咨询与建议

限定检索结果

文献类型

  • 17,673 篇 会议
  • 9,153 篇 期刊文献
  • 224 册 图书

馆藏范围

  • 27,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,177 篇 工学
    • 13,446 篇 计算机科学与技术...
    • 11,004 篇 软件工程
    • 3,470 篇 信息与通信工程
    • 2,205 篇 控制科学与工程
    • 1,681 篇 生物工程
    • 1,423 篇 电气工程
    • 1,189 篇 机械工程
    • 1,165 篇 电子科学与技术(可...
    • 970 篇 生物医学工程(可授...
    • 853 篇 光学工程
    • 615 篇 仪器科学与技术
    • 614 篇 化学工程与技术
    • 568 篇 安全科学与工程
    • 557 篇 动力工程及工程热...
    • 488 篇 交通运输工程
    • 479 篇 网络空间安全
    • 467 篇 建筑学
  • 7,892 篇 理学
    • 4,745 篇 数学
    • 1,834 篇 生物学
    • 1,609 篇 物理学
    • 1,332 篇 统计学(可授理学、...
    • 936 篇 系统科学
    • 633 篇 化学
  • 5,241 篇 管理学
    • 3,236 篇 管理科学与工程(可...
    • 2,257 篇 图书情报与档案管...
    • 1,285 篇 工商管理
  • 875 篇 医学
    • 752 篇 临床医学
    • 669 篇 基础医学(可授医学...
  • 748 篇 法学
    • 586 篇 社会学
  • 452 篇 经济学
    • 451 篇 应用经济学
  • 384 篇 教育学
  • 258 篇 农学
  • 113 篇 文学
  • 67 篇 军事学
  • 65 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 842 篇 computer science
  • 535 篇 software enginee...
  • 507 篇 deep learning
  • 506 篇 feature extracti...
  • 469 篇 computational mo...
  • 436 篇 training
  • 415 篇 semantics
  • 374 篇 data mining
  • 371 篇 software
  • 359 篇 accuracy
  • 303 篇 educational inst...
  • 294 篇 computer archite...
  • 292 篇 machine learning
  • 280 篇 application soft...
  • 248 篇 image segmentati...
  • 247 篇 support vector m...
  • 239 篇 optimization
  • 236 篇 internet of thin...
  • 223 篇 cloud computing
  • 221 篇 conferences

机构

  • 962 篇 state key labora...
  • 474 篇 college of compu...
  • 398 篇 school of comput...
  • 320 篇 school of softwa...
  • 253 篇 department of co...
  • 249 篇 department of co...
  • 221 篇 school of comput...
  • 219 篇 school of softwa...
  • 216 篇 school of inform...
  • 189 篇 school of softwa...
  • 172 篇 college of compu...
  • 151 篇 school of softwa...
  • 147 篇 college of softw...
  • 134 篇 school of comput...
  • 126 篇 college of compu...
  • 124 篇 school of comput...
  • 123 篇 school of softwa...
  • 123 篇 college of compu...
  • 122 篇 national key lab...
  • 113 篇 tianjin key labo...

作者

  • 54 篇 baowen xu
  • 54 篇 liu yang
  • 50 篇 wang lei
  • 45 篇 li li
  • 43 篇 xiang-yang li
  • 42 篇 wei liu
  • 41 篇 lei wang
  • 40 篇 zhang wen
  • 39 篇 sun xingming
  • 39 篇 aichholzer oswin
  • 38 篇 zhou zhi-hua
  • 37 篇 wang hui
  • 37 篇 qi liu
  • 34 篇 jun zhang
  • 33 篇 song mingli
  • 32 篇 li peng
  • 32 篇 shen furao
  • 32 篇 wei jun
  • 32 篇 zhang hua
  • 31 篇 niyato dusit

