咨询与建议

限定检索结果

文献类型

  • 475,530 篇 会议
  • 300,421 篇 期刊文献
  • 4,738 册 图书
  • 3 篇 学位论文

馆藏范围

  • 780,686 篇 电子文献
  • 16 种 纸本馆藏

日期分布

学科分类号

  • 472,106 篇 工学
    • 240,626 篇 计算机科学与技术...
    • 192,248 篇 软件工程
    • 88,012 篇 信息与通信工程
    • 71,531 篇 电子科学与技术(可...
    • 71,272 篇 电气工程
    • 64,540 篇 化学工程与技术
    • 64,122 篇 控制科学与工程
    • 51,366 篇 材料科学与工程(可...
    • 43,068 篇 生物工程
    • 38,020 篇 机械工程
    • 36,331 篇 光学工程
    • 35,631 篇 生物医学工程(可授...
    • 34,435 篇 动力工程及工程热...
    • 27,500 篇 仪器科学与技术
    • 20,758 篇 冶金工程
    • 20,312 篇 力学(可授工学、理...
    • 16,261 篇 土木工程
    • 15,165 篇 建筑学
  • 294,462 篇 理学
    • 120,424 篇 数学
    • 120,180 篇 物理学
    • 60,089 篇 化学
    • 51,603 篇 生物学
    • 38,168 篇 统计学(可授理学、...
    • 25,951 篇 系统科学
  • 97,757 篇 管理学
    • 63,082 篇 管理科学与工程(可...
    • 37,365 篇 图书情报与档案管...
    • 28,464 篇 工商管理
  • 35,014 篇 医学
    • 27,753 篇 临床医学
    • 23,714 篇 基础医学(可授医学...
    • 14,942 篇 药学(可授医学、理...
  • 15,795 篇 法学
  • 12,537 篇 经济学
  • 11,103 篇 农学
  • 7,168 篇 教育学
  • 2,833 篇 文学
  • 1,730 篇 军事学
  • 1,032 篇 艺术学
  • 176 篇 哲学
  • 119 篇 历史学

主题

  • 26,080 篇 computer science
  • 13,303 篇 computational mo...
  • 12,867 篇 accuracy
  • 12,602 篇 feature extracti...
  • 10,448 篇 training
  • 10,301 篇 deep learning
  • 10,250 篇 machine learning
  • 8,230 篇 data mining
  • 7,841 篇 optimization
  • 7,375 篇 predictive model...
  • 7,361 篇 costs
  • 7,336 篇 bandwidth
  • 7,269 篇 algorithm design...
  • 7,264 篇 computer archite...
  • 7,139 篇 neural networks
  • 7,098 篇 wireless sensor ...
  • 7,035 篇 support vector m...
  • 6,846 篇 testing
  • 6,643 篇 robustness
  • 6,495 篇 protocols

机构

  • 5,004 篇 department of co...
  • 2,429 篇 school of comput...
  • 2,164 篇 university of ch...
  • 2,120 篇 chitkara univers...
  • 1,928 篇 infn laboratori ...
  • 1,768 篇 infn sezione di ...
  • 1,598 篇 cavendish labora...
  • 1,499 篇 department of co...
  • 1,491 篇 infn sezione di ...
  • 1,401 篇 department of el...
  • 1,310 篇 school of comput...
  • 1,241 篇 infn sezione di ...
  • 1,223 篇 infn sezione di ...
  • 1,219 篇 institute of hig...
  • 1,074 篇 school of comput...
  • 1,068 篇 department of co...
  • 1,032 篇 department of el...
  • 1,027 篇 infn sezione di ...
  • 987 篇 yerevan physics ...
  • 970 篇 infn sezione di ...

作者

  • 517 篇 ali b.
  • 441 篇 annovi a.
  • 440 篇 bachacou h.
  • 400 篇 akimov a.v.
  • 397 篇 alexopoulos t.
  • 389 篇 aad g.
  • 388 篇 waltenberger w.
  • 388 篇 azuelos g.
  • 387 篇 lowette s.
  • 387 篇 aloisio a.
  • 373 篇 tavernier s.
  • 370 篇 alonso f.
  • 367 篇 arce a.t.h.
  • 367 篇 amidei d.
  • 362 篇 alexa c.
  • 361 篇 arnaez o.
  • 361 篇 alimonti g.
  • 358 篇 argyropoulos s.
  • 358 篇 yang yang
  • 353 篇 anastopoulos c.

