department of Computer Science University of Toronto TorontoON Canada Khulna University of Engineering & Technology Khulna Bangladesh Department of Women and Gender Studies University of Dhaka Dhaka Bangladesh Computer Science and School of the Environment University of Toronto TorontoON Canada Department of Information Science University of Colorado Boulder BoulderCO United States
Despite significant research on online harm, polarization, public deliberation, and justice, CSCW still lacks a comprehensive understanding of the experiences of religious minorities, particularly in relation to fear,... 详细信息
来源: 评论