咨询与建议

限定检索结果

文献类型

  • 557,375 篇 会议
  • 233,691 篇 期刊文献
  • 6,050 册 图书
  • 4 篇 学位论文

馆藏范围

  • 797,116 篇 电子文献
  • 15 种 纸本馆藏

日期分布

学科分类号

  • 461,585 篇 工学
    • 334,278 篇 计算机科学与技术...
    • 263,989 篇 软件工程
    • 97,546 篇 信息与通信工程
    • 66,693 篇 控制科学与工程
    • 50,724 篇 电气工程
    • 46,641 篇 生物工程
    • 44,481 篇 电子科学与技术(可...
    • 35,232 篇 生物医学工程(可授...
    • 28,396 篇 光学工程
    • 26,790 篇 机械工程
    • 21,480 篇 化学工程与技术
    • 19,248 篇 仪器科学与技术
    • 17,919 篇 动力工程及工程热...
    • 16,817 篇 材料科学与工程(可...
    • 13,713 篇 安全科学与工程
    • 12,313 篇 建筑学
  • 260,745 篇 理学
    • 151,399 篇 数学
    • 69,544 篇 物理学
    • 53,686 篇 生物学
    • 44,534 篇 统计学(可授理学、...
    • 28,405 篇 系统科学
    • 23,285 篇 化学
  • 117,318 篇 管理学
    • 65,452 篇 管理科学与工程(可...
    • 56,577 篇 图书情报与档案管...
    • 33,609 篇 工商管理
  • 32,910 篇 医学
    • 27,734 篇 临床医学
    • 24,701 篇 基础医学(可授医学...
    • 15,163 篇 药学(可授医学、理...
    • 12,411 篇 公共卫生与预防医...
  • 20,964 篇 法学
    • 17,585 篇 社会学
  • 12,356 篇 经济学
  • 11,592 篇 教育学
  • 9,587 篇 农学
  • 3,891 篇 文学
  • 1,476 篇 军事学
  • 1,242 篇 艺术学
  • 737 篇 哲学
  • 286 篇 历史学

主题

  • 58,242 篇 computer science
  • 17,506 篇 computational mo...
  • 13,636 篇 accuracy
  • 13,569 篇 feature extracti...
  • 12,568 篇 machine learning
  • 12,468 篇 application soft...
  • 12,210 篇 data mining
  • 11,169 篇 training
  • 11,155 篇 computer archite...
  • 11,016 篇 deep learning
  • 10,160 篇 algorithm design...
  • 10,083 篇 costs
  • 9,933 篇 testing
  • 9,797 篇 protocols
  • 9,439 篇 artificial intel...
  • 8,856 篇 semantics
  • 8,717 篇 bandwidth
  • 8,657 篇 delay
  • 8,652 篇 hardware
  • 8,430 篇 predictive model...

机构

  • 4,993 篇 department of co...
  • 2,072 篇 department of co...
  • 1,695 篇 department of co...
  • 1,536 篇 department of co...
  • 1,332 篇 department of co...
  • 1,321 篇 department of el...
  • 1,112 篇 department of co...
  • 1,093 篇 department of el...
  • 978 篇 department of ph...
  • 977 篇 department of co...
  • 953 篇 cavendish labora...
  • 946 篇 university of ch...
  • 878 篇 department of co...
  • 841 篇 department of co...
  • 836 篇 oliver lodge lab...
  • 818 篇 physikalisches i...
  • 772 篇 department of co...
  • 766 篇 department of el...
  • 729 篇 department of co...
  • 546 篇 department of co...

作者

  • 254 篇 barter w.
  • 235 篇 s. chen
  • 234 篇 j. wang
  • 227 篇 blake t.
  • 220 篇 betancourt c.
  • 218 篇 bowcock t.j.v.
  • 218 篇 borsato m.
  • 217 篇 bellee v.
  • 214 篇 liu yang
  • 212 篇 amato s.
  • 208 篇 brundu d.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 202 篇 boettcher t.
  • 191 篇 c. alexa
  • 191 篇 c. amelung
  • 189 篇 j. m. izen
  • 189 篇 g. bella
  • 189 篇 j. strandberg
  • 189 篇 d. calvet

