咨询与建议

限定检索结果

文献类型

  • 11,015 篇 会议
  • 6,090 篇 期刊文献
  • 148 册 图书

馆藏范围

  • 17,253 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,876 篇 工学
    • 8,434 篇 计算机科学与技术...
    • 6,977 篇 软件工程
    • 2,331 篇 信息与通信工程
    • 1,392 篇 控制科学与工程
    • 1,226 篇 生物工程
    • 982 篇 电气工程
    • 764 篇 机械工程
    • 750 篇 电子科学与技术(可...
    • 719 篇 生物医学工程(可授...
    • 617 篇 光学工程
    • 411 篇 仪器科学与技术
    • 408 篇 动力工程及工程热...
    • 402 篇 化学工程与技术
    • 396 篇 安全科学与工程
    • 340 篇 交通运输工程
    • 315 篇 网络空间安全
  • 5,058 篇 理学
    • 2,882 篇 数学
    • 1,346 篇 生物学
    • 1,099 篇 物理学
    • 857 篇 统计学(可授理学、...
    • 610 篇 系统科学
    • 418 篇 化学
  • 3,379 篇 管理学
    • 2,091 篇 管理科学与工程(可...
    • 1,441 篇 图书情报与档案管...
    • 884 篇 工商管理
  • 689 篇 医学
    • 597 篇 临床医学
    • 532 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 524 篇 法学
    • 413 篇 社会学
  • 320 篇 经济学
    • 319 篇 应用经济学
  • 280 篇 教育学
  • 171 篇 农学
  • 53 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 472 篇 computer science
  • 435 篇 software enginee...
  • 386 篇 deep learning
  • 358 篇 computational mo...
  • 332 篇 feature extracti...
  • 275 篇 training
  • 270 篇 data mining
  • 237 篇 optimization
  • 236 篇 semantics
  • 227 篇 machine learning
  • 210 篇 educational inst...
  • 204 篇 internet of thin...
  • 200 篇 predictive model...
  • 200 篇 accuracy
  • 174 篇 software
  • 172 篇 neural networks
  • 171 篇 support vector m...
  • 170 篇 wireless sensor ...
  • 163 篇 computer archite...
  • 162 篇 image segmentati...

机构

  • 450 篇 college of compu...
  • 343 篇 state key labora...
  • 261 篇 school of comput...
  • 260 篇 school of inform...
  • 219 篇 school of comput...
  • 163 篇 school of softwa...
  • 138 篇 school of comput...
  • 128 篇 school of softwa...
  • 101 篇 school of comput...
  • 98 篇 college of compu...
  • 91 篇 school of comput...
  • 74 篇 department of co...
  • 72 篇 department of co...
  • 72 篇 school of comput...
  • 69 篇 school of softwa...
  • 68 篇 department of co...
  • 68 篇 school of comput...
  • 66 篇 school of comput...
  • 66 篇 school of inform...
  • 65 篇 school of softwa...

作者

  • 38 篇 baowen xu
  • 37 篇 liu yang
  • 35 篇 sun xingming
  • 31 篇 jiacun wang
  • 31 篇 gao yang
  • 30 篇 wang chao
  • 30 篇 qi lianyong
  • 29 篇 niyato dusit
  • 29 篇 wang lei
  • 29 篇 shen furao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 26 篇 zhao jian
  • 25 篇 yang yang
  • 24 篇 jun zhang
  • 24 篇 zheng zibin
  • 23 篇 rehman attique u...
  • 22 篇 xiang li
  • 21 篇 zhi-hui wang
  • 21 篇 yan jun

