咨询与建议

限定检索结果

文献类型

  • 75,134 篇 会议
  • 35,030 篇 期刊文献
  • 616 册 图书
  • 2 篇 学位论文

馆藏范围

  • 110,782 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 66,983 篇 工学
    • 46,937 篇 计算机科学与技术...
    • 38,619 篇 软件工程
    • 17,143 篇 信息与通信工程
    • 10,941 篇 控制科学与工程
    • 8,581 篇 生物工程
    • 8,496 篇 电气工程
    • 7,545 篇 电子科学与技术(可...
    • 6,817 篇 生物医学工程(可授...
    • 5,235 篇 光学工程
    • 5,003 篇 机械工程
    • 3,828 篇 化学工程与技术
    • 3,796 篇 动力工程及工程热...
    • 3,669 篇 仪器科学与技术
    • 3,247 篇 网络空间安全
    • 3,125 篇 安全科学与工程
    • 2,890 篇 材料科学与工程(可...
    • 2,702 篇 交通运输工程
  • 37,708 篇 理学
    • 18,336 篇 数学
    • 11,742 篇 物理学
    • 9,804 篇 生物学
    • 5,795 篇 统计学(可授理学、...
    • 4,170 篇 化学
    • 3,970 篇 系统科学
  • 19,075 篇 管理学
    • 11,910 篇 管理科学与工程(可...
    • 8,104 篇 图书情报与档案管...
    • 5,284 篇 工商管理
  • 7,070 篇 医学
    • 5,884 篇 临床医学
    • 5,285 篇 基础医学(可授医学...
    • 3,252 篇 药学(可授医学、理...
    • 3,066 篇 公共卫生与预防医...
  • 3,332 篇 法学
  • 2,098 篇 经济学
  • 1,963 篇 农学
  • 1,400 篇 教育学
  • 450 篇 文学
  • 313 篇 军事学
  • 194 篇 艺术学
  • 16 篇 哲学
  • 10 篇 历史学

主题

  • 3,600 篇 accuracy
  • 3,324 篇 deep learning
  • 3,233 篇 feature extracti...
  • 2,680 篇 machine learning
  • 2,672 篇 educational inst...
  • 2,483 篇 training
  • 2,473 篇 computational mo...
  • 2,432 篇 computer science
  • 1,978 篇 convolutional ne...
  • 1,925 篇 internet of thin...
  • 1,880 篇 support vector m...
  • 1,844 篇 real-time system...
  • 1,791 篇 predictive model...
  • 1,381 篇 optimization
  • 1,327 篇 data models
  • 1,315 篇 data mining
  • 1,293 篇 security
  • 1,213 篇 neural networks
  • 1,180 篇 image segmentati...
  • 1,152 篇 cloud computing

机构

  • 1,153 篇 college of compu...
  • 1,047 篇 college of compu...
  • 1,028 篇 department of ph...
  • 1,006 篇 cavendish labora...
  • 983 篇 college of compu...
  • 970 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 767 篇 college of compu...
  • 642 篇 university of ch...
  • 613 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 588 篇 infn sezione di ...
  • 564 篇 fakultät physik ...
  • 553 篇 infn sezione di ...
  • 549 篇 imperial college...
  • 546 篇 school of physic...
  • 545 篇 horia hulubei na...
  • 540 篇 department of ph...
  • 536 篇 school of physic...
  • 519 篇 h.h. wills physi...

作者

  • 263 篇 a. gomes
  • 261 篇 barter w.
  • 247 篇 c. alexa
  • 246 篇 beiter a.
  • 245 篇 j. m. izen
  • 240 篇 g. bella
  • 240 篇 j. strandberg
  • 240 篇 d. calvet
  • 240 篇 c. amelung
  • 240 篇 s. chen
  • 229 篇 blake t.
  • 226 篇 bellee v.
  • 223 篇 g. spigo
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 220 篇 bencivenni g.
  • 219 篇 f. siegert
  • 219 篇 brundu d.
  • 219 篇 borsato m.