语言

  • 719,801 篇 英文
  • 71,059 篇 其他
  • 6,503 篇 中文
  • 330 篇 日文
  • 230 篇 德文
  • 106 篇 法文
  • 83 篇 斯洛文尼亚文
  • 72 篇 西班牙文
  • 57 篇 俄文
  • 53 篇 朝鲜文
  • 31 篇 葡萄牙文
  • 26 篇 意大利文
  • 13 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science Program Computer Science Department"
797120 条 记 录,以下是311-320 订阅
排序:
Variant Wasserstein Generative Adversarial Network Applied on Low Dose CT Image Denoising
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4535-4552页
作者: Anoud A.Mahmoud Hanaa A.Sayed Sara S.Mohamed Department of Mathematics and Computer Science Faculty of ScienceNew Valley UniversityNew Valley72511Egypt Department of Computer Science College of Computer Science and Engineering Taibah UniversityMedina42221KSA Department of Mathematics Faculty of ScienceAssiut UniversityAssiut71516Egypt
Computed Tomography(CT)images have been extensively employed in disease diagnosis and treatment,causing a huge concern over the dose of radiation to which patients are *** the radiation dose to get a better image may ... 详细信息
来源: 评论
A Novel CAPTCHA Recognition System Based on Refined Visual Attention
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 115-136页
作者: Zaid Derea Beiji Zou Xiaoyan Kui Monir Abdullah Alaa Thobhani Amr Abdussalam School of Computer Science and Engineering Central South UniversityChangsha410083China College of Computer Science and Information Technology Wasit UniversityWasit52001Iraq Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha67714Saudi Arabia Electronic Engineering and Information Science Department University of Science and Technology of ChinaHefei230026China
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma... 详细信息
来源: 评论
AI-Driven Agronomy: Enhancing Crop Yield and Market Profits  4
AI-Driven Agronomy: Enhancing Crop Yield and Market Profits
收藏 引用
4th International Conference on Innovative Practices in Technology and Management, ICIPTM 2024
作者: Mourya, Kona Chandra, Sai Reddy, N Abhinay Kumar, Aiswarya S Department of Computer Science and Engineering Department of Computer Science and Engineering
The agriculture sector plays an important role to the nation's economy, contributing significantly to GDP and employing a sizable section of the labour force. Nonetheless, precisely projecting food production and ... 详细信息
来源: 评论
emapDiffP: A novel learning algorithm for convolutional neural network optimization
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 11987-12010页
作者: Bhakta, Shubhankar Nandi, Utpal Changdar, Chiranjit Ghosal, Sudipta Kr Pal, Rajat Kumar Department of Computer Science Vidyasagar University West Bengal Midnapore721102 India Department of Computer Science Belda College West Bengal Belda721424 India Department of Computer Science and Technology Behala Goverment Polytechnic West Bengal Kolkata720060 India Department of Computer Science and Engineering University of Calcutta West Bengal Kolkata700106 India
Deep neural networks (DNNs) having multiple hidden layers are very efficient to learn large volume datasets and applied in a wide range of applications. The DNNs are trained on these datasets using learning algorithms... 详细信息
来源: 评论
Enhancing Waste Classification with YOLOv8 Models for Efficient and Accurate Sorting  9th
Enhancing Waste Classification with YOLOv8 Models for Effici...
收藏 引用
9th International Conference on computer science and Computational Intelligence, ICCSCI 2024
作者: Vieri, Deverel Susanto, Rendy Purwanto, Eko Setyo Ario, Muhamad Keenan Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Mobile Application & Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
As of 2023, Indonesia ranks as the second largest waste-producing country globally. The waste produced is not segregated properly, leading to the vast amount of waste piling up in local landfills. Traditional methods,... 详细信息
来源: 评论
Trend analysis in competitive programming using topic modeling  9th
Trend analysis in competitive programming using topic modeli...
收藏 引用
9th International Conference on computer science and Computational Intelligence, ICCSCI 2024
作者: Ramahalim, Albert Yulius Karuniawan, Christoffer Edbert Purwanto, Eko Setyo Ario, Muhamad Keenan Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Mobile Application & Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Competitive programming (CP) is a mind sports activity where people solve problems using command-line computer programs to provide correct output for the given test cases. Competitors need to practice problem-solving ... 详细信息
来源: 评论
Harnessing Deep Learning for Ocular Disease Diagnosis  9th
Harnessing Deep Learning for Ocular Disease Diagnosis
收藏 引用
9th International Conference on computer science and Computational Intelligence, ICCSCI 2024
作者: Ryan, Jessica Nathaniel, Dave Andrew Purwanto, Eko Setyo Ario, Muhamad Keenan Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Mobile Application & Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Vision impairment, often caused by preventable ocular diseases can be challenging to diagnose accurately and prone to human error. Automation using technology, particularly deep learning, offers a promising solution t... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
A fine-tuned vision transformer-based on limited dataset for facial expression recognition  9th
A fine-tuned vision transformer-based on limited dataset for...
收藏 引用
9th International Conference on computer science and Computational Intelligence, ICCSCI 2024
作者: Febrian, Rio Huang, Ronald Richie Setiono, Nicholas Ramdhan, Dimas Chowanda, Andry Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Game Application & Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
With the increase of interest in Facial Expression Recognition (FER) in the past few decades. Several challenges surfaced with the invention of many different FER models which are often based on Convolution Neural Net... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论