咨询与建议

限定检索结果

文献类型

  • 17,006 篇 期刊文献
  • 14,901 篇 会议
  • 169 册 图书

馆藏范围

  • 32,076 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,116 篇 工学
    • 10,863 篇 计算机科学与技术...
    • 8,471 篇 软件工程
    • 3,718 篇 信息与通信工程
    • 3,109 篇 电子科学与技术(可...
    • 2,931 篇 电气工程
    • 2,177 篇 控制科学与工程
    • 2,173 篇 光学工程
    • 2,082 篇 生物工程
    • 1,793 篇 生物医学工程(可授...
    • 1,468 篇 化学工程与技术
    • 1,356 篇 材料科学与工程(可...
    • 1,194 篇 机械工程
    • 1,156 篇 仪器科学与技术
    • 898 篇 动力工程及工程热...
    • 597 篇 力学(可授工学、理...
  • 14,072 篇 理学
    • 7,079 篇 物理学
    • 4,978 篇 数学
    • 2,646 篇 生物学
    • 1,778 篇 统计学(可授理学、...
    • 1,722 篇 化学
    • 942 篇 系统科学
    • 906 篇 地球物理学
  • 4,255 篇 管理学
    • 2,613 篇 管理科学与工程(可...
    • 1,690 篇 图书情报与档案管...
    • 1,087 篇 工商管理
  • 2,079 篇 医学
    • 1,692 篇 临床医学
    • 1,314 篇 基础医学(可授医学...
    • 779 篇 药学(可授医学、理...
    • 619 篇 公共卫生与预防医...
  • 740 篇 法学
    • 592 篇 社会学
  • 434 篇 农学
  • 398 篇 经济学
  • 382 篇 教育学
  • 134 篇 文学
  • 69 篇 军事学
  • 54 篇 艺术学
  • 6 篇 哲学
  • 6 篇 历史学

主题

  • 875 篇 computer science
  • 521 篇 deep learning
  • 370 篇 feature extracti...
  • 347 篇 machine learning
  • 319 篇 computational mo...
  • 293 篇 accuracy
  • 214 篇 computer archite...
  • 211 篇 semantics
  • 206 篇 routing
  • 206 篇 support vector m...
  • 206 篇 application soft...
  • 201 篇 internet of thin...
  • 200 篇 training
  • 199 篇 data mining
  • 197 篇 image segmentati...
  • 173 篇 galaxies
  • 171 篇 artificial intel...
  • 157 篇 throughput
  • 154 篇 reinforcement le...
  • 151 篇 hadron colliders

机构

  • 1,045 篇 cavendish labora...
  • 979 篇 department of ph...
  • 924 篇 oliver lodge lab...
  • 914 篇 physikalisches i...
  • 912 篇 infn laboratori ...
  • 855 篇 infn sezione di ...
  • 833 篇 infn sezione di ...
  • 814 篇 infn sezione di ...
  • 655 篇 university of ch...
  • 646 篇 infn sezione di ...
  • 634 篇 infn sezione di ...
  • 602 篇 infn sezione di ...
  • 532 篇 fakultät physik ...
  • 516 篇 yerevan physics ...
  • 512 篇 school of physic...
  • 482 篇 horia hulubei na...
  • 477 篇 iccub universita...
  • 466 篇 school of physic...
  • 462 篇 h.h. wills physi...
  • 454 篇 department of ph...

作者

  • 374 篇 j. wang
  • 245 篇 barter w.
  • 229 篇 beiter a.
  • 227 篇 a. gomes
  • 226 篇 a. vorobyev
  • 223 篇 bellee v.
  • 212 篇 y. chen
  • 209 篇 h. li
  • 208 篇 c. alexa
  • 208 篇 s. chen
  • 203 篇 j. m. izen
  • 199 篇 brundu d.
  • 197 篇 blake t.
  • 192 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg
  • 191 篇 a. bocci
  • 190 篇 d. calvet
  • 189 篇 bowcock t.j.v.
  • 189 篇 y. gao

