咨询与建议

限定检索结果

文献类型

  • 5,903 篇 会议
  • 3,407 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 9,351 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,572 篇 工学
    • 3,455 篇 计算机科学与技术...
    • 2,772 篇 软件工程
    • 1,092 篇 信息与通信工程
    • 959 篇 控制科学与工程
    • 747 篇 电气工程
    • 739 篇 电子科学与技术(可...
    • 569 篇 生物工程
    • 490 篇 机械工程
    • 446 篇 光学工程
    • 408 篇 生物医学工程(可授...
    • 390 篇 仪器科学与技术
    • 297 篇 动力工程及工程热...
    • 290 篇 化学工程与技术
    • 227 篇 交通运输工程
    • 203 篇 材料科学与工程(可...
    • 188 篇 土木工程
    • 169 篇 安全科学与工程
  • 2,964 篇 理学
    • 1,436 篇 数学
    • 870 篇 物理学
    • 636 篇 生物学
    • 461 篇 统计学(可授理学、...
    • 358 篇 系统科学
    • 295 篇 化学
  • 1,476 篇 管理学
    • 966 篇 管理科学与工程(可...
    • 560 篇 图书情报与档案管...
    • 404 篇 工商管理
  • 382 篇 医学
    • 325 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 171 篇 药学(可授医学、理...
  • 207 篇 法学
    • 173 篇 社会学
  • 157 篇 经济学
  • 96 篇 农学
  • 76 篇 教育学
  • 31 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 176 篇 feature extracti...
  • 168 篇 deep learning
  • 163 篇 computational mo...
  • 145 篇 systems engineer...
  • 145 篇 data mining
  • 126 篇 optimization
  • 122 篇 machine learning
  • 116 篇 neural networks
  • 108 篇 control systems
  • 101 篇 accuracy
  • 98 篇 semantics
  • 93 篇 computer archite...
  • 88 篇 laboratories
  • 85 篇 educational inst...
  • 84 篇 costs
  • 83 篇 predictive model...
  • 79 篇 wireless sensor ...
  • 79 篇 training
  • 78 篇 bandwidth

机构

  • 100 篇 national enginee...
  • 94 篇 college of compu...
  • 77 篇 school of comput...
  • 72 篇 department of co...
  • 66 篇 national enginee...
  • 56 篇 college of infor...
  • 44 篇 school of comput...
  • 41 篇 the key laborato...
  • 38 篇 school of inform...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 30 篇 faculty of compu...
  • 30 篇 university of ch...
  • 29 篇 huazhong univers...
  • 28 篇 national enginee...
  • 27 篇 school of comput...
  • 27 篇 hubei province k...
  • 25 篇 key laboratory o...
  • 24 篇 school of comput...

作者

  • 72 篇 hai jin
  • 39 篇 jin hai
  • 30 篇 yang yang
  • 30 篇 xiaofei liao
  • 28 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 shu-ching chen
  • 20 篇 ji zhen
  • 20 篇 dutta paramartha
  • 19 篇 jianchao zeng
  • 18 篇 wang xingjun
  • 18 篇 hu shengshan
  • 17 篇 zhen ji
  • 16 篇 liao xiaofei
  • 15 篇 wang lei
  • 15 篇 li peng
  • 15 篇 long zheng
  • 15 篇 zhuang songlin

