咨询与建议

限定检索结果

文献类型

  • 738,982 篇 会议
  • 16,354 篇 期刊文献
  • 4,346 册 图书
  • 27 篇 学位论文
  • 3 篇 科技报告

馆藏范围

  • 759,704 篇 电子文献
  • 17 种 纸本馆藏

日期分布

学科分类号

  • 466,253 篇 工学
    • 344,006 篇 计算机科学与技术...
    • 249,137 篇 软件工程
    • 120,095 篇 信息与通信工程
    • 63,559 篇 控制科学与工程
    • 59,315 篇 电气工程
    • 44,039 篇 生物工程
    • 39,950 篇 电子科学与技术(可...
    • 35,995 篇 机械工程
    • 31,658 篇 生物医学工程(可授...
    • 25,060 篇 光学工程
    • 24,271 篇 仪器科学与技术
    • 21,122 篇 动力工程及工程热...
    • 19,497 篇 化学工程与技术
    • 16,661 篇 安全科学与工程
    • 16,243 篇 交通运输工程
    • 13,916 篇 网络空间安全
  • 190,465 篇 理学
    • 102,780 篇 数学
    • 48,008 篇 生物学
    • 45,908 篇 物理学
    • 30,862 篇 统计学(可授理学、...
    • 20,809 篇 系统科学
    • 19,511 篇 化学
  • 118,283 篇 管理学
    • 74,448 篇 管理科学与工程(可...
    • 49,606 篇 图书情报与档案管...
    • 33,773 篇 工商管理
  • 28,877 篇 医学
    • 24,402 篇 临床医学
    • 21,148 篇 基础医学(可授医学...
  • 20,009 篇 法学
    • 15,887 篇 社会学
  • 16,057 篇 教育学
    • 15,301 篇 教育学
  • 13,870 篇 经济学
    • 13,666 篇 应用经济学
  • 9,297 篇 农学
  • 5,332 篇 文学
  • 2,048 篇 军事学
  • 1,737 篇 艺术学
  • 73 篇 哲学
  • 72 篇 历史学

主题

  • 26,894 篇 computer science
  • 20,733 篇 feature extracti...
  • 19,573 篇 computational mo...
  • 18,355 篇 training
  • 17,818 篇 accuracy
  • 17,136 篇 neural networks
  • 15,953 篇 deep learning
  • 14,227 篇 computer archite...
  • 11,774 篇 wireless sensor ...
  • 11,002 篇 data mining
  • 10,886 篇 convolutional ne...
  • 10,861 篇 machine learning
  • 10,815 篇 predictive model...
  • 10,356 篇 protocols
  • 9,848 篇 computer network...
  • 9,792 篇 data models
  • 8,889 篇 support vector m...
  • 8,596 篇 real-time system...
  • 8,593 篇 routing
  • 8,546 篇 educational inst...

机构

  • 2,406 篇 department of co...
  • 2,115 篇 chitkara univers...
  • 1,425 篇 school of comput...
  • 1,328 篇 university of sc...
  • 1,308 篇 university of ch...
  • 1,301 篇 school of comput...
  • 1,203 篇 university of el...
  • 1,128 篇 college of compu...
  • 796 篇 school of comput...
  • 689 篇 huazhong univers...
  • 644 篇 school of comput...
  • 638 篇 college of compu...
  • 629 篇 school of comput...
  • 579 篇 school of comput...
  • 561 篇 lovely professio...
  • 543 篇 maharishi school...
  • 527 篇 college of compu...
  • 498 篇 state key labora...
  • 497 篇 school of comput...
  • 476 篇 school of comput...

