咨询与建议

限定检索结果

文献类型

  • 85,959 篇 会议
  • 45,101 篇 期刊文献
  • 1,262 册 图书

馆藏范围

  • 132,322 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 79,947 篇 工学
    • 57,750 篇 计算机科学与技术...
    • 46,607 篇 软件工程
    • 20,079 篇 信息与通信工程
    • 12,422 篇 控制科学与工程
    • 9,307 篇 生物工程
    • 9,228 篇 电气工程
    • 8,472 篇 电子科学与技术(可...
    • 7,150 篇 生物医学工程(可授...
    • 5,628 篇 光学工程
    • 5,469 篇 机械工程
    • 4,066 篇 仪器科学与技术
    • 3,980 篇 动力工程及工程热...
    • 3,838 篇 化学工程与技术
    • 3,655 篇 网络空间安全
    • 3,334 篇 安全科学与工程
    • 2,834 篇 交通运输工程
  • 44,782 篇 理学
    • 22,911 篇 数学
    • 13,520 篇 物理学
    • 10,661 篇 生物学
    • 7,243 篇 统计学(可授理学、...
    • 4,891 篇 系统科学
    • 4,234 篇 化学
  • 23,468 篇 管理学
    • 14,227 篇 管理科学与工程(可...
    • 10,226 篇 图书情报与档案管...
    • 6,476 篇 工商管理
  • 7,527 篇 医学
    • 6,281 篇 临床医学
    • 5,536 篇 基础医学(可授医学...
    • 3,344 篇 药学(可授医学、理...
    • 3,259 篇 公共卫生与预防医...
  • 4,073 篇 法学
    • 3,292 篇 社会学
  • 2,435 篇 经济学
  • 2,062 篇 农学
  • 1,819 篇 教育学
  • 664 篇 文学
  • 361 篇 军事学
  • 261 篇 艺术学
  • 53 篇 哲学
  • 31 篇 历史学

主题

  • 3,967 篇 computer science
  • 3,639 篇 accuracy
  • 3,286 篇 deep learning
  • 3,278 篇 feature extracti...
  • 2,878 篇 machine learning
  • 2,654 篇 computational mo...
  • 2,456 篇 training
  • 2,301 篇 educational inst...
  • 2,025 篇 internet of thin...
  • 1,952 篇 support vector m...
  • 1,919 篇 data mining
  • 1,742 篇 predictive model...
  • 1,710 篇 artificial intel...
  • 1,668 篇 convolutional ne...
  • 1,605 篇 real-time system...
  • 1,587 篇 optimization
  • 1,426 篇 security
  • 1,425 篇 wireless sensor ...
  • 1,338 篇 data models
  • 1,274 篇 cloud computing

机构

  • 1,091 篇 department of co...
  • 1,018 篇 department of ph...
  • 1,011 篇 cavendish labora...
  • 961 篇 oliver lodge lab...
  • 954 篇 physikalisches i...
  • 780 篇 university of ch...
  • 644 篇 college of compu...
  • 613 篇 infn sezione di ...
  • 585 篇 infn sezione di ...
  • 582 篇 infn laboratori ...
  • 558 篇 department of ph...
  • 543 篇 infn sezione di ...
  • 541 篇 fakultät physik ...
  • 540 篇 horia hulubei na...
  • 537 篇 school of physic...
  • 537 篇 imperial college...
  • 532 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 509 篇 stfc rutherford ...
  • 498 篇 school of physic...

作者

  • 252 篇 barter w.
  • 245 篇 a. gomes
  • 236 篇 s. chen
  • 234 篇 c. alexa
  • 233 篇 j. m. izen
  • 232 篇 beiter a.
  • 229 篇 blake t.
  • 225 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 225 篇 c. amelung
  • 225 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.
  • 216 篇 bay a.

