咨询与建议

限定检索结果

文献类型

  • 14,636 篇 会议
  • 14,167 篇 期刊文献
  • 222 册 图书

馆藏范围

  • 29,025 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,766 篇 工学
    • 9,793 篇 计算机科学与技术...
    • 7,768 篇 软件工程
    • 3,114 篇 信息与通信工程
    • 2,383 篇 电子科学与技术(可...
    • 2,375 篇 电气工程
    • 2,052 篇 生物工程
    • 1,984 篇 控制科学与工程
    • 1,928 篇 光学工程
    • 1,896 篇 生物医学工程(可授...
    • 1,211 篇 化学工程与技术
    • 1,031 篇 材料科学与工程(可...
    • 1,016 篇 机械工程
    • 990 篇 仪器科学与技术
    • 747 篇 动力工程及工程热...
    • 492 篇 力学(可授工学、理...
  • 12,320 篇 理学
    • 5,616 篇 物理学
    • 4,687 篇 数学
    • 2,635 篇 生物学
    • 1,667 篇 统计学(可授理学、...
    • 1,470 篇 化学
    • 843 篇 系统科学
    • 821 篇 地球物理学
  • 3,785 篇 管理学
    • 2,144 篇 管理科学与工程(可...
    • 1,658 篇 图书情报与档案管...
    • 1,050 篇 工商管理
  • 2,102 篇 医学
    • 1,724 篇 临床医学
    • 1,340 篇 基础医学(可授医学...
    • 808 篇 药学(可授医学、理...
    • 628 篇 公共卫生与预防医...
  • 691 篇 法学
    • 594 篇 社会学
  • 453 篇 农学
  • 381 篇 经济学
  • 311 篇 教育学
  • 104 篇 文学
  • 56 篇 军事学
  • 49 篇 艺术学
  • 13 篇 哲学
  • 8 篇 历史学

主题

  • 1,356 篇 computer science
  • 423 篇 deep learning
  • 333 篇 computational mo...
  • 299 篇 application soft...
  • 280 篇 feature extracti...
  • 278 篇 machine learning
  • 272 篇 image segmentati...
  • 260 篇 computer archite...
  • 213 篇 data mining
  • 196 篇 training
  • 192 篇 artificial intel...
  • 189 篇 throughput
  • 189 篇 accuracy
  • 179 篇 support vector m...
  • 171 篇 routing
  • 158 篇 internet of thin...
  • 158 篇 computer vision
  • 157 篇 semantics
  • 153 篇 bandwidth
  • 146 篇 magnetic resonan...

机构

  • 951 篇 cavendish labora...
  • 889 篇 department of ph...
  • 825 篇 oliver lodge lab...
  • 815 篇 physikalisches i...
  • 574 篇 school of physic...
  • 499 篇 infn laboratori ...
  • 463 篇 infn sezione di ...
  • 451 篇 fakultät physik ...
  • 450 篇 university of ch...
  • 443 篇 infn sezione di ...
  • 433 篇 infn sezione di ...
  • 398 篇 horia hulubei na...
  • 394 篇 school of physic...
  • 390 篇 iccub universita...
  • 379 篇 department of ph...
  • 378 篇 department for p...
  • 372 篇 nikhef national ...
  • 370 篇 center for high ...
  • 369 篇 imperial college...
  • 365 篇 stfc rutherford ...

作者

  • 262 篇 a. gomes
  • 252 篇 c. alexa
  • 249 篇 j. m. izen
  • 242 篇 s. chen
  • 237 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 236 篇 d. calvet
  • 227 篇 g. spigo
  • 225 篇 f. siegert
  • 223 篇 j. wang
  • 212 篇 y. tayalati
  • 212 篇 r. ströhmer
  • 210 篇 m. rijssenbeek
  • 206 篇 s. jin
  • 201 篇 g. gaudio
  • 193 篇 s. mohapatra
  • 192 篇 m. gandelman
  • 191 篇 d. golubkov
  • 190 篇 t. gershon

