咨询与建议

限定检索结果

文献类型

  • 572,115 篇 会议
  • 7,442 篇 期刊文献
  • 4,795 册 图书
  • 9 篇 学位论文

馆藏范围

  • 584,353 篇 电子文献
  • 22 种 纸本馆藏

日期分布

学科分类号

  • 336,463 篇 工学
    • 240,749 篇 计算机科学与技术...
    • 196,632 篇 软件工程
    • 79,628 篇 信息与通信工程
    • 50,808 篇 控制科学与工程
    • 36,944 篇 电气工程
    • 34,400 篇 生物工程
    • 32,613 篇 电子科学与技术(可...
    • 29,914 篇 机械工程
    • 28,597 篇 生物医学工程(可授...
    • 21,783 篇 光学工程
    • 19,294 篇 仪器科学与技术
    • 16,430 篇 动力工程及工程热...
    • 16,168 篇 化学工程与技术
    • 13,411 篇 安全科学与工程
    • 12,165 篇 交通运输工程
    • 10,697 篇 材料科学与工程(可...
  • 152,828 篇 理学
    • 84,666 篇 数学
    • 37,734 篇 物理学
    • 36,865 篇 生物学
    • 25,735 篇 统计学(可授理学、...
    • 18,331 篇 系统科学
    • 15,839 篇 化学
  • 91,034 篇 管理学
    • 56,445 篇 管理科学与工程(可...
    • 39,134 篇 图书情报与档案管...
    • 27,220 篇 工商管理
  • 23,509 篇 医学
    • 19,903 篇 临床医学
    • 18,770 篇 基础医学(可授医学...
    • 12,345 篇 药学(可授医学、理...
  • 14,554 篇 法学
    • 11,971 篇 社会学
  • 10,753 篇 教育学
  • 10,633 篇 经济学
    • 10,559 篇 应用经济学
  • 8,031 篇 农学
  • 4,062 篇 文学
  • 1,585 篇 军事学
  • 1,317 篇 艺术学
  • 51 篇 哲学
  • 33 篇 历史学

主题

  • 26,432 篇 computer science
  • 16,887 篇 feature extracti...
  • 16,857 篇 computational mo...
  • 16,184 篇 accuracy
  • 13,736 篇 training
  • 11,077 篇 deep learning
  • 10,944 篇 computer archite...
  • 9,482 篇 data mining
  • 9,112 篇 machine learning
  • 9,087 篇 predictive model...
  • 8,738 篇 support vector m...
  • 8,455 篇 neural networks
  • 8,045 篇 data models
  • 7,810 篇 real-time system...
  • 7,385 篇 optimization
  • 7,238 篇 software enginee...
  • 7,197 篇 educational inst...
  • 7,117 篇 convolutional ne...
  • 6,900 篇 artificial intel...
  • 6,637 篇 testing

机构

  • 1,917 篇 chitkara univers...
  • 1,390 篇 school of comput...
  • 1,110 篇 school of comput...
  • 1,087 篇 school of comput...
  • 890 篇 school of comput...
  • 758 篇 department of co...
  • 711 篇 department of co...
  • 682 篇 school of comput...
  • 675 篇 school of comput...
  • 607 篇 school of comput...
  • 601 篇 college of compu...
  • 589 篇 department of co...
  • 588 篇 lovely professio...
  • 548 篇 school of comput...
  • 511 篇 maharishi school...
  • 484 篇 college of compu...
  • 462 篇 college of compu...
  • 447 篇 college of compu...
  • 432 篇 school of comput...
  • 423 篇 university of ch...

