咨询与建议

限定检索结果

文献类型

  • 10,119 篇 会议
  • 7,348 篇 期刊文献
  • 205 册 图书

馆藏范围

  • 17,672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,131 篇 工学
    • 7,638 篇 计算机科学与技术...
    • 6,228 篇 软件工程
    • 3,039 篇 信息与通信工程
    • 1,823 篇 控制科学与工程
    • 1,464 篇 电气工程
    • 1,390 篇 电子科学与技术(可...
    • 1,266 篇 生物工程
    • 1,006 篇 光学工程
    • 927 篇 生物医学工程(可授...
    • 801 篇 机械工程
    • 643 篇 仪器科学与技术
    • 581 篇 化学工程与技术
    • 566 篇 网络空间安全
    • 524 篇 动力工程及工程热...
    • 437 篇 安全科学与工程
    • 421 篇 交通运输工程
  • 6,182 篇 理学
    • 3,018 篇 数学
    • 2,081 篇 物理学
    • 1,440 篇 生物学
    • 1,015 篇 统计学(可授理学、...
    • 689 篇 化学
    • 592 篇 系统科学
  • 3,032 篇 管理学
    • 1,954 篇 管理科学与工程(可...
    • 1,214 篇 图书情报与档案管...
    • 767 篇 工商管理
  • 1,008 篇 医学
    • 796 篇 临床医学
    • 716 篇 基础医学(可授医学...
    • 465 篇 公共卫生与预防医...
    • 427 篇 药学(可授医学、理...
  • 521 篇 法学
    • 419 篇 社会学
  • 290 篇 经济学
  • 253 篇 农学
  • 174 篇 教育学
  • 90 篇 文学
  • 60 篇 军事学
  • 35 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 488 篇 deep learning
  • 389 篇 accuracy
  • 351 篇 feature extracti...
  • 278 篇 machine learning
  • 276 篇 internet of thin...
  • 264 篇 computer science
  • 263 篇 computational mo...
  • 239 篇 training
  • 225 篇 support vector m...
  • 220 篇 optimization
  • 208 篇 real-time system...
  • 201 篇 data mining
  • 199 篇 predictive model...
  • 176 篇 image segmentati...
  • 165 篇 object detection
  • 160 篇 neural networks
  • 151 篇 wireless sensor ...
  • 147 篇 educational inst...
  • 146 篇 wireless communi...
  • 142 篇 authentication

机构

  • 286 篇 faculty of scien...
  • 285 篇 department for p...
  • 284 篇 department of ph...
  • 281 篇 departamento de ...
  • 276 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 259 篇 faculté des scie...
  • 255 篇 kirchhoff-instit...
  • 226 篇 yerevan physics ...
  • 225 篇 department of ph...
  • 224 篇 department of ph...
  • 224 篇 fakultät für phy...
  • 220 篇 physics division...
  • 210 篇 department of ph...
  • 204 篇 institute of phy...
  • 203 篇 institut für ast...
  • 199 篇 department of ph...
  • 192 篇 department of ph...
  • 176 篇 centre de calcul...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 259 篇 y. nagasaka
  • 251 篇 d. guest
  • 248 篇 s. guindon