语言

  • 125,908 篇 英文
  • 4,737 篇 其他
  • 1,704 篇 中文
  • 101 篇 日文
  • 18 篇 斯洛文尼亚文
  • 17 篇 德文
  • 14 篇 法文
  • 4 篇 朝鲜文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science/ College of Computer Science and Information Technology"
132322 条 记 录,以下是201-210 订阅
排序:
Multi-domain feature-enhanced attribute updater for generalized zero-shot learning
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8397-8414页
作者: Shi, Yuyan Jiang, Chenyi Song, Feifan Ye, Qiaolin Long, Yang Zhang, Haofeng School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China School of Information Science and Technology Nanjing Forestry University Jiangsu Nanjing210037 China Department of Computer Science Durham University DurhamDH1 3LE United Kingdom
The goal of generalized zero-shot learning (GZSL) is to transfer knowledge from seen classes to unseen classes. However, a significant challenge is the single-category attributes are often inadequate to capture the in... 详细信息
来源: 评论
Intelligent Healthcare Applications Based on GraphModo: A Comparative Study of Deep Learning Models for Lung Anomaly Detection  24
Intelligent Healthcare Applications Based on GraphModo: A Co...
收藏 引用
5th International Symposium on Artificial Intelligence for Medicine science, ISAIMS 2024
作者: Yang, Peng Zhou, Yanyang Liu, Yiliang Zeng, Zhifeng Department of Computer Science Zhuhai College of Science and Technology Guangdong Zhuhai China
The aim of this study was to build ten novel deep learning models using the GraphModo system and then evaluate their ability to detect lung abnormalities in medical *** research employs accuracy, precision, recall, F1... 详细信息
来源: 评论
A Customizable Virtual Assistant Enhanced with Vision and Speech Capabilities  12th
A Customizable Virtual Assistant Enhanced with Vision and Sp...
收藏 引用
12th International Conference on Recent Trends in Computing, ICRTC 2024
作者: Christy Jeba Malar, A. Deva Priya, M. Naveen Kumaran, R. Sanjay Abhishek, J. Bhuvana, S. Karthick, S. Department of Information Technology Sri Krishna College of Technology Tamilnadu Coimbatore India Department of Computer Science and Engineering Karpagam College of Engineering Tamilnadu Coimbatore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India Department of Computer Science and Engineering SRM Institute of Science and Technology Uttar Pradesh Delhi–NCR Campus Ghaziabad India
Recent advancements in Smart Assistants (SAs) as well as home automation have captured the attention of both researchers and consumers. Virtual Assistants (VAs) that are speech-enabled are commonly referred to as smar... 详细信息
来源: 评论
A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4181-4218页
作者: Haydar Abdulameer Marhoon Rafid Sagban Atheer Y.Oudah Saadaldeen Rashid Ahmed Information and Communication Technology Research Group Scientific Research CenterAl-Ayen UniversityThi-Qar64011Iraq College of Computer Sciences and Information Technology University of KerbalaKarbala56001Iraq Enginerring Technical College Al-Ayen UniversityThi-Qar64011Iraq Information Technology College University of BabylonHilla51002Iraq Department of Computer Science College of Education for Pure ScienceUniversity ofThi-QarNasiriyah64001Iraq Artificial Intelligence Engineering Department College of EngineeringAl-Ayen UniversityThi-Qar64001Iraq Department of Computer Science Bayan UniversityErbilKurdistan44001Iraq
In order to address the critical security challenges inherent to Wireless Sensor Networks(WSNs),this paper presents a groundbreaking barrier-based machine learning *** applications like military operations,healthcare ... 详细信息
来源: 评论
SESDP:A Sentiment Analysis-Driven Approach for Enhancing Software Product Security by Identifying Defects through Social Media Reviews
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1327-1345页
作者: Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi Center of Excellence in Information Assurance(CoEIA) King Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and TechnologyArab East CollegesRiyadh11583Saudi Arabia College of Computer&Information Sciences King Saud UniversityRiyadh11543Saudi Arabia
Software defect prediction is a critical component in maintaining software quality,enabling early identification and resolution of issues that could lead to system failures and significant financial *** the increasing... 详细信息
来源: 评论
Function Scheduling with Data Security in Serverless Computing Systems  17
Function Scheduling with Data Security in Serverless Computi...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Saha, Srestha Pandey, Arvind Addya, Sourav Kanti Brata Nath, Shubha Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India SRM Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu India National Institute of Technology Karnataka Department of Computer Science and Engineering Surathkal India
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal... 详细信息
来源: 评论
Degradation-Decoupling Vision Enhancement for Intelligent Underwater Robot Vision Perception System
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17880-17895页
作者: Zhou, Jingchun Liu, Chunjiang Long, Bing Zhang, Dehuan Jiang, Qiuping Muhammad, Ghulam Dalian Maritime University College of Information Science and Technology Dalian116026 China Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province Sichuan Luzhou64600 China Ningbo University School of Information Science and Engineering Zhejiang Ningbo315211 China King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh Saudi Arabia
Underwater robots rely on high-quality visual data for precise monitoring and manipulation, yet complex underwater environments often degrade image quality through color distortion, texture blurring, and detail loss. ... 详细信息
来源: 评论
DyPSS: Dynamic Priority Signalling System for Emergency Vehicles using Fog and YOLOv8  17
DyPSS: Dynamic Priority Signalling System for Emergency Vehi...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Kakde, Anuj Nath, Shubha Brata Ghosh, Soumya K. Indian Institute of Technology Department of Computer Science and Engineering Kharagpur India Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India
Efficient navigation of emergency response vehicles (ERVs) through urban congestion is crucial to life-saving efforts, yet traditional traffic systems often slow down their swift passage. In this work, we introduce Dy... 详细信息
来源: 评论
LWFDTL: lightweight fusion deep transfer learning for oral Squamous cell Carcinoma diagnosis using Histopathological oral Mucosa
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Shabir, Aiza ahmed, Khawaja Tehseen Mujahid, Muhammad Kanwal, Khadija Department of Computer Science Bahauddin Zakariya University Multan Pakistan Institute of Computer Science and Information Technology The Women University Multan60000 Pakistan Lab CCIS Prince Sultan University Riyadh11586 Saudi Arabia
Oral squamous cell carcinoma (OSCC) is among the most lethal types of cancers, especially realizing the significance of timely diagnosis. Insufficient training and awareness among primary healthcare practitioners migh... 详细信息
来源: 评论
On Reliability of the Extrema Propagation Technique in Random Environment  28
On Reliability of the Extrema Propagation Technique in Rando...
收藏 引用
28th International Conference on Principles of Distributed Systems, OPODIS 2024
作者: Cichoń, Jacek Dworzański, Dawid Gotfryd, Karol Department of Fundamentals of Computer Science Faculty of Information and Communication Technology Wroclaw University of Science and Technology Poland
We study the reliability of the following simple mechanism for spreading information in a communication network in the presence of random message loss. Initially, some nodes have information that they want to distribu... 详细信息
来源: 评论