语言

  • 27,336 篇 英文
  • 1,404 篇 其他
  • 254 篇 中文
  • 16 篇 日文
  • 8 篇 德文
  • 6 篇 俄文
  • 3 篇 朝鲜文
  • 2 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Center for Research in Computer Vision Department of Computer Science"
29025 条 记 录,以下是111-120 订阅
排序:
Enhanced Neutrosophic Set and Machine Learning Approach for Kidney Disease Prediction
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 465-477页
作者: Al-Doori, Humam M. Alkellezli, Tareef S. Abdelhafeez, Ahmed Eassaa, Mohamed Sawah, Mohamed S. El-Douh, Ahmed A. Cybersecurity Sciences Department College of Science Ashur University Baghdad Iraq Cybersecurity Engineering Department College of Engineering Ashur University Baghdad Iraq Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan Cybersecurity Technology Engineering Department College of Engineering Technology Ashur University Baghdad Iraq
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and... 详细信息
来源: 评论
A globally shared resource paradigm for encoded storage systems in the public cloud
收藏 引用
Fundamental research 2024年 第3期4卷 642-650页
作者: Zhiyue Li Guangyan Zhang Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Beijing National Research Center for Information Science and Technology Tsinghua UniversityBeijing 100084China
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage *** provide high availability,data are often encoded to provide fault tolerance with ... 详细信息
来源: 评论
CMCF-Net: An End-to-End Context Multiscale Cross-Fusion Network for Robust Copy-Move Forgery Detection
收藏 引用
IEEE Transactions on Multimedia 2024年 26卷 6090-6101页
作者: Xiong, Lizhi Xu, Jianhua Yang, Ching-Nung Zhang, Xinpeng Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Engineering Research Center of Digital Forensics Ministry of Education Nanjing210044 China Nanjing University of Information Science and Technology Software Engineering Nanjing210044 China National Dong Hwa University Department of Computer Science and Information Engineering Hualien974301 Taiwan Fudan University School of Computer Science Shanghai200433 China
Image copy-move forgery detection (CMFD) has become a challenging problem due to increasingly powerful editing software that makes forged images increasingly realistic. Existing algorithms that directly connect multip... 详细信息
来源: 评论
Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 695-712页
作者: Fangjun Luan Xuewen Mu Shuai Yuan Department of Computer Technology School of Computer Science and EngineeringShenyang Jianzhu UniversityShenyang110168China Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Jianzhu UniversityShenyang110168China Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang Jianzhu UniversityShenyang110168China
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toadd... 详细信息
来源: 评论
On Construction of Precise Positioning System via IEEE 802.11ax
收藏 引用
IEEE Internet of Things Journal 2023年 第14期10卷 12951-12960页
作者: Tsung, Chen-Kun Yang, Chao-Tung Liu, Jung-Chun Hsiung, Chun Chang, Shih-Kuang Hsu, Ming-Shang National Chin-Yi University of Technology Department of Computer Science and Information Engineering Taichung41170 Taiwan Tunghai University Department of Computer Science and Research Center for Smart Sustainable Circular Economy Taichung407224 Taiwan Tunghai University Department of Computer Science Taichung40704 Taiwan Krystal Technology Company Ltd. Network Department Taichung42756 Taiwan
Wireless network stability is critical for organizations. Most companies rely on a solid Internet connection for at least part of their day-to-day activities. It is essential to show the fast and high capacity of Wi-F... 详细信息
来源: 评论
A Study on Cypher Assignment Based on Secrecy Capacity
收藏 引用
International Journal of Network Security 2024年 第2期26卷 167-172页
作者: Yang, Cheng-Ying Chen, Jong-Shin Yao, Jenq-Foung J F Hwang, Min-Shiang Department of Computer Science University of Taipei Taipei Taiwan Department of Information and Communication Engineering Chaoyang University of Science and Technology Taiwan Computer Science Georgia College and State University Milledgeville United States Department of Computer Science & Information Engineering Asia University Taiwan Fintech and Blockchain Research Center Asia University Taiwan 500 Lioufeng Rd. Wufeng Taichung41354 Taiwan
Accessing wireless services is convenient but not secure. The issue of privacy and security is highly demanded on the internet. The information is sent with the undesired threats of eavesdroppers. Secure communication... 详细信息
来源: 评论
Enhancing Email Spam Detection Using Advanced AI Techniques
Enhancing Email Spam Detection Using Advanced AI Techniques
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Al-Dmour, Nidal A. Kousar, Shagufta Khan, Areeba Ihsan, Anaum Abbas, Tahir Saeed, Ali Q College of Engineering Department of Computer Engineering Mutah University Jordan Applied Science Research Center Applied Science Private University Amman Jordan The TIMES Institute Department of Computer Science Multan60000 Pakistan Lahore Pakistan Northern Technical University Computer Center Ninevah Iraq
This review paper investigates the advances of artificial intelligence (AI) in the field of email spam detection. The study addresses AI-based techniques used for email spam filtering by classifying threats such as ke... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
Socially Aware V2X Localized QoS
收藏 引用
IEEE Internet of Things Journal 2024年 第15期11卷 25925-25938页
作者: Kaliski, Rafael Han, Yue-Hua National Sun Yat-sen University Department of Computer Science and Engineering Kaohsiung804 Taiwan Academia Sinica Research Center for Information Technology Innovation Taipei115 Taiwan National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan
Vehicle to Everything (V2X) is a core 5G technology. V2X and its enabler, Device-to-Device (D2D), are essential for the Internet of Things (IoT) and the Internet of Vehicles (IoV). V2X enables vehicles to communicate ... 详细信息
来源: 评论
ACSarF:a DRL-based adaptive consortium blockchain sharding framework for supply chain finance
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 26-34页
作者: Shijing Hu Junxiong Lin Xin Du Wenbin Huang Zhihui Lu Qiang Duan Jie Wu School of Computer Science Fudan UniversityShanghai 200438China Shanghai Blockchain Engineering Research Center Fudan UniversityShanghai 200438China Information Sciences and Technology Department Pennsylvania State UniversityAbingtonPA 19001USA
Blockchain technologies have been used to facilitate Web 3.0 and FinTech ***,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech appli... 详细信息
来源: 评论