咨询与建议

限定检索结果

文献类型

  • 6,177 篇 会议
  • 5,196 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,400 篇 工学
    • 5,327 篇 计算机科学与技术...
    • 4,386 篇 软件工程
    • 1,746 篇 信息与通信工程
    • 1,064 篇 控制科学与工程
    • 900 篇 生物工程
    • 866 篇 电气工程
    • 676 篇 电子科学与技术(可...
    • 600 篇 生物医学工程(可授...
    • 556 篇 光学工程
    • 538 篇 机械工程
    • 366 篇 仪器科学与技术
    • 344 篇 化学工程与技术
    • 318 篇 动力工程及工程热...
    • 316 篇 网络空间安全
    • 264 篇 交通运输工程
    • 249 篇 安全科学与工程
  • 4,100 篇 理学
    • 2,036 篇 数学
    • 1,294 篇 物理学
    • 1,009 篇 生物学
    • 681 篇 统计学(可授理学、...
    • 415 篇 系统科学
    • 375 篇 化学
  • 2,056 篇 管理学
    • 1,214 篇 管理科学与工程(可...
    • 920 篇 图书情报与档案管...
    • 573 篇 工商管理
  • 612 篇 医学
    • 527 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 258 篇 药学(可授医学、理...
  • 393 篇 法学
    • 306 篇 社会学
  • 188 篇 经济学
  • 155 篇 教育学
  • 141 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 304 篇 deep learning
  • 260 篇 feature extracti...
  • 260 篇 machine learning
  • 224 篇 computational mo...
  • 208 篇 accuracy
  • 187 篇 semantics
  • 175 篇 internet of thin...
  • 175 篇 predictive model...
  • 167 篇 training
  • 149 篇 real-time system...
  • 118 篇 data mining
  • 114 篇 neural networks
  • 113 篇 support vector m...
  • 113 篇 optimization
  • 112 篇 artificial intel...
  • 111 篇 security
  • 106 篇 computer science
  • 95 篇 visualization
  • 92 篇 data models
  • 90 篇 cloud computing

机构

  • 175 篇 university of ch...
  • 123 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 95 篇 hebei normal uni...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 88 篇 school of comput...
  • 87 篇 department of ph...
  • 78 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 57 篇 school of inform...
  • 57 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 school of comput...
  • 53 篇 college of compu...
  • 53 篇 college of intel...
  • 52 篇 institute for nu...
  • 52 篇 school of physic...

