咨询与建议

限定检索结果

文献类型

  • 687,887 篇 会议
  • 281,724 篇 期刊文献
  • 6,822 册 图书
  • 7 篇 专利
  • 5 篇 学位论文

馆藏范围

  • 976,441 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 569,735 篇 工学
    • 412,847 篇 计算机科学与技术...
    • 327,883 篇 软件工程
    • 123,616 篇 信息与通信工程
    • 83,851 篇 控制科学与工程
    • 61,020 篇 电气工程
    • 57,656 篇 生物工程
    • 54,656 篇 电子科学与技术(可...
    • 42,009 篇 生物医学工程(可授...
    • 35,791 篇 机械工程
    • 35,756 篇 光学工程
    • 26,894 篇 化学工程与技术
    • 24,834 篇 仪器科学与技术
    • 22,443 篇 动力工程及工程热...
    • 19,032 篇 材料科学与工程(可...
    • 17,478 篇 安全科学与工程
    • 16,463 篇 网络空间安全
    • 15,563 篇 交通运输工程
  • 317,004 篇 理学
    • 182,330 篇 数学
    • 84,511 篇 物理学
    • 65,586 篇 生物学
    • 53,816 篇 统计学(可授理学、...
    • 34,053 篇 系统科学
    • 29,112 篇 化学
  • 149,172 篇 管理学
    • 84,605 篇 管理科学与工程(可...
    • 71,114 篇 图书情报与档案管...
    • 40,506 篇 工商管理
  • 38,855 篇 医学
    • 32,434 篇 临床医学
    • 28,780 篇 基础医学(可授医学...
    • 17,750 篇 药学(可授医学、理...
  • 25,359 篇 法学
    • 21,117 篇 社会学
  • 15,018 篇 经济学
  • 13,697 篇 教育学
  • 11,862 篇 农学
  • 4,797 篇 文学
  • 1,908 篇 军事学
  • 1,649 篇 艺术学
  • 766 篇 哲学
  • 316 篇 历史学

主题

  • 63,832 篇 computer science
  • 22,122 篇 computational mo...
  • 19,230 篇 feature extracti...
  • 18,153 篇 accuracy
  • 15,658 篇 training
  • 15,421 篇 machine learning
  • 15,142 篇 data mining
  • 15,028 篇 deep learning
  • 13,642 篇 application soft...
  • 12,949 篇 computer archite...
  • 12,279 篇 semantics
  • 12,175 篇 algorithm design...
  • 11,480 篇 costs
  • 11,423 篇 protocols
  • 11,346 篇 testing
  • 11,035 篇 artificial intel...
  • 10,973 篇 predictive model...
  • 10,614 篇 support vector m...
  • 10,576 篇 neural networks
  • 10,343 篇 optimization

机构

  • 4,981 篇 department of co...
  • 2,848 篇 school of comput...
  • 2,474 篇 school of comput...
  • 2,468 篇 college of compu...
  • 2,433 篇 college of compu...
  • 2,202 篇 chitkara univers...
  • 2,061 篇 department of co...
  • 1,665 篇 department of co...
  • 1,578 篇 university of ch...
  • 1,521 篇 school of comput...
  • 1,495 篇 department of co...
  • 1,438 篇 school of comput...
  • 1,283 篇 school of comput...
  • 1,279 篇 department of co...
  • 1,267 篇 department of el...
  • 1,259 篇 school of comput...
  • 1,244 篇 school of comput...
  • 1,156 篇 school of comput...
  • 1,082 篇 department of co...
  • 1,075 篇 department of el...

作者

  • 527 篇 liu yang
  • 433 篇 wang wei
  • 386 篇 niyato dusit
  • 302 篇 yang yang
  • 283 篇 wei li
  • 277 篇 wei wang
  • 258 篇 li li
  • 250 篇 barter w.
  • 242 篇 li yang
  • 237 篇 zhang lei
  • 233 篇 s. chen
  • 225 篇 blake t.
  • 216 篇 j. wang
  • 213 篇 bellee v.
  • 208 篇 brundu d.
  • 206 篇 bowcock t.j.v.
  • 206 篇 zhang wei
  • 204 篇 borsato m.
  • 203 篇 a. gomes
  • 202 篇 betancourt c.