语言

  • 27,372 篇 英文
  • 4,288 篇 其他
  • 424 篇 中文
  • 28 篇 日文
  • 8 篇 德文
  • 6 篇 法文
  • 4 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Center for Network Science and Technology"
32076 条 记 录,以下是281-290 订阅
排序:
Neuroevosp Arse: A Biologically Plausible Framework for Efficient  20
Neuroevosp Arse: A Biologically Plausible Framework for Effi...
收藏 引用
20th International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2023
作者: Shen, Zhao Zhang, Sen Zheng, Peixiang Huang, Yuqi School of Computer Science and Engineering University of Electronic Science and Technology of China China Network &education Technology Center NorthWest A&F University City YangLing China
SNNs have shown great potential in terms of power efficiency and event-driven processing during inference. To fully utilize their low power consumption and further improve their efficiency, researchers have explored p... 详细信息
来源: 评论
An Adaptive Heterogeneous Credit Card Fraud Detection Model Based on Deep Reinforcement Training Subset Selection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第8期5卷 4026-4041页
作者: Zhu, Kun Zhang, Nana Ding, Weiping Jiang, Changjun the Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Collaborative Innovation Center for Financial Network Security Tongji University Shanghai201804 China the School of Computer Science and Technology Donghua University Shanghai201620 China the School of Information Science and Technology Nantong University Nantong226019 China
Heterogeneous fraud detection is an important means of credit card security assurance, which can utilize historical transaction records in a source and target domain to build an effective fraud detection model. Nevert... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
A Comparative Study of DeepLabCut and Other Open-Source Pupillometry Data Analysis Algorithms – Which to Choose?
收藏 引用
Machine Graphics and Vision 2024年 第2期33卷 77-90页
作者: Badkul, Amitesh Mishra, Sonakshi Kommajosyula, Srinivasa P. Department of Electrical & Electronics Engineering Birla Institute of Technology and Science Hyderabad Campus Jawahar Nagar Hyderabad India Department of Pharmacy Birla Institute of Technology and Science Hyderabad Campus Jawahar Nagar Hyderabad India Ph.D. Program in Computer Science The Graduate Center The City University of New York New YorkNY United States
Pupillometry measures pupil size, and several open-source algorithms are available to analyse pupillometry data. However, only a few studies compared these algorithms’ accuracy and computational resources. This study... 详细信息
来源: 评论
PHUI-GA: GPU-based efficiency evolutionary algorithm for mining high utility itemsets
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第4期35卷 965-975页
作者: JIANG Haipeng WU Guoqing SUN Mengdan LI Feng SUN Yunfei FANG Wei Jiangsu Provincial Engineering Laboratory of Pattern Recognition and Computational Intelligence Department of Computer Science and TechnologyJiangnan UniversityWuxi 214122China China Ship Scientific Research Center Wuxi 214082China Taihu Laboratory of Deepsea Technological Science Wuxi 214082China Department of Mathematics Nanjing UniversityNanjing 210023China
Evolutionary algorithms(EAs)have been used in high utility itemset mining(HUIM)to address the problem of discover-ing high utility itemsets(HUIs)in the exponential search *** have good running and mining performance,b... 详细信息
来源: 评论
Modeling Hybrid Feature-Based Phishing Websites Detection Using Machine Learning Techniques
收藏 引用
Annals of Data science 2024年 第1期11卷 217-242页
作者: Das Guptta, Sumitra Shahriar, Khandaker Tayef Alqahtani, Hamed Alsalman, Dheyaaldin Sarker, Iqbal H. Department of Computer Science and Engineering Chittagong University of Engineering & ampTechnology Chittagong4349 Bangladesh Unit of Cybersecurity Department of Computer Science Center of Artificial Intelligence King Khalid University Abha Saudi Arabia School of Engineering Computing and Informatics Dar Al-Hekma University Jeddah Saudi Arabia
In this paper, we mainly present a machine learning based approach to detect real-time phishing websites by taking into account URL and hyperlink based hybrid features to achieve high accuracy without relying on any t... 详细信息
来源: 评论
ON THE PARAMETERIZATION OF SECOND-ORDER OPTIMIZATION EFFECTIVE TOWARDS THE INFINITE WIDTH  12
ON THE PARAMETERIZATION OF SECOND-ORDER OPTIMIZATION EFFECTI...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Ishikawa, Satoki Karakida, Ryo Department of Computer Science Tokyo Institute of Technology Japan Artificial Intelligence Research Center AIST Japan
Second-order optimization has been developed to accelerate the training of deep neural networks and it is being applied to increasingly larger-scale models. In this study, towards training on further larger scales, we... 详细信息
来源: 评论
A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第5期4卷 1051-1063页
作者: Sardar, Alamgir Umer, Saiyed Rout, Ranjeet Kumar Khan, Muhammad Khurram Aliah University Department of Computer Science and Engineering Kolkata700156 India National Institute of Technology Department of Computer Science and Engineering Srinagar190006 India King Saud University Center of Excellence in Information Assurance Riyadh11451 Saudi Arabia
The accuracy and security of a biometric system are the two sides of a coin. A biometric system must be simple, flexible, efficient, and secure enough from unauthorized access. Concerning these requirements, this arti... 详细信息
来源: 评论
ACSarF:a DRL-based adaptive consortium blockchain sharding framework for supply chain finance
收藏 引用
Digital Communications and networks 2025年 第1期11卷 26-34页
作者: Shijing Hu Junxiong Lin Xin Du Wenbin Huang Zhihui Lu Qiang Duan Jie Wu School of Computer Science Fudan UniversityShanghai 200438China Shanghai Blockchain Engineering Research Center Fudan UniversityShanghai 200438China Information Sciences and Technology Department Pennsylvania State UniversityAbingtonPA 19001USA
Blockchain technologies have been used to facilitate Web 3.0 and FinTech ***,conventional blockchain technologies suffer from long transaction delays and low transaction success rates in some Web 3.0 and FinTech appli... 详细信息
来源: 评论
Wind disturbance compensated path-following control for fixed-wing UAVs in arbitrarily strong winds
收藏 引用
Chinese Journal of Aeronautics 2024年 第2期37卷 431-445页
作者: Hao LU Lan GAO Yunda YAN Mingzhe HOU Chenliang WANG Hangzhou Innovation Institute Beihang UniversityHangzhou 310051China School of Information Science and Technology Hangzhou Normal UniversityHangzhou 311121China Department of Computer Science University College LondonLondon WC1E 6BTUnited Kingdom Center for Control Theory and Guidance Technology Harbin Institute of TechnologyHarbin 150001China School of Automation Science and Electrical Engineering Beihang UniversityBeijing 100191China
Wind is the primary challenge for low-speed fixed-wing unmanned aerial vehicles to follow a predefined flight *** cope with various wind conditions,this paper proposes a wind disturbance compensated path following con... 详细信息
来源: 评论