咨询与建议

限定检索结果

文献类型

  • 8,224 篇 期刊文献
  • 7,674 篇 会议
  • 212 册 图书

馆藏范围

  • 16,110 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,062 篇 工学
    • 4,862 篇 计算机科学与技术...
    • 3,771 篇 软件工程
    • 1,569 篇 电子科学与技术(可...
    • 1,516 篇 信息与通信工程
    • 1,485 篇 电气工程
    • 1,223 篇 控制科学与工程
    • 878 篇 化学工程与技术
    • 871 篇 生物工程
    • 817 篇 材料科学与工程(可...
    • 804 篇 光学工程
    • 678 篇 生物医学工程(可授...
    • 657 篇 机械工程
    • 599 篇 仪器科学与技术
    • 566 篇 动力工程及工程热...
    • 436 篇 力学(可授工学、理...
    • 349 篇 冶金工程
  • 7,933 篇 理学
    • 4,261 篇 物理学
    • 3,043 篇 数学
    • 1,079 篇 生物学
    • 1,031 篇 统计学(可授理学、...
    • 1,006 篇 化学
    • 561 篇 系统科学
    • 324 篇 地球物理学
  • 1,871 篇 管理学
    • 1,215 篇 管理科学与工程(可...
    • 704 篇 图书情报与档案管...
    • 622 篇 工商管理
  • 741 篇 医学
    • 602 篇 临床医学
    • 501 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
    • 283 篇 公共卫生与预防医...
  • 329 篇 法学
  • 259 篇 经济学
  • 196 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 331 篇 deep learning
  • 323 篇 computer science
  • 243 篇 machine learning
  • 198 篇 computational mo...
  • 174 篇 accuracy
  • 159 篇 optimization
  • 154 篇 feature extracti...
  • 150 篇 internet of thin...
  • 133 篇 neural networks
  • 132 篇 data mining
  • 122 篇 computational in...
  • 120 篇 support vector m...
  • 120 篇 artificial intel...
  • 119 篇 predictive model...
  • 118 篇 real-time system...
  • 117 篇 hadrons
  • 105 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,108 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 991 篇 oliver lodge lab...
  • 991 篇 physikalisches i...
  • 618 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 569 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 552 篇 iccub universita...
  • 546 篇 school of physic...
  • 537 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 530 篇 imperial college...
  • 528 篇 nikhef national ...
  • 522 篇 university of ch...
  • 522 篇 stfc rutherford ...
  • 513 篇 infn laboratori ...
  • 510 篇 physik-institut ...
  • 505 篇 school of physic...
  • 502 篇 henryk niewodnic...

作者

  • 284 篇 barter w.
  • 264 篇 a. gomes
  • 263 篇 beiter a.
  • 253 篇 c. alexa
  • 253 篇 c. amelung
  • 251 篇 j. m. izen
  • 251 篇 g. bella
  • 251 篇 j. strandberg
  • 251 篇 d. calvet
  • 251 篇 bellee v.
  • 249 篇 g. spigo
  • 246 篇 blake t.
  • 245 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 231 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 r. ströhmer

