咨询与建议

限定检索结果

文献类型

  • 11,122 篇 会议
  • 6,127 篇 期刊文献
  • 149 册 图书

馆藏范围

  • 17,398 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,999 篇 工学
    • 8,525 篇 计算机科学与技术...
    • 7,052 篇 软件工程
    • 2,358 篇 信息与通信工程
    • 1,432 篇 控制科学与工程
    • 1,232 篇 生物工程
    • 990 篇 电气工程
    • 768 篇 机械工程
    • 756 篇 电子科学与技术(可...
    • 725 篇 生物医学工程(可授...
    • 626 篇 光学工程
    • 413 篇 仪器科学与技术
    • 409 篇 动力工程及工程热...
    • 404 篇 化学工程与技术
    • 399 篇 安全科学与工程
    • 350 篇 交通运输工程
    • 324 篇 网络空间安全
  • 5,083 篇 理学
    • 2,895 篇 数学
    • 1,350 篇 生物学
    • 1,103 篇 物理学
    • 863 篇 统计学(可授理学、...
    • 611 篇 系统科学
    • 419 篇 化学
  • 3,404 篇 管理学
    • 2,103 篇 管理科学与工程(可...
    • 1,455 篇 图书情报与档案管...
    • 892 篇 工商管理
  • 693 篇 医学
    • 601 篇 临床医学
    • 537 篇 基础医学(可授医学...
    • 338 篇 药学(可授医学、理...
  • 530 篇 法学
    • 417 篇 社会学
  • 321 篇 经济学
    • 320 篇 应用经济学
  • 282 篇 教育学
  • 172 篇 农学
  • 53 篇 文学
  • 48 篇 军事学
  • 38 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 474 篇 computer science
  • 440 篇 software enginee...
  • 390 篇 deep learning
  • 358 篇 computational mo...
  • 337 篇 feature extracti...
  • 280 篇 training
  • 273 篇 data mining
  • 237 篇 optimization
  • 231 篇 semantics
  • 221 篇 machine learning
  • 213 篇 accuracy
  • 209 篇 educational inst...
  • 209 篇 predictive model...
  • 203 篇 internet of thin...
  • 176 篇 neural networks
  • 176 篇 software
  • 174 篇 support vector m...
  • 167 篇 wireless sensor ...
  • 164 篇 computer archite...
  • 163 篇 image segmentati...

机构

  • 474 篇 college of compu...
  • 342 篇 state key labora...
  • 263 篇 school of inform...
  • 262 篇 school of comput...
  • 221 篇 school of comput...
  • 164 篇 school of softwa...
  • 141 篇 school of comput...
  • 126 篇 school of softwa...
  • 100 篇 school of comput...
  • 96 篇 college of compu...
  • 90 篇 school of comput...
  • 74 篇 school of softwa...
  • 73 篇 department of co...
  • 73 篇 department of co...
  • 72 篇 school of comput...
  • 70 篇 department of co...
  • 67 篇 school of comput...
  • 66 篇 school of inform...
  • 65 篇 school of softwa...
  • 65 篇 school of softwa...

作者

  • 39 篇 liu yang
  • 38 篇 baowen xu
  • 35 篇 sun xingming
  • 32 篇 gao yang
  • 31 篇 jiacun wang
  • 31 篇 qi lianyong
  • 30 篇 wang lei
  • 30 篇 shen furao
  • 29 篇 niyato dusit
  • 29 篇 wang chao
  • 26 篇 zhou zhi-hua
  • 26 篇 qi liu
  • 26 篇 zhao jian
  • 24 篇 jun zhang
  • 24 篇 yang yang
  • 24 篇 zheng zibin
  • 23 篇 rehman attique u...
  • 23 篇 zhang zhao
  • 22 篇 zhou jie
  • 22 篇 xiang li