语言

  • 14,800 篇 英文
  • 2,576 篇 其他
  • 287 篇 中文
  • 41 篇 日文
  • 7 篇 德文
  • 6 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer and Information Engineering Luoyang Institute of Science and Technology"
17672 条 记 录,以下是261-270 订阅
排序:
An Ensemble Approach for Bundle Recommendation Based on Performance Evaluation  2
An Ensemble Approach for Bundle Recommendation Based on Perf...
收藏 引用
2nd IEEE International Conference on Control, Electronics and computer technology, ICCECT 2024
作者: Zhang, Peng Ma, Ru Zhang, Fuzhi School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Information Science and Engineering Yanshan University Hebei Qinhuangdao China
Aiming at the problems that an individual bundle recommendation approach is prone to producing recommendation bias and has poor generality, we propose an ensemble approach for bundle recommendation based on performanc... 详细信息
来源: 评论
Frequency and Edge Guided Network for Weakly Supervised Salient Object Detection  9
Frequency and Edge Guided Network for Weakly Supervised Sali...
收藏 引用
9th International Conference on Intelligent Informatics and BioMedical sciences, ICIIBMS 2024
作者: Liu, Yuyan Tao, Chenhao Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China University of Shanghai for Science and Technology Shanghai China
Recently, due to the large amount of manpower and material resources required for fully supervised salient object detection in pixel-level label labeling, some weakly supervised salient object detection (SOD) based on... 详细信息
来源: 评论
Motion path planning method based on map reference points
收藏 引用
Multimedia Tools and Applications 2024年 1-21页
作者: Yu, Wenbin Fan, Cheng Zhang, Chengjun Chen, Yadang Li, Yangsong Zhang, Yifan Yin, Na Cen, Xiaolin School of Software Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China School of Computer Science Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China Wuxi Institute of Technology Nanjing University of Information Science and Technology Jiangsu Wuxi214000 China Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China School of Computer Science Northeastern University Boston02101 United States Computer Science and Engineering The University of New South Wales SydneyNSW02101 Australia
In recent years, significant progress has been made in the development of the Rapidly-exploring Random Trees (RRT) algorithm, a probabilistic sampling-based search approach. This algorithm effectively addresses comple... 详细信息
来源: 评论
I/O Efficient Early Bursting Cohesive Subgraph Discovery in Massive Temporal Networks
收藏 引用
Journal of computer science & technology 2022年 第6期37卷 1337-1355页
作者: Yuan Li Jie Dai Xiao-Lin Fan Yu-Hai Zhao Guo-Ren Wang School of Information Science and Technology North China University of TechnologyBeijing 100144China School of Computer Science and Engineering Northeastern UniversityShenyang 110169China School of Computer Beijing Institute of TechnologyBeijing 100081China
Temporal networks are an effective way to encode temporal information into graph data *** the bursting cohesive subgraph(BCS),which accumulates its cohesiveness at the fastest rate,is an important problem in temporal ... 详细信息
来源: 评论
Efficient Authentication System Using Wavelet Embeddings of Otoacoustic Emission Signals
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1851-1867页
作者: V.Harshini T.Dhanwin A.Shahina N.Safiyyah A.Nayeemulla Khan Department of Information Technology Sri Sivasubramaniya Nadar College of EngineeringChennai603110India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the huma... 详细信息
来源: 评论
Maximizing Profit of the Service Providers through Efficient Content Placement and Retrieval in an IoT-enabled Edge-Cloud Platform  18
Maximizing Profit of the Service Providers through Efficient...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Gandhi, Preet Mahanta, Abhishriya Ghose, Manojit Sahu, Aryabartta Indian Institute of Technology Department of Computer Science and Engineering Guwahati India Indian Institute of Technology School of Computing and Electrical Engineering Mandi India Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India
In today's 5G era, the amount of data generated by the Internet of Things (IoT) devices is enormous. Data is processed and stored in the cloud under a traditional cloud computing architecture, and real-time proces... 详细信息
来源: 评论
CVS-FLN: a novel IoT-IDS model based on metaheuristic feature selection and neural network classification model
收藏 引用
Multimedia Tools and Applications 2024年 第39期83卷 86557-86591页
作者: Geetha, R. Jegatheesan, A. Dhanaraj, Rajesh Kumar Vijayalakshmi, K. Nayyar, Anand Arulkumar, V. Velmurugan, J. Thavasimuthu, Rajendran Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Campus Chengalpattu Chennai India Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Pune India Department of Computer Science and Engineering Ramco Institute of Technology Tamil Nadu Rajapalayam India Graduate School Faculty of Information Technology Duy Tan University Da Nang550000 Viet Nam School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
The Internet of Things (IoT) is one of the technologies that will be used all over the world in the future, and its security and privacy features are the primary concerns. However, the most critical limitation to over... 详细信息
来源: 评论
Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL
Journal of ICT Standardization
收藏 引用
Journal of ICT Standardization 2023年 第4期11卷 329-354页
作者: Ulla, Mohammed Mujeer Preethi Khan, Md Sameeruddin Sakkari, Deepak S. School of Computer Science and Engineering Presidency University Karnataka Bangalore India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Computer Science and Engineering Sri Krishna Institute of Technology Bangalore India
Very recent attacks like ladder leaks demonstrated the feasibility of recovering private keys with side-channel attacks using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some attacks ... 详细信息
来源: 评论
LKAW: A Robust Watermarking Method Based on Large Kernel Convolution and Adaptive Weight Assignment
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1-17页
作者: Xiaorui Zhang Rui Jiang Wei Sun Aiguo Song Xindong Wei Ruohan Meng Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China School of Instrument Science and Engineering Southeast UniversityNanjing211189China School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Science Engineering Nanyang Technological UniversitySingapore
Robust watermarking requires finding invariant features under multiple attacks to ensure correct *** learning has extremely powerful in extracting features,and watermarking algorithms based on deep learning have attra... 详细信息
来源: 评论
AI LipReader-Transcribing Speech from Lip Movements  6
AI LipReader-Transcribing Speech from Lip Movements
收藏 引用
6th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2024
作者: Ajitha, D. Dutta, Disha Saha, Falguni Giri, Parus Kant, Rohan School of Computer Science and Engineering Vellore Institute of Technology Vellore Department of Software Systems Vellore India School of Computer Science and Engineering Vellore Institute of Technology Department of Database Systems Vellore India School of Computer Science and Engineering Vellore Institute of Technology Vellore Department of Information Security Vellore India
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks... 详细信息
来源: 评论