语言

  • 16,398 篇 英文
  • 608 篇 其他
  • 265 篇 中文
  • 3 篇 日文
  • 3 篇 土耳其文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17253 条 记 录,以下是391-400 订阅
排序:
Optimisation of sparse deep autoencoders for dynamic network embedding
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1361-1376页
作者: Huimei Tang Yutao Zhang Lijia Ma Qiuzhen Lin Liping Huang Jianqiang Li Maoguo Gong College of Computer Science and Software Engineering Shenzhen UniversityShenzhenChina Institute for Infocomm Research Agency for Science Technology and ResearchSingaporeSingapore Key Laboratory of Collaborative Intelligence Systems Ministry of EducationXidian UniversityXi'anChina
Network embedding(NE)tries to learn the potential properties of complex networks represented in a low-dimensional feature ***,the existing deep learningbased NE methods are time-consuming as they need to train a dense... 详细信息
来源: 评论
Multispectral Images and IoT Based Tea Plantation Monitoring: A Proposed System Architecture  5
Multispectral Images and IoT Based Tea Plantation Monitoring...
收藏 引用
5th International Conference on Advanced Research in Computing, ICARC 2025
作者: Kariyawasam, K.P.W.D.V. Kahandagamage, P.N. Fernando, M.R.R. Fernandopulle, J.M. Jayasinghearachchi, Vishan Dissanayaka, Kapila Dept. of Software Engineering Sri Lanka Dept. of Information Technology Sri Lanka Dept. of Computer Science Sri Lanka
In recent years, the Sri Lankan tea industry has fallen behind its competitors in the global tea market. This decline is caused by the challenges in productivity and resource management due to the limitations of tradi... 详细信息
来源: 评论
DFU_XAI: A Deep Learning-Based Approach to Diabetic Foot Ulcer Detection Using Feature Explainability
收藏 引用
Biomedical Materials and Devices 2024年 第2期2卷 1225-1245页
作者: Biswas, Shuvo Mostafiz, Rafid Paul, Bikash Kumar Uddin, Khandaker Mohammad Mohi Hadi, Md. Abdul Khanom, Fahmida Department of Information and Communication Technology Mawlana Bhashani Science and Technology University Institute of Information Technology Noakhali Science and Technology University Department of Software Engineering Daffodil International University Department of Computer Science and Engineering Dhaka International University Department of Computer Science: Information Technology University of Nebraska Omaha Department of Mathematics American International University – Bangladesh
Diabetic foot ulcer (DFU) is a potentially fatal complication of diabetes. Traditional techniques of DFU analysis and therapy are more time-consuming and costly. Artificial intelligence (AI), particularly deep neural ... 详细信息
来源: 评论
Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第5期14卷 6273-6286页
作者: Gong, Cheng Xiong, Ling He, Xingyu Niu, Xianhua College of Computer and Software Engineering Xihua University Sichuan Chengdu610099 China National Key Laboratory of Science and Technology Communications University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Security and privacy are two challenging issues in Vehicular Ad-hoc Networks (VANETs), which have attracted widespread concern from industry and academia. However, the existing security schemes for VANETs environment ... 详细信息
来源: 评论
Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3659-3675页
作者: Mohamed Ezz Ayman Mohamed Mostafa Ayman Elshenawy College of Computer and Information Sciences Jouf UniversitySakaka72314Saudi Arabia Systems and Computers Engineering DEPT Faculty of EngineeringAl-Azhar UniversityCairo11651Egypt Software Engineering&Information Technology Faculty of Engineering&TechnologyEgyptian Chinese UniversityEgypt
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me... 详细信息
来源: 评论
Improving Fake News Detection with a Mixture of Experts: Leveraging Sentiment Analysis and Sarcasm Detection as Core Expert Models  6
Improving Fake News Detection with a Mixture of Experts: Lev...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Gunasekara, Tharindu Thihan, Disira Kodithuwakku, Sansika Dissanayake, Dinuka Fernando, Harinda Vidhanaarachchi, Samitha Sindhujan, Archchana Sri Lanka Institute of Information Technology Malabe Dept. of Software Engineering Sri Lanka Sri Lanka Institute of Information Technology Malabe Dept. of Computer Computer Systems Engineering Sri Lanka University of Surrey Dept. of Computer Science and Electronic Engineering United Kingdom
Fake news continues to proliferate, posing an increasing threat to public discourse. The paper proposes a framework of a Mixture of Experts, Sentiment Analysis, and Sarcasm Detection experts for improved fake news det... 详细信息
来源: 评论
A novel few-shot learning approach for the classification of histological images of liver tumors
A novel few-shot learning approach for the classification of...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Xu, Bo Wang, Qirui Li, Longjiao Yang, Jinqiao Lin, Hongfei Ding, Feng Dalian University of Technology School of Software Engineering Dalian China Dalian University of Technology School of Computer Science and Technology Dalian China
The liver is an internal organ that is most commonly affected by cancer metastasis. Hepatocellular carcinoma (HCC) is a major cause of cancer-related deaths worldwide. Identifying the histological category of this dis... 详细信息
来源: 评论
IoT-Assets Taxonomy, Threats Assessment and Potential Solutions  6
IoT-Assets Taxonomy, Threats Assessment and Potential Soluti...
收藏 引用
6th Global Conference on Wireless and Optical Technologies, GCWOT 2023
作者: Zardari, Shehnila Nisar, Nida Fatima, Zainab Dhirani, Lubna Luxmi NED University of Engineering & Technology Department of Software Engineering Karachi Pakistan University of Limerick Department of Electronic and Computer Engineering Limerick Ireland
Internet of Things (IoT) is a system of interconnected devices and networks that provides autonomous functioning capability. Increasing expansion rate of IoT system in diverse set of domains has resulted in inclinatio... 详细信息
来源: 评论
Multi-Aspect Interest Neighbor-Augmented Network for Next-Basket Recommendation  48
Multi-Aspect Interest Neighbor-Augmented Network for Next-Ba...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Deng, Zhiying Li, Jianjun Guo, Zhiqiang Li, Guohui Huazhong University of Science and Technology School of Computer Science and Technology China Huazhong University of Science and Technology School of Software Engineering China
Next-basket recommendation (NBR) is a type of recommendation task that focuses on mining user interests based on the sequential basket records in which users purchase multiple items at a time. Limited by the sparsity ... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning  5
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Ananthi, P. Nirmaladevi, K. Naveen Kumar, S. Kongu Engineering College Department of Computer Technology-PG Tamilnadu Erode638060 India Madanapalle Institute of Technology & Science Department of Computer Applications India M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection Systems (IDS) in recognizing and impeding... 详细信息
来源: 评论