咨询与建议

限定检索结果

文献类型

  • 17,510 篇 会议
  • 9,104 篇 期刊文献
  • 223 册 图书

馆藏范围

  • 26,837 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,000 篇 工学
    • 13,308 篇 计算机科学与技术...
    • 10,896 篇 软件工程
    • 3,437 篇 信息与通信工程
    • 2,136 篇 控制科学与工程
    • 1,674 篇 生物工程
    • 1,412 篇 电气工程
    • 1,183 篇 机械工程
    • 1,156 篇 电子科学与技术(可...
    • 958 篇 生物医学工程(可授...
    • 839 篇 光学工程
    • 614 篇 化学工程与技术
    • 613 篇 仪器科学与技术
    • 564 篇 安全科学与工程
    • 556 篇 动力工程及工程热...
    • 477 篇 交通运输工程
    • 469 篇 网络空间安全
    • 456 篇 建筑学
  • 7,859 篇 理学
    • 4,727 篇 数学
    • 1,827 篇 生物学
    • 1,605 篇 物理学
    • 1,324 篇 统计学(可授理学、...
    • 936 篇 系统科学
    • 634 篇 化学
  • 5,210 篇 管理学
    • 3,221 篇 管理科学与工程(可...
    • 2,240 篇 图书情报与档案管...
    • 1,275 篇 工商管理
  • 870 篇 医学
    • 746 篇 临床医学
    • 663 篇 基础医学(可授医学...
  • 740 篇 法学
    • 581 篇 社会学
  • 450 篇 经济学
    • 449 篇 应用经济学
  • 376 篇 教育学
  • 256 篇 农学
  • 113 篇 文学
  • 67 篇 军事学
  • 65 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 840 篇 computer science
  • 530 篇 software enginee...
  • 502 篇 feature extracti...
  • 501 篇 deep learning
  • 466 篇 computational mo...
  • 427 篇 training
  • 413 篇 semantics
  • 372 篇 data mining
  • 372 篇 software
  • 343 篇 accuracy
  • 304 篇 educational inst...
  • 296 篇 machine learning
  • 292 篇 computer archite...
  • 280 篇 application soft...
  • 246 篇 image segmentati...
  • 244 篇 support vector m...
  • 242 篇 optimization
  • 237 篇 internet of thin...
  • 221 篇 cloud computing
  • 219 篇 conferences

机构

  • 954 篇 state key labora...
  • 450 篇 college of compu...
  • 398 篇 school of comput...
  • 320 篇 school of softwa...
  • 253 篇 department of co...
  • 242 篇 department of co...
  • 219 篇 school of comput...
  • 219 篇 school of inform...
  • 206 篇 school of softwa...
  • 181 篇 school of softwa...
  • 163 篇 college of compu...
  • 150 篇 school of softwa...
  • 145 篇 college of softw...
  • 133 篇 school of comput...
  • 124 篇 school of comput...
  • 124 篇 school of softwa...
  • 119 篇 college of compu...
  • 118 篇 college of compu...
  • 118 篇 national key lab...
  • 112 篇 tianjin key labo...

作者

  • 54 篇 baowen xu
  • 52 篇 liu yang
  • 49 篇 wang lei
  • 44 篇 li li
  • 43 篇 xiang-yang li
  • 42 篇 wei liu
  • 41 篇 lei wang
  • 39 篇 sun xingming
  • 39 篇 aichholzer oswin
  • 38 篇 zhou zhi-hua
  • 38 篇 zhang wen
  • 37 篇 wang hui
  • 37 篇 qi liu
  • 34 篇 jun zhang
  • 33 篇 song mingli
  • 32 篇 li peng
  • 32 篇 zhang hua
  • 31 篇 niyato dusit
  • 31 篇 shen furao
  • 31 篇 wei jun