语言

  • 104,908 篇 英文
  • 4,518 篇 其他
  • 1,404 篇 中文
  • 60 篇 日文
  • 13 篇 法文
  • 11 篇 德文
  • 6 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 4 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=College of Science and Computer Engineering"
110782 条 记 录,以下是31-40 订阅
排序:
A novel cluster based reliable security enhancement in FANET directed by game theory
收藏 引用
Soft Computing 2025年 第2期29卷 1091-1106页
作者: Gupta, Shikha Sharma, Neetu Department of Computer Science Engineering College Ajmer Rajasthan Ajmer305001 India
The emergence of interconnected UAVs has given rise to the creation of flying ad hoc networks (FANETs) aimed at efficiently facilitating network-dependent services. However, FANET encountered considerable challenges i... 详细信息
来源: 评论
Poor and rich squirrel algorithm-based Deep Maxout network for credit card fraud detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 123-134页
作者: Paul, Annu Paul, Varghese Department of Computer Science Alphonsa College Kottayam Kerala Pala India Department of Computer Science and Engineering Rajagiri School of Engineering and Technology Kerala Kochi India
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation... 详细信息
来源: 评论
VAT: Visibility Aware Transformer for Fine-Grained Clothed Human Reconstruction
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第5期31卷 2277-2287页
作者: Zhang, Xiaoyan Zhu, Zibin Xie, Hong Ren, Sisi Shenzhen University College of Computer Science and Software Engineering Shenzhen518000 China
In order to reconstruct 3D clothed human with accurate fine-grained details from sparse views, we propose a deep cooperating two-level global to fine-grained reconstruction framework that constructs robust global geom... 详细信息
来源: 评论
A verifiable variable threshold visual image secret sharing scheme
收藏 引用
Multimedia Systems 2025年 第3期31卷 1-18页
作者: Yang, Yu-Guang Cheng, Wen Xu, Guang-Bao Jiang, Dong-Huan Zhou, Yi-Hua Shi, Wei-Min Jiang, Dong-Hua College of Computer Science and Technology Beijing University of Technology Beijing100124 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Mathematics and Systems Science Shandong University of Science and Technology Qingdao266590 China School of Computer Science and Engineering Sun Yat-Sen University Guangzhou511400 China
This paper proposes a visual image encryption algorithm based on 2D compressive sensing and variable threshold secret sharing, aiming to achieve efficient, secure, and flexible image encryption and decryption. Firstly... 详细信息
来源: 评论
LoRaDIP: Low-Rank Adaptation With Deep Image Prior for Generative Low-Light Image Enhancement
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第4期6卷 909-920页
作者: Zhao, Zunjin Shi, Daming Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
This article presents LoRaDIP, a novel low-light image enhancement (LLIE) model based on deep image priors (DIPs). While DIP-based enhancement models are known for their zero-shot learning, their expensive computation... 详细信息
来源: 评论
Drug–target interactions prediction based on similarity graph features extraction and deep learning
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4303-4322页
作者: Torkey, Hanaa El-Behery, Heba Attia, Abdel-Fattah El-Fishawy, Nawal Computer Science and Engineering Department Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Computer Science and Engineering Faculty of Engineering Kafrelsheikh University Kafrelsheikh Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici... 详细信息
来源: 评论
REAL-TIME GLUCOSE MONITORING SYSTEM AND DIETARY RECOMMENDATIONS FOR DIABETES MELLITUS USING FOG COMPUTING
收藏 引用
Telecommunications and Radio engineering (English translation of Elektrosvyaz and Radiotekhnika) 2025年 第5期84卷 55-67页
作者: Sathish, N. Elangovan, D. Nagalakshmi, R. Suresh, G. Chitra, Devi D. Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Information Technology Saveetha Engineering College Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Artificial Intelligence and Data Science Kings Engineering College Sriperumbudur India Department of Computer Science And Engineering S.A. Engineering College Chennai India
This systematic review gave special attention to diabetes and the advancements in food and nutrition needed to prevent or manage diabetes in all its forms. There are two main forms of diabetes mellitus: Type 1 (T1D) a... 详细信息
来源: 评论
Improving Multi-model Anomaly Traffic Detection in MEC Networks with Large-Model-powered Continuous Learning
收藏 引用
IEEE Network 2025年 第3期39卷 56-62页
作者: Zhang, Junjie Chen, Zheyi Cheng, Hongju Li, Jie Min, Geyong Fuzhou University College of Computer and Data Science China Shanghai Jiao Tong University Department of Computer Science and Engineering China University of Exeter Department of Computer Science China
Anomaly traffic detection offers essential technical support for securing Mobile Edge Computing (MEC) networks. The emerging Large Model (LM) has attracted much attention for their excellent data generation and proces... 详细信息
来源: 评论
Multimodal emotion recognition model via hybrid model with improved feature level fusion on facial and EEG feature set
收藏 引用
Multimedia Tools and Applications 2025年 第1期84卷 1-36页
作者: Singh, Pratima Tripathi, Mukesh Kumar Patil, Mithun B. Shivendra Neelakantappa, Madugundu Department of Computer Science and Engineering Galgotias University Gautam Buddh Nagar Uttar Pradesh India Department of Computer Science and Engineering Vardhaman College of Engineering Telangana Hyderabad India Department of Computer Science and Engineering N K Orchid College of Engineering & Technology Maharastra Solapur India Department of Computer Application D. K. College Dumraon Bihar Buxar India Department of Information Technology Vasavi College of Engineering Telangana Hyderabad India
In recent years, academics have placed a high value on multi-modal emotion identification, as well as extensive research has been conducted in the areas of video, text, voice, and physical signal emotion detection. Th... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论