咨询与建议

限定检索结果

文献类型

  • 425,274 篇 会议
  • 158,517 篇 期刊文献
  • 3,628 册 图书
  • 103 篇 学位论文

馆藏范围

  • 587,520 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,870 篇 工学
    • 229,854 篇 计算机科学与技术...
    • 187,677 篇 软件工程
    • 82,294 篇 信息与通信工程
    • 53,450 篇 控制科学与工程
    • 44,630 篇 电气工程
    • 43,853 篇 电子科学与技术(可...
    • 38,858 篇 生物工程
    • 28,708 篇 生物医学工程(可授...
    • 26,003 篇 光学工程
    • 24,375 篇 机械工程
    • 19,029 篇 化学工程与技术
    • 18,514 篇 仪器科学与技术
    • 17,580 篇 动力工程及工程热...
    • 14,363 篇 材料科学与工程(可...
    • 12,213 篇 安全科学与工程
    • 11,363 篇 交通运输工程
    • 11,054 篇 网络空间安全
  • 186,622 篇 理学
    • 94,847 篇 数学
    • 58,127 篇 物理学
    • 43,347 篇 生物学
    • 30,607 篇 统计学(可授理学、...
    • 21,706 篇 系统科学
    • 19,963 篇 化学
  • 86,491 篇 管理学
    • 51,971 篇 管理科学与工程(可...
    • 38,104 篇 图书情报与档案管...
    • 24,693 篇 工商管理
  • 26,189 篇 医学
    • 22,106 篇 临床医学
    • 20,002 篇 基础医学(可授医学...
    • 12,677 篇 药学(可授医学、理...
  • 15,500 篇 法学
    • 12,658 篇 社会学
  • 9,488 篇 经济学
  • 7,501 篇 农学
  • 6,366 篇 教育学
  • 2,638 篇 文学
  • 1,327 篇 军事学
  • 839 篇 艺术学
  • 104 篇 哲学
  • 57 篇 历史学

主题

  • 26,551 篇 computer science
  • 13,933 篇 accuracy
  • 13,813 篇 computational mo...
  • 13,484 篇 feature extracti...
  • 11,621 篇 deep learning
  • 11,350 篇 training
  • 10,456 篇 machine learning
  • 7,947 篇 data mining
  • 7,927 篇 predictive model...
  • 7,558 篇 support vector m...
  • 7,387 篇 computer archite...
  • 7,253 篇 optimization
  • 6,795 篇 neural networks
  • 6,742 篇 wireless sensor ...
  • 6,662 篇 real-time system...
  • 6,620 篇 data models
  • 6,473 篇 convolutional ne...
  • 6,383 篇 costs
  • 6,321 篇 algorithm design...
  • 6,215 篇 protocols

机构

  • 2,475 篇 school of comput...
  • 2,182 篇 school of comput...
  • 2,144 篇 chitkara univers...
  • 2,067 篇 school of comput...
  • 1,770 篇 school of comput...
  • 1,676 篇 department of co...
  • 1,472 篇 school of comput...
  • 1,438 篇 school of comput...
  • 1,316 篇 department of co...
  • 1,314 篇 school of comput...
  • 1,310 篇 school of electr...
  • 1,291 篇 department of el...
  • 1,178 篇 school of comput...
  • 1,155 篇 college of compu...
  • 1,118 篇 department of el...
  • 997 篇 university of ch...
  • 995 篇 school of comput...
  • 968 篇 department of ph...
  • 957 篇 college of compu...
  • 945 篇 cavendish labora...

作者

  • 427 篇 niyato dusit
  • 326 篇 liu yang
  • 282 篇 yang yang
  • 244 篇 barter w.
  • 243 篇 wang wei
  • 231 篇 j. wang
  • 229 篇 s. chen
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung

语言

  • 552,067 篇 英文
  • 28,447 篇 其他
  • 7,001 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 68 篇 德文
  • 40 篇 法文
  • 29 篇 斯洛文尼亚文
  • 16 篇 西班牙文
  • 9 篇 俄文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 5 篇 荷兰文
  • 4 篇 阿拉伯文
  • 4 篇 捷克文
  • 4 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
587522 条 记 录,以下是1071-1080 订阅
排序:
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
An Initial Risk Assessment for Multimodal with LSTM-Based Trust Evaluation Framework for Autonomous Vehicle Security
收藏 引用
SN computer science 2025年 第2期6卷 1-15页
作者: Renjith, P.N. Balasubramani, S. Ramesh, K. Patnala, Eswar School of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram India Department of Computer Science and Engineering Sri Krishna College of Engineering and Technology Coimbatore India
This research aims to develop a new approach to increase the safety and reliability of Autonomous Vehicle (AV) through the proposed risk assessment framework, supported by the trust evaluation approach derived from a ... 详细信息
来源: 评论
Hybrid brave-hunting optimisation for heart disease detection model with SVM coupled deep CNN
收藏 引用
International Journal of Intelligent Information and Database Systems 2025年 第1期17卷 92-123页
作者: Tambe, Pravin M. Shrivastava, Manish Department of Computer Science and Engineering Vivekananda Global University Jagatpura Rajasthan Jaipur303012 India
This research proposes a novel hybrid optimisation method called brave-hunting optimisation (BHO) inspired by lion optimisation (LO) and coyote optimisation (CO). The BHO algorithm is employed to fine-tune the SVM par... 详细信息
来源: 评论
Traffic Rerouting Optimization Using Scheduling Algorithms
收藏 引用
SN computer science 2024年 第6期5卷 762页
作者: Garg, Tanya Kaur, Gurjinder Rana, Prashant Singh Department of Computer Science & amp Engineering Sant Longowal Institute of Engineering & amp Technology Computer Science & amp Engineering Department Thapar Institute of Engineering & amp Technology
Traffic rerouting is a technique used to optimize traffic flow and reduce congestion by redirecting vehicles to alternate routes. The work done in this research focuses on a specific case scenario covering a 25 k... 详细信息
来源: 评论
UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3927-3950页
作者: Ting Chen Shujiao Wang Xin Fan Xiujuan Zhang Chuanwen Luo Yi Hong School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Computer Science Qufu Normal UniversityRizhao276826China School of Information Science and Technology Beijing Forestry UniversityBeijing100083China
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication... 详细信息
来源: 评论
An effective speaker adaption using deep learning for the identification of speakers in emergency situation
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 16945-16969页
作者: Deka, Aniruddha Kalita, Nijara Department of Computer Science and Engineering Assam down town University Assam Guwahati781026 India
Automated speaker identification is an important research topic in recent advanced technologies. This process helps to analyze the speakers in their emergencies. Various existing approaches are used for speaker identi... 详细信息
来源: 评论
Intelligent surveillance support system
收藏 引用
Discover Internet of Things 2023年 第1期3卷 9页
作者: Saketh, Meduri Nandal, Neha Tanwar, Rohit Reddy, B. Pradyun Department of Computer Science Engineering Gokaraju Rangaraju Institute of Engineering and Technology Hyderabad India Geethanjali College of Engineering and Technology Hyderabad India School of Computer Science University of Petroleum and Energy Studies Dehradun India Department of Computer Science Engineering Sreenidhi Institute of Engineering and Technology Hyderabad India
The Intelligent Surveillance Support System(ISSS) is an innovative software solution that enables real-time monitoring and analysis of security footage to detect and identify potential threats. This system incorporate... 详细信息
来源: 评论
Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 357-384页
作者: Mohd Anjum Naoufel Kraiem Hong Min Ashit Kumar Dutta Yousef Ibrahim Daradkeh Department of Computer Engineering Aligarh Muslim UniversityAligarh202002India College of Computer Science King Khalid UniversityAbha61413Saudi Arabia School of Computing Gachon UniversitySeongnam13120Republic of Korea Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Engineering and Information College of Engineering in Wadi AlddawasirPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning *** applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws... 详细信息
来源: 评论
Autonomous Vehicle Perception Using Monocular Thermal Imaging Cameras  27
Autonomous Vehicle Perception Using Monocular Thermal Imagin...
收藏 引用
27th IEEE International Conference on Intelligent Transportation Systems, ITSC 2024
作者: Mazhr, Ahmed Mougy, Amr El Computer Engineering Department Cairo Egypt Department of Computer Science and Engineering Cairo Egypt
This paper investigates the integration of monocular thermal imaging cameras into autonomous vehicles to address challenges faced by conventional sensors in adverse conditions. This study explores the performance of t... 详细信息
来源: 评论
DisCovHAR: Contrastive Attention for Human Activity Recognition Under Distribution Shifts
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21973-21983页
作者: Chen, Luke Odema, Mohanad Al Faruque, Mohammad Abdullah University of California Department of Electrical Engineering and Computer Science IrvineCA92697 United States
Advances in Internet-of-Things (IoT) wearable sensors and Edge-Artificial Intelligence (Edge-AI) have enabled practical realizations of Machine Learning (ML)-enabled mobile sensing applications like Human Activity Rec... 详细信息
来源: 评论