语言

  • 25,503 篇 英文
  • 799 篇 其他
  • 561 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=Computer Software Technology"
26837 条 记 录,以下是131-140 订阅
排序:
Reflective clothing detection based on YOLOv5s fused with SE attention mechanism
收藏 引用
International Journal of Reasoning-based Intelligent Systems 2025年 第1期17卷 9-16页
作者: Wang, Yuanyuan Gu, Dingyun Zhu, Yemeng Zhang, Zhihan Cao, Jiahui Zhang, Haiyan School of Computer and Software Engineering Huaiyin Institute of Technology Huaian223001 China Engineering Laboratory of Mobile Interconnection Technology for Internet of Things Jiangsu Province Huai’an Huaian City223001 China
This paper proposes a YOLOv5s deep learning algorithm incorporating the SE attention mechanism to address the issue of workers failing to wear reflective clothing on duty, which has resulted in casualties from time to... 详细信息
来源: 评论
A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第7期140卷 255-273页
作者: Zhong Qu Guoqing Mu Bin Yuan School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China School of Software Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China
Automatic crack detection of cement pavement chiefly benefits from the rapid development of deep learning,with convolutional neural networks(CNN)playing an important role in this ***,as the performance of crack detect... 详细信息
来源: 评论
MSEs Credit Risk Assessment Model Based on Federated Learning and Feature Selection
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5573-5595页
作者: Zhanyang Xu Jianchun Cheng Luofei Cheng Xiaolong Xu Muhammad Bilal School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory Novel Software Technology Nanjing UniversityNanjing210023China Department of Computer and Electronics Systems Engineering Hankuk University of Foreign StudiesYongin-siGyeonggi-do17035Korea
Federated learning has been used extensively in business inno-vation scenarios in various *** research adopts the federated learning approach for the first time to address the issue of bank-enterprise information asym... 详细信息
来源: 评论
New Proper Reparameterization of Plane Rational Bézier Curves
收藏 引用
Journal of computer Science & technology 2024年 第5期39卷 1193-1206页
作者: Zhen-Fei Wang Xiao-Diao Chen Jun-Hai Yong School of Computer Hangzhou Dianzi UniversityHangzhou 310018China Haihe Laboratory of Information Technology Application Innovation Tianjin 300480China School of Software Tsinghua UniversityBeijing 100084China
Coincidence detection of two curves or two surfaces has wide application in computer-aided design(CAD)and computer-aided geometric design(CAGD).Proper reparameterization is the most complicated part in the *** paper p... 详细信息
来源: 评论
Multimodal Neural Machine Translation Based on Knowledge Distillation and Anti-Noise Interaction
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2305-2322页
作者: Erlin Tian Zengchao Zhu Fangmei Liu Zuhe Li School of Software Zhengzhou University of Light IndustryZhengzhou450001China School of Computer Science and Technology Zhengzhou University of Light IndustryZhengzhou450001China
Within the realm of multimodal neural machine translation(MNMT),addressing the challenge of seamlessly integrating textual data with corresponding image data to enhance translation accuracy has become a pressing *** s... 详细信息
来源: 评论
A mathematical multi-objective optimization model and metaheuristic algorithm for effective advertising in the social internet of things
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4797-4821页
作者: Molaei, Reza Rahsepar Fard, Kheirollah Bouyer, Asgarali Department of Computer Engineering and Information Technology University of Qom Qom Iran Department of Software Engineering Azarbaijan Shahid Madani University Tabriz Iran Department of Software Engineering Faculty of Engineering and Natural Science Istinye University Istanbul Turkey
The integration of social networks with the Internet of Things (IoT) has been explored in recent research, giving rise to the Social Internet of Things (SIoT). One promising application of SIoT is viral marketing, whi... 详细信息
来源: 评论
An Approach to Optimize Symbolic Execution in Ethereum Smart Contracts  24
An Approach to Optimize Symbolic Execution in Ethereum Smart...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: Liu, Yi Cai, Lizhi Chai, Chenchen Ma, Yuan School of Information Science and Engineering East China University of Science and Technology Shanghai China Shanghai Development Center of Computer Software Technology Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai China
As the application of smart contracts in blockchain technology becomes increasingly widespread, their security issues have emerged as a focal point of both research and practice. Although symbolic execution technology... 详细信息
来源: 评论
Privacy-Enhanced Data Sharing in Multi-Institutional Healthcare  9
Privacy-Enhanced Data Sharing in Multi-Institutional Healthc...
收藏 引用
9th International Conference on Cloud Computing and Big Data Analytics, ICCCBDA 2024
作者: Xiao, Jixiang Zeng, Shengke Zhou, Tiantian Feng, Yawen School of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China School of Computer and Software Engineering Xihua University Chengdu China
In multi-institutional patient data sharing scenarios, maintaining fine-grained access control while safeguarding privacy and adapting to real-world environments is crucial. Traditional attribute-based encryption (ABE... 详细信息
来源: 评论
IIN-FFD:Intra-Inter Network for Face Forgery Detection
收藏 引用
Tsinghua Science and technology 2024年 第6期29卷 1839-1850页
作者: Qihua Zhou Zhili Zhou Zhipeng Bao Weina Niu Yuling Liu School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Institute of Artificial Intelligence Guangzhou UniversityGuangzhou 510006China School of Computer Science University of Electronic Science and Technology of ChinaChengdu 611731SichuanChina School of Computer Science Hunan UniversityChangsha 410082HunanChina
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurat... 详细信息
来源: 评论
Automated Hematological Analysis:Advances in Segmentation Approaches and Future Directions  6
Automated Hematological Analysis:Advances in Segmentation Ap...
收藏 引用
6th International Conference on Robotics and Automation in Industry, ICRAI 2024
作者: Eram, Saleha Akram, Muhammad Usman Nayab, Maham National University of Sciences and Technology Dept. Computer and Software Engineering Islamabad Pakistan
Hematological analysis is crucial for diagnosing blood disorders such as leukemia and anemia, a process that has traditionally depended on manual microscopy, and is susceptible to variability and human error. The ques... 详细信息
来源: 评论