咨询与建议

限定检索结果

文献类型

  • 683,524 篇 会议
  • 281,015 篇 期刊文献
  • 6,815 册 图书
  • 21 篇 学位论文
  • 7 篇 专利
  • 6 篇 科技报告

馆藏范围

  • 971,384 篇 电子文献
  • 23 种 纸本馆藏

日期分布

学科分类号

  • 567,303 篇 工学
    • 410,953 篇 计算机科学与技术...
    • 326,765 篇 软件工程
    • 121,933 篇 信息与通信工程
    • 82,589 篇 控制科学与工程
    • 60,147 篇 电气工程
    • 57,647 篇 生物工程
    • 54,224 篇 电子科学与技术(可...
    • 41,924 篇 生物医学工程(可授...
    • 35,573 篇 光学工程
    • 35,379 篇 机械工程
    • 26,722 篇 化学工程与技术
    • 24,496 篇 仪器科学与技术
    • 22,073 篇 动力工程及工程热...
    • 18,922 篇 材料科学与工程(可...
    • 16,956 篇 安全科学与工程
    • 15,484 篇 网络空间安全
    • 15,044 篇 交通运输工程
  • 315,820 篇 理学
    • 181,755 篇 数学
    • 84,139 篇 物理学
    • 65,422 篇 生物学
    • 53,401 篇 统计学(可授理学、...
    • 34,052 篇 系统科学
    • 28,727 篇 化学
  • 147,749 篇 管理学
    • 83,397 篇 管理科学与工程(可...
    • 70,506 篇 图书情报与档案管...
    • 40,344 篇 工商管理
  • 38,260 篇 医学
    • 32,188 篇 临床医学
    • 28,673 篇 基础医学(可授医学...
    • 17,734 篇 药学(可授医学、理...
  • 25,019 篇 法学
    • 20,793 篇 社会学
  • 14,898 篇 经济学
  • 13,539 篇 教育学
  • 11,813 篇 农学
  • 4,700 篇 文学
  • 1,903 篇 军事学
  • 1,638 篇 艺术学
  • 759 篇 哲学
  • 312 篇 历史学

主题

  • 63,832 篇 computer science
  • 21,862 篇 computational mo...
  • 18,903 篇 feature extracti...
  • 17,499 篇 accuracy
  • 15,450 篇 training
  • 15,093 篇 data mining
  • 15,088 篇 machine learning
  • 14,431 篇 deep learning
  • 13,642 篇 application soft...
  • 12,880 篇 computer archite...
  • 12,223 篇 semantics
  • 12,175 篇 algorithm design...
  • 11,436 篇 costs
  • 11,386 篇 protocols
  • 11,266 篇 testing
  • 10,855 篇 artificial intel...
  • 10,768 篇 predictive model...
  • 10,497 篇 support vector m...
  • 10,480 篇 neural networks
  • 10,100 篇 optimization

机构

  • 5,008 篇 department of co...
  • 2,892 篇 school of comput...
  • 2,480 篇 college of compu...
  • 2,461 篇 school of comput...
  • 2,417 篇 college of compu...
  • 2,128 篇 chitkara univers...
  • 2,049 篇 department of co...
  • 1,652 篇 department of co...
  • 1,557 篇 university of ch...
  • 1,520 篇 school of comput...
  • 1,488 篇 department of co...
  • 1,443 篇 school of comput...
  • 1,277 篇 school of comput...
  • 1,273 篇 department of el...
  • 1,268 篇 department of co...
  • 1,257 篇 school of comput...
  • 1,223 篇 school of comput...
  • 1,156 篇 school of comput...
  • 1,082 篇 department of co...
  • 1,056 篇 department of el...

作者

  • 524 篇 liu yang
  • 426 篇 wang wei
  • 378 篇 niyato dusit
  • 307 篇 yang yang
  • 288 篇 wei li
  • 270 篇 wei wang
  • 257 篇 li li
  • 245 篇 li yang
  • 240 篇 barter w.
  • 238 篇 zhang lei
  • 232 篇 s. chen
  • 215 篇 j. wang
  • 214 篇 blake t.
  • 208 篇 bellee v.
  • 206 篇 bowcock t.j.v.
  • 204 篇 zhang wei
  • 203 篇 a. gomes
  • 201 篇 brundu d.
  • 201 篇 borsato m.
  • 199 篇 betancourt c.