语言

  • 15,070 篇 英文
  • 887 篇 其他
  • 139 篇 中文
  • 8 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16110 条 记 录,以下是981-990 订阅
排序:
A Hybrid Regularization-Based Multi-Frame Super-Resolution Using Bayesian Framework
收藏 引用
computer Systems science & Engineering 2023年 第1期44卷 35-54页
作者: Mahmoud M.Khattab Akram M.Zeki Ali A.Alwan Belgacem Bouallegue Safaa S.Matter Abdelmoty M.Ahmed Faculty of Information and Communication Technology International Islamic University MalaysiaKuala LumpurMalaysia College of Computer Science King Khalid UniversityAbhaSaudi Arabia School of Theoretical&Applied Science Ramapo College of New JerseyRampao Valley RoadMahwahUSA Community College King Khalid UniversityAbhaSaudi Arabia
The prime purpose for the image reconstruction of a multi-frame super-resolution is to reconstruct a higher-resolution image through incorporating the knowledge obtained from a series of relevant low-resolution images... 详细信息
来源: 评论
Script-Generated Picture Book technology Based on Large Language Models and AIGC  23
Script-Generated Picture Book Technology Based on Large Lang...
收藏 引用
7th International Conference on Digital technology in Education, ICDTE 2023
作者: Wang, Dejiang Zhai, Zhuoran Cheong, Ngai Peng, Li Intelligent Cloud Business Group Infrastructure Department Baidu China College of Art and Communication Tongji University China Faculty of Applied Sciences Macao Polytechnic University China Computer Science and Technology Hunan University of Science and Technology China
This paper mainly discusses how to use the large language models such as GPT and Ernie model combined with the AIGC tools represented by stable diffusion, which uses a random story script to generate images with fixed...
来源: 评论
Advancing Data Security through Blockchain Integration in Encryption Algorithms
Advancing Data Security through Blockchain Integration in En...
收藏 引用
2024 International Conference on Communication, computer sciences and Engineering, IC3SE 2024
作者: Rajani, D. Raj, Vijilius Helena Dutt, Amit Singh, Jay Thandra, Nagarjuna Jabbar, Ahmed Sabah Abed AL-Zahra Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India New Horizon College Of Engineering Department Of Applied Sciences Bangalore India Lovely Professional University Phagwara India Gl Bajaj Institute Of Technology & Management U.P. Greater Noida India Mlr Institute Of Technology Department Of Computer Science And Engineering Telangana Hyderabad India The Islamic University Medical Laboratory Technology Department College Of Medical Technology Najaf Iraq
This piece describes a complicated blockchain-based system for keeping data safe that is not controlled by a single entity. The suggested design is made up of DKM, SCAC, ILE, QRC, and DAE. These stand for Decentralize... 详细信息
来源: 评论
A system for detecting scratches on the surface of small-sized metal shafts after the grinding process using optical techniques combined with computer vision.
A system for detecting scratches on the surface of small-siz...
收藏 引用
International Symposium on applied science 2024, ISAS 2024
作者: Dau, Sy Hieu An, Khang Le Nguyen Thi, Phuc Dang Department of Applied Physics Applied Sciences Faculty Ho Chi Minh city University of Technology Vietnam National University HCMC Ho Chi Minh City Viet Nam Department of Computer Science Faculty of Information Technology Industrial University of Ho Chi Minh City Ho Chi Minh City Viet Nam
During the grinding process of metal machine parts requiring a high degree of smoothness, the use of diamond-surfaced grinding tools, specialized grinding stones, or high-hardness metals are common choices. However, d... 详细信息
来源: 评论
Underwater Target Detection Based on Reinforcement Learning and Ant Colony Optimization
收藏 引用
Journal of Ocean University of China 2022年 第2期21卷 323-330页
作者: WANG Xinhua ZHU Yungang LI Dayu ZHANG Guang School of Computer Science Northeast Electric Power UniversityJilin 132012China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education College of Computer Science and TechnologyJilin UniversityChangchun 130012China State Key Laboratory of Applied Optics Changchun Institute of OpticsFine Mechanics and PhysicsChinese Academy of SciencesChangchun 130033China
Underwater optical imaging produces images with high resolution and abundant information and hence has outstanding advantages in short-distance underwater target ***,low-light and high-noise scenarios pose great chall... 详细信息
来源: 评论
DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor
DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Usi...