语言

  • 16,224 篇 英文
  • 923 篇 其他
  • 275 篇 中文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Software Engineering"
17398 条 记 录,以下是4221-4230 订阅
排序:
Enhancing Human Posture Detection with Hybrid Deep VGG16 and Attention Mechanism Network
Enhancing Human Posture Detection with Hybrid Deep VGG16 and...
收藏 引用
3rd International Conference on Machine Learning and Data engineering, ICMLDE 2024
作者: Roseline Oluwaseun, Ogundokun Maskeliunas, Rytis Oscar, Federick Oki, Oluwakayode A. Department of Software Engineering Kaunas University of Technology Kaunas44249 Lithuania Department of Computer Science Landmark University Omu-Aran Nigeria Pretoria South Africa Adioo Technology Abuja Nigeria Department of Information Technology East London Walter Sisulu University South Africa
Human Posture Detection (HPD) and classification are the initial steps toward various computer vision applications related to security, advertisement, and healthcare. Even though more than three decades have passed, m... 详细信息
来源: 评论
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack Tree and Fuzzy Logic  3
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack T...
收藏 引用
3rd IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2023
作者: Naik, Nitin Jenkins, Paul Grace, Paul Naik, Dishita Song, Jingping Prajapat, Shaligram Mishra, Durgesh Yang, Longzhi Boongoen, Tossapon Iam-On, Natthakan School of Informatics and Digital Engineering Aston University United Kingdom Cardiff School of Technologies Cardiff Metropolitan University United Kingdom Birmingham City University United Kingdom Software College Northeastern University China International Institute of Professional Studies Devi Ahilya University India School of Computer Science & Information Technology Symbiosis University of Applied Sciences India Northumbria University Department of Computer and Information Sciences United Kingdom Aberystwyth University Department of Computer Science United Kingdom
Organisations and users have been experiencing significant rises in cyberattacks and their severity, which means that they require a greater awareness and understanding of the anatomy of cyberattacks, to prevent and m... 详细信息
来源: 评论
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Zongyuan Duan, Tianyang Lin, Zheng Huang, Dong Fang, Zihan Sun, Zekai Xiong, Ling Liang, Hongbin Cui, Heming Cui, Yong Department of Computer Science The University of Hong Kong Hong Kong Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Department of Computer Science City University of Hong Kong Hong Kong School of Computer and Software Engineering Xihua University Chengdu610039 China National United Engineering Laboratory of Integrated and Intelligent Transportation The National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China Department of Computer Science and Technology Ts-inghua University Beijing100084 China
Recently, deep reinforcement learning (DRL) has emerged as a promising approach for robotic control. However, the deployment of DRL in real-world robots is hindered by its sensitivity to environmental perturbations. W... 详细信息
来源: 评论
CorrMAE: Pre-training Correspondence Transformers with Masked Autoencoder
arXiv
收藏 引用
arXiv 2024年
作者: Liao, Tangfei Zhang, Xiaoqin Xiao, Guobao Li, Min Wang, Tao Ye, Mang School of Computer Science Wuhan University China College of Computer Science and Artificial Intelligence Wenzhou University China School of Electronics and Information Engineering Tongji University China State Key Lab for Novel Software Technology Nanjing University China
Pre-training has emerged as a simple yet powerful methodology for representation learning across various domains. However, due to the expensive training cost and limited data, pre-training has not yet been extensively... 详细信息
来源: 评论
Mudahnya BM: A Context-Aware Mobile Cloud Learning Application Using Semantic-Based Approach
Mudahnya BM: A Context-Aware Mobile Cloud Learning Applicati...
收藏 引用
7th International Conference on Advances in Visual Informatics, IVIC 2021
作者: Muhammad, Sufri Admodisastro, Novia Osman, Hafeez Mohd Ali, Norhayati Faculty of Computer Science and Information Technology Department of Software Engineering and Information System Universiti Putra Malaysia Seri Kembangan Selangor43400 Malaysia
A great potential of various learning environment in mobile learning application can clearly be seen in current pandemic situation. The accessibility of the learning resources needs to be available from anywhere anyti... 详细信息
来源: 评论
DD-UNet: Densely Dilated U-Net for Curvilinear Structure Segmentation in Fundus Image
DD-UNet: Densely Dilated U-Net for Curvilinear Structure Seg...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yindong Zhang Jie Chen Li Wang Miaohong Chen Guoming Zhang Jianqiang Li College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Shenzhen Eye Hospital China
Retinopathy of Prematurity (ROP) is a retina disorder that affects premature infants with lower weights. If the patient cannot get the treatment in time when the illness reaches the last stage, irreversible vision los...
来源: 评论
A Novel Machine Learning Based Framework for Bridge Condition Analysis
A Novel Machine Learning Based Framework for Bridge Conditio...
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Masum, Mohammad Anjum, Nafisa Hossain Faruk, Md Jobair Shahriar, Hossain Sakib, Nazmus Valero, Maria Karim, M.A. Rahman, Akond Wu, Fan Cuzzocrea, Alfredo San Jose State University Department of Applied Data Science San Jose United States Kennesaw State University Department of Information Technology United States Kennesaw State University Department of Software Engineering and Game Development United States Kennesaw State University Department of Civil and Environmental Engineering United States Auburn University Department of Computer Science and Software Engineering United States Tuskegee University Department of Computer Science United States University of Calabria IDEA Lab Rende Italy
Bridges play a vital part in the transportation system by ensuring the connectedness of transportation systems, which is critical for a country's social and economic prosperity by offering daily mobility to the pe... 详细信息
来源: 评论
A Novel Approach for Text Classification by Combining Pre-trained BERT Model with CNN Classifier
A Novel Approach for Text Classification by Combining Pre-tr...
收藏 引用
International Conference on Information Systems and computer Aided Education (ICISCAE)
作者: Chenxu Wang Yulin Li Ziying Wang College of Information Engineering (College of Software) Yancheng Teachers University Yancheng China College of Software Henan University of Science and Technology Luoyang China College of Computer Science and Cyber Security (Oxford Brookes College) Chengdu University of Technology Chengdu China
Language model pre-training has emerged as a highly effective approach for acquiring universal language representations. Among the state-of-the-art models in this field, BERT (Bidirectional Encoder Representations fro...
来源: 评论
Fingerprint Presentation Attack Detector Using Global-Local Model
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Haozhe Zhang, Wentian Liu, Feng Wu, Haoqian Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society The National Engineering Laboratory for Big Data System Computing Technology The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The vulnerability of automated fingerprint recognition systems (AFRSs) to presentation attacks (PAs) promotes the vigorous development of PA detection (PAD) technology. However, PAD methods have been limited by inform... 详细信息
来源: 评论
Modelling IoT Application Requirements for Benchmarking IoT Middleware Platforms  2021
Modelling IoT Application Requirements for Benchmarking IoT ...
收藏 引用
23rd International Conference on Information Integration and Web Intelligence, iiWAS 2021
作者: Mondal, Shalmoly Hassani, Alireza Jayaraman, Prem Prakash Haghighi, Pari Delir Georgakopoulos, Dimitrios Faculty of Science Engineering and Technology Swinburne University of Technology Australia School of Info Technology Deakin University Australia Department of Computer Science and Software Engineering Swinburne University of Technology Australia Department of Human Centred Computing Monash University Australia
The significant advances in the Internet of Things (IoT) have led to IoT applications being widely used in various scenarios ranging from smart city, smart farming, to Industrial IoT (IIoT) solutions. With the explosi... 详细信息
来源: 评论