咨询与建议

限定检索结果

文献类型

  • 55,731 篇 会议
  • 28,946 篇 期刊文献
  • 769 册 图书

馆藏范围

  • 85,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53,076 篇 工学
    • 37,996 篇 计算机科学与技术...
    • 30,694 篇 软件工程
    • 14,486 篇 信息与通信工程
    • 8,650 篇 控制科学与工程
    • 6,533 篇 电气工程
    • 6,189 篇 生物工程
    • 6,059 篇 电子科学与技术(可...
    • 4,325 篇 生物医学工程(可授...
    • 4,003 篇 机械工程
    • 3,842 篇 光学工程
    • 2,865 篇 仪器科学与技术
    • 2,652 篇 动力工程及工程热...
    • 2,567 篇 化学工程与技术
    • 2,464 篇 网络空间安全
    • 2,237 篇 安全科学与工程
    • 2,065 篇 交通运输工程
  • 28,083 篇 理学
    • 14,807 篇 数学
    • 7,920 篇 物理学
    • 6,945 篇 生物学
    • 4,836 篇 统计学(可授理学、...
    • 3,121 篇 系统科学
    • 2,750 篇 化学
  • 15,230 篇 管理学
    • 9,389 篇 管理科学与工程(可...
    • 6,502 篇 图书情报与档案管...
    • 3,955 篇 工商管理
  • 4,426 篇 医学
    • 3,661 篇 临床医学
    • 3,253 篇 基础医学(可授医学...
    • 1,950 篇 药学(可授医学、理...
    • 1,931 篇 公共卫生与预防医...
  • 2,483 篇 法学
    • 1,955 篇 社会学
  • 1,503 篇 经济学
  • 1,228 篇 农学
  • 1,073 篇 教育学
  • 378 篇 文学
  • 244 篇 军事学
  • 185 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,281 篇 feature extracti...
  • 2,114 篇 computer science
  • 2,095 篇 accuracy
  • 2,083 篇 deep learning
  • 1,682 篇 machine learning
  • 1,681 篇 computational mo...
  • 1,624 篇 training
  • 1,259 篇 data mining
  • 1,143 篇 internet of thin...
  • 1,119 篇 support vector m...
  • 1,106 篇 optimization
  • 1,046 篇 predictive model...
  • 903 篇 educational inst...
  • 898 篇 real-time system...
  • 896 篇 wireless sensor ...
  • 880 篇 semantics
  • 878 篇 artificial intel...
  • 824 篇 security
  • 793 篇 neural networks
  • 759 篇 image segmentati...