语言

  • 8,848 篇 英文
  • 258 篇 其他
  • 217 篇 中文
  • 32 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Computer Science and System Engineering"
9351 条 记 录,以下是121-130 订阅
排序:
Review of National Cybersecurity Policies: A Case Study on Asian Countries  1
Review of National Cybersecurity Policies: A Case Study on A...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Noor, Hera Seelro, Dodo Khan Ali, Syed Abbas NED University of Engineering & Technology Department of Computer Information System Engineering Karachi Pakistan Thar Institute of Engineering Science & Technology NED University of Engineering & Technology Karachi Pakistan
Accelerating the economic advantages of ICT is one of the finest methods for any nation to boost its economy. Due to the unique topography, governing laws, and cultural traditions of each nation, these colossal challe... 详细信息
来源: 评论
Multi-granularity feature enhancement network for maritime ship detection
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第3期9卷 649-664页
作者: Li Ying Duoqian Miao Zhifei Zhang Hongyun Zhang Witold Pedrycz Department of Computer Science and Technology Tongji UniversityShanghaiChina Project Management Office of China National Scientific Seafloor Observatory Tongji UniversityShanghaiChina Department of Electrical and Computer Engineering AlbertaEdmontonCanada System Research Institute Polish Academy of SciencesWarsawPoland
Due to the characteristics of high resolution and rich texture information,visible light images are widely used for maritime ship ***,these images are suscep-tible to sea fog and ships of different sizes,which can res... 详细信息
来源: 评论
Combinatorial Kinetic Dualistic Auction Model for Metaverse Service Allocation  1
Combinatorial Kinetic Dualistic Auction Model for Metaverse ...
收藏 引用
IEEE AITU: 1st International Student Conference: "Digital Generation", AITU 2024
作者: Singh, Raj Sarkar, Pritam Bandyopadhyay, Anjan Swain, Sujata Sardar, Tanvir Habib Pandey, Bishwajeet School of Computer Engineering KIIT 751024 India Department of Computer Science GITAM University Bengaluru India Department of Intelligent System and Cybersecurity Astana IT University Kazakhstan
The focus of this research work revolves around the utilization of a specialized"Combinatorial Kinetic Dualistic Auction Model" designed specifically for"metaverse Services." The main goal is to im... 详细信息
来源: 评论
Battery Monitoring system on IoT-Based Smart Micro Grid  4
Battery Monitoring System on IoT-Based Smart Micro Grid
收藏 引用
4th International Conference on Electronic and Electrical engineering and Intelligent system, ICE3IS 2024
作者: Iksan, Nur Widodo, Djoko Adi Djuniadi, Djuniadi Putri, Riana Defi Mahadji Suryanto, Agus Udayanti, Erika Devi Universitas Negeri Semarang Faculty of Engineering Department of Electrical Engineering Indonesia Universitas Dian Nuswantoro Faculty of Computer Science Department of Information System Indonesia
The use of batteries as an energy storage medium has a very important role in the installation of renewable energy power plants, such as photovoltaics to overcome intermittency in photovoltaics and to maintain stable ... 详细信息
来源: 评论
Unlocking Security: A Comprehensive Exploration of Biometric Authentication Techniques  14
Unlocking Security: A Comprehensive Exploration of Biometric...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Sriman, Jindam Thapar, Puneet Alyas, Arsalan Ahmed Singh, Urvashi School of Computer Science Engineering Lovely Professional University Phagwara India Wilmington University Information System Technologies United States
Biometric authentication is a rapidly evolving field in information security, providing a personalized and reliable approach to identity verification. This paper explores various biometric methods, including fingerpri... 详细信息
来源: 评论
A comprehensive survey of visible infrared person re-identification from an application perspective
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90243-90270页
作者: Chang, Hua Xu, Xin Liu, Wei Lu, Lingyi Li, Weigang School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan430065 China School of Information Science and Engineering Wuhan University of Science and Technology Wuhan China
Person re-identification (ReID) is a significant issue in computer vision, aiming to match the same pedestrian across various cameras. Recent research on this issue has successfully reached a satisfactory performance ... 详细信息
来源: 评论
Dynamic generative R-CNN
收藏 引用
Neural Computing and Applications 2025年 第10期37卷 7107-7120页
作者: Saffarini, Rasha Khamayseh, Faisal Awwad, Yousef Sabha, Muath Eleyan, Derar IT Engineering Arab American University Jenin Palestine Department of Computer Science Palestine Polytechnic University Hebron Palestine Department of Computer System Engineering Palestine Technical University Tulkarm Palestine Department of Multimedia Technology Arab American University Jenin Palestine Department of Applied Computing Palestine Technical University Tulkarm Palestine
Different techniques have been developed for object detection and recognition. These techniques can be divided into single-shot and two-shot methods. Single-shot methods focus on real-time applications, while two-shot... 详细信息
来源: 评论
Tree Regularization for Visual Explanations of Cancer Cell Classification
Tree Regularization for Visual Explanations of Cancer Cell C...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Raza, Muhammad Umair Chen, Jie Wang, Li Nawaz, Adil Leung, Victor C.M. Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology China
The challenge of interpretability remains a significant barrier to adopting deep neural networks in healthcare domains. Although tree regularization aims to align a deep neural network's decisions with a single ax... 详细信息
来源: 评论
Curve Monitoring and Alert system for Smart Transportation  1
Curve Monitoring and Alert System for Smart Transportation
收藏 引用
1st IEEE International Conference on Cognitive Robotics and Intelligent systems, ICC - ROBINS 2024
作者: Natarajan, Yuvaraj Sri Preethaa K, R. Viswanathan, Shrinithi Jayarathinam, Sandhiya Balasubramaniam, Vikas Kpr Institute of Engineering and Technology Department of Computer Science and Engineering Coimbatore India Kyungpook National University Department of Robot and Smart System Engineering Daegu Korea Republic of
The proposed IoT-based Smart Curve Monitoring and Alert system is designed to improve road safety through the fusion of embedded systems, machine learning and edge computing technologies. The proposed system is primar... 详细信息
来源: 评论
Adaptive Evolutionary Reinforcement Learning Algorithm with Early Termination Strategy  23
Adaptive Evolutionary Reinforcement Learning Algorithm with ...
收藏 引用
23rd International Conference on Autonomous Agents and Multiagent systems, AAMAS 2024
作者: Wu, Xiaoqiang Zhu, Qingling Lin, Qiuzhen Chen, Weineng Li, Jianqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Computer Science and Engineering South China University of Technology Guangzhou China
Evolutionary reinforcement learning algorithms (ERLs), which combine evolutionary algorithms (EAs) with reinforcement learning (RL), have demonstrated significant success in enhancing RL performance. However, most ERL... 详细信息
来源: 评论