咨询与建议

限定检索结果

文献类型

  • 55,731 篇 会议
  • 28,946 篇 期刊文献
  • 769 册 图书

馆藏范围

  • 85,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53,076 篇 工学
    • 37,996 篇 计算机科学与技术...
    • 30,694 篇 软件工程
    • 14,486 篇 信息与通信工程
    • 8,650 篇 控制科学与工程
    • 6,533 篇 电气工程
    • 6,189 篇 生物工程
    • 6,059 篇 电子科学与技术(可...
    • 4,325 篇 生物医学工程(可授...
    • 4,003 篇 机械工程
    • 3,842 篇 光学工程
    • 2,865 篇 仪器科学与技术
    • 2,652 篇 动力工程及工程热...
    • 2,567 篇 化学工程与技术
    • 2,464 篇 网络空间安全
    • 2,237 篇 安全科学与工程
    • 2,065 篇 交通运输工程
  • 28,083 篇 理学
    • 14,807 篇 数学
    • 7,920 篇 物理学
    • 6,945 篇 生物学
    • 4,836 篇 统计学(可授理学、...
    • 3,121 篇 系统科学
    • 2,750 篇 化学
  • 15,230 篇 管理学
    • 9,389 篇 管理科学与工程(可...
    • 6,502 篇 图书情报与档案管...
    • 3,955 篇 工商管理
  • 4,426 篇 医学
    • 3,661 篇 临床医学
    • 3,253 篇 基础医学(可授医学...
    • 1,950 篇 药学(可授医学、理...
    • 1,931 篇 公共卫生与预防医...
  • 2,483 篇 法学
    • 1,955 篇 社会学
  • 1,503 篇 经济学
  • 1,228 篇 农学
  • 1,073 篇 教育学
  • 378 篇 文学
  • 244 篇 军事学
  • 185 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,281 篇 feature extracti...
  • 2,114 篇 computer science
  • 2,095 篇 accuracy
  • 2,083 篇 deep learning
  • 1,682 篇 machine learning
  • 1,681 篇 computational mo...
  • 1,624 篇 training
  • 1,259 篇 data mining
  • 1,143 篇 internet of thin...
  • 1,119 篇 support vector m...
  • 1,106 篇 optimization
  • 1,046 篇 predictive model...
  • 903 篇 educational inst...
  • 898 篇 real-time system...
  • 896 篇 wireless sensor ...
  • 880 篇 semantics
  • 878 篇 artificial intel...
  • 824 篇 security
  • 793 篇 neural networks
  • 759 篇 image segmentati...

机构

  • 708 篇 school of comput...
  • 531 篇 school of comput...
  • 475 篇 maharishi school...
  • 351 篇 department of co...
  • 277 篇 department of ph...
  • 259 篇 faculté des scie...
  • 251 篇 department of ph...
  • 236 篇 faculty of scien...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 205 篇 department of co...
  • 204 篇 school of comput...
  • 197 篇 department of ph...
  • 197 篇 departamento de ...
  • 190 篇 department of ph...
  • 174 篇 college of compu...
  • 164 篇 department for p...
  • 163 篇 department of ph...
  • 162 篇 department of ph...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 265 篇 g. spigo
  • 260 篇 h. a. gordon
  • 260 篇 f. siegert
  • 254 篇 a. c. könig
  • 247 篇 m. klein
  • 243 篇 y. tayalati
  • 241 篇 niyato dusit
  • 241 篇 r. ströhmer
  • 235 篇 h. sakamoto
  • 226 篇 m. rijssenbeek
  • 208 篇 s. jin
  • 203 篇 d. guest
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 70,596 篇 英文
  • 13,631 篇 其他
  • 1,364 篇 中文
  • 72 篇 日文
  • 27 篇 斯洛文尼亚文
  • 21 篇 德文
  • 20 篇 法文
  • 8 篇 朝鲜文
  • 5 篇 俄文
  • 3 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 波兰文
  • 1 篇 土耳其文
检索条件"机构=Science Program in Information Technology Computer Engineering"
85446 条 记 录,以下是31-40 订阅
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3001-3019页
作者: Nannan Wu Xianyi Chen James Msughter Adeke Junjie Zhao School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform... 详细信息
来源: 评论
Nonparametric Statistical Feature Scaling Based Quadratic Regressive Convolution Deep Neural Network for Software Fault Prediction
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3469-3487页
作者: Sureka Sivavelu Venkatesh Palanisamy School of Computer Science Engineering and Information Systems Vellore Institute of TechnologyVellore632014India
The development of defect prediction plays a significant role in improving software quality. Such predictions are used to identify defective modules before the testing and to minimize the time and cost. The software w... 详细信息
来源: 评论
A Generative Model-Based Network Framework for Ecological Data Reconstruction
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 929-948页
作者: Shuqiao Liu Zhao Zhang Hongyan Zhou Xuebo Chen School of Electronic and Information Engineering University of Science and Technology LiaoningAnshan114051China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection *** Strengths,Weaknesses,Opportunities,Threats(SWOT)ana... 详细信息
来源: 评论
2P3FL:A Novel Approach for Privacy Preserving in Financial Sectors Using Flower Federated Learning
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 2035-2051页
作者: Sandeep Dasari Rajesh Kaluri School of Computer Science Engineering and Information Systems Vellore Institute of TechnologyVellore632014India
The increasing data pool in finance sectors forces machine learning(ML)to step into new *** data has significant financial implications and is *** users data from several organizations for various banking services may... 详细信息
来源: 评论
CRAQL: a novel clustering-based resource allocation using the Q-learning in fog environment
收藏 引用
International Journal of Cloud Computing 2024年 第3期13卷 243-266页
作者: Ahlawat, Chanchal Krishnamurthi, Rajalakshmi Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India
Fog computing is an emerging paradigm that provides services near the end-user. The tremendous increase in IoT devices and big data leads to complexity in fog resource allocation. Inefficient resource allocation can l... 详细信息
来源: 评论
A novel binary quantizer for variational autoencoder-based image compressor
收藏 引用
International Journal of computers and Applications 2024年 第8期46卷 604-620页
作者: Thulasidharan, Pillai Praveen Nath, Keshab Department of Computer Science and Engineering Indian Institute of Information Technology Kottayam India
Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t... 详细信息
来源: 评论
A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 3713-3752页
作者: Arshiya Sajid Ansari Ghadir Altuwaijri Fahad Alodhyani Moulay Ibrahim El-Khalil Ghembaza Shahabas Manakunnath Devasam Paramb Mohammad Sajid Mohammadi Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56447Saudi Arabia
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse *** to their heterogeneous nature and constrained resources... 详细信息
来源: 评论
Enhancing User Experience in AI-Powered Human-computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2909-2929页
作者: Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim51911Saudi Arabia
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
Feature-Grounded Single-Stage Text-to-Image Generation
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 469-480页
作者: Yuan Zhou Peng Wang Lei Xiang Haofeng Zhang School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing 210044China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache... 详细信息
来源: 评论