咨询与建议

限定检索结果

文献类型

  • 176,544 篇 会议
  • 76,158 篇 期刊文献
  • 1,852 册 图书
  • 3 篇 学位论文

馆藏范围

  • 254,557 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 150,608 篇 工学
    • 101,370 篇 计算机科学与技术...
    • 82,965 篇 软件工程
    • 38,260 篇 信息与通信工程
    • 24,205 篇 控制科学与工程
    • 20,376 篇 电气工程
    • 19,634 篇 电子科学与技术(可...
    • 17,801 篇 生物工程
    • 13,103 篇 生物医学工程(可授...
    • 12,240 篇 光学工程
    • 11,373 篇 机械工程
    • 8,857 篇 化学工程与技术
    • 8,452 篇 仪器科学与技术
    • 8,331 篇 动力工程及工程热...
    • 6,580 篇 材料科学与工程(可...
    • 6,181 篇 网络空间安全
    • 5,937 篇 安全科学与工程
    • 5,683 篇 交通运输工程
  • 83,795 篇 理学
    • 41,660 篇 数学
    • 26,791 篇 物理学
    • 19,865 篇 生物学
    • 13,552 篇 统计学(可授理学、...
    • 9,335 篇 系统科学
    • 9,264 篇 化学
  • 40,238 篇 管理学
    • 24,897 篇 管理科学与工程(可...
    • 17,055 篇 图书情报与档案管...
    • 10,931 篇 工商管理
  • 12,391 篇 医学
    • 10,338 篇 临床医学
    • 9,442 篇 基础医学(可授医学...
    • 5,979 篇 药学(可授医学、理...
  • 6,956 篇 法学
    • 5,608 篇 社会学
  • 4,370 篇 经济学
  • 3,635 篇 农学
  • 2,362 篇 教育学
  • 1,211 篇 文学
  • 582 篇 军事学
  • 394 篇 艺术学
  • 23 篇 哲学
  • 16 篇 历史学

主题

  • 7,345 篇 accuracy
  • 7,127 篇 computer science
  • 6,742 篇 feature extracti...
  • 6,317 篇 deep learning
  • 5,765 篇 computational mo...
  • 5,506 篇 training
  • 5,037 篇 machine learning
  • 3,695 篇 predictive model...
  • 3,694 篇 convolutional ne...
  • 3,688 篇 support vector m...
  • 3,443 篇 optimization
  • 3,349 篇 real-time system...
  • 3,183 篇 internet of thin...
  • 3,154 篇 data mining
  • 2,969 篇 data models
  • 2,862 篇 neural networks
  • 2,694 篇 wireless sensor ...
  • 2,609 篇 artificial intel...
  • 2,512 篇 semantics
  • 2,475 篇 security

机构

  • 2,450 篇 school of comput...
  • 2,154 篇 chitkara univers...
  • 1,511 篇 school of comput...
  • 1,329 篇 school of comput...
  • 1,070 篇 cavendish labora...
  • 1,009 篇 college of compu...
  • 969 篇 department of ph...
  • 965 篇 university of ch...
  • 943 篇 school of comput...
  • 897 篇 department of co...
  • 883 篇 physikalisches i...
  • 877 篇 oliver lodge lab...
  • 817 篇 department of el...
  • 725 篇 college of compu...
  • 650 篇 department of co...
  • 649 篇 department of el...
  • 649 篇 school of comput...
  • 553 篇 infn sezione di ...
  • 531 篇 infn sezione di ...
  • 529 篇 infn laboratori ...

作者

  • 293 篇 niyato dusit
  • 250 篇 barter w.
  • 248 篇 a. gomes
  • 242 篇 s. chen
  • 235 篇 c. alexa
  • 235 篇 j. wang
  • 230 篇 j. m. izen
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 boettcher t.
  • 211 篇 brundu d.
  • 210 篇 beiter a.
  • 208 篇 c. amelung
  • 208 篇 bencivenni g.
  • 207 篇 g. bella
  • 206 篇 j. strandberg