作者

  • 97 篇 niyato dusit
  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 9,626 篇 英文
  • 1,742 篇 其他
  • 130 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11498 条 记 录,以下是951-960 订阅
排序:
Study on Improved YOLOv7-based Algorithm for Detecting Crack Defects in Ancient Buildings  24
Study on Improved YOLOv7-based Algorithm for Detecting Crack...
收藏 引用
3rd International Conference on Computer, Artificial Intelligence and Control Engineering, CAICE 2024
作者: Fang, Tianke Hui, Zhenxing Rey, William P Xie, Zhiying Yang, Aihua He, Yuanrong School of Information Technology Mapua University Manila1200 Philippines Big Data Institute of Digital Natural Disaster Monitoring in Fujian Xiamen University of Technology Xiamen Fujian361024 China School of Computing and Information Engineering Xiamen University of Technology Xiamen Fujian361024 China School of Information Media Zhangzhou Vocational College of Science and Technology Zhangzhou Fujian363200 China Hunan Key Laboratory of Remote Sensing Monitoring of Ecological Environment Dongting Lake Area Changsha Hunan410004 China
In the protection and restoration work of ancient buildings, the detection and analysis of the cracks and defects of the exterior walls of ancient buildings is a crucial task. In this paper, an improved YOLOv7 algorit... 详细信息
来源: 评论
Dates Fruit Recognition: From Classical Fusion to Deep Learning
收藏 引用
Computer Systems science & Engineering 2022年 第1期40卷 151-166页
作者: Khaled Marji Alresheedi Suliman Aladhadh Rehan Ullah Khan Ali Mustafa Qamar Department of Computer Science College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Information Technology College of ComputerQassim UniversityBuraydahSaudi Arabia Department of Computing School of Electrical Engineering and Computer Science(SEECS)National University of Sciences and Technology(NUST)IslamabadPakistan
There are over 200 different varieties of dates fruit in the ***,every single type has some very specific features that differ from the *** recent years,sorting,separating,and arranging in automated industries,in frui... 详细信息
来源: 评论
Defending Against Digital Threats: Machine Learning Techniques for Cyber Persecution Detection  5
Defending Against Digital Threats: Machine Learning Techniqu...
收藏 引用
5th International Conference on Artificial Intelligence and Data sciences, AiDAS 2024
作者: Chinnasamy, P. Ayyasamy, Ramesh Kumar Krishnan, Kesavan Kumar, Vijay Jalil, Norazira Binti A Kiran, Ajmeera School of Computing Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu India Faculty of Information and Communication Technology Kampar Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Kuala Lumpur Malaysia Graphic Era Hill University Department of Physics Dehardun India Graphic Era Deemed to be University Dehradun India Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India
Cyber persecution has become a widespread problem on the social media. It has resulted in omissions such as suicide and sadness. Content regulation on social media sites is becoming increasingly important. The followi... 详细信息
来源: 评论
Dimensionality-driven metal to Mott insulator transition in two-dimensional 1T-TaSe2
收藏 引用
National science Review 2024年 第3期11卷 108-118页
作者: Ning Tian Zhe Huang Bo Gyu Jang Shuaifei Guo Ya-Jun Yan Jingjing Gao Yijun Yu Jinwoong Hwang Cenyao Tang Meixiao Wang Xuan Luo Yu Ping Sun Zhongkai Liu Dong-Lai Feng Xianhui Chen Sung-Kwan Mo Minjae Kim Young-Woo Son Dawei Shen Wei Ruan Yuanbo Zhang State Key Laboratory of Surface Physics New Cornerstone Science Laboratory and Department of PhysicsFudan University Shanghai Qi Zhi Institute Shanghai Research Center for Quantum Sciences Institute for Nanoelectronic Devices and Quantum Computing Fudan University Zhangjiang Fudan International Innovation Center Fudan University State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Microsystem and Information Technology(SIMIT)Chinese Academy of Sciences School of Physical Science and Technology ShanghaiTech University Korea Institute for Advanced Study School of Emerging Technology and Department of Physics University of Science and Technology of China Advanced Light Source Lawrence Berkeley National Laboratory ShanghaiTech Laboratory for Topological Physics Key Laboratory of Materials Physics Institute of Solid State Physics Hefei Institutes of Physical ScienceChinese Academy of Sciences High Magnetic Field Laboratory Hefei Institutes of Physical Science Chinese Academy of Sciences Collaborative Innovation Centre of Advanced Microstructures Nanjing University Department of Physics University of Science and Technology of China and Key Laboratory of Strongly Coupled Quantum Matter Physics Chinese Academy of Sciences National Synchrotron Radiation Laboratory University of Science and Technology of China
Two-dimensional materials represent a major frontier for research into exotic many-body quantum phenomena. In the extreme two-dimensional limit, electron-electron interaction often dominates over other electronic ener... 详细信息
来源: 评论
Grid Search Hyperparameters Tuning with Supervised Machine Learning for Awngi Language Named Entity Recognition  2
Grid Search Hyperparameters Tuning with Supervised Machine L...
收藏 引用
2nd International Conference Computational and Characterization Techniques in Engineering and sciences, IC3TES 2024