语言

  • 917,623 篇 英文
  • 43,143 篇 其他
  • 10,590 篇 中文
  • 448 篇 日文
  • 219 篇 德文
  • 93 篇 法文
  • 76 篇 西班牙文
  • 68 篇 朝鲜文
  • 58 篇 俄文
  • 57 篇 斯洛文尼亚文
  • 29 篇 葡萄牙文
  • 25 篇 意大利文
  • 10 篇 土耳其文
  • 5 篇 阿拉伯文
  • 5 篇 荷兰文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science Technology and Computer Science"
971388 条 记 录,以下是21-30 订阅
排序:
Facial Sentiment Analysis Using Convolutional Neural Network and Fuzzy Systems
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第12期48卷 15-32页
作者: Kadhim, Ahmed R. Khudeyer, Raidah S. Alabbas, Maytham Department of Computer Information System College of Computer Science and Information Technology University of Basrah Basrah Iraq Department of Computer Science College of Computer Science and Information Technology University of Basrah Basrah Iraq
This study provides a detailed study of a Сonvolutional Neural Network (СNN) model optimized for facial eхpression recognition with Fuzzy logic using Fuzzy2DPooling and Fuzzy Neural Networks (FNN), and discusses da... 详细信息
来源: 评论
Fake news detection on social media using Adaptive Optimization based Deep Learning Approach
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 6091-6111页
作者: Steni Mol, T.S. Sreeja, P.S. Department of Computer Science Hindustan Institute of Technology and Science Chennai India Department of Computer Applications Vellore Institute of Technology Chennai India
Various content-sharing platforms and social media are developed in recent times so that it is highly possible to spread fake news and misinformation. This kind of news may cause chaos and panic among people. The auto... 详细信息
来源: 评论
Route selection for opportunity-sensing and prediction of waterlogging
收藏 引用
Frontiers of computer science 2024年 第4期18卷 147-159页
作者: Jingbin WANG Weijie ZHANG Zhiyong YU Fangwan HUANG Weiping ZHU Longbiao CHEN College of Computer and Data Science Fuzhou UniversityFuzhou 350108China Department of Computer Science and Technology Xiamen UniversityXiamen 361005China
Accurate monitoring of urban waterlogging contributes to the city’s normal operation and the safety of residents’daily ***,due to feedback delays or high costs,existing methods make large-scale,fine-grained waterlog... 详细信息
来源: 评论
Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 979-988页
作者: Yunyi ZHOU Haichang GAO Jianping HE Shudong ZHANG Zihui WU School of Computer Science and Technology Xidian University
Adversarial examples(AEs) are an additive amalgamation of clean examples and artificially malicious perturbations. Attackers often leverage random noise and multiple random restarts to initialize perturbation starting... 详细信息
来源: 评论
Cloud Computing Security: Assured Deletion
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第3期48卷 485-496页
作者: Ahmed, Sarmad Mahmood Mahmood, Baban Ahmed Department of Computer Science College of Computer Science and Information Technology Kirkuk University Kirkuk Iraq
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How... 详细信息
来源: 评论
APF-GAN:Exploring asymmetric pre-training and fine-tuning strategy for conditional generative adversarial network
收藏 引用
Computational Visual Media 2024年 第1期10卷 187-192页
作者: Yuxuan Li Lingfeng Yang Xiang Li College of Computer Science Nankai UniversityTianjinChina School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjingChina
The use of generative adversarial network(GAN)-based models for the conditional generation of image semantic segmentation has shown promising results in recent ***,there are still some limitations,including limited di... 详细信息
来源: 评论
Learn to optimize——a brief overview
收藏 引用
National science Review 2024年 第8期11卷 39-47页
作者: Ke Tang Xin Yao Department of Computer Science and Engineering Southern University of Science and Technology Department of Computing and Decision Sciences Lingnan University
Most optimization problems of practical significance are typically solved by highly configurable parameterized *** achieve the best performance on a problem instance,a trial-and-error configuration process is required... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
Enhanced Acceleration for Generalized Nonconvex Low-Rank Matrix Learning
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 98-113页
作者: Hengmin Zhang Jian Yang Wenli Du Bob Zhang Zhiyuan Zha Bihan Wen School of Electrical and Electronic Engineering Nanyang Technological University School of Computer Science and Engineering Nanjing University of Science and Technology School of Information Science and Engineering East China University of Science and Technology Department of Electrical and Computer Engineering University of Macau
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher... 详细信息
来源: 评论
Brain Tumor Classification in MRI Images Using VGG19 with Type-2 Fuzzy Logic
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第13期49卷 163-174页
作者: Dihin, Rasha Ali Hamza, Nesreen Readh Department of Computer Science College of Education for Women University of Kufa Najaf Iraq Department of Computer Science College of Computer Science and Information Technology University of Al-Qadisiyah Diwania
A Brain Tumors are highly dangerous illnesses that significantly reduce the life expectancy of patients. The classification of brain tumors plays a crucial role in clinical diagnosis and effective treatment. The misdi... 详细信息
来源: 评论