语言

  • 242,057 篇 英文
  • 9,016 篇 其他
  • 3,480 篇 中文
  • 207 篇 日文
  • 36 篇 朝鲜文
  • 24 篇 德文
  • 23 篇 法文
  • 16 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering Technology"
254557 条 记 录,以下是141-150 订阅
排序:
Weakly-supervised instance co-segmentation via tensor-based salient co-peak search
收藏 引用
Frontiers of computer science 2024年 第2期18卷 83-92页
作者: Wuxiu QUAN Yu HU Tingting DAN Junyu LI Yue ZHANG Hongmin CAI School of Computer Science Guangdong Polytechnic Normal UniversityGuangzhou 510665China School of Computer Science and Engineering South China University of TechnologyGuangzhou 510006China
Instance co-segmentation aims to segment the co-occurrent instances among two *** task heavily relies on instance-related cues provided by co-peaks,which are generally estimated by exhaustively exploiting all paired c... 详细信息
来源: 评论
On the Generalisation Performance of Geometric Semantic Genetic Programming for Boolean Functions: Learning Block Mutations
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-33页
作者: Corus, Dogan Oliveto, Pietro S. Department of Computer Engineering Kadir Has University Istanbul Turkey Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
In this article, we present the first rigorous theoretical analysis of the generalisation performance of a Geometric Semantic Genetic Programming (GSGP) system. More specifically, we consider a hill-climber using the ... 详细信息
来源: 评论
CMDCF: an effective cross-modal dense cooperative fusion network for RGB-D SOD
收藏 引用
Neural Computing and Applications 2024年 第23期36卷 14361-14378页
作者: Jia, XingZhao Zhao, WenXiu Wang, YuMei DongYe, ChangLei Peng, YanJun College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
The success of vision transformer demonstrates that the transformer structure is also suitable for various vision tasks, including high-level classification tasks and low-level dense prediction tasks. Salient object d... 详细信息
来源: 评论
From light sensing to adaptive learning:hafnium diselenide reconfigurable memcapacitive devices in neuromorphic computing
收藏 引用
Light(science & Applications) 2025年 第1期14卷 215-226页
作者: Bashayr Alqahtani Hanrui Li Abdul Momin Syed Nazek El-Atab Electrical and Computer Engineering Program Computer Electrical Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)ThuwalSaudi Arabia Electrical Engineering Department College of EngineeringPrincess Nourah Bint Abdulrahman University(PNU)RiyadhSaudi Arabia
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris... 详细信息
来源: 评论
Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1977-1993页
作者: Zhiqing Dong Zhao Zhang Hongyan Zhou Xuebo Chen School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China School of Electronic and Information Engineering University of Science and Technology LiaoningAnshan114051China
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat... 详细信息
来源: 评论
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1205-1222页
作者: Jungpil Shin Md.AlMehedi Hasan Md.Maniruzzaman Taiki Watanabe Issei Jozume School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... 详细信息
来源: 评论
Fake Face Detection Based on Fusion of Spatial Texture and High-Frequency Noise
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 212-221页
作者: Dengyong Zhang Feifan Qi Jiahao Chen Jiaxin Chen Rongrong Gong Yuehong Tian Lebing Zhang Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication Engineering Changsha University of Science and Technology School of Computer and Communication Engineering Changsha University of Science and Technology Changsha Social Work College Changkuangao Beijing Technology Co. Ltd. School of Computer and Artificial Intelligence Huaihua University
The rapid development of the Internet has led to the widespread dissemination of manipulated facial images, significantly impacting people's daily lives. With the continuous advancement of Deepfake technology, the... 详细信息
来源: 评论
Poor and rich squirrel algorithm-based Deep Maxout network for credit card fraud detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 123-134页
作者: Paul, Annu Paul, Varghese Department of Computer Science Alphonsa College Kottayam Kerala Pala India Department of Computer Science and Engineering Rajagiri School of Engineering and Technology Kerala Kochi India
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation... 详细信息
来源: 评论
Intrumer:A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 579-607页
作者: Nazreen Banu A S.K.B.Sangeetha Department of Computer Science and Engineering SRM Institute of Science and TechnologyVadapalani CampusChennai600026Tamil NaduIndia
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be... 详细信息
来源: 评论
Optimizing wireless sensor network topology with node load consideration
收藏 引用
虚拟现实与智能硬件(中英文) 2025年 第1期7卷 47-61页
作者: Ruizhi CHEN School of Computer Engineering Zhanjiang University of Science and TechnologyZhanjiang 524094China
Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing ***,traditional optimization methods often overlook the energy imbalance caused by node loa... 详细信息
来源: 评论