作者

  • 747 篇 wang wei
  • 645 篇 yang yang
  • 590 篇 liu yang
  • 562 篇 wang lei
  • 482 篇 li li
  • 451 篇 zhang lei
  • 410 篇 li yang
  • 369 篇 wei li
  • 345 篇 li wei
  • 312 篇 china
  • 301 篇 zhang wei
  • 299 篇 lei wang
  • 297 篇 wei wang
  • 288 篇 li bo
  • 276 篇 wang jing
  • 272 篇 zhang yan
  • 267 篇 wang jian
  • 254 篇 li xin
  • 253 篇 wei liu
  • 239 篇 kukreja vinay

语言

  • 738,847 篇 英文
  • 14,074 篇 其他
  • 8,472 篇 中文
  • 40 篇 俄文
  • 38 篇 法文
  • 32 篇 西班牙文
  • 21 篇 土耳其文
  • 15 篇 德文
  • 9 篇 葡萄牙文
  • 6 篇 乌克兰文
  • 2 篇 阿拉伯文
  • 1 篇 日文
检索条件"任意字段=International Conference on Computer Science and Network Technology"
759713 条 记 录,以下是231-240 订阅
排序:
Improving Scattered Defect Grading in Castings Digital Radiographs via Smoothing the One-Hot Encoding
收藏 引用
international JOURNAL OF METALCASTING 2025年 第1期19卷 531-543页
作者: Yu, Han Li, Xingjie Hao, Xue Song, Zhaowei Liu, Shangyu Li, Xinyue Hou, Chunyu Xie, Huasheng China Acad Machinery Shenyang Res Inst Foundry Co Ltd Natl Key Lab Adv Casting Technol Shenyang Liaoning Peoples R China
Ensuring the precise grading of discontinuities is imperative to guarantee the quality of castings and enhance profitability in casting production. Recent grading methods leveraging computer vision are advanced by per... 详细信息
来源: 评论
Serial Local Patterns and Irregular Dependencies Extract and Cascaded Fusion network for Structural Crack Segmentation
Serial Local Patterns and Irregular Dependencies Extract and...
收藏 引用
2025 IEEE international conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Hui Jia, Chen Cheng, Xu Liu, Xiufeng Shi, Fan School of Computer Science and Engineering Tianjin University of Technology Tianjin China Department of Technology Management and Economics Technical University of Denmark Kongens Lyngby Denmark
Achieving pixel-level crack segmentation in complex scenarios is a major challenge, as current methods have difficulty effectively integrating both local features and irregular pixel dependencies. In this paper, we in... 详细信息
来源: 评论
Evolutionary game of international trade network based on trade policy differences
收藏 引用
SCIENTIFIC REPORTS 2025年 第1期15卷 1-10页
作者: Zheng, Jun Wang, Junfang Shen, Aizhong Nanchang Inst Sci & Technol Sch Econ & Management Nanchang 330108 Peoples R China North China Univ Water Resources & Elect Power Sch Math & Stat Zhengzhou 450045 Peoples R China Chaohu Univ Coll Business Adm Hefei 238024 Peoples R China
Trade policy differences among different countries are important factors affecting international trade cooperation. In this paper, we build an evolutionary game model of international trade in which complex networks p... 详细信息
来源: 评论
Improving Library Resource Access with Face Recognition-Enhanced VPN Security
IAENG International Journal of Computer Science
收藏 引用
IAENG international Journal of computer science 2025年 第4期52卷 1098-1115页
作者: Balachandran, S. Dominic, J. Hindustan Institute of Technology and Science Tamil Nadu Chennai India Central Library of the Hindustan Institute of Technology and Science Tamil Nadu Chennai India
In the digital age, where data security is paramount, managing the security of library repositories poses significant challenges due to the increasing threat of unauthorized access and data breaches. Face recognition ... 详细信息
来源: 评论
Research on the network Security Construction Plan of Emergency Command System for Public Health Emergencies  24
Research on the Network Security Construction Plan of Emerge...
收藏 引用
5th international conference on computer science and Management technology, ICCSMT 2024
作者: Zhang, Xi Deng, Kai Fu, Bing Chen, Qingkun Zheng, Yang Wan, Yanli Xie, Liqin Hu, Hongpu Institute of Medical Information Chinese Academy of Medical Sciences Peking Union Medical College Beijing China Beijing Public Health Emergency Management Center Beijing China Institute of Medical Information School of Humanities and Social Sciences School of Marxism Chinese Academy of Medical Sciences Peking Union Medical College Beijing China