语言

  • 25,266 篇 英文
  • 1,244 篇 其他
  • 573 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=Computer Software Technology"
27050 条 记 录,以下是231-240 订阅
排序:
YOLO-RLC:An Advanced Target-Detection Algorithm for Surface Defects of Printed Circuit Boards Based on YOLOv5
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4973-4995页
作者: Yuanyuan Wang Jialong Huang Md Sharid Kayes Dipu Hu Zhao Shangbing Gao Haiyan Zhang Pinrong Lv School of Computer and Software Engineering Huaiyin Institute of TechnologyHuai’an223003China Huaiyin Institute of Technology Laboratory for Internet of Things and Mobile Internet Technology of Jiangsu ProvinceHuai’an223001China Jiangsu Kesheng Xuanyi Technology Co. Ltd.Huai’an223300China
Printed circuit boards(PCBs)provide stable connections between electronic ***,defective printed circuit boards may cause the entire equipment system to malfunction,resulting in incalculable ***,it is crucial to detect... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
EPM: Evolutionary Perception Method for Anomaly Detection in Noisy Dynamic Graphs
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2025年 第7期37卷 4035-4048页
作者: Wang, Huan Chen, Junyang Wu, Yirui Leung, Victor C. M. Wang, Di King Abdullah University of Science and Technology Division of Computer Electrical and Mathematical Sciences and Engineering Saudi Arabia Huazhong Agricultural University College of Informatics China Shenzhen University College of Computer Science and Software Engineering China Hohai University College of Computer and Information China
With the rapid expansion of interactions across various domains such as knowledge graphs and social networks, anomaly detection in dynamic graphs has become increasingly critical for mitigating potential risks. Howeve... 详细信息
来源: 评论
Modeling Implicit Emotion and User-specific Context for Malevolence Detection in Mental Health Counseling Dialogues
Modeling Implicit Emotion and User-specific Context for Male...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Xu, Bo Qiao, Xuening Zhang, Xiaokun Wan, Jiahui Liu, Xinyue Zong, Linlin Lin, Hongfei Dalian University of Technology School of Computer Science Dalian China Dalian University of Technology School of Software Dalian China
Generative conversational agents, driven by large language models, have gained widespread popularity. However, a significant drawback lies in their tendency to produce uncontrollable and unpredictable contents, thereb... 详细信息
来源: 评论
A Virtual Texture technology Realized on Low Computational Power Platforms  11
A Virtual Texture Technology Realized on Low Computational P...
收藏 引用
11th International Conference on Dependable Systems and Their Applications, DSA 2024
作者: Ma, Jinzhao Fang, Zhenyu Zheng, Jiangbin Cao, Jun School of Computer Software Xi'an China Nanjing RuiYue Technology Ltd. Nanjing China
Texture is a fundamental component of computer graphics. Virtual texture technology is essential for facilitating large-scale texture loading and real-time rendering of natural terrain. To address the limitations pose... 详细信息
来源: 评论
Is Large Language Model Good at Triple Set Prediction? An Empirical Study  15
Is Large Language Model Good at Triple Set Prediction? An Em...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Yuan, Yuan Xu, Yajing Zhang, Wen Zhejiang University School of Software Technology Ningbo China Zhejiang University College of Computer Science of Technology Hangzhou China
The core of the Knowledge Graph Completion (KGC) task is to predict and complete the missing relations or nodes in a KG. Common KGC tasks are mostly about inferring unknown elements with one or two elements being know... 详细信息
来源: 评论
Masked Face Detection and Recognition Using a Unified Feature Extractor  5
Masked Face Detection and Recognition Using a Unified Featur...
收藏 引用
5th International Conference on Advancements in Computational Sciences, ICACS 2024
作者: Iftikhar, Aroobah Shaukat, Arslan Tariq, Rimsha College of Eme Dept of Computer and Software Engineering Islamabad Pakistan Information Technology University Dept of Computer Engineering Lahore Pakistan
The research field of computer vision has recently taken an interest in the active computer vision problem of masked face recognition due to the COVID-19 pandemic. The use of face masks as a preventative measure again... 详细信息
来源: 评论
An Efficient Heterogeneous Ring Signcryption Scheme for Wireless Body Area Networks
收藏 引用
computer Systems Science & Engineering 2023年 第11期47卷 2061-2078页
作者: Qingqing Ning Chunhua Jin Zhiwei Chen Yongliang Xu Huaqi Lu Faculty of Computer&Software Engineering Huaiyin Institute of TechnologyHuai’an233003China
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open ... 详细信息
来源: 评论
Quick Hidden Layer Size Tuning in ELM for Classification Problems
Mendel
收藏 引用
Mendel 2024年 第1期30卷 1-14页
作者: Albtoush, Audi Fernandez-Delgado, Manuel Maarouf, Haitham Al Nawaiseh, Asmaa Jameel Faculty of Computer Science and Information Technology Jerash University Jordan Santiago De Compostela University Spain Software Engineering Department Mut’ah university Jordan
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a... 详细信息
来源: 评论
A Preference-Based Multi-Objective Evolutionary Algorithm with Local Pareto Front Modeling
A Preference-Based Multi-Objective Evolutionary Algorithm wi...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Zhao, Peipei Wang, Liping Wang, Hui College of Computer Science Technology College of Software Zhejiang University of Technology Hangzhou China
Most existing multi-objective evolutionary algorithms (MOEAs) have difficulties in approximating the whole Pareto Fronts with complicated geometries. However, the decision maker (DM) may only be interested in a small ...
来源: 评论