作者

  • 325 篇 wang wei
  • 279 篇 yang liu
  • 273 篇 wei wang
  • 268 篇 yang yang
  • 268 篇 li wei
  • 261 篇 liu yang
  • 245 篇 vinay kukreja
  • 232 篇 kukreja vinay
  • 224 篇 china
  • 201 篇 li li
  • 201 篇 wei li
  • 197 篇 wei zhang
  • 196 篇 zhang yu
  • 171 篇 zhang lei
  • 167 篇 wang lei
  • 163 篇 li yang
  • 156 篇 zhang wei
  • 142 篇 liu wei
  • 133 篇 li bo
  • 131 篇 lei wang

语言

  • 558,500 篇 英文
  • 21,453 篇 其他
  • 6,052 篇 中文
  • 35 篇 西班牙文
  • 34 篇 法文
  • 31 篇 土耳其文
  • 16 篇 俄文
  • 9 篇 葡萄牙文
  • 5 篇 德文
  • 2 篇 阿拉伯文
  • 2 篇 朝鲜文
  • 2 篇 乌克兰文
  • 1 篇 捷克文
检索条件"任意字段=International Multi-Conference in Computer Science and Computer Engineering"
584362 条 记 录,以下是431-440 订阅
排序:
Research on Image Fusion Method Based on Nonsubsampled Contourlet Transform  4
Research on Image Fusion Method Based on Nonsubsampled Conto...
收藏 引用
4th international conference on Electronic Information engineering and computer science, EIECS 2024
作者: Zhao, Pengfei Liu, Peng Zhao, Haili Zhao, Zhi School of Electronic Information Engineering Changchun University of Science and Technology Changchun China
In modern military operations, as camouflage technology advances, soldiers, weaponry, and other military materials have become highly similar to their surroundings, making it difficult for traditional optical target r... 详细信息
来源: 评论
Security Challenges in multi-Cloud Environments: Solutions and Best Practices  7
Security Challenges in Multi-Cloud Environments: Solutions a...
收藏 引用
7th international conference on Contemporary Computing and Informatics, IC3I 2024
作者: Madanan, Mukesh Patel, Pratik Agrawal, Prateek Mudholkar, Pankaj Mudholkar, Megha Jaganraja, V. Dhofar University Department of Computer Science Oman National Forensic Sciences University India India Marwadi University Faculty of Computer Applications Gujarat Rajkot360003 India Marwadi University Department of Computer Engineering Gujarat Rajkot360003 India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Avadi Chennai600062 India
The aim of this research paper is to investigate how machine learning can be incorporated to improve security around multi-clouds, with specific reference to the challenges. Based on the datasets obtained from Kaggle,... 详细信息
来源: 评论
multi-scale network combined with multi-loss optimization for low-light image super-resolution reconstruction  5
Multi-scale network combined with multi-loss optimization fo...
收藏 引用
5th international conference on computer Vision and Data Mining, ICCVDM 2024
作者: Liu, Bofeng Yu, Haiyang Hu, Xiaojuan Li, Yanfeng School of Computer Science and Technology Changchun University of Science and Technology Jilin Changchun130022 China Key Laboratory of Photoelectric Measurement & Control and Optical Information Transfer Technology Ministry of Education Changchun University of Science and Technology Jilin Changchun130022 China
The proposed super resolution reconstruction method aims to address the issues of missing detailed information in low light environments and poor recovery of high frequency details in reconstructed images. To fully ex... 详细信息
来源: 评论
A Resource-Efficient multi-core multi-thread RISC-V-based System-on-Chip  21
A Resource-Efficient Multi-core Multi-thread RISC-V-based Sy...
收藏 引用
21st international System-on-Chip Design conference, ISOCC 2024
作者: Kieu-Do-Nguyen, Binh Nguyen, Khai-Duy Binh, Nguyen The Dang, Tuan-Kiet Le, Duc-Hung Pham-Quoc, Cuong Tran, Ngoc-Thinh Pham, Cong-Kha Hoang, Trong-Thuc Department of Computer and Network Engineering Tokyo Japan Faculty of Computer Science and Engineering Hochiminh Viet Nam Faculty of Electronics and Telecommunications Hochiminh Viet Nam
In the past, a small size microcontroller was needed to control and gather data from resource-constrained electronic devices aimed at Internet of Things (IoT) applications. While the server nodes receive the requests ... 详细信息
来源: 评论
STViT+: improving self-supervised multi-camera depth estimation with spatial-temporal context and adversarial geometry regularization
收藏 引用
Applied Intelligence 2025年 第5期55卷 1-20页