机构

  • 708 篇 school of comput...
  • 531 篇 school of comput...
  • 475 篇 maharishi school...
  • 351 篇 department of co...
  • 277 篇 department of ph...
  • 259 篇 faculté des scie...
  • 251 篇 department of ph...
  • 236 篇 faculty of scien...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 205 篇 department of co...
  • 204 篇 school of comput...
  • 197 篇 department of ph...
  • 197 篇 departamento de ...
  • 190 篇 department of ph...
  • 174 篇 college of compu...
  • 164 篇 department for p...
  • 163 篇 department of ph...
  • 162 篇 department of ph...
  • 160 篇 department of co...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 265 篇 g. spigo
  • 260 篇 h. a. gordon
  • 260 篇 f. siegert
  • 254 篇 a. c. könig
  • 247 篇 m. klein
  • 243 篇 y. tayalati
  • 241 篇 niyato dusit
  • 241 篇 r. ströhmer
  • 235 篇 h. sakamoto
  • 226 篇 m. rijssenbeek
  • 208 篇 s. jin
  • 203 篇 d. guest
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 70,596 篇 英文
  • 13,631 篇 其他
  • 1,364 篇 中文
  • 72 篇 日文
  • 27 篇 斯洛文尼亚文
  • 21 篇 德文
  • 20 篇 法文
  • 8 篇 朝鲜文
  • 5 篇 俄文
  • 3 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 波兰文
  • 1 篇 土耳其文
检索条件"机构=Science Program in Information Technology Computer Engineering"
85446 条 记 录,以下是81-90 订阅
排序:
Development of optimized cascaded LSTM with Seq2seqNet and transformer net for aspect-based sentiment analysis framework
收藏 引用
Web Intelligence 2025年 第Pre-press期Pre-press卷 1-26页
作者: Ramasamy, Mekala Elangovan, Mohanraj Department of Information Science and Engineering Bannari Amman Institute of Technology India Department of Computer Science and Engineering K.S. Rangasamy College of Technology India
The recent development of communication technologies made it possible for people to share opinions on various social media platforms. The opinion of the people is converted into small-sized textual data. Aspect Based ... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing Algorithm
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
From light sensing to adaptive learning:hafnium diselenide reconfigurable memcapacitive devices in neuromorphic computing
收藏 引用
Light(science & Applications) 2025年 第1期14卷 215-226页
作者: Bashayr Alqahtani Hanrui Li Abdul Momin Syed Nazek El-Atab Electrical and Computer Engineering Program Computer Electrical Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)ThuwalSaudi Arabia Electrical Engineering Department College of EngineeringPrincess Nourah Bint Abdulrahman University(PNU)RiyadhSaudi Arabia
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris... 详细信息
来源: 评论
A systematic review on deep learning implementation in brain tumor segmentation, classification and prediction
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Abid, Muhammad Adeel Munir, Kashif Institute of Computer Science Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan Pakistan Institute of Information Technology Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan Pakistan
The brain is the central part of the body that controls the overall functionality of the human body. The formulation of abnormal cells in the brain may lead to a brain tumor. Manual examination of a brain tumor is cha... 详细信息
来源: 评论
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1383-1398页
作者: Xueqing YAN Yongming LI Sanjiang LI School of Computer Science Shaanxi Normal University School of Mathematics and Statistics Shaanxi Normal University Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile... 详细信息
来源: 评论
A Novel Reliable and Trust Objective Function for RPL-Based IoT Routing Protocol
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3467-3497页
作者: Mariam A.Alotaibi Sami S.Alwakeel Aasem N.Alyahya Department of Computer Engineering College of Computer ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia
The Internet of Things (IoT) integrates diverse devices into the Internet infrastructure, including sensors, meters, and wearable devices. Designing efficient IoT networks with these heterogeneous devices requires the... 详细信息
来源: 评论
An enhanced AMBTC for color image compression using color palette
收藏 引用
Multimedia Tools and Applications 2024年 第11期83卷 31783-31803页
作者: Xiong, Lizhi Zhang, Mengtao Yang, Ching-Nung Kim, Cheonshik School of Computer Science Nanjing University of Information Science and Technology Nanjing China Department of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan Department of Computer Engineering Sejong University Seoul Korea Republic of
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T... 详细信息
来源: 评论
SmartEagleEye:A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 766-783页
作者: Xin Liu Yingli Zhang Qingchen Yu Jiajun Min Jun Shen Rui Zhou Qingguo Zhou School of Information Science and Engineering Lanzhou UniversityLanzhou 730000China College of Computer Science and Technology Zhejiang UniversityHangzhou 310058China School of Computing and Information Technology University of WollongongWollongong 2500Australia
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin... 详细信息
来源: 评论
Vision-based Robotic Arm Control for Screwdriver Bit Placement Tasks
收藏 引用
Sensors and Materials 2024年 第3期36卷 1003-1018页
作者: Lin, Cheng-Jian Lin, Pei-Jung Shih, Chi-Huang Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung411 Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung407 Taiwan
Robotic arms are widely used in the automation industry to package and deliver classified objects. When the products are small objects with very similar shapes, such as screwdriver bits with slightly different threads... 详细信息
来源: 评论