语言

  • 732,039 篇 英文
  • 34,054 篇 其他
  • 12,804 篇 中文
  • 1,337 篇 日文
  • 279 篇 德文
  • 246 篇 法文
  • 212 篇 朝鲜文
  • 39 篇 斯洛文尼亚文
  • 30 篇 俄文
  • 25 篇 西班牙文
  • 22 篇 阿拉伯文
  • 20 篇 土耳其文
  • 17 篇 荷兰文
  • 14 篇 意大利文
  • 7 篇 葡萄牙文
  • 5 篇 爱沙尼亚文
  • 2 篇 捷克文
  • 2 篇 克罗地亚文
  • 2 篇 波兰文
  • 2 篇 泰文
检索条件"机构=Department of Computer Science University of Engineering and Technology"
780692 条 记 录,以下是131-140 订阅
排序:
A Trusted Medical Image Zero-watermarking Scheme Based On DCNN and Hyperchaotic System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 第6期29卷 4241-4253页
作者: Xiang, Ruotong Liu, Gang Dang, Min Wangn, Quan Pan, Rong Xidian University School of Computer Science & Technology China Xidian University Department of Computer Science & Technology China
The zero-watermarking methods provide a means of lossless, which was adopted to protect medical image copyright requiring high integrity. However, most existing studies have only focused on robustness and there has be... 详细信息
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
Data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(Information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论
A Comprehensive Review of Modern Methods for Load Prediction in the Smart Grid
收藏 引用
Recent Patents on engineering 2024年 第4期18卷 40-51页
作者: Attiwal, Pushpa Indora, Sanjeev Department of Computer Science and Engineering Deenbandhu Chhotu Ram University of Science and Technology Sonepat India
Load forecasting plays a crucial role in mitigating risks for utilities by predicting future usage of commodity markets transmission or supplied by the utility. To achieve this, various techniques such as price elasti... 详细信息
来源: 评论
Highly transparent anti-reflection coating enhances the underwater efficiency and stability of perovskite solar modules
收藏 引用
Nano Research 2024年 第9期17卷 8126-8133页
作者: Feng Qian Shihao Yuan Ting Zhang Lei Wang Xiaobo Li Hualin Zheng Qien Xu Zhi David Chen Shibin Li School of Optoelectronic Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610054China Department of Electrical and Computer Engineering and Center for Nanoscale Science and Engineering University of KentuckyLexingtonKentucky 40506USA
Perovskite solar cells have shown great potential in the field of underwater solar cells due to their excellent optoelectronic properties;however,their underwater performance and stability still hinder their practical... 详细信息
来源: 评论
A Color Image Encryption Scheme Based on Singular Values and Chaos
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 965-999页
作者: Adnan Malik Muhammad Ali Faisal S.Alsubaei Nisar Ahmed Harish Kumar Electrical Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Computer Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ... 详细信息
来源: 评论
From light sensing to adaptive learning:hafnium diselenide reconfigurable memcapacitive devices in neuromorphic computing
收藏 引用
Light(science & Applications) 2025年 第1期14卷 215-226页
作者: Bashayr Alqahtani Hanrui Li Abdul Momin Syed Nazek El-Atab Electrical and Computer Engineering Program Computer Electrical Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)ThuwalSaudi Arabia Electrical Engineering Department College of EngineeringPrincess Nourah Bint Abdulrahman University(PNU)RiyadhSaudi Arabia
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Image-based rice leaf disease detection using CNN and generative adversarial network
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 439-456页
作者: Ramadan, Syed Taha Yeasin Islam, Md Shafiqul Sakib, Tanjim Sharmin, Nusrat Rahman, Md. Mokhlesur Rahman, Md. Mahbubur Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka Bangladesh
Rice is a major crop and staple food for more than half of the world’s population and plays a vital role in ensuring food security as well as the global economy pests and diseases pose a threat to the production of r... 详细信息
来源: 评论
Robust video question answering via contrastive cross-modality representation learning
收藏 引用
science China(Information sciences) 2024年 第10期67卷 211-226页
作者: Xun YANG Jianming ZENG Dan GUO Shanshan WANG Jianfeng DONG Meng WANG School of Information Science and Technology University of Science and Technology of China Institute of Artificial Intelligence Hefei Comprehensive National Science Center School of Computer Science and Information Engineering Hefei University of Technology Institutes of Physical Science and Information Technology Anhui University School of Computer Science and Technology Zhejiang Gongshang University
Video question answering(VideoQA) is a challenging yet important task that requires a joint understanding of low-level video content and high-level textual semantics. Despite the promising progress of existing efforts... 详细信息
来源: 评论