咨询与建议

限定检索结果

文献类型

  • 456,331 篇 会议
  • 177,261 篇 期刊文献
  • 4,164 册 图书
  • 103 篇 学位论文

馆藏范围

  • 637,856 篇 电子文献
  • 11 种 纸本馆藏

日期分布

学科分类号

  • 368,509 篇 工学
    • 249,095 篇 计算机科学与技术...
    • 203,213 篇 软件工程
    • 87,110 篇 信息与通信工程
    • 56,784 篇 控制科学与工程
    • 46,943 篇 电气工程
    • 45,822 篇 电子科学与技术(可...
    • 41,529 篇 生物工程
    • 31,021 篇 生物医学工程(可授...
    • 27,428 篇 光学工程
    • 25,808 篇 机械工程
    • 20,564 篇 化学工程与技术
    • 19,613 篇 仪器科学与技术
    • 18,505 篇 动力工程及工程热...
    • 15,313 篇 材料科学与工程(可...
    • 12,991 篇 安全科学与工程
    • 11,925 篇 交通运输工程
    • 11,682 篇 网络空间安全
  • 206,023 篇 理学
    • 105,851 篇 数学
    • 63,977 篇 物理学
    • 46,569 篇 生物学
    • 33,559 篇 统计学(可授理学、...
    • 23,668 篇 系统科学
    • 21,635 篇 化学
  • 94,744 篇 管理学
    • 56,264 篇 管理科学与工程(可...
    • 42,491 篇 图书情报与档案管...
    • 27,122 篇 工商管理
  • 28,440 篇 医学
    • 24,030 篇 临床医学
    • 21,649 篇 基础医学(可授医学...
    • 13,696 篇 药学(可授医学、理...
  • 16,896 篇 法学
    • 13,832 篇 社会学
  • 10,307 篇 经济学
  • 8,108 篇 农学
  • 7,265 篇 教育学
  • 2,897 篇 文学
  • 1,402 篇 军事学
  • 891 篇 艺术学
  • 169 篇 哲学
  • 85 篇 历史学

主题

  • 28,388 篇 computer science
  • 14,738 篇 accuracy
  • 14,697 篇 computational mo...
  • 14,383 篇 feature extracti...
  • 12,271 篇 deep learning
  • 12,186 篇 training
  • 11,230 篇 machine learning
  • 8,696 篇 data mining
  • 8,340 篇 predictive model...
  • 8,217 篇 support vector m...
  • 7,882 篇 computer archite...
  • 7,692 篇 optimization
  • 7,323 篇 neural networks
  • 7,131 篇 data models
  • 6,997 篇 wireless sensor ...
  • 6,905 篇 real-time system...
  • 6,817 篇 convolutional ne...
  • 6,715 篇 testing
  • 6,699 篇 algorithm design...
  • 6,617 篇 costs

机构

  • 2,475 篇 school of comput...
  • 2,182 篇 school of comput...
  • 2,142 篇 chitkara univers...
  • 2,063 篇 school of comput...
  • 1,770 篇 school of comput...
  • 1,673 篇 department of co...
  • 1,469 篇 school of comput...
  • 1,436 篇 school of comput...
  • 1,316 篇 department of co...
  • 1,311 篇 school of comput...
  • 1,310 篇 school of electr...
  • 1,291 篇 department of el...
  • 1,169 篇 school of comput...
  • 1,153 篇 college of compu...
  • 1,105 篇 department of el...
  • 1,016 篇 university of ch...
  • 991 篇 school of comput...
  • 972 篇 department of ph...
  • 957 篇 college of compu...
  • 951 篇 cavendish labora...

作者

  • 429 篇 niyato dusit
  • 338 篇 liu yang
  • 280 篇 yang yang
  • 246 篇 wang wei
  • 244 篇 barter w.
  • 221 篇 blake t.
  • 221 篇 s. chen
  • 220 篇 j. wang
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 214 篇 bowcock t.j.v.
  • 209 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 203 篇 beiter a.
  • 203 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung

语言

  • 600,086 篇 英文
  • 30,527 篇 其他
  • 7,214 篇 中文
  • 382 篇 日文
  • 110 篇 朝鲜文
  • 85 篇 德文
  • 53 篇 法文
  • 41 篇 斯洛文尼亚文
  • 28 篇 俄文
  • 24 篇 西班牙文
  • 8 篇 土耳其文
  • 7 篇 意大利文
  • 7 篇 葡萄牙文
  • 5 篇 捷克文
  • 5 篇 荷兰文
  • 4 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science Faculty of Computer Science and Engineering"
637859 条 记 录,以下是61-70 订阅
排序:
AES-Based Steganography Using Blockchain: A Novel Approach for Secure Text Hiding in Encrypted Images
收藏 引用
Informatica (Slovenia) 2024年 第21期48卷 67-78页
作者: Salim, Batool Arif Aljabery, Maalim A. Younis, Hameed Abdulkareem Faculty of Computer Science and Information Technology Computer Science Dept. University of Basrah Basrah Iraq
Steganography is a technique used to hide data within other data, emerging from the realization that information is valuable and must be concealed. By considering the potential of blockchain technology, which produces... 详细信息
来源: 评论
ChatGPT Tweets Sentiment Analysis Using Machine Learning and Data Classification
收藏 引用
Informatica (Slovenia) 2024年 第7期48卷 103-112页
作者: Sabir, Aliea Ali, Huda A. Aljabery, Maalim A. Faculty of Computer Science and Information Technology Computer Information System Dept. University of Basrah Basrah Iraq Faculty of Computer Science and Information Technology Computer Science Dept. University of Basrah Basrah Iraq
Many things, such as goods, products, and websites are evaluated based on user's notes and comments. One popular research project is sentiment analysis, which aims to extract information from notes and comments as... 详细信息
来源: 评论
MLRT-UNet:An Efficient Multi-Level Relation Transformer Based U-Net for Thyroid Nodule Segmentation
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 413-448页
作者: Kaku Haribabu Prasath R Praveen Joe IR Department of Computer Science and Engineering RMK College of Engineering and TechnologyTiruvallur601206India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in... 详细信息
来源: 评论
A secret sharing scheme based on integer decomposition and hexagonal structure
收藏 引用
International Journal of Information and Communication Technology 2024年 第4期24卷 482-501页
作者: Rouia, Zender Lemnouar, Noui Rida, Abdessemed Mohamed LAMIE Laboratory Department of Computer Science Faculty of Mathematics and Computer Science University of Batna 2 Algeria
Security is a major challenge in storage and transmission of digital data. Secret sharing scheme is a fundamental primitive used in multiparty computations, access control and key management, which is based here on tw... 详细信息
来源: 评论
An enhanced hybrid single-image-based structure-guided 0-norm and radiance–reflectance optimization
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: WangNo, Nitit Thaiklang, Saowaluk Major of Computer Science Faculty of Information Technology Roi Et Rajabhat University Roi Et Thailand Major of Computer Science Faculty of Computer Science Ubon Ratchathani Rajabhat University Ubon Ratchathani Thailand
The reduced visibility during the winter season in an outdoor setting can be attributed primarily to the presence of haze or fog. Despite adjusting the lens of an optical sensor system for various purposes, such as au... 详细信息
来源: 评论
Analyzing topics in social media for improving digital twinning based product development
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 273-281页
作者: Wenyi Tang Ling Tian Xu Zheng Ke Yan School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China
Digital twinning enables manufacturers to create digital representations of physical entities,thus implementing virtual simulations for product *** efforts of digital twinning neglect the decisive consumer feedback in... 详细信息
来源: 评论
S+E+O-band luminescence and enhancement in Nd3+/Tm3+/Ce3+ doped tellurite glass
收藏 引用
Journal of the Optical Society of America B: Optical Physics 2024年 第6期41卷 1432-1442页
作者: Zhou, Dexing Wang, Shuhong Zhao, Dongyi Zhu, Liqiao Zhou, Yaxun Faculty of Electrical Engineering and Computer Science Ningbo University Zhejiang315211 China
A new, to our knowledge, doped combination of Nd3+, Tm3+, and Ce3+ ions was developed in tellurite glass with a fundamental composition of TeO2-ZnO-WO3-Bi2O3, and the structural, thermal, and especially near-infrared ... 详细信息
来源: 评论
A Global-Local Parallel Dual-Branch Deep Learning Model with Attention-Enhanced Feature Fusion for Brain Tumor MRI Classification
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 739-760页
作者: Zhiyong Li Xinlian Zhou School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411100China
Brain tumor classification is crucial for personalized treatment *** deep learning-based Artificial Intelligence(AI)models can automatically analyze tumor images,fine details of small tumor regions may be overlooked d... 详细信息
来源: 评论
Microwave Through Wall Imaging via An Induced Current Learning Method
收藏 引用
Journal of Beijing Institute of Technology 2024年 第3期33卷 248-254页
作者: Pengjin Lan Jianguo Huang Tianyi Zhou Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China
In this paper,an induced current learning method(ICLM)for microwave through wall imaging(TWI),named as TWI-ICLM,is *** the inversion of induced current,the unknown object along with the enclosed walls are treated as a... 详细信息
来源: 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman School of Computer Science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India Department of Computer Science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 评论