语言

  • 847,413 篇 英文
  • 119,093 篇 其他
  • 10,905 篇 中文
  • 450 篇 日文
  • 262 篇 德文
  • 133 篇 斯洛文尼亚文
  • 129 篇 法文
  • 74 篇 西班牙文
  • 69 篇 俄文
  • 68 篇 朝鲜文
  • 28 篇 葡萄牙文
  • 27 篇 意大利文
  • 18 篇 阿拉伯文
  • 7 篇 捷克文
  • 7 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science Technology and Computer Science"
976445 条 记 录,以下是851-860 订阅
排序:
FedQT: A Federated Learning Model Compression Algorithm Based on Quicksort and Top Avg Pruning
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第1期9卷 225-238页
作者: Zhang, Jin-Quan Xu, Hui-Xin Ma, Yun-Shen Ni, Li-Na College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
With the advent of the fourth industrial revolution, data ushered in explosive growth. Federated learning can protect users’ privacy and raw data from being known by third parties. Its client data is only trained loc... 详细信息
来源: 评论
Bidirectional Transformer with absolute-position aware relative position encoding for encoding sentences
收藏 引用
Frontiers of computer science 2023年 第1期17卷 63-71页
作者: Le QI Yu ZHANG Ting LIU School of Computer Science and Technology Harbin Institute of TechnologyHarbin 150001China
Transformers have been widely studied in many natural language processing (NLP) tasks, which can capture the dependency from the whole sentence with a high parallelizability thanks to the multi-head attention and the ... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Optimized Visual Recognition Through a Deep Convolutional Neural Network With Hierarchical Modular Organization
收藏 引用
IEEE Access 2024年 12卷 95517-95528页
作者: Clinton Sitepu, Ade Liu, Chuan-Ming National Taipei University of Technology College of Electrical Engineering and Computer Science Taipei10608 Taiwan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ... 详细信息
来源: 评论
Thermal-energy-efficient-secured-link reliable and delay-aware routing protocol (TESLDAR) for wireless body area networks
收藏 引用
International Journal of computers and Applications 2024年 第9期46卷 715-727页
作者: Mohanty, Rasmita Kumari Sahoo, Satya Prakash Kabat, Manas Ranjan Department of Computer Science and Engineering Veer Surendra Sai University of Technology Burla India
Wireless Body Area Networks (WBANs) have emerged as a transformative technology for health monitoring, leveraging sensor nodes placed on or within the human body. This paradigm offers real-time insights into physiolog... 详细信息
来源: 评论
Tracking and Analysis of Pedestrian’s Behavior in Public Places
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 841-853页
作者: Mahwish Pervaiz Mohammad Shorfuzzaman Abdulmajeed Alsufyani Ahmad Jalal Suliman A.Alsuhibany Jeongmin Park Department of Computer Science Bahria UniversityIslamabadPakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science Air UniversityIslamabadPakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Computer Engineering Tech University of Korea237 Sangidaehak-roSiheung-si15073Gyeonggi-doKorea
Crowd management becomes a global concern due to increased population in urban *** management of pedestrians leads to improved use of public *** of pedestrian’s is a major factor of crowd management in public *** are... 详细信息
来源: 评论
DRLLog: Deep Reinforcement Learning for Online Log Anomaly Detection
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2382-2395页
作者: Zhou, Junwei Gao, Yuyang Zhu, Ying Yu, Xiangtian Yang, Yanchao Tan, Cheng Xiang, Jianwen Wuhan University of Technology Sanya Science and Education Innovation Park School of Computer Science and Artificial Intelligence Sanya Science and Education Innovation Park School of Computer Science and Artificial Intelligence Wuhan430070 China Wuhan University of Technology School of Computer and Artificial Intelligence Wuhan430070 China
System logs record the system’s status and application behavior, providing support for various system management and diagnostic tasks. However, existing methods for log anomaly detection face several challenges, incl... 详细信息
来源: 评论
The potential of augmented reality in Indian rural primary education [STEM Education]
收藏 引用
IEEE Potentials 2024年 第4期43卷 26-31页
作者: Basumatary, Dipali Maity, Ranjan Central Institute of Technology Department of Computer Science and Engineering Assam Kokrajhar783370 India
technology-enhanced learning has the potential to increase educational quality. In this study, we examine the integration of augmented reality (AR) technology in rural primary schools in India. We listed articles asso... 详细信息
来源: 评论
A Color Image Encryption Scheme Based on Singular Values and Chaos
收藏 引用
computer Modeling in Engineering & sciences 2023年 第10期137卷 965-999页
作者: Adnan Malik Muhammad Ali Faisal S.Alsubaei Nisar Ahmed Harish Kumar Electrical Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Computer Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ... 详细信息
来源: 评论
Advancements in Remote Sensing Image Dehazing: Introducing URA-Net with Multi-Scale Dense Feature Fusion Clusters and Gated Jump Connection
收藏 引用
computer Modeling in Engineering & sciences 2024年 第9期140卷 2397-2424页
作者: Hongchi Liu Xing Deng Haijian Shao School of Computer Jiangsu University of Science and TechnologyZhenjiang212003China Department of Electrical and Computer Engineering University of NevadaLas Vegas89119USA
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components... 详细信息
来源: 评论