This study constructs or strengthens the network security of the emergency command system from all aspects based on different requirements such as secure physical environment, secure communication network, secure area... 详细信息
来源: 评论
A multi-input parallel convolutional attention network for tool wear monitoring
收藏 引用
international JOURNAL OF computer INTEGRATED MANUFACTURING 2025年 第1期38卷 23-39页
作者: Liu, Qiang Li, Dingkun Ma, Jing Wei, Xudong Bai, Zhengyan Minist Educ Key Lab Adv Mfg & Intelligent Technol Harbin Peoples R China Harbin Univ Sci & Technol Postdoctoral Mobile Stn Instrument Sci & Technol Harbin Peoples R China
Effective tool wear monitoring is of great importance for machining process. With existing deep learning-based methods, the end-to-end model is often combined with sensor data to predict the state of the tool wear. Th... 详细信息
来源: 评论
GRU-Based Winner Subcarrier Detection in Frequency Domain Contention  24
GRU-Based Winner Subcarrier Detection in Frequency Domain Co...
收藏 引用
7th international conference on Information science and Systems, ICISS 2024
作者: Yao, Shumin Zhao, Qinglin Xu, Zezhou Feng, Li Li, Guanghui Tian, Liwei Sun, Yi School of Computer Science and Engineering Macau University of Science and Technology China Department of Broadband Communication Pengcheng Laboratory China School of Artificial Intelligence and Computer Science Jiangnan University China Department of Computer Guangdong University of Science and Technology China Institute of Computing Technology Chinese Academy of Sciences China
Single-carrier frequency domain contention (S-FDC) is an efficient wireless contention mechanism based on orthogonal frequency-division multiplexing (OFDM). In each round of S-FDC, each node randomly selects and signa... 详细信息
来源: 评论
Brain Tumour Detection using MRI Images  1
Brain Tumour Detection using MRI Images
收藏 引用
1st international conference on Intelligent Systems and Computational networks, ICISCN 2025
作者: Jayashree Mallick, Ahmed Faraz Das, Ashutosh Singh, Abhiraj Shivaprakash, T. Preethi Salian, K. Nitte Meenakshi Institute of Technology Dept of Computer Science and Engineering Bangalore India Nitte Meenakshi Institute of Technology Dept of Computer Science and Engineering India Vijaya Vittala Institute of Technology Dept of Computer Science and Engineering Bangalore India Nmamit Dept of Information Science and Engineering Nitte Udupi India
An essential diagnostic technique for brain tumors, Magnetic Resonance Imaging (MRI) enables early detection and improved patient outcomes. However, manual interpretation of MRI scans can be time-consuming and subject... 详细信息
来源: 评论
Improvement and Performance of Data Transmission Algorithms in computer Communications  14
Improvement and Performance of Data Transmission Algorithms ...
收藏 引用
14th IEEE international conference on Communication Systems and network Technologies, CSNT 2025
作者: Liu, Yi Liu, Hao Cheng, Yun Cheng, Siqiang Information School Hunan University of Humanities Science and Technology Loudi417000 China
In response to the current problems of low data transmission efficiency, high latency, and insufficient stability in computer communications, this paper studies a comprehensive optimized data transmission algorithm, w... 详细信息
来源: 评论
InTrust: An Asset Monitoring, Analysis and Vulnerability Assessment System for Zero Trust network  20th
InTrust: An Asset Monitoring, Analysis and Vulnerability Ass...
收藏 引用
20th international conference on Information Systems Security
作者: Muraleedharan, N. Neve, Hrishikesh Rajendra Sarkar, Samar Rajendran, Balaji Ctr Dev Adv Comp C DAC Bangalore Karnataka India
In the present day, as the number of connected devices increases exponentially, an organization faces challenges in monitoring, managing and detecting vulnerable devices. Moreover, by the introduction of Bring Your Ow... 详细信息
来源: 评论