作者: Chen, Zhuo Zhao, Haimei Hao, Xiaoshuai Yuan, Bo Li, Xiu Shenzhen International Graduate School Tsinghua University Guangdong Shenzhen518055 China School of Computer Science The University of Sydney SydneyNSW2008 Australia Beijing Academy of Artificial Intelligence Beijing China School of Electrical Engineering and Computer Science The University of Queensland BrisbaneQLD4072 Australia
multi-camera depth estimation has gained significant attention in autonomous driving due to its importance in perceiving complex environments. However, extending monocular self-supervised methods to multi-camera setup... 详细信息
来源: 评论
SFFNet: multi-Scale Sparse Focus Feature Cue-Aware for Efficient Facial Expression Recognition  4
SFFNet: Multi-Scale Sparse Focus Feature Cue-Aware for Effic...
收藏 引用
4th international conference on Electronic Information engineering and computer Communication, EIECC 2024
作者: Deng, Liqian Liu, Tingting Wang, Minhong Liu, Hai Zhang, Zhaoli Li, Youfu Central China Normal University National Engineering Research Center of E-Learning Wuhan China The University of Hong Kong Faculty of Education Hong Kong City University of Hong Kong Department of Mechanical Engineering Hong Kong
Facial expression recognition is an important subtask in the field of computer vision. Accurate recognition of facial expressions plays a critical role in applications such as human-computer interaction, emotion analy... 详细信息
来源: 评论
computer Vision-Based Cybersecurity Threat Detection System with GAN-Enhanced Data Augmentation  5th
Computer Vision-Based Cybersecurity Threat Detection System ...
收藏 引用
5th international conference on Soft Computing and its engineering Applications (IcSoftComp)
作者: Ranka, Prateek Shah, Ayush Vora, Nivan Kulkarni, Aditya Patil, Nilesh Dwarkadas J Sanghvi Coll Engn Mumbai 400056 MH India
The importance of establishing a strong and resilient cyber-security threat detection system has become increasingly evident. In recent years, a multitude of methodologies have been developed to identify and mitigate ... 详细信息
来源: 评论
Simulation of Airborne Radar Sea Surface Scattering Based on Improved Sea Clutter Modeling  4
Simulation of Airborne Radar Sea Surface Scattering Based on...
收藏 引用
4th international conference on computer science, Electronic Information engineering and Intelligent Control Technology, CEI 2024
作者: Sui, Bingxuan Jingzhou University Department of Information Engineering Jingzhou China
Airborne radar plays an important role in sea surface search and rescue and national defense, and the analysis of control variables in multiple dimensions of the sea conditions of the sea surface to be detected, the f... 详细信息
来源: 评论
Control device of pepper picker based on truss manipulator  24
Control device of pepper picker based on truss manipulator
收藏 引用
8th international conference on Electronic Information Technology and computer engineering, EITCE 2024
作者: Ji, Xiang Gao, Rucheng Zheng, Bing Shi, Jinmei Li, Qi Hainan Vocational University of Science and Technology Hainan Haikou China
A picker control device based on a truss manipulator integrates the information of various sensors such as force sense, temperature sense, vision and distance, and timely feedback information to realize the flexible p... 详细信息
来源: 评论
An improved whale optimization algorithm based on multi-populations and multi-strategies for multilevel threshold image segmentation  4
An improved whale optimization algorithm based on multi-popu...
收藏 引用
4th international conference on Neural Networks, Information and Communication engineering, NNICE 2024
作者: Ma, Pufang Geng, Yuran Chongqing Normal University Department of Computer and Information Science Chongqing401331 China Chongqing University of Mobile Communication Department of Computer Chongqing401420 China
multilevel threshold image segmentation is one of the most widely used methods. Thus, the determination of the best thresholds is crucial. Swarm intelligence optimization algorithm has been widely used to solve the op... 详细信息
来源: 评论