作者: Ayalew, Amogne Andualem Bitew, Gizachew Salau, Ayodeji Olalekan Tegegne, Melaku Lake Gupta, Shashi Kant Israr, Mohammad Tegegne, Tesfa Assegie, Tsehay Admassu Mizan-Tepi University School of Computing and Informatics Department of Information Technology Tepi Ethiopia Mizan Tepi University School of Computing Computer Science Department Mizan-Tepi Ethiopia Afe Babalola University Department of Electrical/Electronics and Computer Engineering Ado-Ekiti Nigeria Injibara University College of Engineering and Technology Department of Information Technology Injibara Ethiopia Eudoxia Research University Department of Computer Science and Engineering United States Maryam Abacha American University of Nigeria Hotoro Gra Kano State Nigeria Bahir Dar University Faculty of Computing Bahir Dar Institute of Technology Bahir Dara Ethiopia Injibara University College of Engineering and Technology Department of Computer Science Injibara Ethiopia
Named entity recognition has emerged as a critical step in recognizing, classifying, and extracting the most significant information from unstructured text without human intervention. It is used in information retriev... 详细信息
来源: 评论
JetVision: A Low-Cost Real-Time Depth Estimation System using Jetson computing Platform  9
JetVision: A Low-Cost Real-Time Depth Estimation System usin...
收藏 引用
9th IEEE International Conference on Electronics, computing and Communication Technologies, CONECCT 2023
作者: Mandal, Siddhanta Cholachgudda, Kartik E. Chamakura, Lohith V. Biradar, Rajashekhar C. Devanagavi, Geetha D. Reva University School of Computer Science and Engineering Bengaluru India Reva University School of Electronics and Communication Engineering Bengaluru India Reva University School of Computing and Information Technology Bengaluru India
Stereo vision is an important technique in computer vision that enables depth information to be extracted from a pair of cameras. Depth estimation has numerous applications across various fields. Some of the notable a... 详细信息
来源: 评论
How to Construct Public Timeline for RSA-Formed Time-Lock Cryptography  20th
How to Construct Public Timeline for RSA-Formed Time-Lock ...
收藏 引用
20th International Conference on information Security and Cryptology, Inscrypt 2024
作者: Jin, Huixuan Peng, Cong Fu, Jintao Luo, Min Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Henan Key Laboratory of Network Cryptography Technology Henan Zhengzhou China Inspur Academy of Science and Technology Jinan China
Time-Locked Puzzle (TLP) and timed-release encryption (T-RE) are both time-based locking mechanisms. The former requires the decryptor to perform a predetermined amount of computation, while the latter requires a trus... 详细信息
来源: 评论
An Effective Fire Detection Algorithm Based on Improved YOLOv7  24
An Effective Fire Detection Algorithm Based on Improved YOLO...
收藏 引用
6th International Conference on Control and Computer Vision, ICCCV 2024
作者: Shen, Jing Wang, Xue Alghazzawi, Daniyal Aldhaheri, Sahar Business School Hubei University Hubei Wuhan430062 China College of Automation and Electronic Engineering Qingdao University of Science and Technology Shandong Qingdao266061 China Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
In the critical domain of fire detection, essential for safeguarding public safety and industrial assets, traditional methods have struggled with issues like low accuracy and slow response times, compromising real-tim... 详细信息
来源: 评论
Classification of SEMG Signal Based Hand Movements by Using Support Vector Machine  6
Classification of SEMG Signal Based Hand Movements by Using ...
收藏 引用
6th IEEE Symposium on Computers and Informatics, ISCI 2024
作者: Zahra, Syeda Rabail Ismail, Sadia Ali, Muhammad Danish Khan, Muhammad Amir Darus, Mohamad Yusof Mazhar, Tahseen Gomal University Institute of Computing & Information Technology Dera Ismail Khan Pakistan University Islamabad Computer Science Comsats Abbottabad Pakistan Universiti Teknologi Mara School of Computing Sciences College of Computing Informatics and Mathematics Selangor Shah Alam40450 Malaysia Virtual University of Pakistan Department of Computer Science Pakistan
This paper explores the application of Surface Electromyography (SEMG) for hand movement classification using machine learning techniques. SEMG signals play a crucial role in sports medicine, rehabilitation, prosthesi... 详细信息
来源: 评论
Practical fixed-time adaptive fuzzy control of uncertain nonlinear systems with time-varying asymmetric constraints: a unified barrier function based approach
收藏 引用
Frontiers of information technology & Electronic Engineering 2024年 第9期25卷 1282-1294页
作者: Zixuan HUANG Huanqing WANG Ben NIU Xudong ZHAO Adil M.AHMAD College of Engineering Bohai UniversityJinzhou 121013China College of Mathematical Science Bohai UniversityJinzhou 121013China School of Information Science and Engineering Shandong Normal UniversityJinan 250014China Faculty of Electronic Information and Engineering Dalian University of TechnologyDalian 116024China Communication Systems and Networks Research Group Department of Information TechnologyFaculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia
A practical fixed-time adaptive fuzzy control strategy is investigated for uncertain nonlinear systems with time-varying asymmetric constraints and input quantization. To overcome the difficulties of designing control... 详细信息
来源: 评论