收藏 引用
2023 IEEE International Conference on computer, Information, and Telecommunication Systems, CITS 2023
作者: Faheem, Layeba Mukherjee, Soumya Obaidat, Mohammad S. Pal, Arup Kumar Islam, Sk Hafizul Sadoun, Balqies Dhanbad Department of Computer Science and Engineering Jharkhand Dhanbad826004 India University of Science and Technology Beijing100083 China Amity University UP Noida201313 India Indian Institute of Information Technology Department of Computer Science and Engineering West Bengal Kalyani741235 India College of Engineering Al-Balqa' Applied University Al-Salt19117 Jordan
Due to readily available software, anyone can easily manipulate the image and create a piece of false information. Among different types of image forgery, copy-move image forgery is widely practiced due to its sophist... 详细信息
来源: 评论
VigilantAI: Real-time detection of anomalous activity from a video stream using deep learning
VigilantAI: Real-time detection of anomalous activity from a...
收藏 引用
2024 International Conference on IT and Industrial Technologies, ICIT 2024
作者: Javed, Danish Arshad, Usama Peerzada, Shuhrabeel Saud, Muhammad Ramiz Ali, Nisar Ali, Raja Hashim Department of Artificial Intelligence Faculty of Computer Science & Engineering GIK Institute of Engineering Sciences & Technology Topi23460 Pakistan Department of Business University of Europe for Applied Sciences Potsdam14469 Germany Faculty of Engineering and Applied Science University of Regina ReginaS4S0A2 Canada
In an era where artificial intelligence (AI) solutions are increasingly integrated into various sectors, we have utilized Artificial Intelligence for enhancing public safety through realtime detection of illegal activ... 详细信息
来源: 评论
Rapid and Efficient Facial Landmark Identification by Light and High Resolution Network using Artificial Intelligence
Rapid and Efficient Facial Landmark Identification by Light ...
收藏 引用
2023 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications, ICRAMET 2023
作者: Rahman, Saad Mamoun Abdel Armi, Nasrullah Abdelhag, Mohammed Eltahir Amin, Sherif Tawfik Eishah, Hassan Abu King Faisal University Department of Applied College Computer Science Saudi Arabia Research Center for Telecommunication National Research & Innovation Agency Bandung Indonesia Jazan University Department of Information Technology & Security Jazan Saudi Arabia Jazan University Department of Computer Science Jazan Saudi Arabia
The ability to detect facial landmarks is in high demand because of its usefulness in monitoring driver health in real time. Heat map-based approaches are well-known for their exact accuracy in landmark position predi... 详细信息
来源: 评论
IoT Devices Authentication Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3701-3716页
作者: Syed Shabih Ul Hasan Anwar Ghani Ikram Ud Din Ahmad Almogren Ayman Altameem Department of Computer Science and Software Engineering International Islamic University Islamabad45000Pakistan Department of Information Technology The University of Haripur22620HaripurPakistan Chair of Cyber Security Department of Computer ScienceCollege of Computer and Information SciencesKing Saud UniversityRiyadh11633Saudi Arabia Chair of Cyber Security Department of Natural and Engineering SciencesCollege of Applied Studies and Community ServicesKing Saud UniversityRiyadh11543Saudi Arabia
User authentication is one of the critical concerns of information *** tend to use strong textual passwords,but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobi... 详细信息
来源: 评论
Metaheuristic Based Clustering with Deep Learning Model for Big Data Classification
收藏 引用
computer Systems science & Engineering 2023年 第1期44卷 391-406页
作者: R.Krishnaswamy Kamalraj Subramaniam V.Nandini K.Vijayalakshmi Seifedine Kadry Yunyoung Nam Department of Electronics and Communication Engineering University College of Engineering AriyalurAriyalur621704India Department of Biomedical Engineering Faculty of EngineeringKarpagam Academy of Higher EducationCoimbatore641021India Department of Computer Science and Engineering Sona College of TechnologySalem636005India Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai600077India Deparmtent of Applied Data Science Noroff University CollegeKristiansandNorway Department of Computer Science and Engineering Soonchunhyang UniversityAsanKorea
Recently,a massive quantity of data is being produced from a distinct number of sources and the size of the daily created on the Internet has crossed two *** the same time,clustering is one of the efficient techniques... 详细信息
来源: 评论